Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • Chapter

    Secure Arithmetic Computation with Constant Computational Overhead

    Applebaum, B., Damgard, I., Ishai, Y., Nielsen, M., Zichron, L. & Damgård, I., 2017, ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I. Shacham, H. & Katz, J. (eds.). Vol. 10401. p. 223-254 32 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    37 Scopus citations
  • The Price of Low Communication in Secure Multi-party Computation

    Garay, J., Ishai, Y., Ostrovsky, R. & Zikas, V., 2017, ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I. Shacham, H. & Katz, J. (eds.). Vol. 10401. p. 420-446 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    17 Scopus citations
  • Trapdoor Hash Functions and Their Applications

    Dottling, N., Garg, S., Ishai, Y., Malavolta, G., Mour, T., Ostrovsky, R. & Döttling, N., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 3-32 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    39 Scopus citations
  • Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions

    Badrinarayanan, S., Garg, S., Ishai, Y., Sahai, A. & Wadia, A., 2017, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III. Takagi, T. & Peyrin, T. (eds.). Vol. 10626. p. 275-303 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    25 Scopus citations
  • Unconditionally Secure Computation Against Low-Complexity Leakage

    Bogdanov, A., Ishai, Y. & Srinivasan, A., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II. Boldyreva, A. & Micciancio, D. (eds.). Vol. 11693. p. 387-416 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    7 Scopus citations
  • Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 67-97 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    36 Scopus citations
  • Conference article

    Batch codes and their applications

    Ishai, Y., Ostrovsky, R., Kushilevitz, E. & Sahai, A., 2004, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 262-271 10 p.

    Research output: Contribution to journalConference articlepeer-review

    168 Scopus citations
  • Breaking the O(n1/(2k-1)) barrier for information-theoretic private information retrieval

    Beimel, A., Ishai, Y., Kushilevitz, E. & Raymond, J. F., 2002, In: Annual Symposium on Foundations of Computer Science - Proceedings. p. 261-270 10 p.

    Research output: Contribution to journalConference articlepeer-review

    187 Scopus citations
  • Computationally private randomizing polynomials and their applications

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2005, In: Proceedings of the Annual IEEE Conference on Computational Complexity. p. 260-274 15 p.

    Research output: Contribution to journalConference articlepeer-review

    26 Scopus citations
  • Cryptography in NC 0 (extended abstract)

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2004, In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 166-175 10 p.

    Research output: Contribution to journalConference articlepeer-review

    104 Scopus citations
  • Improved upper bounds on information-theoretic private information retrieval

    Ishai, Y. & Kushilevitz, E., 1999, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 79-88 10 p.

    Research output: Contribution to journalConference articlepeer-review

    53 Scopus citations
  • Keyword search and oblivious pseudorandom functions

    Freedman, M. J., Ishai, Y., Pinkas, B. & Reingold, O., 2005, In: Lecture Notes in Computer Science. 3378, p. 303-324 22 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    247 Scopus citations
  • Non-interactive and non-malleable commitment

    Di Crescenzo, G., Ishai, Y. & Ostrovsky, R., 1998, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 141-150 10 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    101 Scopus citations
  • One-way functions are essential for single-server private information retrieval

    Beimel, A., Ishai, Y., Kushilevitz, E. & Malkin, T., 1999, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 89-98 10 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    32 Scopus citations
  • On the power of nonlinear secret-sharing

    Beimel, A. & Ishai, Y., 2001, In: Proceedings of the Annual IEEE Conference on Computational Complexity. p. 188-202 15 p.

    Research output: Contribution to journalConference articlepeer-review

    33 Scopus citations
  • Protecting data privacy in private information retrieval schemes

    Gertner, Y., Ishai, Y., Kushilevitz, E. & Malkin, T., Jun 2000, In: Journal of Computer and System Sciences. 60, 3, p. 592-629 38 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    217 Scopus citations
  • Protecting data privacy in private information retrieval schemes

    Gertner, Y., Ishai, Y., Kushilevitz, E. & Malkin, T., 1998, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 151-160 10 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    198 Scopus citations
  • Share conversion, pseudorandom secret-sharing and applications to secure computation

    Cramer, R., Damgård, I. & Ishai, Y., 2005, In: Lecture Notes in Computer Science. 3378, p. 342-362 21 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    151 Scopus citations
  • Sufficient conditions for collision-resistant hashing

    Ishai, Y., Kushilevitz, E. & Ostrovsky, R., 2005, In: Lecture Notes in Computer Science. 3378, p. 445-456 12 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    41 Scopus citations
  • The round complexity of verifiable secret sharing and secure multicast

    Gennaro, R., Ishai, Y., Kushilevitz, E. & Rabin, T., 2001, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 580-589 10 p.

    Research output: Contribution to journalConference articlepeer-review

    100 Scopus citations
  • Conference contribution

    Additive Randomized Encodings and Their Applications

    Halevi, S., Ishai, Y., Kushilevitz, E. & Rabin, T., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 203-235 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Affine determinant programs: A framework for obfuscation and witness encryption

    Bartusek, J., Ishai, Y., Jain, A., Ma, F., Sahai, A. & Zhandry, M., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 82. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • A Geometric Approach to Homomorphic Secret Sharing

    Ishai, Y., Lai, R. W. F. & Malavolta, G., 2021, Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings. Garay, J. A. (ed.). p. 92-119 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12711 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Arithmetic Sketching

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 171-202 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Authenticated Garbling from Simple Correlations

    Dittmer, S., Ishai, Y., Lu, S. & Ostrovsky, R., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 57-87 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Basing weak public-key cryptography on strong one-way functions

    Biham, E., Goren, Y. J. & Ishai, Y., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 55-72 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation

    Ishai, Y., Korb, A., Lou, P. & Sahai, A., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 573-602 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13508 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Binary AMD circuits from secure multiparty computation

    Genkin, D., Ishai, Y. & Weiss, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). p. 336-366 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Black-box constructions for secure computation

    Ishai, Y., Kushilevitz, E., Lindell, Y. & Petrank, E., 2006, STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing. p. 99-108 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    53 Scopus citations
  • Black-Box Reusable NISC with Random Oracles

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings. Hazay, C. & Stam, M. (eds.). p. 68-97 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14005 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Bounded-Communication Leakage Resilience via Parity-Resilient Circuits

    Goyal, V., Ishai, Y., Maji, H. K., Sahai, A. & Sherstov, A. A., 14 Dec 2016, Proceedings - 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2016. p. 1-10 10 p. 7782912. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2016-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • Bounded indistinguishability and the complexity of recovering secrets

    Bogdanov, A., Ishai, Y., Viola, E. & Williamson, C., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). p. 593-618 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9816).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Scopus citations
  • Bounded indistinguishability for simple sources

    Filmus, Y., Ishai, Y., Bogdanov, A., Srinivasan, A., Dinesh, K. & Kaplan, A., 2022, ITCS 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Bounded Indistinguishability for Simple Sources

    Bogdanov, A., Dinesh, K., Filmus, Y., Ishai, Y., Kaplan, A. & Srinivasan, A., 1 Jan 2022, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022. Braverman, M. (ed.). 26. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 215).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Bounded key-dependent message security

    Barak, B., Haitner, I., Hofheinz, D. & Ishai, Y., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 423-444 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    99 Scopus citations
  • Bounded Simultaneous Messages

    Bogdanov, A., Dinesh, K., Filmus, Y., Ishai, Y., Kaplan, A. & Sekar, S., Dec 2023, 43rd IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2023. Bouyer, P., Srinivasan, S. & Srinivasan, S. (eds.). 20. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 284).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Can we access a database both locally and privately?

    Boyle, E., Ishai, Y., Pass, R. & Wootters, M., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). p. 662-693 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • Circuits resilient to additive attacks with applications to secure computation

    Genkin, D., Ishai, Y., Prabhakaran, M. M., Sahai, A. & Tromer, E., 2014, STOC 2014 - Proceedings of the 2014 ACM Symposium on Theory of Computing. p. 495-504 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    76 Scopus citations
  • Combinatorially Homomorphic Encryption

    Ishai, Y., Kushnir, E. & Rothblum, R. D., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). p. 251-278 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14370 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Compressing cryptographic resources

    Gilboa, N. & Ishai, Y., 1999, Advances in Cryptology – CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Wiener, M. (ed.). p. 591-608 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1666).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    13 Scopus citations
  • Compressing vector OLE

    Boyle, E., Couteau, G., Gilboa, N. & Ishai, Y., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 896-912 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    91 Scopus citations
  • Computational Wiretap Coding from Indistinguishability Obfuscation

    Ishai, Y., Jain, A., Lou, P., Sahai, A. & Zhandry, M., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 263-293 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14084 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Constant-rate oblivious transfer from noisy channels

    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Prabhakaran, M., Sahai, A. & Wullschleger, J., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. p. 667-684 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    26 Scopus citations
  • Constant-round multiparty computation using black-box pseudorandom generator

    Damgård, I. & Ishai, Y., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 378-394 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    108 Scopus citations
  • Correlated Pseudorandomness from Expand-Accumulate Codes

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N. & Scholl, P., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 603-633 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13508 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Correlation extractors and their applications(Invited Talk)

    Ishai, Y., 2011, Information Theoretic Security - 5th International Conference, ICITS 2011, Proceedings. p. 1-5 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6673 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cryptography from anonymity

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2006, 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006. p. 239-248 10 p. 4031360. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    101 Scopus citations
  • Cryptography from One-Way Communication: On Completeness of Finite Channels

    Agrawal, S., Ishai, Y., Kushilevitz, E., Narayanan, V., Prabhakaran, M., Prabhakaran, V. & Rosen, A., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). p. 653-685 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12493 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Cryptography from Planted Graphs: Security with Logarithmic-Size Messages

    Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). p. 286-315 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14369 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cryptography with constant computational overhead

    Ishai, Y., Ostrovsky, R., Kushilevitz, E. & Sahai, A., 2008, STOC'08: Proceedings of the 2008 ACM Symposium on Theory of Computing. p. 433-442 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    115 Scopus citations