Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • 2017

    Non-Interactive Multiparty Computation Without Correlated Randomness

    Halevi, S., Ishai, Y., Jain, A., Komargodski, I., Sahai, A. & Yogev, E., 2017, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III. Takagi, T. & Peyrin, T. (eds.). Vol. 10626. p. 181-211 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    21 Scopus citations
  • Secure Arithmetic Computation with Constant Computational Overhead

    Applebaum, B., Damgard, I., Ishai, Y., Nielsen, M., Zichron, L. & Damgård, I., 2017, ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I. Shacham, H. & Katz, J. (eds.). Vol. 10401. p. 223-254 32 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    37 Scopus citations
  • The Price of Low Communication in Secure Multi-party Computation

    Garay, J., Ishai, Y., Ostrovsky, R. & Zikas, V., 2017, ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I. Shacham, H. & Katz, J. (eds.). Vol. 10401. p. 420-446 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    17 Scopus citations
  • Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions

    Badrinarayanan, S., Garg, S., Ishai, Y., Sahai, A. & Wadia, A., 2017, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III. Takagi, T. & Peyrin, T. (eds.). Vol. 10626. p. 275-303 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    25 Scopus citations
  • 2018

    Compressing vector OLE

    Boyle, E., Couteau, G., Gilboa, N. & Ishai, Y., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 896-912 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    91 Scopus citations
  • Compressing Vector OLE

    Boyle, E., Couteau, G., Gilboa, N. & Ishai, Y., 2018

    Research output: Other contributionpeer-review

  • Foundations of homomorphic secret sharing

    Boyle, E., Gilboa, N., Ishai, Y., Lin, H. & Tessaro, S., 1 Jan 2018, 9th Innovations in Theoretical Computer Science, ITCS 2018. Karlin, A. R. (ed.). 21. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 94).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Scopus citations
  • Limits of Practical Sublinear Secure Computation

    Boyle, E., Ishai, Y. & Polychroniadou, A., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III. Shacham, H. & Boldyreva, A. (eds.). Vol. 10993. p. 302-332 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • Minimizing Locality of One-Way Functions via Semi-private Randomized Encodings

    Applebaum, B., Ishai, Y., Kushilevitz, E. & Eyal, K., 1 Jan 2018, In: Journal of Cryptology. 31, 1, p. 1-22

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • On the Local Leakage Resilience of Linear Secret Sharing Schemes

    Benhamouda, F., Degwekar, A., Ishai, Y. & Rabin, T., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I. Boldyreva, A. & Shacham, H. (eds.). Vol. 10991. p. 531-561 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    28 Scopus citations
  • On the message complexity of secure multiparty computation

    Ishai, Y., Mittal, M. & Ostrovsky, R., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). p. 698-711 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Private Circuits: A Modular Approach: A modular approach

    Ananth, P., Ishai, Y. & Sahai, A., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III. Shacham, H. & Boldyreva, A. (eds.). Vol. 10993. p. 427-455 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    21 Scopus citations
  • Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs

    Boneh, D., Ishai, Y., Sahai, A. & Wu, D. J., 2018, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III. Nielsen, J. B. & Rijmen, V. (eds.). Vol. 10822. p. 222-255 34 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    17 Scopus citations
  • Two-round MPC: Information-theoretic and black-box

    Garg, S., Ishai, Y. & Srinivasan, A., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). p. 123-151 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • 2019

    Cryptographic Sensing

    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A. & Eyal, K., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 583-604 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • Efficient Pseudorandom Correlation Generators: Silent OT Extension and More: Silent OT Extension and More

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 489-518 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    61 Scopus citations
  • Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Rindal, P. & Scholl, P., 2019

    Research output: Other contributionpeer-review

  • Leviosa: Lightweight secure arithmetic computation

    Hazay, C., Marcedone, A., Ishai, Y. & Venkitasubramaniam, M., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 327-344 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • LevioSA: Lightweight Secure Arithmetic Computation

