Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Filter
Article

Search results

  • 2024

    Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation

    Ishai, Y., Korb, A., Lou, P. & Sahai, A., Mar 2024, In: Journal of Cryptology. 37, 1, 1.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • 2023

    Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model

    Hazay, C., Ishai, Y. & Venkitasubramaniam, M., Jul 2023, In: Journal of Cryptology. 36, 3, 26.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Ligero: lightweight sublinear arguments without a trusted setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., Nov 2023, In: Designs, Codes, and Cryptography. 91, 11, p. 3379-3424 46 p.

    Research output: Contribution to journalArticlepeer-review

  • Proximity Gaps for Reed-Solomon Codes

    Ben-Sasson, E., Carmon, D., Ishai, Y., Kopparty, S. & Saraf, S., 12 Oct 2023, In: Journal of the ACM. 70, 5, 31.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • 2021

    On the Local Leakage Resilience of Linear Secret Sharing Schemes

    Benhamouda, F., Degwekar, A., Ishai, Y. & Rabin, T., Apr 2021, In: Journal of Cryptology. 34, 2, 10.

    Research output: Contribution to journalArticlepeer-review

    14 Scopus citations
  • 2018

    Minimizing Locality of One-Way Functions via Semi-private Randomized Encodings

    Applebaum, B., Ishai, Y., Kushilevitz, E. & Eyal, K., 1 Jan 2018, In: Journal of Cryptology. 31, 1, p. 1-22

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • 2016

    Bounded-Communication Leakage Resilience via Parity-Resilient Circuits

    Goyal, V., Ishai, Y., Maji, H. K., Sahai, A. & Sherstov, A. A., 2016, In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 1-10

    Research output: Contribution to journalArticlepeer-review

  • 2015

    Encoding functions with constant online rate, or how to compress garbled circuit keys

    Applebaum, B., Ishai, Y., Kushilevitz, E. & Waters, B., 2015, In: SIAM Journal on Computing. 44, 2, p. 433-466 34 p.

    Research output: Contribution to journalArticlepeer-review

    9 Scopus citations
  • Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs

    Gentry, C., Groth, J., Ishai, Y., Peikert, C., Sahai, A. & Smith, A., 30 Oct 2015, In: Journal of Cryptology. 28, 4, p. 820-843 24 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    48 Scopus citations
  • 2014

    How to garble arithmetic circuits

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2014, In: SIAM Journal on Computing. 43, 2, p. 905-929 25 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    23 Scopus citations
  • On linear-size pseudorandom generators and hardcore functions

    Baron, J., Ishai, Y. & Ostrovsky, R., 2014, In: Theoretical Computer Science. 554, C, p. 50-63 14 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    7 Scopus citations
  • 2011

    Black-box constructions of protocols for secure computation

    Haitner, I., Ishai, Y., Kushilevitz, E., Lindell, Y. & Petrank, E., 2011, In: SIAM Journal on Computing. 40, 2, p. 225-266 42 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    35 Scopus citations
  • On achieving the "best of both worlds" in secure multiparty computation

    Ishai, Y., Katz, J., Kushilevitz, E., Lindell, Y. & Petrank, E., 2011, In: SIAM Journal on Computing. 40, 1, p. 122-141 20 p.

    Research output: Contribution to journalArticlepeer-review

    24 Scopus citations
  • 2010

    On locally decodable codes, self-correctable codes, and t-private PIR

    Barkol, O., Ishai, Y. & Weinreb, E., Dec 2010, In: Algorithmica (New York). 58, 4, p. 831-859 29 p.

    Research output: Contribution to journalArticlepeer-review

    9 Scopus citations
  • 2009

    Cryptography with constant input locality

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Oct 2009, In: Journal of Cryptology. 22, 4, p. 429-469 41 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    34 Scopus citations
  • Private multiparty sampling and approximation of vector combinations

    Ishai, Y., Malkin, T., Strauss, M. J. & Wright, R. N., 17 Apr 2009, In: Theoretical Computer Science. 410, 18, p. 1730-1745 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    4 Scopus citations
  • Zero-knowledge proofs from secure multiparty computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2009, In: SIAM Journal on Computing. 39, 3, p. 1121-1152 32 p.

    Research output: Contribution to journalArticlepeer-review

    83 Scopus citations
  • 2008

    On pseudorandom generators with linear stretch in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Apr 2008, In: Computational Complexity. 17, 1, p. 38-69 32 p.

    Research output: Contribution to journalArticlepeer-review

    40 Scopus citations
  • 2007

    Communication vs. computation

    Harsha, P., Ishai, Y., Kilian, J., Nissim, K. & Venkatesh, S., May 2007, In: Computational Complexity. 16, 1, p. 1-33 33 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • 2006

    Computationally private randomizing polynomials and their applications

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Jun 2006, In: Computational Complexity. 15, 2, p. 115-162 48 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    77 Scopus citations
  • Cryptography in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2006, In: SIAM Journal on Computing. 36, 4, p. 845-888 44 p.

    Research output: Contribution to journalArticlepeer-review

    141 Scopus citations
  • Secure multiparty computation of approximations

    Feigenbaum, J., Ishai, Y., Malkin, T. A. L., Nissim, K., Strauss, M. J. & Wright, R. N., 2006, In: ACM Transactions on Algorithms. 2, 3, p. 435-472 38 p.

    Research output: Contribution to journalArticlepeer-review

    68 Scopus citations
  • 2005

    General constructions for information-theoretic private information retrieval

    Beimel, A., Ishai, Y. & Kushilevitz, E., Aug 2005, In: Journal of Computer and System Sciences. 71, 2, p. 213-247 35 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    74 Scopus citations
  • On the power of nonlinear secret-sharing

    Beimel, A. & Ishai, Y., 2005, In: SIAM Journal on Discrete Mathematics. 19, 1, p. 258-280 23 p.

    Research output: Contribution to journalArticlepeer-review

    20 Scopus citations
  • 2004

    Adaptive versus non-adaptive security of multi-party protocols

    Canetti, R., Damgård, I., Dziembowski, S., Ishai, Y. & Malkin, T., Jun 2004, In: Journal of Cryptology. 17, 3, p. 153-207 55 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    30 Scopus citations
  • Reducing the servers' computation in private information retrieval: PIR with preprocessing

    Beimel, A., Ishai, Y. & Malkin, T., Mar 2004, In: Journal of Cryptology. 17, 2, p. 125-151 27 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    55 Scopus citations
  • 2003

    Private computation using a PEZ dispenser

    Balogh, J., Csirik, J. A., Ishai, Y. & Kushilevitz, E., 5 Sep 2003, In: Theoretical Computer Science. 306, 1-3, p. 69-84 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    29 Scopus citations
  • 2001

    On privacy and partition arguments

    Chor, B. & Ishai, Y., 25 May 2001, In: Information and Computation. 167, 1, p. 2-9 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    9 Scopus citations
  • 2000

    Randomizing polynomials: A new representation with applications to round-efficient secure computation

    Ishai, Y. & Kushilevitz, E., 2000, In: Annual Symposium on Foundations of Computer Science - Proceedings. p. 294-304 11 p.

    Research output: Contribution to journalArticlepeer-review

    205 Scopus citations
  • 1996

    Valid generalisation from approximate interpolation

    Anthony, M., Bartlett, P., Ishai, Y. & Shawe-Taylor, J., 1996, In: Combinatorics Probability and Computing. 5, 3, p. 191-214 24 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Scopus citations