×

zbMATH — the first resource for mathematics

Nissim, Kobbi

Compute Distance To:
Author ID: nissim.kobbi Recent zbMATH articles by "Nissim, Kobbi"
Published as: Nissim, Kobbi; Nissirn, Kobbi
External Links: MGP · Wikidata
Documents Indexed: 54 Publications since 1999

Publications by Year

Citations contained in zbMATH Open

40 Publications have been cited 930 times in 418 Documents Cited by Year
Calibrating noise to sensitivity in private data analysis. Zbl 1112.94027
Dwork, Cynthia; McSherry, Frank; Nissim, Kobbi; Smith, Adam
195
2006
Privacy-preserving datamining on vertically partitioned databases. Zbl 1104.68038
Dwork, Cynthia; Nissim, Kobbi
107
2004
Private learning and sanitization: pure vs approximate differential privacy. Zbl 1332.68061
Beimel, Amos; Nissim, Kobbi; Stemmer, Uri
97
2013
Bounds on the sample complexity for private learning and private data release. Zbl 1274.94038
Beimel, Amos; Kasiviswanathan, Shiva Prasad; Nissim, Kobbi
96
2010
Evaluating 2-DNF formulas on ciphertexts. Zbl 1079.94534
Boneh, Dan; Goh, Eu-Jin; Nissim, Kobbi
96
2005
Characterizing the sample complexity of private learners. Zbl 1362.68119
Beimel, Amos; Nissim, Kobbi; Stemmer, Uri
95
2013
Efficient private matching and set intersection. Zbl 1122.94416
Freedman, Michael J.; Nissim, Kobbi; Pinkas, Benny
35
2004
Extending oblivious transfers efficiently. Zbl 1122.94422
Ishai, Yuval; Kilian, Joe; Nissim, Kobbi; Petrank, Erez
31
2003
What can we learn privately? Zbl 1235.68093
Kasiviswanathan, Shiva Prasad; Lee, Homin K.; Nissim, Kobbi; Raskhodnikova, Sofya; Smith, Adam
28
2011
Smooth sensitivity and sampling in private data analysis. Zbl 1232.68039
Nissirn, Kobbi; Raskhodnikova, Sofya; Smith, Adam
16
2007
Approximately optimal mechanism design via differential privacy. Zbl 1348.91124
Nissim, Kobbi; Smorodinsky, Rann; Tennenholtz, Moshe
14
2012
Distributed private data analysis: Simultaneously solving how and what. Zbl 1183.68080
Beimel, Amos; Nissim, Kobbi; Omri, Eran
10
2008
Efficient communication-storage tradeoffs for multicast encryption. Zbl 0937.68043
Canetti, Ran; Malkin, Tal; Nissim, Kobbi
10
1999
Communication preserving protocols for secure function evaluation. Zbl 1323.68317
Naor, Moni; Nissim, Kobbi
10
2001
Algorithmic stability for adaptive data analysis. Zbl 1376.68122
Bassily, Raef; Nissim, Kobbi; Smith, Adam; Steinke, Thomas; Stemmer, Uri; Ullman, Jonathan
8
2016
Efficient set operations in the presence of malicious adversaries. Zbl 1272.94034
Hazay, Carmit; Nissim, Kobbi
8
2012
Secure multiparty computation of approximations. Zbl 1321.68464
Feigenbaum, Joan; Ishai, Yuval; Malkin, Tal; Nissim, Kobbi; Strauss, Martin J.; Wright, Rebecca N.
6
2006
Approximating the minimum bisection size (extended abstract). Zbl 1296.05162
Feige, Uriel; Krauthgamer, Robert; Nissim, Kobbi
6
2000
Secure multiparty computation of approximations (extended abstract). Zbl 0986.68954
Feigenbaum, Joan; Ishai, Yuval; Malkin, Tal; Nissim, Kobbi; Strauss, Martin J.
6
2001
Efficient set operations in the presence of malicious adversaries. Zbl 1281.94029
Hazay, Carmit; Nissim, Kobbi
6
2010
Efficient set intersection with simulation-based security. Zbl 1351.94044
Freedman, Michael J.; Hazay, Carmit; Nissim, Kobbi; Pinkas, Benny
5
2016
Simultaneous private learning of multiple concepts. Zbl 1334.68179
Bun, Mark; Nissim, Kobbi; Stemmer, Uri
4
2016
Private coresets. Zbl 1304.94054
Feldman, Dan; Fiat, Amos; Kaplan, Haim; Nissim, Kobbi
4
2009
Impossibility of differentially private universally optimal mechanisms. Zbl 1320.68072
Brenner, Hai; Nissim, Kobbi
4
2014
On cutting a few vertices from a graph. Zbl 1019.68137
