Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • 2005

    Sufficient conditions for collision-resistant hashing

    Ishai, Y., Kushilevitz, E. & Ostrovsky, R., 2005, In: Lecture Notes in Computer Science. 3378, p. 445-456 12 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    41 Scopus citations
  • 2004

    Adaptive versus non-adaptive security of multi-party protocols

    Canetti, R., Damgård, I., Dziembowski, S., Ishai, Y. & Malkin, T., Jun 2004, In: Journal of Cryptology. 17, 3, p. 153-207 55 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    30 Scopus citations
  • Batch codes and their applications

    Ishai, Y., Ostrovsky, R., Kushilevitz, E. & Sahai, A., 2004, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 262-271 10 p.

    Research output: Contribution to journalConference articlepeer-review

    166 Scopus citations
  • Communication versus computation

    Harsha, P., Ishai, Y., Kilian, J., Nissim, K. & Venkatesh, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Díaz, J., Karhumäki, J., Lepistö, A. & Sannella, D. (eds.). p. 745-756 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3142).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    8 Scopus citations
  • Cryptography in NC 0 (extended abstract)

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2004, In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 166-175 10 p.

    Research output: Contribution to journalConference articlepeer-review

    104 Scopus citations
  • On the hardness of information-theoretic multiparty computation

    Ishai, Y. & Kushilevitz, E., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cachin, C. & Camenisch, J. (eds.). p. 439-455 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3027).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    30 Scopus citations
  • Reducing the servers' computation in private information retrieval: PIR with preprocessing

    Beimel, A., Ishai, Y. & Malkin, T., Mar 2004, In: Journal of Cryptology. 17, 2, p. 125-151 27 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    55 Scopus citations
  • 2003

    Efficient multi-party computation over rings

    Cramer, R., Fehr, S., Ishai, Y. & Kushilevitz, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Biham, E. (ed.). p. 596-613 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2656).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    60 Scopus citations
  • Extending oblivious transfers efficiently

    Ishai, Y., Kilian, J., Nissim, K. & Petrank, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). p. 145-161 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    440 Scopus citations
  • Private circuits: Securing hardware against probing attacks

    Ishai, Y., Sahai, A. & Wagner, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). p. 463-481 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    703 Scopus citations
  • Private computation using a PEZ dispenser

    Balogh, J., Csirik, J. A., Ishai, Y. & Kushilevitz, E., 5 Sep 2003, In: Theoretical Computer Science. 306, 1-3, p. 69-84 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    29 Scopus citations
  • 2002

    Breaking the O(n1/(2k-1)) barrier for information-theoretic private information retrieval

    Beimel, A., Ishai, Y., Kushilevitz, E. & Raymond, J. F., 2002, In: Annual Symposium on Foundations of Computer Science - Proceedings. p. 261-270 10 p.

    Research output: Contribution to journalConference articlepeer-review

    187 Scopus citations
  • On 2-round secure multiparty computation

    Gennaro, R., Ishai, Y., Kushilevitz, E. & Rabin, T., 2002, Advances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings. Yung, M. (ed.). p. 178-193 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2442).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • Perfect constant-round secure computation via perfect randomizing polynomials

    Ishai, Y. & Kushilevitz, E., 2002, Automata, Languages and Programming - 29th International Colloquium, ICALP 2002, Proceedings. Widmayer, P., Eidenbenz, S., Triguero, F., Morales, R., Conejo, R. & Hennessy, M. (eds.). p. 244-256 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2380 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    116 Scopus citations
  • 2001

    Information-theoretic Private Information Retrieval: A unified construction (extended abstract)

    Beimel, A. & Ishai, Y., 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. Orejas, F., Spirakis, P. G. & van Leeuwen, J. (eds.). p. 912-926 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    72 Scopus citations
  • On adaptive vs. Non-adaptive security of multiparty protocols

    Canetti, R., Damgaard, I., Dziembowski, S., Ishai, Y. & Malkin, T., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). p. 262-279 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • On privacy and partition arguments

    Chor, B. & Ishai, Y., 25 May 2001, In: Information and Computation. 167, 1, p. 2-9 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    9 Scopus citations
  • On the power of nonlinear secret-sharing

    Beimel, A. & Ishai, Y., 2001, In: Proceedings of the Annual IEEE Conference on Computational Complexity. p. 188-202 15 p.

