Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model

    Hazay, C., Ishai, Y. & Venkitasubramaniam, M., Jul 2023, In: Journal of Cryptology. 36, 3, 26.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Adaptive versus non-adaptive security of multi-party protocols

    Canetti, R., Damgård, I., Dziembowski, S., Ishai, Y. & Malkin, T., Jun 2004, In: Journal of Cryptology. 17, 3, p. 153-207 55 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    30 Scopus citations
  • Additive Randomized Encodings and Their Applications

    Halevi, S., Ishai, Y., Kushilevitz, E. & Rabin, T., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 203-235 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Ad Hoc PSM Protocols: Secure Computation Without Coordination: Secure computation without coordination

    Beimel, A., Ishai, Y., Kushilevitz, E. & Eyal, K., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III. Coron, J-S. & Nielsen, J. B. (eds.). Vol. 10212. p. 580-608 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    6 Scopus citations
  • Affine determinant programs: A framework for obfuscation and witness encryption

    Bartusek, J., Ishai, Y., Jain, A., Ma, F., Sahai, A. & Zhandry, M., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 82. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • A Geometric Approach to Homomorphic Secret Sharing

    Ishai, Y., Lai, R. W. F. & Malavolta, G., 2021, Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings. Garay, J. A. (ed.). p. 92-119 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12711 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Arithmetic Sketching

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 171-202 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Authenticated Garbling from Simple Correlations

    Dittmer, S., Ishai, Y., Lu, S. & Ostrovsky, R., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 57-87 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Basing weak public-key cryptography on strong one-way functions

    Biham, E., Goren, Y. J. & Ishai, Y., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 55-72 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • Batch codes and their applications

    Ishai, Y., Ostrovsky, R., Kushilevitz, E. & Sahai, A., 2004, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 262-271 10 p.

    Research output: Contribution to journalConference articlepeer-review

    166 Scopus citations
  • Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation

    Ishai, Y., Korb, A., Lou, P. & Sahai, A., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 573-602 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13508 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation

    Ishai, Y., Korb, A., Lou, P. & Sahai, A., Mar 2024, In: Journal of Cryptology. 37, 1, 1.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Binary AMD circuits from secure multiparty computation

    Genkin, D., Ishai, Y. & Weiss, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). p. 336-366 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Black-box constructions for secure computation

    Ishai, Y., Kushilevitz, E., Lindell, Y. & Petrank, E., 2006, STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing. p. 99-108 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    53 Scopus citations
  • Black-box constructions of protocols for secure computation

    Haitner, I., Ishai, Y., Kushilevitz, E., Lindell, Y. & Petrank, E., 2011, In: SIAM Journal on Computing. 40, 2, p. 225-266 42 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    35 Scopus citations
  • Black-Box Reusable NISC with Random Oracles

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings. Hazay, C. & Stam, M. (eds.). p. 68-97 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14005 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Bounded-Communication Leakage Resilience via Parity-Resilient Circuits

    Goyal, V., Ishai, Y., Maji, H. K., Sahai, A. & Sherstov, A. A., 2016, In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 1-10

    Research output: Contribution to journalArticlepeer-review

  • Bounded-Communication Leakage Resilience via Parity-Resilient Circuits

    Goyal, V., Ishai, Y., Maji, H. K., Sahai, A. & Sherstov, A. A., 14 Dec 2016, Proceedings - 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2016. p. 1-10 10 p. 7782912. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2016-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • Bounded indistinguishability and the complexity of recovering secrets

    Bogdanov, A., Ishai, Y., Viola, E. & Williamson, C., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). p. 593-618 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9816).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Scopus citations
  • Bounded indistinguishability for simple sources

    Filmus, Y., Ishai, Y., Bogdanov, A., Srinivasan, A., Dinesh, K. & Kaplan, A., 2022, ITCS 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Bounded Indistinguishability for Simple Sources

    Bogdanov, A., Dinesh, K., Filmus, Y., Ishai, Y., Kaplan, A. & Srinivasan, A., 1 Jan 2022, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022. Braverman, M. (ed.). 26. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 215).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Bounded key-dependent message security

    Barak, B., Haitner, I., Hofheinz, D. & Ishai, Y., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 423-444 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    98 Scopus citations
  • Bounded Simultaneous Messages

    Bogdanov, A., Dinesh, K., Filmus, Y., Ishai, Y., Kaplan, A. & Sekar, S., Dec 2023, 43rd IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2023. Bouyer, P., Srinivasan, S. & Srinivasan, S. (eds.). 20. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 284).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Breaking the O(n1/(2k-1)) barrier for information-theoretic private information retrieval

    Beimel, A., Ishai, Y., Kushilevitz, E. & Raymond, J. F., 2002, In: Annual Symposium on Foundations of Computer Science - Proceedings. p. 261-270 10 p.

    Research output: Contribution to journalConference articlepeer-review

    187 Scopus citations
  • Can we access a database both locally and privately?

    Boyle, E., Ishai, Y., Pass, R. & Wootters, M., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). p. 662-693 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • Circuits resilient to additive attacks with applications to secure computation

    Genkin, D., Ishai, Y., Prabhakaran, M. M., Sahai, A. & Tromer, E., 2014, STOC 2014 - Proceedings of the 2014 ACM Symposium on Theory of Computing. p. 495-504 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    76 Scopus citations
  • Combinatorially Homomorphic Encryption

    Ishai, Y., Kushnir, E. & Rothblum, R. D., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). p. 251-278 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14370 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Communication versus computation

    Harsha, P., Ishai, Y., Kilian, J., Nissim, K. & Venkatesh, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Díaz, J., Karhumäki, J., Lepistö, A. & Sannella, D. (eds.). p. 745-756 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3142).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    8 Scopus citations
  • Communication vs. computation

    Harsha, P., Ishai, Y., Kilian, J., Nissim, K. & Venkatesh, S., May 2007, In: Computational Complexity. 16, 1, p. 1-33 33 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Compressing cryptographic resources

    Gilboa, N. & Ishai, Y., 1999, Advances in Cryptology – CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Wiener, M. (ed.). p. 591-608 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1666).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    13 Scopus citations
  • Compressing vector OLE

    Boyle, E., Couteau, G., Gilboa, N. & Ishai, Y., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 896-912 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    90 Scopus citations
  • Compressing Vector OLE

    Boyle, E., Couteau, G., Gilboa, N. & Ishai, Y., 2018

    Research output: Other contributionpeer-review

  • Computationally private randomizing polynomials and their applications

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2005, In: Proceedings of the Annual IEEE Conference on Computational Complexity. p. 260-274 15 p.

    Research output: Contribution to journalConference articlepeer-review

    26 Scopus citations
  • Computationally private randomizing polynomials and their applications

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Jun 2006, In: Computational Complexity. 15, 2, p. 115-162 48 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    77 Scopus citations
  • Computational Wiretap Coding from Indistinguishability Obfuscation

    Ishai, Y., Jain, A., Lou, P., Sahai, A. & Zhandry, M., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 263-293 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14084 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Constant-rate oblivious transfer from noisy channels

    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Prabhakaran, M., Sahai, A. & Wullschleger, J., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. p. 667-684 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    26 Scopus citations
  • Constant-round multiparty computation using black-box pseudorandom generator

    Damgård, I. & Ishai, Y., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 378-394 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    108 Scopus citations
  • Correlated Pseudorandomness from Expand-Accumulate Codes

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N. & Scholl, P., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 603-633 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13508 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Correlation extractors and their applications(Invited Talk)

    Ishai, Y., 2011, Information Theoretic Security - 5th International Conference, ICITS 2011, Proceedings. p. 1-5 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6673 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cryptographic Sensing

    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A. & Eyal, K., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 583-604 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • Cryptography from anonymity

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2006, 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006. p. 239-248 10 p. 4031360. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    101 Scopus citations
  • Cryptography from One-Way Communication: On Completeness of Finite Channels

    Agrawal, S., Ishai, Y., Kushilevitz, E., Narayanan, V., Prabhakaran, M., Prabhakaran, V. & Rosen, A., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). p. 653-685 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12493 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Cryptography from Planted Graphs: Security with Logarithmic-Size Messages

    Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). p. 286-315 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14369 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cryptography in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2006, In: SIAM Journal on Computing. 36, 4, p. 845-888 44 p.

    Research output: Contribution to journalArticlepeer-review

    141 Scopus citations
  • Cryptography in NC 0 (extended abstract)

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2004, In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 166-175 10 p.

    Research output: Contribution to journalConference articlepeer-review

    104 Scopus citations
  • Cryptography with constant computational overhead

    Ishai, Y., Ostrovsky, R., Kushilevitz, E. & Sahai, A., 2008, STOC'08: Proceedings of the 2008 ACM Symposium on Theory of Computing. p. 433-442 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    115 Scopus citations
  • Cryptography with constant input locality

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Oct 2009, In: Journal of Cryptology. 22, 4, p. 429-469 41 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    34 Scopus citations