Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Filter
Conference contribution

Search results

  • Conference contribution

    Homomorphic secret sharing: Optimizations and applications

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y. & Orrù, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 2105-2122 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    52 Scopus citations
  • How many oblivious transfers are needed for secure multiparty computation?

    Harnik, D., Ishai, Y. & Kushilevitz, E., 2007, Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings. p. 284-302 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4622 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • How to construct a leakage-resilient (stateless) trusted party

    Genkin, D., Ishai, Y. & Weiss, M., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). p. 209-244 36 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • How to garble arithmetic circuits

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 120-129 10 p. 6108157. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Identifying cheaters without an honest majority

    Ishai, Y., Ostrovsky, R. & Seyalioglu, H., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 21-38 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    28 Scopus citations
  • Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One

    Dittmer, S., Ishai, Y., Lu, S. & Ostrovsky, R., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. p. 829-841 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Information-Theoretic Distributed Point Functions

    Boyle, E., Gilboa, N., Ishai, Y. & Kolobov, V. I., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). 17. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Information-theoretic Private Information Retrieval: A unified construction (extended abstract)

    Beimel, A. & Ishai, Y., 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. Orejas, F., Spirakis, P. G. & van Leeuwen, J. (eds.). p. 912-926 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    72 Scopus citations
  • Interactive locking, zero-knowledge PCPs, and unconditional cryptography

    Goyal, V., Ishai, Y., Mahmoody, M. & Sahai, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 173-190 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC

    Abascal, J., Faghihi Sereshgi, M. H., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. p. 1591-1605 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Leviosa: Lightweight secure arithmetic computation

    Hazay, C., Marcedone, A., Ishai, Y. & Venkitasubramaniam, M., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 327-344 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • Ligero: Lightweight sublinear arguments without a trusted setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 2087-2104 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    209 Scopus citations
  • Limits of preprocessing

    Filmus, Y., Ishai, Y., Kaplan, A. & Kindler, G., 1 Jul 2020, 35th Computational Complexity Conference, CCC 2020. Saraf, S. (ed.). 17. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 169).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications

    Druk, E. & Ishai, Y., 2014, ITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science. p. 169-182 14 p. (ITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • Lossy chains and fractional secret sharing

    Ishai, Y., Kushilevitz, E. & Strulovich, O., 2013, 30th International Symposium on Theoretical Aspects of Computer Science, STACS 2013. p. 160-171 12 p. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 20).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Low-complexity cryptographic hash functions

    Applebaum, B., Haramaty-Krasne, N., Ishai, Y., Kushilevitz, E. & Vaikuntanathan, V., 1 Nov 2017, 8th Innovations in Theoretical Computer Science Conference, ITCS 2017. Papadimitriou, C. H. (ed.). (Leibniz International Proceedings in Informatics, LIPIcs; vol. 67).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • Making the best of a leaky situation: Zero-knowledge PCPs from leakage-resilient circuits

    Ishai, Y., Weiss, M. & Yang, G., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). p. 3-32 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • Multi-party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN

    Dao, Q., Ishai, Y., Jain, A. & Lin, H., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings, Part II. Handschuh, H. & Lysyanskaya, A. (eds.). p. 315-348 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14082 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Near-optimal secret sharing and error correcting codes in AC0

    Cheng, K., Ishai, Y. & Li, X., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). p. 424-458 35 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Non-interactive secure multiparty computation

    Beimel, A., Gabizon, A., Ishai, Y., Kushilevitz, E., Meldgaard, S. & Paskin-Cherniavsky, A., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. p. 387-404 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    52 Scopus citations
  • Oblivious Transfer with Constant Computational Overhead

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N. & Scholl, P., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). p. 271-302 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14004 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On 2-round secure multiparty computation

    Gennaro, R., Ishai, Y., Kushilevitz, E. & Rabin, T., 2002, Advances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings. Yung, M. (ed.). p. 178-193 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2442).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • On adaptive vs. Non-adaptive security of multiparty protocols

    Canetti, R., Damgaard, I., Dziembowski, S., Ishai, Y. & Malkin, T., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). p. 262-279 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • On complete primitives for fairness

    Gordon, D., Ishai, Y., Moran, T., Ostrovsky, R. & Sahai, A., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 91-108 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • On computational shortcuts for information-theoretic PIR

    Hong, M. M., Ishai, Y., Kolobov, V. I. & Lai, R. W. F., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). p. 504-534 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12550 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • On efficient zero-knowledge PCPs

    Ishai, Y., Mahmoody, M. & Sahai, A., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 151-168 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • One-Message Secure Reductions: On the Cost of Converting Correlations

    Ishai, Y., Kelkar, M., Narayanan, V. & Zafar, L., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 515-547 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On invertible sampling and adaptive security

    Ishai, Y., Kumarasubramanian, A., Orlandi, C. & Sahai, A., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 466-482 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • On linear-size pseudorandom generators and hardcore functions

    Baron, J., Ishai, Y. & Ostrovsky, R., 2013, Computing and Combinatorics - 19th International Conference, COCOON 2013, Proceedings. p. 169-181 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7936 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • On locally decodable codes, self-correctable codes, and t-private PIR

    Barkol, O., Ishai, Y. & Weinreb, E., 2007, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 10th International Workshop, APPROX 2007 and 11th International Workshop, RANDOM 2007, Proceedings. p. 311-325 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4627 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • On Low-End Obfuscation and Learning

    Boyle, E., Ishai, Y., Meyer, P., Robere, R. & Yehuda, G., 1 Jan 2023, 14th Innovations in Theoretical Computer Science Conference, ITCS 2023. Kalai, Y. T. (ed.). 23. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 251).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • On pseudorandom encodings

    Agrikola, T., Couteau, G., Ishai, Y., Jarecki, S. & Sahai, A., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). p. 639-669 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12552 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • On pseudorandom generators with linear stretch in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2006, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 9th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2006 a. p. 260-271 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • On public key encryption from noisy codewords

    Ben-Sasson, E., Ben-Tov, I., Damgård, I., Ishai, Y. & Ron-Zewi, N., 2016, Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Cheng, C-M., Chung, K-M., Yang, B-Y. & Persiano, G. (eds.). p. 417-446 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9615).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    4 Scopus citations
  • On succinct arguments and witness encryption from groups

    Barta, O., Ishai, Y., Ostrovsky, R. & Wu, D. J., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). p. 776-806 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12170 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • On the complexity of decomposable randomized encodings, or: How friendly can a garbling-friendly PRF be?

    Ball, M., Holmgren, J., Ishai, Y., Liu, T. & Malkin, T., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 86. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • On the complexity of UC commitments

    Garay, J. A., Ishai, Y., Kumaresan, R. & Wee, H., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 677-694 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • On the cryptographic complexity of the worst functions

    Beimel, A., Ishai, Y., Kumaresan, R. & Kushilevitz, E., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. p. 317-342 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    51 Scopus citations
  • On the message complexity of secure multiparty computation

    Ishai, Y., Mittal, M. & Ostrovsky, R., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). p. 698-711 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • On the power of correlated randomness in secure computation

    Ishai, Y., Kushilevitz, E., Meldgaard, S., Orlandi, C. & Paskin-Cherniavsky, A., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 600-620 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    63 Scopus citations
  • On the randomness complexity of efficient sampling

    Dubrov, B. & Ishai, Y., 2006, STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing. p. 711-720 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Optimizing obfuscation: Avoiding Barrington's theorem

    Ananth, P., Gupta, D., Ishai, Y. & Sahai, A., 3 Nov 2014, Proceedings of the ACM Conference on Computer and Communications Security. p. 646-658 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    61 Scopus citations
  • OT-combiners via secure computation

    Harnik, D., Ishai, Y., Kushilevitz, E. & Nielsen, J. B., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 393-411 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    64 Scopus citations
  • Parallel hashing via list recoverability

    Haitner, I., Ishai, Y., Omri, E. & Shaltiel, R., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). p. 173-190 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • Partial garbling schemes and their applications

    Ishai, Y. & Wee, H., 2014, Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Proceedings. PART 1 ed. p. 650-662 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8572 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    55 Scopus citations
  • Perfect constant-round secure computation via perfect randomizing polynomials

    Ishai, Y. & Kushilevitz, E., 2002, Automata, Languages and Programming - 29th International Colloquium, ICALP 2002, Proceedings. Widmayer, P., Eidenbenz, S., Triguero, F., Morales, R., Conejo, R. & Hennessy, M. (eds.). p. 244-256 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2380 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    116 Scopus citations
  • Perfectly secure multiparty computation and the computational overhead of cryptography

    Damgård, I., Ishai, Y. & Krøigaard, M., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 445-465 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    123 Scopus citations
  • Perfect MPC over Layered Graphs

    David, B., Deligios, G., Goel, A., Ishai, Y., Konring, A., Kushilevitz, E., Liu-Zhang, C. D. & Narayanan, V., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 360-392 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs

    Boyle, E., Ishai, Y., Gilboa, N. & Nof, A., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 869-886 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • Priced oblivious transfer: How to sell digital goods

    Aiello, B., Ishai, Y. & Reingold, O., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). p. 119-135 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    280 Scopus citations