Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • Conference contribution

    On Low-End Obfuscation and Learning

    Boyle, E., Ishai, Y., Meyer, P., Robere, R. & Yehuda, G., 1 Jan 2023, 14th Innovations in Theoretical Computer Science Conference, ITCS 2023. Kalai, Y. T. (ed.). 23. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 251).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • On pseudorandom encodings

    Agrikola, T., Couteau, G., Ishai, Y., Jarecki, S. & Sahai, A., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). p. 639-669 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12552 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • On pseudorandom generators with linear stretch in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2006, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 9th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2006 a. p. 260-271 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • On public key encryption from noisy codewords

    Ben-Sasson, E., Ben-Tov, I., Damgård, I., Ishai, Y. & Ron-Zewi, N., 2016, Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Cheng, C-M., Chung, K-M., Yang, B-Y. & Persiano, G. (eds.). p. 417-446 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9615).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    4 Scopus citations
  • On succinct arguments and witness encryption from groups

    Barta, O., Ishai, Y., Ostrovsky, R. & Wu, D. J., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). p. 776-806 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12170 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • On the complexity of decomposable randomized encodings, or: How friendly can a garbling-friendly PRF be?

    Ball, M., Holmgren, J., Ishai, Y., Liu, T. & Malkin, T., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 86. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • On the complexity of UC commitments

    Garay, J. A., Ishai, Y., Kumaresan, R. & Wee, H., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 677-694 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • On the cryptographic complexity of the worst functions

    Beimel, A., Ishai, Y., Kumaresan, R. & Kushilevitz, E., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. p. 317-342 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    51 Scopus citations
  • On the message complexity of secure multiparty computation

    Ishai, Y., Mittal, M. & Ostrovsky, R., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). p. 698-711 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • On the power of correlated randomness in secure computation

    Ishai, Y., Kushilevitz, E., Meldgaard, S., Orlandi, C. & Paskin-Cherniavsky, A., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 600-620 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    63 Scopus citations
  • On the randomness complexity of efficient sampling

    Dubrov, B. & Ishai, Y., 2006, STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing. p. 711-720 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Optimizing obfuscation: Avoiding Barrington's theorem

    Ananth, P., Gupta, D., Ishai, Y. & Sahai, A., 3 Nov 2014, Proceedings of the ACM Conference on Computer and Communications Security. p. 646-658 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    61 Scopus citations
  • OT-combiners via secure computation

    Harnik, D., Ishai, Y., Kushilevitz, E. & Nielsen, J. B., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 393-411 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    64 Scopus citations
  • Parallel hashing via list recoverability

    Haitner, I., Ishai, Y., Omri, E. & Shaltiel, R., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). p. 173-190 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • Partial garbling schemes and their applications

    Ishai, Y. & Wee, H., 2014, Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Proceedings. PART 1 ed. p. 650-662 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8572 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    55 Scopus citations
  • Perfect constant-round secure computation via perfect randomizing polynomials

    Ishai, Y. & Kushilevitz, E., 2002, Automata, Languages and Programming - 29th International Colloquium, ICALP 2002, Proceedings. Widmayer, P., Eidenbenz, S., Triguero, F., Morales, R., Conejo, R. & Hennessy, M. (eds.). p. 244-256 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2380 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    116 Scopus citations
  • Perfectly secure multiparty computation and the computational overhead of cryptography

    Damgård, I., Ishai, Y. & Krøigaard, M., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 445-465 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    123 Scopus citations
  • Perfect MPC over Layered Graphs

    David, B., Deligios, G., Goel, A., Ishai, Y., Konring, A., Kushilevitz, E., Liu-Zhang, C. D. & Narayanan, V., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 360-392 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs

    Boyle, E., Ishai, Y., Gilboa, N. & Nof, A., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 869-886 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • Priced oblivious transfer: How to sell digital goods

    Aiello, B., Ishai, Y. & Reingold, O., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). p. 119-135 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    280 Scopus citations
  • Private circuits II: Keeping secrets in tamperable circuits

    Ishai, Y., Prabhakaran, M., Sahai, A. & Wagner, D., 2006, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 308-327 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4004 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    123 Scopus citations
  • Private large-scale databases with distributed Searchable symmetric encryption

    Ishai, Y., Kushilevitz, E., Lu, S. & Ostrovsky, R., 2016, Topics in Cryptology - The Cryptographers Track at the RSA Conference, CT-RSA 2016. Sako, K. (ed.). p. 90-107 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9610).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    50 Scopus citations
  • Private multiparty sampling and approximation of vector combinations

    Ishai, Y., Malkin, T., Strauss, M. J. & Wright, R. N., 2007, Automata, Languages and Programming - 34th International Colloquium, ICALP 2007, Proceedings. p. 243-254 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4596 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Probabilistically checkable proofs of proximity with zero-knowledge

    Ishai, Y. & Weiss, M., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. p. 121-145 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • Programmable Distributed Point Functions

    Boyle, E., Gilboa, N., Ishai, Y. & Kolobov, V. I., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 121-151 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Proximity gaps for reed-solomon codes

    Ben-Sasson, E., Carmon, D., Ishai, Y., Kopparty, S. & Saraf, S., Nov 2020, Proceedings - 2020 IEEE 61st Annual Symposium on Foundations of Computer Science, FOCS 2020. p. 900-909 10 p. 9317990. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • PSI from Ring-OLE

    Chongchitmate, W., Ishai, Y., Lu, S. & Ostrovsky, R., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. p. 531-545 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Public-coin differing-inputs obfuscation and its applications

    Ishai, Y., Pandey, O. & Sahai, A., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). p. 668-697 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    45 Scopus citations
  • Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications

    Applebaum, B., Ishai, Y., Karni, O. & Patra, A., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 453-482 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Reducing the servers computation in private information retrieval: PIR with preprocessing

    Beimel, A., Ishai, Y. & Malkin, T., 2000, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Bellare, M. (ed.). p. 55-73 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    55 Scopus citations
  • Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC

    Badrinarayanan, S., Ishai, Y., Khurana, D., Sahai, A. & Wichs, D., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). 10. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Robust pseudorandom generators

    Ishai, Y., Kushilevitz, E., Li, X., Ostrovsky, R., Prabhakaran, M., Sahai, A. & Zuckerman, D., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Proceedings. PART 1 ed. p. 576-588 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7965 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    23 Scopus citations
  • Round-Optimal Black-Box MPC in the Plain Model

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 393-426 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). p. 441-469 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Scalable multiparty computation with nearly optimal work and resilience

    Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J. B. & Smith, A., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 241-261 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    75 Scopus citations
  • Scalable secure multiparty computation

    Damgård, I. & Ishai, Y., 2006, Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings. p. 501-520 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    85 Scopus citations
  • Secure arithmetic computation with no honest majority

    Ishai, Y., Prabhakaran, M. & Sahai, A., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 294-314 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    94 Scopus citations
  • Secure Computation and Its Diverse Applications

    Ishai, Y., 2010, Theory of Cryptography. Micciancio, D. (ed.). Berlin, Heidelberg, p. 90-90 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure computation from leaky correlated randomness

    Gupta, D., Ishai, Y., Maji, H. K. & Sahai, A., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). p. 701-720 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Secure computation with minimal interaction, revisited

    Ishai, Y., Kumaresan, R., Kushilevitz, E. & Paskin-Cherniavsky, A., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). p. 359-378 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    23 Scopus citations
  • Secure Computation with Preprocessing via Function Secret Sharing

    Boyle, E., Gilboa, N. & Ishai, Y., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). p. 341-371 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11891 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • Secure multiparty computation of approximations (extended abstract)

    Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M. J. & Wright, R. N., 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. Orejas, F., Spirakis, P. G. & van Leeuwen, J. (eds.). p. 927-938 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    64 Scopus citations
  • Secure multiparty computation with general interaction patterns

    Halevi, S., Ishai, Y., Jain, A., Kushilevitz, E. & Rabin, T., 14 Jan 2016, ITCS 2016 - Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science. p. 157-168 12 p. (ITCS 2016 - Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    39 Scopus citations
  • Secure multi-party computation with identifiable abort

    Ishai, Y., Ostrovsky, R. & Zikas, V., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. p. 369-386 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    45 Scopus citations
  • Secure multiparty computation with minimal interaction

    Ishai, Y., Kushilevitz, E. & Paskin, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 577-594 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    35 Scopus citations
  • Secure protocol transformations

    Ishai, Y., Kushilevitz, E., Prabhakaran, M., Sahai, A. & Yu, C. H., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). p. 430-458 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Separating two-round secure computation from oblivious transfer

    Applebaum, B., Brakerski, Z., Garg, S., Ishai, Y. & Srinivasan, A., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 71. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Share conversion and private information retrieval

    Beimel, A., Ishai, Y., Kushilevitz, E. & Orlov, I., 2012, Proceedings - 2012 IEEE 27th Conference on Computational Complexity, CCC 2012. p. 258-268 11 p. 6243402. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Single-use OT combiners with near-optimal resilience

    Ishai, Y., Maji, H. K., Sahai, A. & Wullschleger, J., 2014, 2014 IEEE International Symposium on Information Theory, ISIT 2014. p. 1544-1548 5 p. 6875092. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Statistical randomized encodings: A complexity theoretic view

    Agrawal, S., Ishai, Y., Khurana, D. & Paskin-Cherniavsky, A., 2015, Automata, Languages, and Programming - 42nd International Colloquium, ICALP 2015, Proceedings. Halldorsson, M. M., Kobayashi, N., Speckmann, B. & Iwama, K. (eds.). p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9134).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations