Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • Cryptography with constant input locality

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2007, Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings. p. 92-110 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4622 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    25 Scopus citations
  • Cryptography with one-way communication

    Garg, S., Ishai, Y., Kushilevit, E., Ostrovsky, R. & Sahai, A., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). p. 191-208 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • Distributed point functions and their applications

    Gilboa, N. & Ishai, Y., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 640-658 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    82 Scopus citations
  • Efficient arguments without short PCPs

    Ishai, Y., Kushilevitz, E. & Ostrovsky, R., 2007, Proceedings - Twenty-Second Annual IEEE Conference on Computational Complexity, CCC 2007. p. 278-291 14 p. 4262770. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    92 Scopus citations
  • Efficient multi-party computation: From passive to active security via secure SIMD circuits

    Genkin, D., Ishai, Y. & Polychroniadou, A., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). p. 721-741 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    25 Scopus citations
  • Efficient multi-party computation over rings

    Cramer, R., Fehr, S., Ishai, Y. & Kushilevitz, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Biham, E. (ed.). p. 596-613 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2656).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    60 Scopus citations
  • Efficient multiparty protocols via log-depth threshold formulae (Extended abstract)

    Cohen, G., Damgård, I. B., Ishai, Y., Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. D., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 2 ed. p. 185-202 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8043 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    24 Scopus citations
  • Efficient non-interactive secure computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Prabhakaran, M. & Sahai, A., 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 406-425 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    77 Scopus citations
  • Efficient Pseudorandom Correlation Generators: Silent OT Extension and More: Silent OT Extension and More

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 489-518 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    61 Scopus citations
  • Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Rindal, P. & Scholl, P., 2019

    Research output: Other contributionpeer-review

  • Encoding functions with constant online rate, or how to compress garbled circuit keys

    Applebaum, B., Ishai, Y., Kushilevitz, E. & Waters, B., 2015, In: SIAM Journal on Computing. 44, 2, p. 433-466 34 p.

    Research output: Contribution to journalArticlepeer-review

    9 Scopus citations
  • Encoding functions with constant online rate or how to compress garbled circuits keys

    Applebaum, B., Ishai, Y., Kushilevitz, E. & Waters, B., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 2 ed. p. 166-184 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8043 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    32 Scopus citations
  • Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs

    Bitansky, N., Chiesa, A., Ishai, Y., Ostrovsky, R. & Paneth, O., 2013, Theory of Cryptography. Sahai, A. (ed.). Berlin, Heidelberg, p. E1-E1

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Evaluating branching programs on encrypted data

    Ishai, Y. & Paskin, A., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 575-594 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    143 Scopus citations
  • Extending oblivious transfers efficiently

    Ishai, Y., Kilian, J., Nissim, K. & Petrank, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). p. 145-161 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    442 Scopus citations
  • Extracting correlations

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2009, Proceedings - 50th Annual Symposium on Foundations of Computer Science, FOCS 2009. p. 261-270 10 p. 5438627. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    38 Scopus citations
  • Foundations of homomorphic secret sharing

    Boyle, E., Gilboa, N., Ishai, Y., Lin, H. & Tessaro, S., 1 Jan 2018, 9th Innovations in Theoretical Computer Science, ITCS 2018. Karlin, A. R. (ed.). 21. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 94).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Scopus citations
  • Founding cryptography on oblivious transfer - Efficiently

    Ishai, Y., Prabhakaran, M. & Sahai, A., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 572-591 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    306 Scopus citations
  • Founding cryptography on tamper-proof hardware tokens

    Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R. & Wadia, A., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 308-326 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    117 Scopus citations
  • From randomizing polynomials to parallel algorithms

    Ishai, Y., Kushilevitz, E. & Paskin-Cherniavsky, A., 2012, ITCS 2012 - Innovations in Theoretical Computer Science Conference. p. 76-89 14 p. (ITCS 2012 - Innovations in Theoretical Computer Science Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • From secrecy to soundness: Efficient verification via secure computation

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2010, Automata, Languages and Programming - 37th International Colloquium, ICALP 2010, Proceedings. PART 1 ed. p. 152-163 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6198 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    138 Scopus citations
  • Fully-Secure MPC with Minimal Trust

    Ishai, Y., Patra, A., Patranabis, S., Ravi, D. & Srinivasan, A., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). p. 470-501 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Function secret sharing

    Boyle, E., Gilboa, N. & Ishai, Y., 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). p. 337-367 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    143 Scopus citations
  • Function secret sharing: Improvements and extensions

    Boyle, E., Gilboa, N. & Ishai, Y., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. p. 1292-1303 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    141 Scopus citations
  • General constructions for information-theoretic private information retrieval