    Hazay, C., Ishai, Y., Marcedone, A. & Venkitasubramaniam, M., 2019

    Research output: Other contributionpeer-review

  • Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs

    Boyle, E., Ishai, Y., Gilboa, N. & Nof, A., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 869-886 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs

    Boyle, E., Gilboa, N., Ishai, Y. & Nof, A., 2019

    Research output: Other contributionpeer-review

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11478 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11477 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11476 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Reusable Non-Interactive Secure Computation

    Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 462-488 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    15 Scopus citations
  • Secure Computation with Preprocessing via Function Secret Sharing

    Boyle, E., Gilboa, N. & Ishai, Y., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). p. 341-371 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11891 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • Trapdoor Hash Functions and Their Applications

    Dottling, N., Garg, S., Ishai, Y., Malavolta, G., Mour, T., Ostrovsky, R. & Döttling, N., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 3-32 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    39 Scopus citations
  • Unconditionally Secure Computation Against Low-Complexity Leakage

    Bogdanov, A., Ishai, Y. & Srinivasan, A., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II. Boldyreva, A. & Micciancio, D. (eds.). Vol. 11693. p. 387-416 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    7 Scopus citations
  • Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 67-97 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    36 Scopus citations
  • 2020
  • Affine determinant programs: A framework for obfuscation and witness encryption

    Bartusek, J., Ishai, Y., Jain, A., Ma, F., Sahai, A. & Zhandry, M., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 82. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • Cryptography from One-Way Communication: On Completeness of Finite Channels

    Agrawal, S., Ishai, Y., Kushilevitz, E., Narayanan, V., Prabhakaran, M., Prabhakaran, V. & Rosen, A., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). p. 653-685 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12493 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • How Low Can We Go?

    Ishai, Y., 2020

    Research output: Other contribution

  • Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC

    Abascal, J., Faghihi Sereshgi, M. H., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. p. 1591-1605 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Limits of preprocessing

    Filmus, Y., Ishai, Y., Kaplan, A. & Kindler, G., 1 Jul 2020, 35th Computational Complexity Conference, CCC 2020. Saraf, S. (ed.). 17. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 169).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • On computational shortcuts for information-theoretic PIR

    Hong, M. M., Ishai, Y., Kolobov, V. I. & Lai, R. W. F., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). p. 504-534 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12550 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • On pseudorandom encodings

    Agrikola, T., Couteau, G., Ishai, Y., Jarecki, S. & Sahai, A., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). p. 639-669 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12552 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • On succinct arguments and witness encryption from groups

    Barta, O., Ishai, Y., Ostrovsky, R. & Wu, D. J., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). p. 776-806 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12170 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • On the complexity of decomposable randomized encodings, or: How friendly can a garbling-friendly PRF be?

    Ball, M., Holmgren, J., Ishai, Y., Liu, T. & Malkin, T., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 86. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12105 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12107 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12106 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Proximity gaps for reed-solomon codes

    Ben-Sasson, E., Carmon, D., Ishai, Y., Kopparty, S. & Saraf, S., Nov 2020, Proceedings - 2020 IEEE 61st Annual Symposium on Foundations of Computer Science, FOCS 2020. p. 900-909 10 p. 9317990. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Separating two-round secure computation from oblivious transfer

    Applebaum, B., Brakerski, Z., Garg, S., Ishai, Y. & Srinivasan, A., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 71. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • 2021

    A Geometric Approach to Homomorphic Secret Sharing

    Ishai, Y., Lai, R. W. F. & Malavolta, G., 2021, Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings. Garay, J. A. (ed.). p. 92-119 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12711 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • On the Local Leakage Resilience of Linear Secret Sharing Schemes

    Benhamouda, F., Degwekar, A., Ishai, Y. & Rabin, T., Apr 2021, In: Journal of Cryptology. 34, 2, 10.

    Research output: Contribution to journalArticlepeer-review

    14 Scopus citations
  • 2022

    Authenticated Garbling from Simple Correlations

    Dittmer, S., Ishai, Y., Lu, S. & Ostrovsky, R., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 57-87 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation

    Ishai, Y., Korb, A., Lou, P. & Sahai, A., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 573-602 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13508 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations