Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Filter
Chapter

Search results

  • 2019

    Cryptographic Sensing

    Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A. & Eyal, K., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 583-604 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • Efficient Pseudorandom Correlation Generators: Silent OT Extension and More: Silent OT Extension and More

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 489-518 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    61 Scopus citations
  • Reusable Non-Interactive Secure Computation

    Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 462-488 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    15 Scopus citations
  • Trapdoor Hash Functions and Their Applications

    Dottling, N., Garg, S., Ishai, Y., Malavolta, G., Mour, T., Ostrovsky, R. & Döttling, N., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 3-32 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    38 Scopus citations
  • Unconditionally Secure Computation Against Low-Complexity Leakage

    Bogdanov, A., Ishai, Y. & Srinivasan, A., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II. Boldyreva, A. & Micciancio, D. (eds.). Vol. 11693. p. 387-416 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    7 Scopus citations
  • Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 67-97 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    35 Scopus citations
  • 2018

    Limits of Practical Sublinear Secure Computation

    Boyle, E., Ishai, Y. & Polychroniadou, A., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III. Shacham, H. & Boldyreva, A. (eds.). Vol. 10993. p. 302-332 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • On the Local Leakage Resilience of Linear Secret Sharing Schemes

    Benhamouda, F., Degwekar, A., Ishai, Y. & Rabin, T., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I. Boldyreva, A. & Shacham, H. (eds.). Vol. 10991. p. 531-561 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    27 Scopus citations
  • Private Circuits: A Modular Approach: A modular approach

    Ananth, P., Ishai, Y. & Sahai, A., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III. Shacham, H. & Boldyreva, A. (eds.). Vol. 10993. p. 427-455 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    21 Scopus citations
  • Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs

    Boneh, D., Ishai, Y., Sahai, A. & Wu, D. J., 2018, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III. Nielsen, J. B. & Rijmen, V. (eds.). Vol. 10822. p. 222-255 34 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    17 Scopus citations
  • 2017

    Ad Hoc PSM Protocols: Secure Computation Without Coordination: Secure computation without coordination

    Beimel, A., Ishai, Y., Kushilevitz, E. & Eyal, K., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III. Coron, J-S. & Nielsen, J. B. (eds.). Vol. 10212. p. 580-608 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    6 Scopus citations
  • Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation: Optimizing rounds, communication, and computation

    Boyle, E., Gilboa, N. & Ishai, Y., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II. Nielsen, J. B. & Coron, J-S. (eds.). Vol. 10211. p. 163-193 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    48 Scopus citations
  • Lattice-Based SNARGs and Their Application to More Efficient Obfuscation

    Boneh, D., Ishai, Y., Sahai, A. & Wu, D. J., 2017, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III. Coron, J-S. & Nielsen, J. B. (eds.). Vol. 10212. p. 247-277 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    35 Scopus citations
  • Non-Interactive Multiparty Computation Without Correlated Randomness

    Halevi, S., Ishai, Y., Jain, A., Komargodski, I., Sahai, A. & Yogev, E., 2017, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III. Takagi, T. & Peyrin, T. (eds.). Vol. 10626. p. 181-211 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    21 Scopus citations
  • Secure Arithmetic Computation with Constant Computational Overhead

    Applebaum, B., Damgard, I., Ishai, Y., Nielsen, M., Zichron, L. & Damgård, I., 2017, ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I. Shacham, H. & Katz, J. (eds.). Vol. 10401. p. 223-254 32 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    36 Scopus citations
  • The Price of Low Communication in Secure Multi-party Computation

    Garay, J., Ishai, Y., Ostrovsky, R. & Zikas, V., 2017, ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I. Shacham, H. & Katz, J. (eds.). Vol. 10401. p. 420-446 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    17 Scopus citations
  • Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions

    Badrinarayanan, S., Garg, S., Ishai, Y., Sahai, A. & Wadia, A., 2017, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III. Takagi, T. & Peyrin, T. (eds.). Vol. 10626. p. 275-303 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    25 Scopus citations
  • 2013

    Randomization techniques for secure computation

    Ishai, Y., 2013, Secure Multi-Party Computation. p. 222-248 27 p. (Cryptology and Information Security Series; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    24 Scopus citations
  • 2004

    Communication versus computation

    Harsha, P., Ishai, Y., Kilian, J., Nissim, K. & Venkatesh, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Díaz, J., Karhumäki, J., Lepistö, A. & Sannella, D. (eds.). p. 745-756 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3142).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    8 Scopus citations
  • On the hardness of information-theoretic multiparty computation

    Ishai, Y. & Kushilevitz, E., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cachin, C. & Camenisch, J. (eds.). p. 439-455 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3027).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    30 Scopus citations
  • 2003

    Efficient multi-party computation over rings

    Cramer, R., Fehr, S., Ishai, Y. & Kushilevitz, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Biham, E. (ed.). p. 596-613 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2656).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    60 Scopus citations
  • Extending oblivious transfers efficiently

    Ishai, Y., Kilian, J., Nissim, K. & Petrank, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). p. 145-161 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    439 Scopus citations
  • Private circuits: Securing hardware against probing attacks

    Ishai, Y., Sahai, A. & Wagner, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). p. 463-481 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    703 Scopus citations