    Research output: Contribution to journalConference articlepeer-review

    33 Scopus citations
  • Priced oblivious transfer: How to sell digital goods

    Aiello, B., Ishai, Y. & Reingold, O., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). p. 119-135 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    280 Scopus citations
  • Secure multiparty computation of approximations (extended abstract)

    Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M. J. & Wright, R. N., 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. Orejas, F., Spirakis, P. G. & van Leeuwen, J. (eds.). p. 927-938 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    64 Scopus citations
  • Selective private function evaluation with applications to private statistics

    Canetti, R., Ishai, Y., Kumar, R., Reiter, M. K., Rubinfeld, R. & Wright, R. N., 2001, p. 293-302. 10 p.

    Research output: Contribution to conferencePaperpeer-review

    61 Scopus citations
  • The round complexity of verifiable secret sharing and secure multicast

    Gennaro, R., Ishai, Y., Kushilevitz, E. & Rabin, T., 2001, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 580-589 10 p.

    Research output: Contribution to journalConference articlepeer-review

    100 Scopus citations
  • 2000

    Protecting data privacy in private information retrieval schemes

    Gertner, Y., Ishai, Y., Kushilevitz, E. & Malkin, T., Jun 2000, In: Journal of Computer and System Sciences. 60, 3, p. 592-629 38 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    216 Scopus citations
  • Randomizing polynomials: A new representation with applications to round-efficient secure computation

    Ishai, Y. & Kushilevitz, E., 2000, In: Annual Symposium on Foundations of Computer Science - Proceedings. p. 294-304 11 p.

    Research output: Contribution to journalArticlepeer-review

    205 Scopus citations
  • Reducing the servers computation in private information retrieval: PIR with preprocessing

    Beimel, A., Ishai, Y. & Malkin, T., 2000, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Bellare, M. (ed.). p. 55-73 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    55 Scopus citations
  • 1999

    Compressing cryptographic resources

    Gilboa, N. & Ishai, Y., 1999, Advances in Cryptology – CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Wiener, M. (ed.). p. 591-608 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1666).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    13 Scopus citations
  • Improved upper bounds on information-theoretic private information retrieval

    Ishai, Y. & Kushilevitz, E., 1999, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 79-88 10 p.

    Research output: Contribution to journalConference articlepeer-review

    53 Scopus citations
  • One-way functions are essential for single-server private information retrieval

    Beimel, A., Ishai, Y., Kushilevitz, E. & Malkin, T., 1999, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 89-98 10 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    32 Scopus citations
  • 1998

    Non-interactive and non-malleable commitment

    Di Crescenzo, G., Ishai, Y. & Ostrovsky, R., 1998, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 141-150 10 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    101 Scopus citations
  • Protecting data privacy in private information retrieval schemes

    Gertner, Y., Ishai, Y., Kushilevitz, E. & Malkin, T., 1998, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 151-160 10 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    198 Scopus citations
  • Universal service-providers for database private information retrieval

    Di-Crescenzo, G., Ishai, Y. & Ostrovsky, R., 1998, p. 91-100. 10 p.

    Research output: Contribution to conferencePaperpeer-review

    38 Scopus citations
  • 1997

    Private simultaneous messages protocols with applications

    Ishai, Y. & Kushilevitz, E., 1997, p. 174-183. 10 p.

    Research output: Contribution to conferencePaperpeer-review

    104 Scopus citations
  • 1996

    Valid generalisation from approximate interpolation

    Anthony, M., Bartlett, P., Ishai, Y. & Shawe-Taylor, J., 1996, In: Combinatorics Probability and Computing. 5, 3, p. 191-214 24 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Scopus citations