Feige, Uriel; Krauthgamer, Robert; Nissim, Kobbi
4
2003
Analyzing graphs with node differential privacy. Zbl 1316.68050
Kasiviswanathan, Shiva Prasad; Nissim, Kobbi; Raskhodnikova, Sofya; Smith, Adam
4
2013
Hiding the input-size in secure two-party computation. Zbl 1326.94110
Lindell, Yehuda; Nissim, Kobbi; Orlandi, Claudio
3
2013
Bounds on the sample complexity for private learning and private data release. Zbl 1311.68131
Beimel, Amos; Brenner, Hai; Kasiviswanathan, Shiva Prasad; Nissim, Kobbi
3
2014
Private learning and sanitization: pure vs. approximate differential privacy. Zbl 1362.68096
Beimel, Amos; Nissim, Kobbi; Stemmer, Uri
2
2016
Private approximation of search problems. Zbl 1301.68265
Beimel, Amos; Carmi, Paz; Nissim, Kobbi; Weinreb, Enav
2
2006
Private approximation of NP-hard functions. Zbl 1323.68569
Halevi, Shai; Krauthgamer, Robert; Kushilevitz, Eyal; Nissim, Kobbi
2
2001
Redrawing the boundaries on purchasing data from privacy-sensitive individuals. Zbl 1366.91094
Nissim, Kobbi; Vadhan, Salil; Xiao, David
2
2014
Private approximation of clustering and vertex cover. Zbl 1129.94013
Beimel, Amos; Hallak, Renen; Nissim, Kobbi
2
2007
Communication efficient secure linear algebra. Zbl 1112.94031
Nissim, Kobbi; Weinreb, Enav
2
2006
On the hardness of approximating \({\mathcal N}{\mathcal P}\) witnesses. Zbl 0976.90081
Feige, Uriel; Langberg, Michael; Nissim, Kobbi
2
2000
Clustering algorithms for the centralized and local models. Zbl 1405.68111
Nissim, Kobbi; Stemmer, Uri
1
2018
How should we solve search problems privately? Zbl 1215.68086
Beimel, Amos; Malkin, Tal; Nissim, Kobbi; Weinreb, Enav
1
2007
Denials leak information: simulatable auditing. Zbl 1307.68036
Kenthapadi, Krishnaram; Mishra, Nina; Nissim, Kobbi
1
2013
Hard instances of the constrained discrete logarithm problem. Zbl 1143.11365
Mironov, Ilya; Mityagin, Anton; Nissim, Kobbi
1
2006
Practical locally private heavy hitters. Zbl 07255047
Bassily, Raef; Nissim, Kobbi; Stemmer, Uri; Thakurta, Abhradeep
1
2020
Practical locally private heavy hitters. Zbl 07255047
Bassily, Raef; Nissim, Kobbi; Stemmer, Uri; Thakurta, Abhradeep
1
2020
Clustering algorithms for the centralized and local models. Zbl 1405.68111
Nissim, Kobbi; Stemmer, Uri
1
2018
Algorithmic stability for adaptive data analysis. Zbl 1376.68122
Bassily, Raef; Nissim, Kobbi; Smith, Adam; Steinke, Thomas; Stemmer, Uri; Ullman, Jonathan
8
2016
Efficient set intersection with simulation-based security. Zbl 1351.94044
Freedman, Michael J.; Hazay, Carmit; Nissim, Kobbi; Pinkas, Benny
5
2016
Simultaneous private learning of multiple concepts. Zbl 1334.68179
Bun, Mark; Nissim, Kobbi; Stemmer, Uri
4
2016
Private learning and sanitization: pure vs. approximate differential privacy. Zbl 1362.68096
Beimel, Amos; Nissim, Kobbi; Stemmer, Uri
2
2016
Impossibility of differentially private universally optimal mechanisms. Zbl 1320.68072
Brenner, Hai; Nissim, Kobbi
4
2014
Bounds on the sample complexity for private learning and private data release. Zbl 1311.68131
Beimel, Amos; Brenner, Hai; Kasiviswanathan, Shiva Prasad; Nissim, Kobbi
3
2014
Redrawing the boundaries on purchasing data from privacy-sensitive individuals. Zbl 1366.91094
Nissim, Kobbi; Vadhan, Salil; Xiao, David
2
2014
Private learning and sanitization: pure vs approximate differential privacy. Zbl 1332.68061
Beimel, Amos; Nissim, Kobbi; Stemmer, Uri
97
2013
Characterizing the sample complexity of private learners. Zbl 1362.68119
Beimel, Amos; Nissim, Kobbi; Stemmer, Uri
95
2013
Analyzing graphs with node differential privacy. Zbl 1316.68050
Kasiviswanathan, Shiva Prasad; Nissim, Kobbi; Raskhodnikova, Sofya; Smith, Adam
