Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • 2020

    Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12107 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12106 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Proximity gaps for reed-solomon codes

    Ben-Sasson, E., Carmon, D., Ishai, Y., Kopparty, S. & Saraf, S., Nov 2020, Proceedings - 2020 IEEE 61st Annual Symposium on Foundations of Computer Science, FOCS 2020. p. 900-909 10 p. 9317990. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Separating two-round secure computation from oblivious transfer

    Applebaum, B., Brakerski, Z., Garg, S., Ishai, Y. & Srinivasan, A., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 71. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • 2019

    Cryptographic Sensing

    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A. & Eyal, K., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 583-604 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • Efficient Pseudorandom Correlation Generators: Silent OT Extension and More: Silent OT Extension and More

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 489-518 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    61 Scopus citations
  • Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Rindal, P. & Scholl, P., 2019

    Research output: Other contributionpeer-review

  • Leviosa: Lightweight secure arithmetic computation

    Hazay, C., Marcedone, A., Ishai, Y. & Venkitasubramaniam, M., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 327-344 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • LevioSA: Lightweight Secure Arithmetic Computation

    Hazay, C., Ishai, Y., Marcedone, A. & Venkitasubramaniam, M., 2019

    Research output: Other contributionpeer-review

  • Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs

    Boyle, E., Ishai, Y., Gilboa, N. & Nof, A., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 869-886 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs

    Boyle, E., Gilboa, N., Ishai, Y. & Nof, A., 2019

    Research output: Other contributionpeer-review

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11478 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11476 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11477 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Reusable Non-Interactive Secure Computation

    Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 462-488 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    15 Scopus citations
  • Secure Computation with Preprocessing via Function Secret Sharing

    Boyle, E., Gilboa, N. & Ishai, Y., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). p. 341-371 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11891 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • Trapdoor Hash Functions and Their Applications

    Dottling, N., Garg, S., Ishai, Y., Malavolta, G., Mour, T., Ostrovsky, R. & Döttling, N., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 3-32 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    38 Scopus citations
  • Unconditionally Secure Computation Against Low-Complexity Leakage

    Bogdanov, A., Ishai, Y. & Srinivasan, A., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II. Boldyreva, A. & Micciancio, D. (eds.). Vol. 11693. p. 387-416 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    7 Scopus citations
  • Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 67-97 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    36 Scopus citations
  • 2018

    Compressing vector OLE

    Boyle, E., Couteau, G., Gilboa, N. & Ishai, Y., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 896-912 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    90 Scopus citations
  • Compressing Vector OLE

    Boyle, E., Couteau, G., Gilboa, N. & Ishai, Y., 2018

    Research output: Other contributionpeer-review

  • Foundations of homomorphic secret sharing

    Boyle, E., Gilboa, N., Ishai, Y., Lin, H. & Tessaro, S., 1 Jan 2018, 9th Innovations in Theoretical Computer Science, ITCS 2018. Karlin, A. R. (ed.). 21. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 94).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Scopus citations
  • Limits of Practical Sublinear Secure Computation

    Boyle, E., Ishai, Y. & Polychroniadou, A., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III. Shacham, H. & Boldyreva, A. (eds.). Vol. 10993. p. 302-332 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • Minimizing Locality of One-Way Functions via Semi-private Randomized Encodings

    Applebaum, B., Ishai, Y., Kushilevitz, E. & Eyal, K., 1 Jan 2018, In: Journal of Cryptology. 31, 1, p. 1-22

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • On the Local Leakage Resilience of Linear Secret Sharing Schemes

    Benhamouda, F., Degwekar, A., Ishai, Y. & Rabin, T., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I. Boldyreva, A. & Shacham, H. (eds.). Vol. 10991. p. 531-561 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    28 Scopus citations
  • On the message complexity of secure multiparty computation

    Ishai, Y., Mittal, M. & Ostrovsky, R., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). p. 698-711 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Private Circuits: A Modular Approach: A modular approach

    Ananth, P., Ishai, Y. & Sahai, A., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III. Shacham, H. & Boldyreva, A. (eds.). Vol. 10993. p. 427-455 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    21 Scopus citations
  • Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs

    Boneh, D., Ishai, Y., Sahai, A. & Wu, D. J., 2018, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III. Nielsen, J. B. & Rijmen, V. (eds.). Vol. 10822. p. 222-255 34 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    17 Scopus citations
  • Two-round MPC: Information-theoretic and black-box

    Garg, S., Ishai, Y. & Srinivasan, A., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). p. 123-151 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • 2017

    Ad Hoc PSM Protocols: Secure Computation Without Coordination: Secure computation without coordination

    Beimel, A., Ishai, Y., Kushilevitz, E. & Eyal, K., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III. Coron, J-S. & Nielsen, J. B. (eds.). Vol. 10212. p. 580-608 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    6 Scopus citations
  • Can we access a database both locally and privately?

    Boyle, E., Ishai, Y., Pass, R. & Wootters, M., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). p. 662-693 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation: Optimizing rounds, communication, and computation

    Boyle, E., Gilboa, N. & Ishai, Y., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II. Nielsen, J. B. & Coron, J-S. (eds.). Vol. 10211. p. 163-193 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    48 Scopus citations
  • Homomorphic secret sharing: Optimizations and applications

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y. & Orrù, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 2105-2122 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    52 Scopus citations
  • Homomorphic Secret Sharing: Optimizations and Applications

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y. & Orru, M., 2017

    Research output: Other contributionpeer-review

  • How to construct a leakage-resilient (stateless) trusted party

    Genkin, D., Ishai, Y. & Weiss, M., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). p. 209-244 36 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Lattice-Based SNARGs and Their Application to More Efficient Obfuscation

    Boneh, D., Ishai, Y., Sahai, A. & Wu, D. J., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III. Coron, J-S. & Nielsen, J. B. (eds.). Vol. 10212. p. 247-277 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    35 Scopus citations
  • Ligero: Lightweight sublinear arguments without a trusted setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 2087-2104 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    208 Scopus citations
  • Ligero: Lightweight Sublinear Arguments Without a Trusted Setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 2017

    Research output: Other contributionpeer-review

  • Low-complexity cryptographic hash functions

    Applebaum, B., Haramaty-Krasne, N., Ishai, Y., Kushilevitz, E. & Vaikuntanathan, V., 1 Nov 2017, 8th Innovations in Theoretical Computer Science Conference, ITCS 2017. Papadimitriou, C. H. (ed.). (Leibniz International Proceedings in Informatics, LIPIcs; vol. 67).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • Near-optimal secret sharing and error correcting codes in AC0

    Cheng, K., Ishai, Y. & Li, X., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). p. 424-458 35 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Non-Interactive Multiparty Computation Without Correlated Randomness

    Halevi, S., Ishai, Y., Jain, A., Komargodski, I., Sahai, A. & Yogev, E., 2017, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III. Takagi, T. & Peyrin, T. (eds.). Vol. 10626. p. 181-211 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    21 Scopus citations
  • Secure Arithmetic Computation with Constant Computational Overhead

    Applebaum, B., Damgard, I., Ishai, Y., Nielsen, M., Zichron, L. & Damgård, I., 2017, ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I. Shacham, H. & Katz, J. (eds.). Vol. 10401. p. 223-254 32 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    37 Scopus citations
  • The Price of Low Communication in Secure Multi-party Computation

    Garay, J., Ishai, Y., Ostrovsky, R. & Zikas, V., 2017, ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I. Shacham, H. & Katz, J. (eds.). Vol. 10401. p. 420-446 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    17 Scopus citations
  • Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions

    Badrinarayanan, S., Garg, S., Ishai, Y., Sahai, A. & Wadia, A., 2017, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III. Takagi, T. & Peyrin, T. (eds.). Vol. 10626. p. 275-303 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    25 Scopus citations
  • 2016

    Binary AMD circuits from secure multiparty computation

    Genkin, D., Ishai, Y. & Weiss, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). p. 336-366 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Bounded-Communication Leakage Resilience via Parity-Resilient Circuits

    Goyal, V., Ishai, Y., Maji, H. K., Sahai, A. & Sherstov, A. A., 2016, In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 1-10

    Research output: Contribution to journalArticlepeer-review

  • Bounded-Communication Leakage Resilience via Parity-Resilient Circuits

    Goyal, V., Ishai, Y., Maji, H. K., Sahai, A. & Sherstov, A. A., 14 Dec 2016, Proceedings - 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2016. p. 1-10 10 p. 7782912. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2016-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • Bounded indistinguishability and the complexity of recovering secrets

    Bogdanov, A., Ishai, Y., Viola, E. & Williamson, C., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). p. 593-618 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9816).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Scopus citations
  • Function secret sharing: Improvements and extensions

    Boyle, E., Gilboa, N. & Ishai, Y., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. p. 1292-1303 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    140 Scopus citations
  • Making the best of a leaky situation: Zero-knowledge PCPs from leakage-resilient circuits

    Ishai, Y., Weiss, M. & Yang, G., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). p. 3-32 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations