Visual cryptography M Naor, A Shamir Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995 | 4173 | 1995 |
Optimal aggregation algorithms for middleware R Fagin, A Lotem, M Naor Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on …, 2001 | 2675 | 2001 |
Our data, ourselves: Privacy via distributed noise generation C Dwork, K Kenthapadi, F McSherry, I Mironov, M Naor Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006 | 2517 | 2006 |
Rank aggregation methods for the web C Dwork, R Kumar, M Naor, D Sivakumar Proceedings of the 10th international conference on World Wide Web, 613-622, 2001 | 2375 | 2001 |
Pricing via processing or combatting junk mail C Dwork, M Naor Annual international cryptology conference, 139-147, 1992 | 2251 | 1992 |
Broadcast encryption A Fiat, M Naor Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 1994 | 2151 | 1994 |
Untraceable electronic cash D Chaum, A Fiat, M Naor Advances in Cryptology—CRYPTO’88: Proceedings 8, 319-327, 1990 | 2105 | 1990 |
Non-malleable cryptography D Dolev, C Dwork, M Naor Proceedings of the twenty-third annual ACM symposium on Theory of computing …, 1991 | 2059 | 1991 |
Revocation and tracing schemes for stateless receivers D Naor, M Naor, J Lotspiech Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 1634 | 2001 |
Public-key cryptosystems provably secure against chosen ciphertext attacks M Naor, M Yung Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990 | 1387 | 1990 |
Universal one-way hash functions and their cryptographic applications M Naor, M Yung Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989 | 1357 | 1989 |
Multicast security: A taxonomy and some efficient constructions R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999 | 1175 | 1999 |
Efficient oblivious transfer protocols. M Naor, B Pinkas SODA 1, 448-457, 2001 | 1092 | 2001 |
Viceroy: A scalable and dynamic emulation of the butterfly D Malkhi, M Naor, D Ratajczak Proceedings of the twenty-first annual symposium on Principles of …, 2002 | 1025 | 2002 |
Privacy preserving auctions and mechanism design M Naor, B Pinkas, R Sumner Proceedings of the 1st ACM Conference on Electronic Commerce, 129-139, 1999 | 1011 | 1999 |
Small-bias probability spaces: Efficient constructions and applications J Naor, M Naor Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990 | 993 | 1990 |
Tracing traitors B Chor, A Fiat, M Naor Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology …, 1994 | 947 | 1994 |
Number-theoretic constructions of efficient pseudo-random functions M Naor, O Reingold Journal of the ACM (JACM) 51 (2), 231-262, 2004 | 922 | 2004 |
Bit commitment using pseudorandomness M Naor Journal of cryptology 4, 151-158, 1991 | 896 | 1991 |
Differential privacy under continual observation C Dwork, M Naor, T Pitassi, GN Rothblum Proceedings of the forty-second ACM symposium on Theory of computing, 715-724, 2010 | 884 | 2010 |