Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • Anthology
  • Article

    Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model

    Hazay, C., Ishai, Y. & Venkitasubramaniam, M., Jul 2023, In: Journal of Cryptology. 36, 3, 26.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Adaptive versus non-adaptive security of multi-party protocols

    Canetti, R., Damgård, I., Dziembowski, S., Ishai, Y. & Malkin, T., Jun 2004, In: Journal of Cryptology. 17, 3, p. 153-207 55 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    30 Scopus citations
  • Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation

    Ishai, Y., Korb, A., Lou, P. & Sahai, A., Mar 2024, In: Journal of Cryptology. 37, 1, 1.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Black-box constructions of protocols for secure computation

    Haitner, I., Ishai, Y., Kushilevitz, E., Lindell, Y. & Petrank, E., 2011, In: SIAM Journal on Computing. 40, 2, p. 225-266 42 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    35 Scopus citations
  • Bounded-Communication Leakage Resilience via Parity-Resilient Circuits

    Goyal, V., Ishai, Y., Maji, H. K., Sahai, A. & Sherstov, A. A., 2016, In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 1-10

    Research output: Contribution to journalArticlepeer-review

  • Communication vs. computation

    Harsha, P., Ishai, Y., Kilian, J., Nissim, K. & Venkatesh, S., May 2007, In: Computational Complexity. 16, 1, p. 1-33 33 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Computationally private randomizing polynomials and their applications

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Jun 2006, In: Computational Complexity. 15, 2, p. 115-162 48 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    77 Scopus citations
  • Cryptography in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2006, In: SIAM Journal on Computing. 36, 4, p. 845-888 44 p.

    Research output: Contribution to journalArticlepeer-review

    141 Scopus citations
  • Cryptography with constant input locality

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Oct 2009, In: Journal of Cryptology. 22, 4, p. 429-469 41 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    34 Scopus citations
  • Encoding functions with constant online rate, or how to compress garbled circuit keys

    Applebaum, B., Ishai, Y., Kushilevitz, E. & Waters, B., 2015, In: SIAM Journal on Computing. 44, 2, p. 433-466 34 p.

    Research output: Contribution to journalArticlepeer-review

    9 Scopus citations
  • General constructions for information-theoretic private information retrieval

    Beimel, A., Ishai, Y. & Kushilevitz, E., Aug 2005, In: Journal of Computer and System Sciences. 71, 2, p. 213-247 35 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    74 Scopus citations
  • How to garble arithmetic circuits

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2014, In: SIAM Journal on Computing. 43, 2, p. 905-929 25 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    23 Scopus citations
  • Ligero: lightweight sublinear arguments without a trusted setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., Nov 2023, In: Designs, Codes, and Cryptography. 91, 11, p. 3379-3424 46 p.

    Research output: Contribution to journalArticlepeer-review

  • Minimizing Locality of One-Way Functions via Semi-private Randomized Encodings

    Applebaum, B., Ishai, Y., Kushilevitz, E. & Eyal, K., 1 Jan 2018, In: Journal of Cryptology. 31, 1, p. 1-22

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • On achieving the "best of both worlds" in secure multiparty computation

    Ishai, Y., Katz, J., Kushilevitz, E., Lindell, Y. & Petrank, E., 2011, In: SIAM Journal on Computing. 40, 1, p. 122-141 20 p.

    Research output: Contribution to journalArticlepeer-review

    24 Scopus citations
  • On linear-size pseudorandom generators and hardcore functions

    Baron, J., Ishai, Y. & Ostrovsky, R., 2014, In: Theoretical Computer Science. 554, C, p. 50-63 14 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    7 Scopus citations
  • On locally decodable codes, self-correctable codes, and t-private PIR

    Barkol, O., Ishai, Y. & Weinreb, E., Dec 2010, In: Algorithmica (New York). 58, 4, p. 831-859 29 p.

    Research output: Contribution to journalArticlepeer-review

    10 Scopus citations
  • On privacy and partition arguments

    Chor, B. & Ishai, Y., 25 May 2001, In: Information and Computation. 167, 1, p. 2-9 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    9 Scopus citations
  • On pseudorandom generators with linear stretch in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Apr 2008, In: Computational Complexity. 17, 1, p. 38-69 32 p.

    Research output: Contribution to journalArticlepeer-review

    40 Scopus citations
  • On the Local Leakage Resilience of Linear Secret Sharing Schemes

    Benhamouda, F., Degwekar, A., Ishai, Y. & Rabin, T., Apr 2021, In: Journal of Cryptology. 34, 2, 10.

    Research output: Contribution to journalArticlepeer-review

    14 Scopus citations
  • On the power of nonlinear secret-sharing

    Beimel, A. & Ishai, Y., 2005, In: SIAM Journal on Discrete Mathematics. 19, 1, p. 258-280 23 p.

    Research output: Contribution to journalArticlepeer-review

    20 Scopus citations
  • Private computation using a PEZ dispenser

    Balogh, J., Csirik, J. A., Ishai, Y. & Kushilevitz, E., 5 Sep 2003, In: Theoretical Computer Science. 306, 1-3, p. 69-84 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    29 Scopus citations
  • Private multiparty sampling and approximation of vector combinations

    Ishai, Y., Malkin, T., Strauss, M. J. & Wright, R. N., 17 Apr 2009, In: Theoretical Computer Science. 410, 18, p. 1730-1745 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    4 Scopus citations
  • Proximity Gaps for Reed-Solomon Codes

    Ben-Sasson, E., Carmon, D., Ishai, Y., Kopparty, S. & Saraf, S., 12 Oct 2023, In: Journal of the ACM. 70, 5, 31.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Randomizing polynomials: A new representation with applications to round-efficient secure computation

    Ishai, Y. & Kushilevitz, E., 2000, In: Annual Symposium on Foundations of Computer Science - Proceedings. p. 294-304 11 p.

    Research output: Contribution to journalArticlepeer-review

    205 Scopus citations
  • Reducing the servers' computation in private information retrieval: PIR with preprocessing

    Beimel, A., Ishai, Y. & Malkin, T., Mar 2004, In: Journal of Cryptology. 17, 2, p. 125-151 27 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    55 Scopus citations
  • Secure multiparty computation of approximations

    Feigenbaum, J., Ishai, Y., Malkin, T. A. L., Nissim, K., Strauss, M. J. & Wright, R. N., 2006, In: ACM Transactions on Algorithms. 2, 3, p. 435-472 38 p.

    Research output: Contribution to journalArticlepeer-review

    68 Scopus citations
  • Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs

    Gentry, C., Groth, J., Ishai, Y., Peikert, C., Sahai, A. & Smith, A., 30 Oct 2015, In: Journal of Cryptology. 28, 4, p. 820-843 24 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    49 Scopus citations
  • Valid generalisation from approximate interpolation

    Anthony, M., Bartlett, P., Ishai, Y. & Shawe-Taylor, J., 1996, In: Combinatorics Probability and Computing. 5, 3, p. 191-214 24 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Scopus citations
  • Zero-knowledge proofs from secure multiparty computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2009, In: SIAM Journal on Computing. 39, 3, p. 1121-1152 32 p.

    Research output: Contribution to journalArticlepeer-review

    83 Scopus citations
  • Chapter

    Ad Hoc PSM Protocols: Secure Computation Without Coordination: Secure computation without coordination

    Beimel, A., Ishai, Y., Kushilevitz, E. & Eyal, K., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III. Coron, J-S. & Nielsen, J. B. (eds.). Vol. 10212. p. 580-608 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    6 Scopus citations
  • Communication versus computation

    Harsha, P., Ishai, Y., Kilian, J., Nissim, K. & Venkatesh, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Díaz, J., Karhumäki, J., Lepistö, A. & Sannella, D. (eds.). p. 745-756 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3142).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    8 Scopus citations
  • Cryptographic Sensing

    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A. & Eyal, K., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 583-604 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • Efficient multi-party computation over rings

    Cramer, R., Fehr, S., Ishai, Y. & Kushilevitz, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Biham, E. (ed.). p. 596-613 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2656).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    60 Scopus citations
  • Efficient Pseudorandom Correlation Generators: Silent OT Extension and More: Silent OT Extension and More

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 489-518 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    61 Scopus citations
  • Extending oblivious transfers efficiently

    Ishai, Y., Kilian, J., Nissim, K. & Petrank, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). p. 145-161 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    440 Scopus citations
  • Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation: Optimizing rounds, communication, and computation

    Boyle, E., Gilboa, N. & Ishai, Y., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II. Nielsen, J. B. & Coron, J-S. (eds.). Vol. 10211. p. 163-193 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    48 Scopus citations
  • Lattice-Based SNARGs and Their Application to More Efficient Obfuscation

    Boneh, D., Ishai, Y., Sahai, A. & Wu, D. J., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III. Coron, J-S. & Nielsen, J. B. (eds.). Vol. 10212. p. 247-277 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    35 Scopus citations
  • Limits of Practical Sublinear Secure Computation

    Boyle, E., Ishai, Y. & Polychroniadou, A., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III. Shacham, H. & Boldyreva, A. (eds.). Vol. 10993. p. 302-332 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • Non-Interactive Multiparty Computation Without Correlated Randomness

    Halevi, S., Ishai, Y., Jain, A., Komargodski, I., Sahai, A. & Yogev, E., 2017, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III. Takagi, T. & Peyrin, T. (eds.). Vol. 10626. p. 181-211 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    21 Scopus citations
  • On the hardness of information-theoretic multiparty computation

    Ishai, Y. & Kushilevitz, E., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cachin, C. & Camenisch, J. (eds.). p. 439-455 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3027).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    30 Scopus citations
  • On the Local Leakage Resilience of Linear Secret Sharing Schemes

    Benhamouda, F., Degwekar, A., Ishai, Y. & Rabin, T., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I. Boldyreva, A. & Shacham, H. (eds.). Vol. 10991. p. 531-561 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    28 Scopus citations
  • Private circuits: Securing hardware against probing attacks

    Ishai, Y., Sahai, A. & Wagner, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). p. 463-481 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    703 Scopus citations
  • Private Circuits: A Modular Approach: A modular approach

    Ananth, P., Ishai, Y. & Sahai, A., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III. Shacham, H. & Boldyreva, A. (eds.). Vol. 10993. p. 427-455 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    21 Scopus citations
  • Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs

    Boneh, D., Ishai, Y., Sahai, A. & Wu, D. J., 2018, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III. Nielsen, J. B. & Rijmen, V. (eds.). Vol. 10822. p. 222-255 34 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    17 Scopus citations
  • Randomization techniques for secure computation

    Ishai, Y., 2013, Secure Multi-Party Computation. p. 222-248 27 p. (Cryptology and Information Security Series; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    24 Scopus citations
  • Reusable Non-Interactive Secure Computation

    Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 462-488 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    15 Scopus citations