Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Filter
Conference contribution

Search results

  • 2011

    How to garble arithmetic circuits

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 120-129 10 p. 6108157. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • 2010

    Bounded key-dependent message security

    Barak, B., Haitner, I., Hofheinz, D. & Ishai, Y., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 423-444 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    98 Scopus citations
  • Founding cryptography on tamper-proof hardware tokens

    Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R. & Wadia, A., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 308-326 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    117 Scopus citations
  • From secrecy to soundness: Efficient verification via secure computation

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2010, Automata, Languages and Programming - 37th International Colloquium, ICALP 2010, Proceedings. PART 1 ed. p. 152-163 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6198 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    138 Scopus citations
  • Interactive locking, zero-knowledge PCPs, and unconditional cryptography

    Goyal, V., Ishai, Y., Mahmoody, M. & Sahai, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 173-190 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • On complete primitives for fairness

    Gordon, D., Ishai, Y., Moran, T., Ostrovsky, R. & Sahai, A., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 91-108 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • On invertible sampling and adaptive security

    Ishai, Y., Kumarasubramanian, A., Orlandi, C. & Sahai, A., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 466-482 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Perfectly secure multiparty computation and the computational overhead of cryptography

    Damgård, I., Ishai, Y. & Krøigaard, M., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 445-465 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    123 Scopus citations
  • Secure Computation and Its Diverse Applications

    Ishai, Y., 2010, Theory of Cryptography. Micciancio, D. (ed.). Berlin, Heidelberg, p. 90-90 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure multiparty computation with minimal interaction

    Ishai, Y., Kushilevitz, E. & Paskin, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 577-594 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    35 Scopus citations
  • 2009

    Extracting correlations

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2009, Proceedings - 50th Annual Symposium on Foundations of Computer Science, FOCS 2009. p. 261-270 10 p. 5438627. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    38 Scopus citations
  • Secure arithmetic computation with no honest majority

    Ishai, Y., Prabhakaran, M. & Sahai, A., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 294-314 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    94 Scopus citations
  • 2008

    Basing weak public-key cryptography on strong one-way functions

    Biham, E., Goren, Y. J. & Ishai, Y., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 55-72 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • Cryptography with constant computational overhead

    Ishai, Y., Ostrovsky, R., Kushilevitz, E. & Sahai, A., 2008, STOC'08: Proceedings of the 2008 ACM Symposium on Theory of Computing. p. 433-442 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    115 Scopus citations
  • Founding cryptography on oblivious transfer - Efficiently

    Ishai, Y., Prabhakaran, M. & Sahai, A., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 572-591 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    306 Scopus citations
  • OT-combiners via secure computation

    Harnik, D., Ishai, Y., Kushilevitz, E. & Nielsen, J. B., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 393-411 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    64 Scopus citations
  • Scalable multiparty computation with nearly optimal work and resilience

    Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J. B. & Smith, A., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 241-261 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    75 Scopus citations
  • Sub-linear zero-knowledge argument for correctness of a shuffle

    Groth, J. & Ishai, Y., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 379-396 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    59 Scopus citations
  • 2007

    Cryptography with constant input locality

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2007, Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings. p. 92-110 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4622 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    25 Scopus citations
  • Efficient arguments without short PCPs

    Ishai, Y., Kushilevitz, E. & Ostrovsky, R., 2007, Proceedings - Twenty-Second Annual IEEE Conference on Computational Complexity, CCC 2007. p. 278-291 14 p. 4262770. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    91 Scopus citations
  • Evaluating branching programs on encrypted data

    Ishai, Y. & Paskin, A., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 575-594 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    142 Scopus citations
  • How many oblivious transfers are needed for secure multiparty computation?

    Harnik, D., Ishai, Y. & Kushilevitz, E., 2007, Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings. p. 284-302 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4622 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • On locally decodable codes, self-correctable codes, and t-private PIR

    Barkol, O., Ishai, Y. & Weinreb, E., 2007, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 10th International Workshop, APPROX 2007 and 11th International Workshop, RANDOM 2007, Proceedings. p. 311-325 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4627 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Private multiparty sampling and approximation of vector combinations

    Ishai, Y., Malkin, T., Strauss, M. J. & Wright, R. N., 2007, Automata, Languages and Programming - 34th International Colloquium, ICALP 2007, Proceedings. p. 243-254 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4596 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Zero-knowledge from secure multiparty computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2007, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing. p. 21-30 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    268 Scopus citations
  • 2006

    Black-box constructions for secure computation

    Ishai, Y., Kushilevitz, E., Lindell, Y. & Petrank, E., 2006, STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing. p. 99-108 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    53 Scopus citations
  • Constant-round multiparty computation using black-box pseudorandom generator

    Damgård, I. & Ishai, Y., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 378-394 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    108 Scopus citations
  • Cryptography from anonymity

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2006, 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006. p. 239-248 10 p. 4031360. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    101 Scopus citations
  • On pseudorandom generators with linear stretch in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2006, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 9th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2006 a. p. 260-271 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • On the randomness complexity of efficient sampling

    Dubrov, B. & Ishai, Y., 2006, STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing. p. 711-720 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Private circuits II: Keeping secrets in tamperable circuits

    Ishai, Y., Prabhakaran, M., Sahai, A. & Wagner, D., 2006, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 308-327 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4004 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    123 Scopus citations
  • Scalable secure multiparty computation

    Damgård, I. & Ishai, Y., 2006, Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings. p. 501-520 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    85 Scopus citations
  • 2002

    On 2-round secure multiparty computation

    Gennaro, R., Ishai, Y., Kushilevitz, E. & Rabin, T., 2002, Advances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings. Yung, M. (ed.). p. 178-193 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2442).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • Perfect constant-round secure computation via perfect randomizing polynomials

    Ishai, Y. & Kushilevitz, E., 2002, Automata, Languages and Programming - 29th International Colloquium, ICALP 2002, Proceedings. Widmayer, P., Eidenbenz, S., Triguero, F., Morales, R., Conejo, R. & Hennessy, M. (eds.). p. 244-256 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2380 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    116 Scopus citations
  • 2001

    Information-theoretic Private Information Retrieval: A unified construction (extended abstract)

    Beimel, A. & Ishai, Y., 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. Orejas, F., Spirakis, P. G. & van Leeuwen, J. (eds.). p. 912-926 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    72 Scopus citations
  • On adaptive vs. Non-adaptive security of multiparty protocols

    Canetti, R., Damgaard, I., Dziembowski, S., Ishai, Y. & Malkin, T., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). p. 262-279 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • Priced oblivious transfer: How to sell digital goods

    Aiello, B., Ishai, Y. & Reingold, O., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). p. 119-135 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    280 Scopus citations
  • Secure multiparty computation of approximations (extended abstract)

    Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M. J. & Wright, R. N., 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. Orejas, F., Spirakis, P. G. & van Leeuwen, J. (eds.). p. 927-938 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    64 Scopus citations
  • 2000

    Reducing the servers computation in private information retrieval: PIR with preprocessing

    Beimel, A., Ishai, Y. & Malkin, T., 2000, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Bellare, M. (ed.). p. 55-73 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    55 Scopus citations
  • 1999

    Compressing cryptographic resources

    Gilboa, N. & Ishai, Y., 1999, Advances in Cryptology – CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Wiener, M. (ed.). p. 591-608 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1666).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    13 Scopus citations