Search the dblp DataBase
Benny Chor :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Benny Chor , Charles E. Leiserson , Ronald L. Rivest , James B. Shearer An application of number theory to the organization of raster-graphics memory. [Citation Graph (4, 0)][DBLP ] J. ACM, 1986, v:33, n:1, pp:86-104 [Journal ] Shai Ben-David , Benny Chor , Oded Goldreich , Michael Luby On the Theory of Average Case Complexity (abstract). [Citation Graph (0, 0)][DBLP ] Structure in Complexity Theory Conference, 1989, pp:36- [Conf ] Reuven Bar-Yehuda , Benny Chor , Eyal Kushilevitz Privacy, Additional Information, and Communication. [Citation Graph (0, 0)][DBLP ] Structure in Complexity Theory Conference, 1990, pp:55-65 [Conf ] Jianer Chen , Benny Chor , Mike Fellows , Xiuzhen Huang , David W. Juedes , Iyad A. Kanj , Ge Xia Tight Lower Bounds for Certain Parameterized NP-Hard Problems. [Citation Graph (0, 0)][DBLP ] IEEE Conference on Computational Complexity, 2004, pp:150-160 [Conf ] Amos Beimel , Benny Chor Universally Ideal Secret Sharing Schemes (Preliminary Version). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:183-195 [Conf ] Amos Beimel , Benny Chor Interaction in Key Distribution Schemes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:444-455 [Conf ] Amos Beimel , Benny Chor Secret Sharing with Public Reconstruction (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:353-366 [Conf ] Benny Chor , Amos Fiat , Moni Naor Tracing Traitors. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:257-270 [Conf ] Benny Chor , Oded Goldreich , Shafi Goldwasser The Bit Security of Modular Squaring Given Partial Factorization of the Modulos. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:448-457 [Conf ] Benny Chor , Eyal Kushilevitz Secret Sharing Over Infinite Domains (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:299-306 [Conf ] Benny Chor , Ronald L. Rivest A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:54-65 [Conf ] Benny Chor , Oded Goldreich RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:303-313 [Conf ] Benny Chor , Madhu Sudan A Geometric Approach to Betweenness. [Citation Graph (0, 0)][DBLP ] ESA, 1995, pp:227-237 [Conf ] Werner Alexi , Benny Chor , Oded Goldreich , Claus-Peter Schnorr RSA/Rabin Bits are 1/2 + 1/poly(log N) Secure [Citation Graph (0, 0)][DBLP ] FOCS, 1984, pp:449-457 [Conf ] Benny Chor , Oded Goldreich Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1985, pp:429-442 [Conf ] Benny Chor , Oded Goldreich , Johan Håstad , Joel Friedman , Steven Rudich , Roman Smolensky The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) [Citation Graph (0, 0)][DBLP ] FOCS, 1985, pp:396-407 [Conf ] Benny Chor , Mihály Geréb-Graus , Eyal Kushilevitz Private Computations Over the Integers (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1990, pp:335-344 [Conf ] Benny Chor , Oded Goldreich , Eyal Kushilevitz , Madhu Sudan Private Information Retrieval. [Citation Graph (0, 0)][DBLP ] FOCS, 1995, pp:41-50 [Conf ] Benny Chor , Shafi Goldwasser , Silvio Micali , Baruch Awerbuch Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1985, pp:383-395 [Conf ] Benny Chor , Charles E. Leiserson , Ronald L. Rivest An Application of Number Theory to the Organization of Raster-Graphics Memory (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1982, pp:92-99 [Conf ] Benny Chor , Lior Moscovici Solvability in Asynchronous Environments (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1989, pp:422-427 [Conf ] Benny Chor , Tamir Tuller Maximum likelihood of evolutionary trees: hardness and approximation. [Citation Graph (0, 0)][DBLP ] ISMB (Supplement of Bioinformatics), 2005, pp:97-106 [Conf ] Benny Chor , Yuval Ishai On Privacy and Partition Arguments. [Citation Graph (0, 0)][DBLP ] ISTCS, 1996, pp:191-194 [Conf ] Benny Chor , Amos Israeli , Ming Li On Processor Coordination Using Asynchronous Hardware. [Citation Graph (0, 0)][DBLP ] PODC, 1987, pp:86-97 [Conf ] Benny Chor , Michael Merritt , David B. Shmoys Simple Constant-Time Consensus Protocols in Realistic Failure Models (Extended Abstract). [Citation Graph (0, 0)][DBLP ] PODC, 1985, pp:152-162 [Conf ] Benny Chor , Lee-Bath Nelson Resiliency of Interactive Distributed Tasks (Extended Abstract). [Citation Graph (0, 0)][DBLP ] PODC, 1991, pp:37-49 [Conf ] Benny Chor , Lee-Bath Nelson Resilience of General Interactive Tasks. [Citation Graph (0, 0)][DBLP ] PODC, 1994, pp:173-182 [Conf ] Benny Chor , Michael O. Rabin Achieving Independence in Logarithmic Number of Rounds. [Citation Graph (0, 0)][DBLP ] PODC, 1987, pp:260-268 [Conf ] Amir Ben-Dor , Benny Chor On constructing radiation hybrid maps (extended abstract). [Citation Graph (0, 0)][DBLP ] RECOMB, 1997, pp:17-26 [Conf ] David Burstein , Igor Ulitsky , Tamir Tuller , Benny Chor Information Theoretic Approaches to Whole Genome Phylogenies. [Citation Graph (0, 0)][DBLP ] RECOMB, 2005, pp:283-295 [Conf ] Amir Ben-Dor , Benny Chor , Dan Graur , Ron Ophir , Dan Pelleg From four-taxon trees to phylogenies (preliminary report): the case of mammalian evolution. [Citation Graph (0, 0)][DBLP ] RECOMB, 1998, pp:9-19 [Conf ] Amir Ben-Dor , Benny Chor , Richard M. Karp , Zohar Yakhini Discovering local structure in gene expression data: the order-preserving submatrix problem. [Citation Graph (0, 0)][DBLP ] RECOMB, 2002, pp:49-57 [Conf ] Benny Chor , Michael D. Hendy , Barbara R. Holland , David Penny Multiple maxima of likelihood in phylogenetic trees: an analytic approach. [Citation Graph (0, 0)][DBLP ] RECOMB, 2000, pp:108-117 [Conf ] Benny Chor , Amit Khetan , Sagi Snir Maximum likelihood on four taxa phylogenetic trees: analytic solutions. [Citation Graph (0, 0)][DBLP ] RECOMB, 2003, pp:76-83 [Conf ] Benny Chor , Tamir Tuller Maximum Likelihood of Evolutionary Trees Is Hard. [Citation Graph (0, 0)][DBLP ] RECOMB, 2005, pp:296-310 [Conf ] Benny Chor , Tamir Tuller Biological Networks: Comparison, Conservation, and Evolutionary Trees. [Citation Graph (0, 0)][DBLP ] RECOMB, 2006, pp:30-44 [Conf ] Benny Chor From Quartets to Phylogenetic Trees. [Citation Graph (0, 0)][DBLP ] SOFSEM, 1998, pp:36-53 [Conf ] Benny Chor , Brian A. Coan A Simple and Efficient Randomized Byzantine Agreement Algorithm. [Citation Graph (0, 0)][DBLP ] Symposium on Reliability in Distributed Software and Database Systems, 1984, pp:98-106 [Conf ] Shai Ben-David , Benny Chor , Oded Goldreich , Michael Luby On the Theory of Average Case Complexity [Citation Graph (0, 0)][DBLP ] STOC, 1989, pp:204-216 [Conf ] Michael Ben-Or , Benny Chor , Adi Shamir On the Cryptographic Security of Single RSA Bits [Citation Graph (0, 0)][DBLP ] STOC, 1983, pp:421-430 [Conf ] Benny Chor , Niv Gilboa Computationally Private Information Retrieval (Extended Abstract). [Citation Graph (0, 0)][DBLP ] STOC, 1997, pp:304-313 [Conf ] Benny Chor , Eyal Kushilevitz A Zero-One Law for Boolean Privacy (extended abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1989, pp:62-72 [Conf ] Louigi Addario-Berry , Benny Chor , Michael T. Hallett , Jens Lagergren , Alessandro Panconesi , Todd Wareham Ancestral Maximum Likelihood of Evolutionary Trees Is Hard. [Citation Graph (0, 0)][DBLP ] WABI, 2003, pp:202-215 [Conf ] Benny Chor , Michael D. Hendy , David Penny Analytic Solutions for Three-Taxon MLMC Trees with Variable Rates Across Sites. [Citation Graph (0, 0)][DBLP ] WABI, 2001, pp:204-213 [Conf ] Benny Chor , Tamir Tuller Adding Hidden Nodes to Gene Networks (Extended Abstract). [Citation Graph (0, 0)][DBLP ] WABI, 2004, pp:123-134 [Conf ] Tamir Tuller , Efrat Oron , Erez Makavy , Daniel A. Chamovitz , Benny Chor Time-Window Analysis of Developmental Gene Expression Data with Multiple Genetic Backgrounds. [Citation Graph (0, 0)][DBLP ] WABI, 2005, pp:53-64 [Conf ] Benny Chor , Mike Fellows , David W. Juedes Linear Kernels in Linear Time, or How to Save k Colors in O(n2 ) Steps. [Citation Graph (0, 0)][DBLP ] WG, 2004, pp:257-269 [Conf ] Benny Chor , Oded Goldreich An Improved Parallel Algorithm for Integer GCD. [Citation Graph (0, 0)][DBLP ] Algorithmica, 1990, v:5, n:1, pp:1-10 [Journal ] Matan Gavish , Amnon Peled , Benny Chor Genetic code symmetry and efficient design of GC-constrained coding sequences. [Citation Graph (0, 0)][DBLP ] Bioinformatics, 2007, v:23, n:2, pp:57-63 [Journal ] Benny Chor , Netta Shani The Privacy of Dense Symmetric Functions. [Citation Graph (0, 0)][DBLP ] Computational Complexity, 1995, v:5, n:1, pp:43-59 [Journal ] Benny Chor , Michael D. Hendy , David Penny Analytic solutions for three taxon ML trees with variable rates across sites. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2007, v:155, n:6-7, pp:750-758 [Journal ] Benny Chor , Paul Lemke , Ziv Mador On the number of ordered factorizations of natural numbers. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 2000, v:214, n:1-3, pp:123-133 [Journal ] Jianer Chen , Benny Chor , Mike Fellows , Xiuzhen Huang , David W. Juedes , Iyad A. Kanj , Ge Xia Tight lower bounds for certain parameterized NP-hard problems. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2005, v:201, n:2, pp:216-231 [Journal ] Benny Chor , Yuval Ishai On Privacy and Partition Arguments. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2001, v:167, n:1, pp:2-9 [Journal ] Benny Chor , Eyal Kushilevitz A Communication-Privacy Tradeoff for Modular Addition. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1993, v:45, n:4, pp:205-210 [Journal ] Benny Chor , Eyal Kushilevitz , Oded Goldreich , Madhu Sudan Private Information Retrieval. [Citation Graph (0, 0)][DBLP ] J. ACM, 1998, v:45, n:6, pp:965-981 [Journal ] Benny Chor , Michael Merritt , David B. Shmoys Simple constant-time consensus protocols in realistic failure models. [Citation Graph (0, 0)][DBLP ] J. ACM, 1989, v:36, n:3, pp:591-614 [Journal ] Benny Chor , Tamir Tuller Finding a maximum likelihood tree is hard. [Citation Graph (0, 0)][DBLP ] J. ACM, 2006, v:53, n:5, pp:722-744 [Journal ] Louigi Addario-Berry , Benny Chor , Michael T. Hallett , Jens Lagergren , Alessandro Panconesi , Todd Wareham Ancestral Maximum Likelihood of Evolutionary Trees Is Hard. [Citation Graph (0, 0)][DBLP ] J. Bioinformatics and Computational Biology, 2004, v:2, n:2, pp:257-272 [Journal ] Benny Chor , Oded Goldreich On the power of two-point based sampling. [Citation Graph (0, 0)][DBLP ] J. Complexity, 1989, v:5, n:1, pp:96-106 [Journal ] Amir Ben-Dor , Benny Chor On Constructing Radiation Hybrid Maps. [Citation Graph (0, 0)][DBLP ] Journal of Computational Biology, 1997, v:4, n:4, pp:517-534 [Journal ] Amir Ben-Dor , Benny Chor , Dan Graur , Ron Ophir , Dan Pelleg Constructing Phylogenies from Quartets: Elucidation of Eutherian Superordinal Relationships. [Citation Graph (0, 0)][DBLP ] Journal of Computational Biology, 1998, v:5, n:3, pp:377-390 [Journal ] Amir Ben-Dor , Benny Chor , Richard M. Karp , Zohar Yakhini Discovering Local Structure in Gene Expression Data: The Order-Preserving Submatrix Problem. [Citation Graph (0, 0)][DBLP ] Journal of Computational Biology, 2003, v:10, n:3/4, pp:373-384 [Journal ] Shai Ben-David , Benny Chor , Oded Goldreich , Michael Luby On the Theory of Average Case Complexity. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1992, v:44, n:2, pp:193-219 [Journal ] Richard Chang , Benny Chor , Oded Goldreich , Juris Hartmanis , Johan Håstad , Desh Ranjan , Pankaj Rohatgi The Random Oracle Hypothesis Is False. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1994, v:49, n:1, pp:24-39 [Journal ] Benny Chor , Eyal Kushilevitz Secret Sharing Over Infinite Domains. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1993, v:6, n:2, pp:87-95 [Journal ] Benny Chor , Mihály Geréb-Graus , Eyal Kushilevitz On the Structure of the Privacy Hierarchy. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1994, v:7, n:1, pp:53-60 [Journal ] Werner Alexi , Benny Chor , Oded Goldreich , Claus-Peter Schnorr RSA and Rabin Functions: Certain Parts are as Hard as the Whole. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1988, v:17, n:2, pp:194-209 [Journal ] Benny Chor , Oded Goldreich Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1988, v:17, n:2, pp:230-261 [Journal ] Benny Chor , Mihály Geréb-Graus , Eyal Kushilevitz Private Computations over the Integers. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1995, v:24, n:2, pp:376-386 [Journal ] Benny Chor , Amos Israeli , Ming Li Wait-Free Consensus Using Asynchronous Hardware. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1994, v:23, n:4, pp:701-712 [Journal ] Benny Chor , Lee-Bath Nelson Solvability in Asynchronous Environments II: Finite Interactive Tasks. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1999, v:29, n:2, pp:351-377 [Journal ] Benny Chor , Mihály Geréb-Graus On the Influence of Single Participant in Coin Flipping Schemes. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 1988, v:1, n:4, pp:411-415 [Journal ] Benny Chor , Eyal Kushilevitz A Zero-One Law for Boolean Privacy. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 1991, v:4, n:1, pp:36-47 [Journal ] Benny Chor , Madhu Sudan A Geometric Approach to Betweenness. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 1998, v:11, n:4, pp:511-523 [Journal ] Reuven Bar-Yehuda , Benny Chor , Eyal Kushilevitz , Alon Orlitsky Privacy, additional information and communication. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1993, v:39, n:6, pp:1930-1943 [Journal ] Amos Beimel , Benny Chor Universally ideal secret-sharing schemes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1994, v:40, n:3, pp:786-794 [Journal ] Amos Beimel , Benny Chor Communication in key distribution schemes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:1, pp:19-28 [Journal ] Amos Beimel , Benny Chor Secret Sharing with Public Reconstruction. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1998, v:44, n:5, pp:1887-1896 [Journal ] Benny Chor , Amos Fiat , Moni Naor , Benny Pinkas Tracing traitors. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:893-910 [Journal ] Benny Chor , Ronald L. Rivest A knapsack-type public key cryptosystem based on arithmetic in finite fields. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:901-909 [Journal ] Benny Chor , Brian A. Coan A Simple and Efficient Randomized Byzantine Agreement Algorithm. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1985, v:11, n:6, pp:531-539 [Journal ] Benny Chor , Michael R. Fellows , Mark A. Ragan , Igor Razgon , Frances A. Rosamond , Sagi Snir Connected Coloring Completion for General Graphs: Algorithms and Complexity. [Citation Graph (0, 0)][DBLP ] COCOON, 2007, pp:75-85 [Conf ] Genomic DNA k -mer Spectra: Models and Modalities. [Citation Graph (, )][DBLP ] Search in 0.198secs, Finished in 0.200secs