Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs

    Boyle, E., Ishai, Y., Gilboa, N. & Nof, A., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 869-886 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs

    Boyle, E., Gilboa, N., Ishai, Y. & Nof, A., 2019

    Research output: Other contributionpeer-review

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11478 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11477 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y., 2011, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2011-March

    Research output: Contribution to journalEditorial

  • Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12105 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11476 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12107 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12106 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Priced oblivious transfer: How to sell digital goods

    Aiello, B., Ishai, Y. & Reingold, O., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). p. 119-135 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    280 Scopus citations
  • Private circuits: Securing hardware against probing attacks

    Ishai, Y., Sahai, A. & Wagner, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). p. 463-481 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    705 Scopus citations
  • Private Circuits: A Modular Approach: A modular approach

    Ananth, P., Ishai, Y. & Sahai, A., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III. Shacham, H. & Boldyreva, A. (eds.). Vol. 10993. p. 427-455 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    21 Scopus citations
  • Private circuits II: Keeping secrets in tamperable circuits

    Ishai, Y., Prabhakaran, M., Sahai, A. & Wagner, D., 2006, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 308-327 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4004 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    123 Scopus citations
  • Private computation using a PEZ dispenser

    Balogh, J., Csirik, J. A., Ishai, Y. & Kushilevitz, E., 5 Sep 2003, In: Theoretical Computer Science. 306, 1-3, p. 69-84 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    29 Scopus citations
  • Private large-scale databases with distributed Searchable symmetric encryption

    Ishai, Y., Kushilevitz, E., Lu, S. & Ostrovsky, R., 2016, Topics in Cryptology - The Cryptographers Track at the RSA Conference, CT-RSA 2016. Sako, K. (ed.). p. 90-107 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9610).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    50 Scopus citations
  • Private multiparty sampling and approximation of vector combinations

    Ishai, Y., Malkin, T., Strauss, M. J. & Wright, R. N., 17 Apr 2009, In: Theoretical Computer Science. 410, 18, p. 1730-1745 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    4 Scopus citations
  • Private multiparty sampling and approximation of vector combinations

    Ishai, Y., Malkin, T., Strauss, M. J. & Wright, R. N., 2007, Automata, Languages and Programming - 34th International Colloquium, ICALP 2007, Proceedings. p. 243-254 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4596 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Private simultaneous messages protocols with applications

    Ishai, Y. & Kushilevitz, E., 1997, p. 174-183. 10 p.

    Research output: Contribution to conferencePaperpeer-review

    104 Scopus citations
  • Probabilistically checkable proofs of proximity with zero-knowledge

    Ishai, Y. & Weiss, M., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. p. 121-145 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • Proceedings - 23rd Annual IEEE Conference on Computational Complexity, CCC 2008: Preface

    Atserias, A., Beame, P., Chakrabarti, A., Feige, U., Fortnow, L., Ishai, Y., Kalai, Y. T., Servedio, R., Watanabe, O., De Wolf, R. & Zuckerman, D., 2008, In: Proceedings of the Annual IEEE Conference on Computational Complexity. p. 9 1 p., 4558800.

    Research output: Contribution to journalEditorial

  • Programmable Distributed Point Functions

    Boyle, E., Gilboa, N., Ishai, Y. & Kolobov, V. I., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 121-151 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Protecting data privacy in private information retrieval schemes

    Gertner, Y., Ishai, Y., Kushilevitz, E. & Malkin, T., Jun 2000, In: Journal of Computer and System Sciences. 60, 3, p. 592-629 38 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    217 Scopus citations
  • Protecting data privacy in private information retrieval schemes

    Gertner, Y., Ishai, Y., Kushilevitz, E. & Malkin, T., 1998, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 151-160 10 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    198 Scopus citations
  • Proximity gaps for reed-solomon codes

    Ben-Sasson, E., Carmon, D., Ishai, Y., Kopparty, S. & Saraf, S., Nov 2020, Proceedings - 2020 IEEE 61st Annual Symposium on Foundations of Computer Science, FOCS 2020. p. 900-909 10 p. 9317990. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Proximity Gaps for Reed-Solomon Codes

    Ben-Sasson, E., Carmon, D., Ishai, Y., Kopparty, S. & Saraf, S., 12 Oct 2023, In: Journal of the ACM. 70, 5, 31.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • PSI from Ring-OLE

    Chongchitmate, W., Ishai, Y., Lu, S. & Ostrovsky, R., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. p. 531-545 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Public-coin differing-inputs obfuscation and its applications

    Ishai, Y., Pandey, O. & Sahai, A., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). p. 668-697 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    45 Scopus citations
  • Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications

    Applebaum, B., Ishai, Y., Karni, O. & Patra, A., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 453-482 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs

    Boneh, D., Ishai, Y., Sahai, A. & Wu, D. J., 2018, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III. Nielsen, J. B. & Rijmen, V. (eds.). Vol. 10822. p. 222-255 34 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    17 Scopus citations
  • Randomization techniques for secure computation

    Ishai, Y., 2013, Secure Multi-Party Computation. p. 222-248 27 p. (Cryptology and Information Security Series; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    24 Scopus citations
  • Randomizing polynomials: A new representation with applications to round-efficient secure computation

    Ishai, Y. & Kushilevitz, E., 2000, In: Annual Symposium on Foundations of Computer Science - Proceedings. p. 294-304 11 p.

    Research output: Contribution to journalArticlepeer-review

    205 Scopus citations
  • Reducing the servers computation in private information retrieval: PIR with preprocessing

    Beimel, A., Ishai, Y. & Malkin, T., 2000, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Bellare, M. (ed.). p. 55-73 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    55 Scopus citations
  • Reducing the servers' computation in private information retrieval: PIR with preprocessing

    Beimel, A., Ishai, Y. & Malkin, T., Mar 2004, In: Journal of Cryptology. 17, 2, p. 125-151 27 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    55 Scopus citations
  • Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC

    Badrinarayanan, S., Ishai, Y., Khurana, D., Sahai, A. & Wichs, D., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). 10. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Reusable Non-Interactive Secure Computation

    Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 462-488 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    15 Scopus citations
  • Robust pseudorandom generators

    Ishai, Y., Kushilevitz, E., Li, X., Ostrovsky, R., Prabhakaran, M., Sahai, A. & Zuckerman, D., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Proceedings. PART 1 ed. p. 576-588 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7965 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    23 Scopus citations
  • Round-Optimal Black-Box MPC in the Plain Model

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 393-426 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). p. 441-469 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Scalable multiparty computation with nearly optimal work and resilience

    Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J. B. & Smith, A., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 241-261 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    75 Scopus citations
  • Scalable secure multiparty computation

    Damgård, I. & Ishai, Y., 2006, Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings. p. 501-520 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    85 Scopus citations
  • Secure Arithmetic Computation with Constant Computational Overhead

    Applebaum, B., Damgard, I., Ishai, Y., Nielsen, M., Zichron, L. & Damgård, I., 2017, ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I. Shacham, H. & Katz, J. (eds.). Vol. 10401. p. 223-254 32 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    37 Scopus citations
  • Secure arithmetic computation with no honest majority

    Ishai, Y., Prabhakaran, M. & Sahai, A., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 294-314 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    94 Scopus citations
  • Secure Computation and Its Diverse Applications

    Ishai, Y., 2010, Theory of Cryptography. Micciancio, D. (ed.). Berlin, Heidelberg, p. 90-90 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure computation from leaky correlated randomness

    Gupta, D., Ishai, Y., Maji, H. K. & Sahai, A., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). p. 701-720 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Secure computation with minimal interaction, revisited

    Ishai, Y., Kumaresan, R., Kushilevitz, E. & Paskin-Cherniavsky, A., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). p. 359-378 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    23 Scopus citations
  • Secure Computation with Preprocessing via Function Secret Sharing

    Boyle, E., Gilboa, N. & Ishai, Y., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). p. 341-371 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11891 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • Secure multiparty computation of approximations

    Feigenbaum, J., Ishai, Y., Malkin, T. A. L., Nissim, K., Strauss, M. J. & Wright, R. N., 2006, In: ACM Transactions on Algorithms. 2, 3, p. 435-472 38 p.

    Research output: Contribution to journalArticlepeer-review

    68 Scopus citations
  • Secure multiparty computation of approximations (extended abstract)

    Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M. J. & Wright, R. N., 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. Orejas, F., Spirakis, P. G. & van Leeuwen, J. (eds.). p. 927-938 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    64 Scopus citations
  • Secure multiparty computation with general interaction patterns

    Halevi, S., Ishai, Y., Jain, A., Kushilevitz, E. & Rabin, T., 14 Jan 2016, ITCS 2016 - Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science. p. 157-168 12 p. (ITCS 2016 - Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    39 Scopus citations
  • Secure Multiparty Computation with General Interaction Patterns

    Halevi, S., Ishai, Y., Jain, A., Kushilevitz, E. & Rabin, T., 2016

    Research output: Other contributionpeer-review