Protecting data privacy in private information retrieval schemes Y Gertner, Y Ishai, E Kushilevitz, T Malkin Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 699 | 1998 |
Learning words and rules: Abstract knowledge of word order in early sentence comprehension Y Gertner, C Fisher, J Eisengart Psychological science 17 (8), 684-691, 2006 | 476 | 2006 |
The relationship between public key encryption and oblivious transfer Y Gertner, S Kannan, T Malkin, O Reingold, M Viswanathan Proceedings 41st Annual Symposium on Foundations of Computer Science, 325-335, 2000 | 246 | 2000 |
Syntactic bootstrapping C Fisher, Y Gertner, RM Scott, S Yuan Wiley Interdisciplinary Reviews: Cognitive Science 1 (2), 143-149, 2010 | 214 | 2010 |
Distributed agent based model for security monitoring and response Y Gertner, FSM Herz, WP Labys US Patent 9,503,470, 2016 | 164 | 2016 |
Predicted errors in children’s early sentence comprehension Y Gertner, C Fisher Cognition 124 (1), 85-94, 2012 | 156 | 2012 |
Bounds on the efficiency of generic cryptographic constructions R Gennaro, Y Gertner, J Katz, L Trevisan SIAM journal on Computing 35 (1), 217-246, 2005 | 135 | 2005 |
How do infants reason about physical events? R Baillargeon, J Li, Y Gertner, D Wu The Wiley‐Blackwell handbook of childhood cognitive development, 11-48, 2010 | 128 | 2010 |
On the impossibility of basing trapdoor functions on trapdoor predicates Y Gertner, T Malkin, O Reingold Proceedings 42nd IEEE Symposium on Foundations of Computer Science, 126-135, 2001 | 125 | 2001 |
A Random Server Model for Private Information Retrieval: How to Achieve Information Theoretic PIR Avoiding Database Replication Y Gertner, S Goldwasser, T Malkin Randomization and Approximation Techniques in Computer Science: Second …, 1998 | 116 | 1998 |
Object individuation and physical reasoning in infancy: An integrative account R Baillargeon, M Stavans, D Wu, Y Gertner, P Setoh, AK Kittredge, ... Language Learning and Development 8 (1), 4-46, 2012 | 100 | 2012 |
Towards a separation of semantic and CCA security for public key encryption Y Gertner, T Malkin, S Myers Theory of Cryptography Conference, 434-455, 2007 | 80 | 2007 |
Lower bounds on the efficiency of encryption and digital signature schemes R Gennaro, Y Gertner, J Katz Proceedings of the thirty-fifth annual ACM symposium on Theory of computing …, 2003 | 47 | 2003 |
How do the object-file and physical-reasoning systems interact? Evidence from priming effects with object arrays or novel labels Y Lin, J Li, Y Gertner, W Ng, CL Fisher, R Baillargeon Cognitive Psychology 125, 101368, 2021 | 43 | 2021 |
Distributed agent based model for security monitoring and response Y Gertner, FSM Herz, WP Labys US Patent 11,171,974, 2021 | 30 | 2021 |
System and method which employs a multi user secure scheme utilizing shared keys FSM Herz, Y Gertner, CH Martell, S Kannan US Patent 7,350,069, 2008 | 25 | 2008 |
Baby SRL: Modeling Early Language Acquisition. M Connor, Y Gertner, C Fisher, D Roth CoNLL 2008: Proceedings of the Twelfth Conference on Computational Natural …, 2008 | 22 | 2008 |
Sdi (sdi for epi-demics) FSM Herz, WP Labys, B Madan, Y Gertner, S Kannan US Patent App. 14/043,498, 2014 | 21 | 2014 |
Starting from scratch in semantic role labeling M Connor, Y Gertner, C Fisher, D Roth Proceedings of the 48th Annual Meeting of the Association for Computational …, 2010 | 16 | 2010 |
Minimally supervised model of early language acquisition M Connor, Y Gertner, C Fisher, D Roth Proceedings of the Thirteenth Conference on Computational Natural Language …, 2009 | 11 | 2009 |