4
2013
Hiding the input-size in secure two-party computation. Zbl 1326.94110
Lindell, Yehuda; Nissim, Kobbi; Orlandi, Claudio
3
2013
Denials leak information: simulatable auditing. Zbl 1307.68036
Kenthapadi, Krishnaram; Mishra, Nina; Nissim, Kobbi
1
2013
Approximately optimal mechanism design via differential privacy. Zbl 1348.91124
Nissim, Kobbi; Smorodinsky, Rann; Tennenholtz, Moshe
14
2012
Efficient set operations in the presence of malicious adversaries. Zbl 1272.94034
Hazay, Carmit; Nissim, Kobbi
8
2012
What can we learn privately? Zbl 1235.68093
Kasiviswanathan, Shiva Prasad; Lee, Homin K.; Nissim, Kobbi; Raskhodnikova, Sofya; Smith, Adam
28
2011
Bounds on the sample complexity for private learning and private data release. Zbl 1274.94038
Beimel, Amos; Kasiviswanathan, Shiva Prasad; Nissim, Kobbi
96
2010
Efficient set operations in the presence of malicious adversaries. Zbl 1281.94029
Hazay, Carmit; Nissim, Kobbi
6
2010
Private coresets. Zbl 1304.94054
Feldman, Dan; Fiat, Amos; Kaplan, Haim; Nissim, Kobbi
4
2009
Distributed private data analysis: Simultaneously solving how and what. Zbl 1183.68080
Beimel, Amos; Nissim, Kobbi; Omri, Eran
10
2008
Smooth sensitivity and sampling in private data analysis. Zbl 1232.68039
Nissirn, Kobbi; Raskhodnikova, Sofya; Smith, Adam
16
2007
Private approximation of clustering and vertex cover. Zbl 1129.94013
Beimel, Amos; Hallak, Renen; Nissim, Kobbi
2
2007
How should we solve search problems privately? Zbl 1215.68086
Beimel, Amos; Malkin, Tal; Nissim, Kobbi; Weinreb, Enav
1
2007
Calibrating noise to sensitivity in private data analysis. Zbl 1112.94027
Dwork, Cynthia; McSherry, Frank; Nissim, Kobbi; Smith, Adam
195
2006
Secure multiparty computation of approximations. Zbl 1321.68464
Feigenbaum, Joan; Ishai, Yuval; Malkin, Tal; Nissim, Kobbi; Strauss, Martin J.; Wright, Rebecca N.
6
2006
Private approximation of search problems. Zbl 1301.68265
Beimel, Amos; Carmi, Paz; Nissim, Kobbi; Weinreb, Enav
2
2006
Communication efficient secure linear algebra. Zbl 1112.94031
Nissim, Kobbi; Weinreb, Enav
2
2006
Hard instances of the constrained discrete logarithm problem. Zbl 1143.11365
Mironov, Ilya; Mityagin, Anton; Nissim, Kobbi
1
2006
Evaluating 2-DNF formulas on ciphertexts. Zbl 1079.94534
Boneh, Dan; Goh, Eu-Jin; Nissim, Kobbi
96
2005
Privacy-preserving datamining on vertically partitioned databases. Zbl 1104.68038
Dwork, Cynthia; Nissim, Kobbi
107
2004
Efficient private matching and set intersection. Zbl 1122.94416
Freedman, Michael J.; Nissim, Kobbi; Pinkas, Benny
35
2004
Extending oblivious transfers efficiently. Zbl 1122.94422
Ishai, Yuval; Kilian, Joe; Nissim, Kobbi; Petrank, Erez
31
2003
On cutting a few vertices from a graph. Zbl 1019.68137
Feige, Uriel; Krauthgamer, Robert; Nissim, Kobbi
4
2003
Communication preserving protocols for secure function evaluation. Zbl 1323.68317
Naor, Moni; Nissim, Kobbi
10
2001
Secure multiparty computation of approximations (extended abstract). Zbl 0986.68954
Feigenbaum, Joan; Ishai, Yuval; Malkin, Tal; Nissim, Kobbi; Strauss, Martin J.
6
2001
Private approximation of NP-hard functions. Zbl 1323.68569
Halevi, Shai; Krauthgamer, Robert; Kushilevitz, Eyal; Nissim, Kobbi
2
2001
Approximating the minimum bisection size (extended abstract). Zbl 1296.05162
Feige, Uriel; Krauthgamer, Robert; Nissim, Kobbi
6
2000
On the hardness of approximating \({\mathcal N}{\mathcal P}\) witnesses. Zbl 0976.90081
Feige, Uriel; Langberg, Michael; Nissim, Kobbi
2
2000
Efficient communication-storage tradeoffs for multicast encryption. Zbl 0937.68043
Canetti, Ran; Malkin, Tal; Nissim, Kobbi
10
1999
all top 5

Cited by 900 Authors

12 Nissim, Kobbi
7 Hazay, Carmit
7 Lindell, Yehuda
7 Vadhan, Salil P.
6 Ishai, Yuval
6 Mu, Yi
6 Sahai, Amit
6 Ullman, Jonathan R.
6 Waters, Brent
5 Bun, Mark
5 Domingo-Ferrer, Josep
5 Feldman, Vitaly
5 Nikolov, Aleksandar
5 Ostrovsky, Rafail
5 Pinkas, Benny
5 Roth, Aaron Leon
4 Beimel, Amos
4 Haitner, Iftach
4 Jordan, Michael Irwin
4 Li, Shundong
4 Libert, Benoît
4 Malkin, Tal G.
4 Mohassel, Payman
4 Nielsen, Jesper Buus
4 Rosulek, Mike
4 Susilo, Willy
4 Talwar, Kunal
4 Wang, Di
4 Wigderson, Avi
4 Xu, Jinhui
4 Zhang, Fangguo
3 Boneh, Dan
3 Boyle, Elette
3 Canetti, Ran
3 Cummings, Rachel
3 D’Arco, Paolo
3 Debnath, Sumit Kumar
3 Duchi, John C.
3 Dwork, Cynthia
3 Fotakis, Dimitris A.
3 Groth, Jens
3 Hsu, Justin
3 Katz, Jonathan N.
3 Koutsoupias, Elias
3 Li, Jiguo
3 Li, Jin
3 Lokshtanov, Daniel
3 Prabhakaran, Manoj M.
3 Qin, Bo
3 Roughgarden, Tim
3 Schneider, Thomas
3 Servedio, Rocco A.
3 Shi, Runhua
3 Srinivasan, Srikanth
3 Stemmer, Uri
3 Vaikuntanathan, Vinod
3 Wainwright, Martin J.
3 Wang, Daoshun
3 Woodruff, David P.
3 Wu, Qianhong
3 Wu, Zhiwei Steven
3 Yaroslavtsev, Grigory
3 Yu, Qihong
3 Yung, Moti
3 Zhang, Lei
3 Zhang, Shun
3 Zhang, Yichen
3 Zhao, Minghao
2 Awasthi, Pranjal
2 Balcan, Maria-Florina
2 Barthe, Gilles
2 Bassily, Raef
2 Bitansky, Nir
2 Blundo, Carlo
2 Boyen, Xavier
2 Brakerski, Zvika
2 Chase, Melissa
2 Chatterjee, Sanjit
2 Chen, Jie
2 Chen, Xiaofeng
2 Choi, Seung Geol
2 Cleve, Richard
2 Cui, Jie
2 Cygan, Marek
2 Dai, Yiqi
2 Ding, Jian
2 Dou, Jiawei
2 Dutta, Ratna
2 Feige, Uriel
2 Feldman, Dan
2 Fischlin, Marc
2 Fuchsbauer, Georg
2 Fujisaki, Eiichiro
2 Galbraith, Steven D.
2 Ganesh, Chaya
2 Genkin, Daniel
2 Gentry, Craig
2 Giannakopoulos, Yiannis
2 Gilboa, Niv
2 Goldreich, Oded
...and 800 more Authors
all top 5

Cited in 71 Serials

37 Journal of Cryptology
29 Information Sciences
19 Theoretical Computer Science
10 SIAM Journal on Computing
6 Journal of the American Statistical Association
6 Algorithmica
6 Journal of Machine Learning Research (JMLR)
5 Automatica
5 Advances in Mathematics of Communications
4 Discrete Applied Mathematics
4 Journal of Computer and System Sciences
4 Machine Learning
4 Quantum Information Processing
4 Electronic Journal of Statistics
3 Information Processing Letters
3 Statistical Science
3 International Journal of Foundations of Computer Science
3 Designs, Codes and Cryptography
3 Distributed Computing
3 Mathematical Problems in Engineering
3 Theory of Computing Systems
3 Soft Computing
3 Journal of Mathematical Cryptology
3 Statistics and Computing
3 ACM Transactions on Computation Theory
2 The Annals of Statistics
2 Mathematics of Operations Research
2 Operations Research
2 SIAM Journal on Discrete Mathematics
2 Games and Economic Behavior
2 Wuhan University Journal of Natural Sciences (WUJNS)
2 Science in China. Series F
2 Frontiers of Computer Science
1 ACM Transactions on Database Systems
1 Mathematics of Computation
1 Computing
1 Journal of Mathematical Psychology
1 Journal of Number Theory
1 Journal of Statistical Planning and Inference
1 Mathematika
1 Mathematical Social Sciences
1 Discrete & Computational Geometry
1 International Journal of Approximate Reasoning
1 Neural Networks
1 Annals of Operations Research
1 Journal of Statistical Computation and Simulation
1 Linear Algebra and its Applications
1 Journal of Mathematical Imaging and Vision
1 Finite Fields and their Applications
1 The Journal of Artificial Intelligence Research (JAIR)
1 Complexity
1 Nonlinear Dynamics
1 Journal of Inequalities and Applications
1 Journal of Combinatorial Optimization
1 Journal of the ACM
1 Data Mining and Knowledge Discovery
1 Interdisciplinary Information Sciences (IIS)
1 Acta Mathematica Sinica. English Series
1 Fundamenta Informaticae
1 JP Journal of Algebra, Number Theory and Applications
1 Journal of Discrete Algorithms
1 Mathematics in Computer Science
1 Journal of Modern Dynamics
1 Logical Methods in Computer Science
1 The Annals of Applied Statistics
1 Statistics Surveys
1 Science China. Information Sciences
1 Pacific Journal of Mathematics for Industry
1 Japanese Journal of Statistics and Data Science
1 SIAM Journal on Mathematics of Data Science
1 Matematicheskie Voprosy Kriptografii

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.