Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • 2011

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

    Ishai, Y., 2011, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6597 LNCS, p. VI

    Research output: Contribution to journalEditorial

    Open Access
  • On achieving the "best of both worlds" in secure multiparty computation

    Ishai, Y., Katz, J., Kushilevitz, E., Lindell, Y. & Petrank, E., 2011, In: SIAM Journal on Computing. 40, 1, p. 122-141 20 p.

    Research output: Contribution to journalArticlepeer-review

    24 Scopus citations
  • Preface

    Ishai, Y., 2011, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2011-March

    Research output: Contribution to journalEditorial

  • 2010

    Bounded key-dependent message security

    Barak, B., Haitner, I., Hofheinz, D. & Ishai, Y., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 423-444 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    98 Scopus citations
  • Founding cryptography on tamper-proof hardware tokens

    Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R. & Wadia, A., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 308-326 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    117 Scopus citations
  • From secrecy to soundness: Efficient verification via secure computation

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2010, Automata, Languages and Programming - 37th International Colloquium, ICALP 2010, Proceedings. PART 1 ed. p. 152-163 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6198 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    138 Scopus citations
  • Interactive locking, zero-knowledge PCPs, and unconditional cryptography

    Goyal, V., Ishai, Y., Mahmoody, M. & Sahai, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 173-190 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • On complete primitives for fairness

    Gordon, D., Ishai, Y., Moran, T., Ostrovsky, R. & Sahai, A., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 91-108 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • On invertible sampling and adaptive security

    Ishai, Y., Kumarasubramanian, A., Orlandi, C. & Sahai, A., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 466-482 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • On locally decodable codes, self-correctable codes, and t-private PIR

    Barkol, O., Ishai, Y. & Weinreb, E., Dec 2010, In: Algorithmica (New York). 58, 4, p. 831-859 29 p.

    Research output: Contribution to journalArticlepeer-review

    10 Scopus citations
  • Perfectly secure multiparty computation and the computational overhead of cryptography

    Damgård, I., Ishai, Y. & Krøigaard, M., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 445-465 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    123 Scopus citations
  • Secure Computation and Its Diverse Applications

    Ishai, Y., 2010, Theory of Cryptography. Micciancio, D. (ed.). Berlin, Heidelberg, p. 90-90 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure multiparty computation with minimal interaction

    Ishai, Y., Kushilevitz, E. & Paskin, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 577-594 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    35 Scopus citations
  • Semantic Security Under Related-Key Attacks and Applications

    Applebaum, B., Harnik, D. & Ishai, Y., 2010

    Research output: Other contribution

  • 2009

    Cryptography with constant input locality

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Oct 2009, In: Journal of Cryptology. 22, 4, p. 429-469 41 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    34 Scopus citations
  • Extracting correlations

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2009, Proceedings - 50th Annual Symposium on Foundations of Computer Science, FOCS 2009. p. 261-270 10 p. 5438627. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    38 Scopus citations
  • Private multiparty sampling and approximation of vector combinations

    Ishai, Y., Malkin, T., Strauss, M. J. & Wright, R. N., 17 Apr 2009, In: Theoretical Computer Science. 410, 18, p. 1730-1745 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    4 Scopus citations
  • Secure arithmetic computation with no honest majority

    Ishai, Y., Prabhakaran, M. & Sahai, A., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 294-314 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    94 Scopus citations
  • Zero-knowledge proofs from secure multiparty computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2009, In: SIAM Journal on Computing. 39, 3, p. 1121-1152 32 p.

    Research output: Contribution to journalArticlepeer-review

    83 Scopus citations
  • 2008

    Basing weak public-key cryptography on strong one-way functions

    Biham, E., Goren, Y. J. & Ishai, Y., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 55-72 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • Cryptography with constant computational overhead

    Ishai, Y., Ostrovsky, R., Kushilevitz, E. & Sahai, A., 2008, STOC'08: Proceedings of the 2008 ACM Symposium on Theory of Computing. p. 433-442 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    115 Scopus citations
  • Founding cryptography on oblivious transfer - Efficiently

    Ishai, Y., Prabhakaran, M. & Sahai, A., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 572-591 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    306 Scopus citations
  • On pseudorandom generators with linear stretch in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Apr 2008, In: Computational Complexity. 17, 1, p. 38-69 32 p.

    Research output: Contribution to journalArticlepeer-review

    40 Scopus citations
  • OT-combiners via secure computation

    Harnik, D., Ishai, Y., Kushilevitz, E. & Nielsen, J. B., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 393-411 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    64 Scopus citations
  • Proceedings - 23rd Annual IEEE Conference on Computational Complexity, CCC 2008: Preface

    Atserias, A., Beame, P., Chakrabarti, A., Feige, U., Fortnow, L., Ishai, Y., Kalai, Y. T., Servedio, R., Watanabe, O., De Wolf, R. & Zuckerman, D., 2008, In: Proceedings of the Annual IEEE Conference on Computational Complexity. p. 9 1 p., 4558800.

    Research output: Contribution to journalEditorial

  • Scalable multiparty computation with nearly optimal work and resilience

    Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J. B. & Smith, A., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 241-261 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    75 Scopus citations
  • Sub-linear zero-knowledge argument for correctness of a shuffle

    Groth, J. & Ishai, Y., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 379-396 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    59 Scopus citations
  • 2007

    Communication vs. computation

    Harsha, P., Ishai, Y., Kilian, J., Nissim, K. & Venkatesh, S., May 2007, In: Computational Complexity. 16, 1, p. 1-33 33 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Cryptography with constant input locality

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2007, Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings. p. 92-110 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4622 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    25 Scopus citations
  • Efficient arguments without short PCPs

    Ishai, Y., Kushilevitz, E. & Ostrovsky, R., 2007, Proceedings - Twenty-Second Annual IEEE Conference on Computational Complexity, CCC 2007. p. 278-291 14 p. 4262770. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    91 Scopus citations
  • Evaluating branching programs on encrypted data

    Ishai, Y. & Paskin, A., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 575-594 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    142 Scopus citations
  • How many oblivious transfers are needed for secure multiparty computation?

    Harnik, D., Ishai, Y. & Kushilevitz, E., 2007, Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings. p. 284-302 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4622 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • On locally decodable codes, self-correctable codes, and t-private PIR

    Barkol, O., Ishai, Y. & Weinreb, E., 2007, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 10th International Workshop, APPROX 2007 and 11th International Workshop, RANDOM 2007, Proceedings. p. 311-325 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4627 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Private multiparty sampling and approximation of vector combinations

    Ishai, Y., Malkin, T., Strauss, M. J. & Wright, R. N., 2007, Automata, Languages and Programming - 34th International Colloquium, ICALP 2007, Proceedings. p. 243-254 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4596 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Zero-knowledge from secure multiparty computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2007, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing. p. 21-30 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    268 Scopus citations
  • 2006

    Black-box constructions for secure computation

    Ishai, Y., Kushilevitz, E., Lindell, Y. & Petrank, E., 2006, STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing. p. 99-108 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    53 Scopus citations
  • Computationally private randomizing polynomials and their applications

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Jun 2006, In: Computational Complexity. 15, 2, p. 115-162 48 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    77 Scopus citations
  • Constant-round multiparty computation using black-box pseudorandom generator

    Damgård, I. & Ishai, Y., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 378-394 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    108 Scopus citations
  • Cryptography from anonymity

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2006, 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006. p. 239-248 10 p. 4031360. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    101 Scopus citations
  • Cryptography in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2006, In: SIAM Journal on Computing. 36, 4, p. 845-888 44 p.

    Research output: Contribution to journalArticlepeer-review

    141 Scopus citations
  • On pseudorandom generators with linear stretch in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2006, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 9th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2006 a. p. 260-271 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • On the randomness complexity of efficient sampling

    Dubrov, B. & Ishai, Y., 2006, STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing. p. 711-720 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Private circuits II: Keeping secrets in tamperable circuits

    Ishai, Y., Prabhakaran, M., Sahai, A. & Wagner, D., 2006, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 308-327 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4004 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    123 Scopus citations
  • Scalable secure multiparty computation

    Damgård, I. & Ishai, Y., 2006, Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings. p. 501-520 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    85 Scopus citations
  • Secure multiparty computation of approximations

    Feigenbaum, J., Ishai, Y., Malkin, T. A. L., Nissim, K., Strauss, M. J. & Wright, R. N., 2006, In: ACM Transactions on Algorithms. 2, 3, p. 435-472 38 p.

    Research output: Contribution to journalArticlepeer-review

    68 Scopus citations
  • 2005

    Computationally private randomizing polynomials and their applications

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2005, In: Proceedings of the Annual IEEE Conference on Computational Complexity. p. 260-274 15 p.

    Research output: Contribution to journalConference articlepeer-review

    26 Scopus citations
  • General constructions for information-theoretic private information retrieval

    Beimel, A., Ishai, Y. & Kushilevitz, E., Aug 2005, In: Journal of Computer and System Sciences. 71, 2, p. 213-247 35 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    74 Scopus citations
  • Keyword search and oblivious pseudorandom functions

    Freedman, M. J., Ishai, Y., Pinkas, B. & Reingold, O., 2005, In: Lecture Notes in Computer Science. 3378, p. 303-324 22 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    246 Scopus citations
  • On the power of nonlinear secret-sharing

    Beimel, A. & Ishai, Y., 2005, In: SIAM Journal on Discrete Mathematics. 19, 1, p. 258-280 23 p.

    Research output: Contribution to journalArticlepeer-review

    20 Scopus citations
  • Share conversion, pseudorandom secret-sharing and applications to secure computation

    Cramer, R., Damgård, I. & Ishai, Y., 2005, In: Lecture Notes in Computer Science. 3378, p. 342-362 21 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    150 Scopus citations