    Beimel, A., Ishai, Y. & Kushilevitz, E., Aug 2005, In: Journal of Computer and System Sciences. 71, 2, p. 213-247 35 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    74 Scopus citations
  • Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation: Optimizing rounds, communication, and computation

    Boyle, E., Gilboa, N. & Ishai, Y., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II. Nielsen, J. B. & Coron, J-S. (eds.). Vol. 10211. p. 163-193 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    48 Scopus citations
  • Hard Languages in NP ∩ coNP and NIZK Proofs from Unstructured Hardness

    Ghosal, R., Ishai, Y., Korb, A., Kushilevitz, E., Lou, P. & Sahai, A., 2 Jun 2023, STOC 2023 - Proceedings of the 55th Annual ACM Symposium on Theory of Computing. Saha, B. & Servedio, R. A. (eds.). p. 1243-1256 14 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Homomorphic secret sharing: Optimizations and applications

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y. & Orrù, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 2105-2122 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    52 Scopus citations
  • Homomorphic Secret Sharing: Optimizations and Applications

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y. & Orru, M., 2017

    Research output: Other contributionpeer-review

  • How Low Can We Go?

    Ishai, Y., 2020

    Research output: Other contribution

  • How many oblivious transfers are needed for secure multiparty computation?

    Harnik, D., Ishai, Y. & Kushilevitz, E., 2007, Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings. p. 284-302 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4622 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • How to construct a leakage-resilient (stateless) trusted party

    Genkin, D., Ishai, Y. & Weiss, M., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). p. 209-244 36 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • How to garble arithmetic circuits

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2014, In: SIAM Journal on Computing. 43, 2, p. 905-929 25 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    23 Scopus citations
  • How to garble arithmetic circuits

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 120-129 10 p. 6108157. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Identifying cheaters without an honest majority

    Ishai, Y., Ostrovsky, R. & Seyalioglu, H., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 21-38 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    28 Scopus citations
  • Improved upper bounds on information-theoretic private information retrieval

    Ishai, Y. & Kushilevitz, E., 1999, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 79-88 10 p.

    Research output: Contribution to journalConference articlepeer-review

    53 Scopus citations
  • Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One

    Dittmer, S., Ishai, Y., Lu, S. & Ostrovsky, R., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. p. 829-841 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Information-Theoretic Distributed Point Functions

    Boyle, E., Gilboa, N., Ishai, Y. & Kolobov, V. I., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). 17. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Information-theoretic Private Information Retrieval: A unified construction (extended abstract)

    Beimel, A. & Ishai, Y., 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. Orejas, F., Spirakis, P. G. & van Leeuwen, J. (eds.). p. 912-926 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    72 Scopus citations
  • Interactive locking, zero-knowledge PCPs, and unconditional cryptography

    Goyal, V., Ishai, Y., Mahmoody, M. & Sahai, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 173-190 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC

    Abascal, J., Faghihi Sereshgi, M. H., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. p. 1591-1605 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Keyword search and oblivious pseudorandom functions

    Freedman, M. J., Ishai, Y., Pinkas, B. & Reingold, O., 2005, In: Lecture Notes in Computer Science. 3378, p. 303-324 22 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    247 Scopus citations
  • Lattice-Based SNARGs and Their Application to More Efficient Obfuscation

    Boneh, D., Ishai, Y., Sahai, A. & Wu, D. J., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III. Coron, J-S. & Nielsen, J. B. (eds.). Vol. 10212. p. 247-277 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    35 Scopus citations
  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

    Ishai, Y., 2011, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6597 LNCS, p. VI

    Research output: Contribution to journalEditorial

    Open Access
  • Leviosa: Lightweight secure arithmetic computation

    Hazay, C., Marcedone, A., Ishai, Y. & Venkitasubramaniam, M., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 327-344 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • LevioSA: Lightweight Secure Arithmetic Computation

    Hazay, C., Ishai, Y., Marcedone, A. & Venkitasubramaniam, M., 2019

    Research output: Other contributionpeer-review

  • Ligero: Lightweight sublinear arguments without a trusted setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 2087-2104 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    209 Scopus citations
  • Ligero: lightweight sublinear arguments without a trusted setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., Nov 2023, In: Designs, Codes, and Cryptography. 91, 11, p. 3379-3424 46 p.

    Research output: Contribution to journalArticlepeer-review

  • Ligero: Lightweight Sublinear Arguments Without a Trusted Setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 2017

    Research output: Other contributionpeer-review

  • Limits of Practical Sublinear Secure Computation

    Boyle, E., Ishai, Y. & Polychroniadou, A., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III. Shacham, H. & Boldyreva, A. (eds.). Vol. 10993. p. 302-332 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations