Fairness through awareness C Dwork, M Hardt, T Pitassi, O Reingold, R Zemel Proceedings of the 3rd innovations in theoretical computer science …, 2012 | 1765 | 2012 |

Undirected connectivity in log-space O Reingold Journal of the ACM (JACM) 55 (4), 1-24, 2008 | 881 | 2008 |

Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors O Reingold, S Vadhan, A Wigderson Proceedings 41st Annual Symposium on Foundations of Computer Science, 3-13, 2000 | 545 | 2000 |

On the Construction of Pseudorandom Permutations: Luby—Rackoff Revisited M Naor, O Reingold Journal of Cryptology 12 (1), 29-66, 1999 | 484 | 1999 |

Priced oblivious transfer: How to sell digital goods B Aiello, Y Ishai, O Reingold International Conference on the Theory and Applications of Cryptographic …, 2001 | 481 | 2001 |

Number-theoretic constructions of efficient pseudo-random functions M Naor, O Reingold Proceedings 38th Annual Symposium on Foundations of Computer Science, 458-467, 1997 | 424 | 1997 |

Keyword search and oblivious pseudorandom functions MJ Freedman, Y Ishai, B Pinkas, O Reingold Theory of Cryptography Conference, 303-324, 2005 | 395 | 2005 |

On the complexity of differentially private data release: efficient algorithms and hardness results C Dwork, M Naor, O Reingold, GN Rothblum, S Vadhan Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009 | 384 | 2009 |

Number-theoretic constructions of efficient pseudo-random functions M Naor, O Reingold Journal of the ACM (JACM) 51 (2), 231-262, 2004 | 344 | 2004 |

Preserving statistical validity in adaptive data analysis C Dwork, V Feldman, M Hardt, T Pitassi, O Reingold, AL Roth Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015 | 297 | 2015 |

The reusable holdout: Preserving validity in adaptive data analysis C Dwork, V Feldman, M Hardt, T Pitassi, O Reingold, A Roth Science 349 (6248), 636-638, 2015 | 294 | 2015 |

Notions of reducibility between cryptographic primitives O Reingold, L Trevisan, S Vadhan Theory of Cryptography Conference, 1-20, 2004 | 282 | 2004 |

Computational differential privacy I Mironov, O Pandey, O Reingold, S Vadhan Annual International Cryptology Conference, 126-142, 2009 | 233 | 2009 |

Extracting all the randomness and reducing the error in Trevisan's extractors R Raz, O Reingold, S Vadhan Journal of Computer and System Sciences 65 (1), 97-128, 2002 | 233 | 2002 |

Randomness conductors and constant-degree lossless expanders M Capalbo, O Reingold, S Vadhan, A Wigderson Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002 | 228 | 2002 |

Distributed pseudo-random functions and KDCs M Naor, B Pinkas, O Reingold International Conference on the Theory and Applications of Cryptographic …, 1999 | 219 | 1999 |

Perfectly one-way probabilistic hash functions (preliminary version) R Canetti, D Micciancio, O Reingold Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 212 | 1998 |

The relationship between public key encryption and oblivious transfer Y Gertner, S Kannan, T Malkin, O Reingold, M Viswanathan Proceedings 41st Annual Symposium on Foundations of Computer Science, 325-335, 2000 | 210 | 2000 |

Magic Functions: In Memoriam: Bernard M. Dwork 1923--1998 C Dwork, M Naor, O Reingold, L Stockmeyer Journal of the ACM (JACM) 50 (6), 852-921, 2003 | 209 | 2003 |

The limits of two-party differential privacy A McGregor, I Mironov, T Pitassi, O Reingold, K Talwar, S Vadhan 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 81-90, 2010 | 188 | 2010 |