Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • Conference contribution

    Streaming and Unbalanced PSI from Function Secret Sharing

    Dittmer, S., Ishai, Y., Lu, S., Ostrovsky, R., Elsabagh, M., Kiourtis, N., Schulte, B. & Stavrou, A., 2022, Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings. Galdi, C. & Jarecki, S. (eds.). p. 564-587 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13409 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Sub-linear zero-knowledge argument for correctness of a shuffle

    Groth, J. & Ishai, Y., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 379-396 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    59 Scopus citations
  • Succinct Arguments for RAM Programs via Projection Codes

    Ishai, Y., Ostrovsky, R. & Shah, A., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings, Part II. Handschuh, H. & Lysyanskaya, A. (eds.). p. 159-192 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14082 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Succinct Computational Secret Sharing

    Applebaum, B., Beimel, A., Ishai, Y., Kushilevitz, E., Liu, T. & Vaikuntanathan, V., 2 Jun 2023, STOC 2023 - Proceedings of the 55th Annual ACM Symposium on Theory of Computing. Saha, B. & Servedio, R. A. (eds.). p. 1553-1566 14 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Succinct non-interactive arguments via linear interactive proofs

    Bitansky, N., Chiesa, A., Ishai, Y., Paneth, O. & Ostrovsky, R., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 315-333 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    161 Scopus citations
  • The complexity of information theoretic secure computation

    Ishai, Y., 2012, 2012 IEEE Information Theory Workshop. p. 80-80 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Tight Bounds on the Randomness Complexity of Secure Multiparty Computation

    Goyal, V., Ishai, Y. & Song, Y., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 483-513 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Two-round MPC: Information-theoretic and black-box

    Garg, S., Ishai, Y. & Srinivasan, A., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). p. 123-151 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • Zero-knowledge from secure multiparty computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2007, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing. p. 21-30 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    270 Scopus citations
  • Zero knowledge LTCs and their applications

    Ishai, Y., Sahai, A., Viderman, M. & Weiss, M., 2013, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 16th International Workshop, APPROX 2013 and 17th International Workshop, RANDOM 2013, Proceedings. p. 607-622 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8096 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Editorial

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

    Ishai, Y., 2011, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6597 LNCS, p. VI

    Research output: Contribution to journalEditorial

    Open Access
  • Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12106 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11477 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12107 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11478 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Canteaut, A. & Ishai, Y., 2020, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12105 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y., 2011, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2011-March

    Research output: Contribution to journalEditorial

  • Preface

    Ishai, Y. & Rijmen, V., 2019, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11476 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Proceedings - 23rd Annual IEEE Conference on Computational Complexity, CCC 2008: Preface

    Atserias, A., Beame, P., Chakrabarti, A., Feige, U., Fortnow, L., Ishai, Y., Kalai, Y. T., Servedio, R., Watanabe, O., De Wolf, R. & Zuckerman, D., 2008, In: Proceedings of the Annual IEEE Conference on Computational Complexity. p. 9 1 p., 4558800.

    Research output: Contribution to journalEditorial

  • Special section on the fifty-fourth annual symposium on foundations of computer science (FOCS 2013)

    Hardt, M., Ishai, Y., Meka, R. & Williams, V. V., 2016, In: SIAM Journal on Computing. 45, 3, p. 881 1 p.

    Research output: Contribution to journalEditorial

    Open Access
  • Special section on the forty-fifth annual ACM symposium on the theory of computing (STOC 2013)

    Aspnes, J., Ishai, Y. & Miltersen, P. B., 2016, In: SIAM Journal on Computing. 45, 2, p. 459-460 2 p.

    Research output: Contribution to journalEditorial

    Open Access
  • Other contribution

    Compressing Vector OLE

    Boyle, E., Couteau, G., Gilboa, N. & Ishai, Y., 2018

    Research output: Other contributionpeer-review

  • Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Rindal, P. & Scholl, P., 2019

    Research output: Other contributionpeer-review

  • Homomorphic Secret Sharing: Optimizations and Applications

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y. & Orru, M., 2017

    Research output: Other contributionpeer-review

  • How Low Can We Go?

    Ishai, Y., 2020

    Research output: Other contribution

  • LevioSA: Lightweight Secure Arithmetic Computation

    Hazay, C., Ishai, Y., Marcedone, A. & Venkitasubramaniam, M., 2019

    Research output: Other contributionpeer-review

  • Ligero: Lightweight Sublinear Arguments Without a Trusted Setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 2017

    Research output: Other contributionpeer-review

  • Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs

    Boyle, E., Gilboa, N., Ishai, Y. & Nof, A., 2019

    Research output: Other contributionpeer-review

  • Secure Multiparty Computation with General Interaction Patterns

    Halevi, S., Ishai, Y., Jain, A., Kushilevitz, E. & Rabin, T., 2016

    Research output: Other contributionpeer-review

  • Semantic Security Under Related-Key Attacks and Applications

    Applebaum, B., Harnik, D. & Ishai, Y., 2010

    Research output: Other contribution

  • Paper

    Private simultaneous messages protocols with applications

    Ishai, Y. & Kushilevitz, E., 1997, p. 174-183. 10 p.

    Research output: Contribution to conferencePaperpeer-review

    104 Scopus citations
  • Selective private function evaluation with applications to private statistics

    Canetti, R., Ishai, Y., Kumar, R., Reiter, M. K., Rubinfeld, R. & Wright, R. N., 2001, p. 293-302. 10 p.

    Research output: Contribution to conferencePaperpeer-review

    61 Scopus citations
  • Universal service-providers for database private information retrieval

    Di-Crescenzo, G., Ishai, Y. & Ostrovsky, R., 1998, p. 91-100. 10 p.

    Research output: Contribution to conferencePaperpeer-review

    39 Scopus citations