Visual cryptography M Naor, A Shamir Workshop on the Theory and Application of of Cryptographic Techniques, 1-12, 1994 | 3209 | 1994 |
Optimal aggregation algorithms for middleware R Fagin, A Lotem, M Naor Journal of computer and system sciences 66 (4), 614-656, 2003 | 2288 | 2003 |
Rank aggregation methods for the web C Dwork, R Kumar, M Naor, D Sivakumar Proceedings of the 10th international conference on World Wide Web, 613-622, 2001 | 1885 | 2001 |
Broadcast encryption A Fiat, M Naor Annual International Cryptology Conference, 480-491, 1993 | 1809 | 1993 |
Untraceable electronic cash D Chaum, A Fiat, M Naor Conference on the Theory and Application of Cryptography, 319-327, 1988 | 1752 | 1988 |
Nonmalleable cryptography D Dolev, C Dwork, M Naor SIAM review 45 (4), 727-784, 2003 | 1734 | 2003 |
Revocation and tracing schemes for stateless receivers D Naor, M Naor, J Lotspiech Annual International Cryptology Conference, 41-62, 2001 | 1380 | 2001 |
Pricing via processing or combatting junk mail C Dwork, M Naor Annual International Cryptology Conference, 139-147, 1992 | 1270 | 1992 |
Universal one-way hash functions and their cryptographic applications M Naor, M Yung Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989 | 1163 | 1989 |
Public-key cryptosystems provably secure against chosen ciphertext attacks M Naor, M Yung Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990 | 1077 | 1990 |
Multicast security: A taxonomy and some efficient constructions R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999 | 1039 | 1999 |
Viceroy: A scalable and dynamic emulation of the butterfly D Malkhi, M Naor, D Ratajczak Proceedings of the twenty-first annual symposium on Principles of …, 2002 | 947 | 2002 |
Our data, ourselves: Privacy via distributed noise generation C Dwork, K Kenthapadi, F McSherry, I Mironov, M Naor Annual International Conference on the Theory and Applications of …, 2006 | 933 | 2006 |
Tracing traitors B Chor, A Fiat, M Naor Annual International Cryptology Conference, 257-270, 1994 | 808 | 1994 |
Small-bias probability spaces: Efficient constructions and applications J Naor, M Naor SIAM journal on computing 22 (4), 838-856, 1993 | 806 | 1993 |
Efficient oblivious transfer protocols M Naor, B Pinkas, B Pinkas Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms …, 2001 | 803 | 2001 |
Privacy preserving auctions and mechanism design M Naor, B Pinkas, R Sumner EC 99, 129-139, 1999 | 762 | 1999 |
Oblivious transfer and polynomial evaluation M Naor, B Pinkas Proceedings of the thirty-first annual ACM symposium on Theory of computing …, 1999 | 709 | 1999 |
Bit commitment using pseudorandomness M Naor Journal of cryptology 4 (2), 151-158, 1991 | 693 | 1991 |
Certificate revocation and certificate update M Naor, K Nissim IEEE Journal on selected areas in communications 18 (4), 561-570, 2000 | 668 | 2000 |