default search action
Aloni Cohen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Mark Bun, Aloni Cohen, Rathin Desai:
Private PAC Learning May be Harder than Online Learning. ALT 2024: 362-389 - [c13]Giuseppe D'Acquisto, Aloni Cohen, Maurizio Naldi, Kobbi Nissim:
From Isolation to Identification. PSD 2024: 3-17 - [i21]Mark Bun, Aloni Cohen, Rathin Desai:
Private PAC Learning May be Harder than Online Learning. CoRR abs/2402.11119 (2024) - [i20]Aloni Cohen, Alexander Hoover, Gabe Schoenbach:
Enhancing Watermarked Language Models to Identify Users. CoRR abs/2405.11109 (2024) - [i19]Aloni Cohen, Micah Altman, Francesca Falzon, Evangelina Anna Markatou, Kobbi Nissim:
Properties of Effective Information Anonymity Regulations. CoRR abs/2408.14740 (2024) - [i18]Christian Cianfarani, Aloni Cohen:
Understanding and Mitigating the Impacts of Differentially Private Census Data on State Level Redistricting. CoRR abs/2409.06801 (2024) - [i17]Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, Saraswathy RV:
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security. IACR Cryptol. ePrint Arch. 2024: 681 (2024) - [i16]Aloni Cohen, Alexander Hoover, Gabe Schoenbach:
Enhancing Watermarked Language Models to Identify Users. IACR Cryptol. ePrint Arch. 2024: 759 (2024) - 2023
- [j4]Micah Altman, Aloni Cohen:
Natural differential privacy - a perspective on protection guarantees. PeerJ Comput. Sci. 9: e1576 (2023) - [c12]Aloni Cohen, Adam D. Smith, Marika Swanberg, Prashant Nalini Vasudevan:
Control, Confidentiality, and the Right to be Forgotten. CCS 2023: 3358-3372 - 2022
- [c11]Aloni Cohen, Sarah Scheffler, Mayank Varia:
Can the Government Compel Decryption?: Don't Trust - Verify. CSLAW 2022: 23-36 - [c10]Julissa Milligan Walsh, Mayank Varia, Aloni Cohen, Andrew Sellars, Azer Bestavros:
Multi-Regulation Computing: Examining the Legal and Policy Questions That Arise From Secure Multiparty Computation. CSLAW 2022: 53-65 - [c9]Aloni Cohen:
Attacks on Deidentification's Defenses. USENIX Security Symposium 2022: 1469-1486 - [i15]Aloni Cohen:
Attacks on Deidentification's Defenses. CoRR abs/2202.13470 (2022) - [i14]Aloni Cohen, Moon Duchin, JN Matthews, Bhushan Suwal:
Census TopDown: The Impacts of Differential Privacy on Redistricting. CoRR abs/2203.05085 (2022) - [i13]Aloni Cohen, Sarah Scheffler, Mayank Varia:
Can the Government Compel Decryption? Don't Trust - Verify. CoRR abs/2208.02905 (2022) - [i12]Aloni Cohen, Adam D. Smith, Marika Swanberg, Prashant Nalini Vasudevan:
Control, Confidentiality, and the Right to be Forgotten. CoRR abs/2210.07876 (2022) - 2021
- [c8]Aloni Cohen, Moon Duchin, JN Matthews, Bhushan Suwal:
Census TopDown: The Impacts of Differential Privacy on Redistricting. FORC 2021: 5:1-5:22 - 2020
- [j3]Aloni Cohen, Kobbi Nissim:
Linear Program Reconstruction in Practice. J. Priv. Confidentiality 10(1) (2020) - [j2]Aloni Cohen, Kobbi Nissim:
Towards formalizing the GDPR's notion of singling out. Proc. Natl. Acad. Sci. USA 117(15): 8344-8352 (2020)
2010 – 2019
- 2019
- [b1]Aloni Cohen:
New guarantees for cryptographic circuits and data anonymization. Massachusetts Institute of Technology, Cambridge, USA, 2019 - [c7]Ran Canetti, Aloni Cohen, Nishanth Dikkala, Govind Ramnarayan, Sarah Scheffler, Adam D. Smith:
From Soft Classifiers to Hard Decisions: How fair can we be? FAT 2019: 309-318 - [c6]Aloni Cohen:
What About Bob? The Inadequacy of CPA Security for Proxy Reencryption. Public Key Cryptography (2) 2019: 287-316 - [i11]Aloni Cohen, Kobbi Nissim:
Towards Formalizing the GDPR's Notion of Singling Out. CoRR abs/1904.06009 (2019) - 2018
- [j1]Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs:
Watermarking Cryptographic Capabilities. SIAM J. Comput. 47(6): 2157-2202 (2018) - [i10]Ran Canetti, Aloni Cohen, Nishanth Dikkala, Govind Ramnarayan, Sarah Scheffler, Adam D. Smith:
From Soft Classifiers to Hard Decisions: How fair can we be? CoRR abs/1810.02003 (2018) - [i9]Aloni Cohen, Kobbi Nissim:
Linear Program Reconstruction in Practice. CoRR abs/1810.05692 (2018) - 2017
- [c5]Prabhanjan Ananth, Aloni Cohen, Abhishek Jain:
Cryptography with Updates. EUROCRYPT (2) 2017: 445-472 - [i8]Aloni Cohen:
What about Bob? The Inadequacy of CPA Security for Proxy Reencryption. IACR Cryptol. ePrint Arch. 2017: 785 (2017) - 2016
- [c4]Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs:
Watermarking cryptographic capabilities. STOC 2016: 1115-1127 - [c3]Aloni Cohen, Saleet Klein:
The GGM Function Family Is a Weakly One-Way Family of Functions. TCC (B1) 2016: 84-107 - [i7]Aloni Cohen, Saleet Klein:
The GGM PRF is a Weakly One-Way Family of Functions. IACR Cryptol. ePrint Arch. 2016: 610 (2016) - [i6]Prabhanjan Ananth, Aloni Cohen, Abhishek Jain:
Cryptography with Updates. IACR Cryptol. ePrint Arch. 2016: 934 (2016) - 2015
- [c2]Aloni Cohen, Justin Holmgren:
Multilinear Pseudorandom Functions. ICALP (1) 2015: 331-342 - [c1]Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregate Pseudorandom Functions and Connections to Learning. TCC (2) 2015: 61-89 - [i5]Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregate Pseudorandom Functions and Connections to Learning. Electron. Colloquium Comput. Complex. TR15 (2015) - [i4]Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregatable Pseudorandom Functions and Connections to Learning. IACR Cryptol. ePrint Arch. 2015: 38 (2015) - [i3]Aloni Cohen, Justin Holmgren:
Multilinear Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2015: 125 (2015) - [i2]Aloni Cohen, Justin Holmgren, Vinod Vaikuntanathan:
Publicly Verifiable Software Watermarking. IACR Cryptol. ePrint Arch. 2015: 373 (2015) - [i1]Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs:
Watermarking Cryptographic Capabilities. IACR Cryptol. ePrint Arch. 2015: 1096 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint