Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • 2007

    Efficient arguments without short PCPs

    Ishai, Y., Kushilevitz, E. & Ostrovsky, R., 2007, Proceedings - Twenty-Second Annual IEEE Conference on Computational Complexity, CCC 2007. p. 278-291 14 p. 4262770. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    92 Scopus citations
  • Evaluating branching programs on encrypted data

    Ishai, Y. & Paskin, A., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 575-594 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    143 Scopus citations
  • How many oblivious transfers are needed for secure multiparty computation?

    Harnik, D., Ishai, Y. & Kushilevitz, E., 2007, Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings. p. 284-302 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4622 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • On locally decodable codes, self-correctable codes, and t-private PIR

    Barkol, O., Ishai, Y. & Weinreb, E., 2007, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 10th International Workshop, APPROX 2007 and 11th International Workshop, RANDOM 2007, Proceedings. p. 311-325 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4627 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Private multiparty sampling and approximation of vector combinations

    Ishai, Y., Malkin, T., Strauss, M. J. & Wright, R. N., 2007, Automata, Languages and Programming - 34th International Colloquium, ICALP 2007, Proceedings. p. 243-254 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4596 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Zero-knowledge from secure multiparty computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2007, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing. p. 21-30 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    270 Scopus citations
  • 2008

    Basing weak public-key cryptography on strong one-way functions

    Biham, E., Goren, Y. J. & Ishai, Y., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 55-72 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • Cryptography with constant computational overhead

    Ishai, Y., Ostrovsky, R., Kushilevitz, E. & Sahai, A., 2008, STOC'08: Proceedings of the 2008 ACM Symposium on Theory of Computing. p. 433-442 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    115 Scopus citations
  • Founding cryptography on oblivious transfer - Efficiently

    Ishai, Y., Prabhakaran, M. & Sahai, A., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 572-591 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    306 Scopus citations
  • On pseudorandom generators with linear stretch in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Apr 2008, In: Computational Complexity. 17, 1, p. 38-69 32 p.

    Research output: Contribution to journalArticlepeer-review

    40 Scopus citations
  • OT-combiners via secure computation

    Harnik, D., Ishai, Y., Kushilevitz, E. & Nielsen, J. B., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 393-411 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    64 Scopus citations
  • Proceedings - 23rd Annual IEEE Conference on Computational Complexity, CCC 2008: Preface

    Atserias, A., Beame, P., Chakrabarti, A., Feige, U., Fortnow, L., Ishai, Y., Kalai, Y. T., Servedio, R., Watanabe, O., De Wolf, R. & Zuckerman, D., 2008, In: Proceedings of the Annual IEEE Conference on Computational Complexity. p. 9 1 p., 4558800.

    Research output: Contribution to journalEditorial

  • Scalable multiparty computation with nearly optimal work and resilience

    Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J. B. & Smith, A., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 241-261 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    75 Scopus citations
  • Sub-linear zero-knowledge argument for correctness of a shuffle

    Groth, J. & Ishai, Y., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 379-396 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    59 Scopus citations
  • 2009

    Cryptography with constant input locality

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Oct 2009, In: Journal of Cryptology. 22, 4, p. 429-469 41 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    34 Scopus citations
  • Extracting correlations

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2009, Proceedings - 50th Annual Symposium on Foundations of Computer Science, FOCS 2009. p. 261-270 10 p. 5438627. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    38 Scopus citations
  • Private multiparty sampling and approximation of vector combinations

    Ishai, Y., Malkin, T., Strauss, M. J. & Wright, R. N., 17 Apr 2009, In: Theoretical Computer Science. 410, 18, p. 1730-1745 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    4 Scopus citations
  • Secure arithmetic computation with no honest majority

    Ishai, Y., Prabhakaran, M. & Sahai, A., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 294-314 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    94 Scopus citations
  • Zero-knowledge proofs from secure multiparty computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2009, In: SIAM Journal on Computing. 39, 3, p. 1121-1152 32 p.

    Research output: Contribution to journalArticlepeer-review

    86 Scopus citations
  • 2010

    Bounded key-dependent message security

    Barak, B., Haitner, I., Hofheinz, D. & Ishai, Y., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 423-444 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    99 Scopus citations
  • Founding cryptography on tamper-proof hardware tokens

    Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R. & Wadia, A., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 308-326 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    117 Scopus citations
  • From secrecy to soundness: Efficient verification via secure computation

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2010, Automata, Languages and Programming - 37th International Colloquium, ICALP 2010, Proceedings. PART 1 ed. p. 152-163 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6198 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    138 Scopus citations
  • Interactive locking, zero-knowledge PCPs, and unconditional cryptography

    Goyal, V., Ishai, Y., Mahmoody, M. & Sahai, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 173-190 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • On complete primitives for fairness

    Gordon, D., Ishai, Y., Moran, T., Ostrovsky, R. & Sahai, A., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 91-108 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • On invertible sampling and adaptive security

    Ishai, Y., Kumarasubramanian, A., Orlandi, C. & Sahai, A., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 466-482 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • On locally decodable codes, self-correctable codes, and t-private PIR

    Barkol, O., Ishai, Y. & Weinreb, E., Dec 2010, In: Algorithmica (New York). 58, 4, p. 831-859 29 p.

    Research output: Contribution to journalArticlepeer-review

    10 Scopus citations
  • Perfectly secure multiparty computation and the computational overhead of cryptography

    Damgård, I., Ishai, Y. & Krøigaard, M., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 445-465 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    123 Scopus citations
  • Secure Computation and Its Diverse Applications

    Ishai, Y., 2010, Theory of Cryptography. Micciancio, D. (ed.). Berlin, Heidelberg, p. 90-90 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure multiparty computation with minimal interaction

    Ishai, Y., Kushilevitz, E. & Paskin, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 577-594 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    35 Scopus citations
  • Semantic Security Under Related-Key Attacks and Applications

    Applebaum, B., Harnik, D. & Ishai, Y., 2010

    Research output: Other contribution

  • 2011

    Black-box constructions of protocols for secure computation

    Haitner, I., Ishai, Y., Kushilevitz, E., Lindell, Y. & Petrank, E., 2011, In: SIAM Journal on Computing. 40, 2, p. 225-266 42 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    35 Scopus citations
  • Constant-rate oblivious transfer from noisy channels

    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Prabhakaran, M., Sahai, A. & Wullschleger, J., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. p. 667-684 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    26 Scopus citations
  • Correlation extractors and their applications(Invited Talk)

    Ishai, Y., 2011, Information Theoretic Security - 5th International Conference, ICITS 2011, Proceedings. p. 1-5 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6673 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient non-interactive secure computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Prabhakaran, M. & Sahai, A., 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 406-425 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    77 Scopus citations
  • How to garble arithmetic circuits

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 120-129 10 p. 6108157. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

    Ishai, Y., 2011, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6597 LNCS, p. VI

    Research output: Contribution to journalEditorial

    Open Access
  • On achieving the "best of both worlds" in secure multiparty computation

    Ishai, Y., Katz, J., Kushilevitz, E., Lindell, Y. & Petrank, E., 2011, In: SIAM Journal on Computing. 40, 1, p. 122-141 20 p.

    Research output: Contribution to journalArticlepeer-review

    24 Scopus citations
  • Preface

    Ishai, Y., 2011, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2011-March

    Research output: Contribution to journalEditorial

  • 2012

    From randomizing polynomials to parallel algorithms

    Ishai, Y., Kushilevitz, E. & Paskin-Cherniavsky, A., 2012, ITCS 2012 - Innovations in Theoretical Computer Science Conference. p. 76-89 14 p. (ITCS 2012 - Innovations in Theoretical Computer Science Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Identifying cheaters without an honest majority

    Ishai, Y., Ostrovsky, R. & Seyalioglu, H., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 21-38 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    28 Scopus citations
  • On efficient zero-knowledge PCPs

    Ishai, Y., Mahmoody, M. & Sahai, A., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 151-168 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • Share conversion and private information retrieval

    Beimel, A., Ishai, Y., Kushilevitz, E. & Orlov, I., 2012, Proceedings - 2012 IEEE 27th Conference on Computational Complexity, CCC 2012. p. 258-268 11 p. 6243402. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • The complexity of information theoretic secure computation

    Ishai, Y., 2012, 2012 IEEE Information Theory Workshop. p. 80-80 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Efficient multiparty protocols via log-depth threshold formulae (Extended abstract)

    Cohen, G., Damgård, I. B., Ishai, Y., Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. D., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 2 ed. p. 185-202 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8043 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    24 Scopus citations
  • Encoding functions with constant online rate or how to compress garbled circuits keys

    Applebaum, B., Ishai, Y., Kushilevitz, E. & Waters, B., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 2 ed. p. 166-184 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8043 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    32 Scopus citations
  • Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs

    Bitansky, N., Chiesa, A., Ishai, Y., Ostrovsky, R. & Paneth, O., 2013, Theory of Cryptography. Sahai, A. (ed.). Berlin, Heidelberg, p. E1-E1

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Lossy chains and fractional secret sharing

    Ishai, Y., Kushilevitz, E. & Strulovich, O., 2013, 30th International Symposium on Theoretical Aspects of Computer Science, STACS 2013. p. 160-171 12 p. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 20).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • On linear-size pseudorandom generators and hardcore functions

    Baron, J., Ishai, Y. & Ostrovsky, R., 2013, Computing and Combinatorics - 19th International Conference, COCOON 2013, Proceedings. p. 169-181 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7936 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • On the power of correlated randomness in secure computation

    Ishai, Y., Kushilevitz, E., Meldgaard, S., Orlandi, C. & Paskin-Cherniavsky, A., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 600-620 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    63 Scopus citations
  • Randomization techniques for secure computation

    Ishai, Y., 2013, Secure Multi-Party Computation. p. 222-248 27 p. (Cryptology and Information Security Series; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    24 Scopus citations