Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yuval Ishai
@article{DBLP:journals/joc/IshaiKLS24, author = {Yuval Ishai and Alexis Korb and Paul Lou and Amit Sahai}, title = {Beyond the Csisz{\'{a}}r-K{\"{o}}rner Bound: Best-Possible Wiretap Coding via Obfuscation}, journal = {J. Cryptol.}, volume = {37}, number = {1}, pages = {1}, year = {2024}, url = {https://doi.org/10.1007/s00145-023-09482-2}, doi = {10.1007/S00145-023-09482-2}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/IshaiKLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiS24, author = {Yuval Ishai and Yifan Song}, title = {Leakage-Tolerant Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2024}, url = {https://eprint.iacr.org/2024/332}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/IshaiS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AmesHIV23, author = {Scott Ames and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Ligero: lightweight sublinear arguments without a trusted setup}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3379--3424}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01222-8}, doi = {10.1007/S10623-023-01222-8}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AmesHIV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/BenSassonCIKS23, author = {Eli Ben{-}Sasson and Dan Carmon and Yuval Ishai and Swastik Kopparty and Shubhangi Saraf}, title = {Proximity Gaps for Reed-Solomon Codes}, journal = {J. {ACM}}, volume = {70}, number = {5}, pages = {31:1--31:57}, year = {2023}, url = {https://doi.org/10.1145/3614423}, doi = {10.1145/3614423}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/BenSassonCIKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayIV23, author = {Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model}, journal = {J. Cryptol.}, volume = {36}, number = {3}, pages = {26}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09465-3}, doi = {10.1007/S00145-023-09465-3}, timestamp = {Sat, 24 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayIV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiOS23, author = {Yuval Ishai and Rafail Ostrovsky and Akash Shah}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Succinct Arguments for {RAM} Programs via Projection Codes}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {159--192}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_6}, doi = {10.1007/978-3-031-38545-2\_6}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehBCGI23, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Arithmetic Sketching}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {171--202}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_6}, doi = {10.1007/978-3-031-38557-5\_6}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehBCGI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaleviIKR23, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Additive Randomized Encodings and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {203--235}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_7}, doi = {10.1007/978-3-031-38557-5\_7}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaleviIKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiJLSZ23, author = {Yuval Ishai and Aayush Jain and Paul Lou and Amit Sahai and Mark Zhandry}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Computational Wiretap Coding from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {263--293}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_9}, doi = {10.1007/978-3-031-38551-3\_9}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiJLSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DaoIJL23, author = {Quang Dao and Yuval Ishai and Aayush Jain and Huijia Lin}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Multi-party Homomorphic Secret Sharing and Sublinear {MPC} from Sparse {LPN}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {315--348}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_11}, doi = {10.1007/978-3-031-38545-2\_11}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DaoIJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DavidDGIKKLN23, author = {Bernardo David and Giovanni Deligios and Aarushi Goel and Yuval Ishai and Anders Konring and Eyal Kushilevitz and Chen{-}Da Liu{-}Zhang and Varun Narayanan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Perfect {MPC} over Layered Graphs}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {360--392}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_12}, doi = {10.1007/978-3-031-38557-5\_12}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DavidDGIKKLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Round-Optimal Black-Box {MPC} in the Plain Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {393--426}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_13}, doi = {10.1007/978-3-031-38557-5\_13}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKNZ23, author = {Yuval Ishai and Mahimna Kelkar and Varun Narayanan and Liav Zafar}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {One-Message Secure Reductions: On the Cost of Converting Correlations}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {515--547}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_17}, doi = {10.1007/978-3-031-38557-5\_17}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKNZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Carmit Hazay and Martijn Stam}, title = {Black-Box Reusable {NISC} with Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {68--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_3}, doi = {10.1007/978-3-031-30617-4\_3}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleCGIKRS23, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Nicolas Resch and Peter Scholl}, editor = {Carmit Hazay and Martijn Stam}, title = {Oblivious Transfer with Constant Computational Overhead}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {271--302}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_10}, doi = {10.1007/978-3-031-30545-0\_10}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleCGIKRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/Bogdanov0FIKS23, author = {Andrej Bogdanov and Krishnamoorthy Dinesh and Yuval Filmus and Yuval Ishai and Avi Kaplan and Sruthi Sekar}, editor = {Patricia Bouyer and Srikanth Srinivasan}, title = {Bounded Simultaneous Messages}, booktitle = {43rd {IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2023, December 18-20, 2023, {IIIT} Hyderabad, Telangana, India}, series = {LIPIcs}, volume = {284}, pages = {23:1--23:17}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2023.23}, doi = {10.4230/LIPICS.FSTTCS.2023.23}, timestamp = {Wed, 13 Dec 2023 14:08:06 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/Bogdanov0FIKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BoyleIMRY23, author = {Elette Boyle and Yuval Ishai and Pierre Meyer and Robert Robere and Gal Yehuda}, editor = {Yael Tauman Kalai}, title = {On Low-End Obfuscation and Learning}, booktitle = {14th Innovations in Theoretical Computer Science Conference, {ITCS} 2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, {USA}}, series = {LIPIcs}, volume = {251}, pages = {23:1--23:28}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2023.23}, doi = {10.4230/LIPICS.ITCS.2023.23}, timestamp = {Thu, 02 Feb 2023 12:50:42 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BoyleIMRY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GhosalIKKLS23, author = {Riddhi Ghosal and Yuval Ishai and Alexis Korb and Eyal Kushilevitz and Paul Lou and Amit Sahai}, editor = {Barna Saha and Rocco A. Servedio}, title = {Hard Languages in {NP} {\(\cap\)} coNP and {NIZK} Proofs from Unstructured Hardness}, booktitle = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing, {STOC} 2023, Orlando, FL, USA, June 20-23, 2023}, pages = {1243--1256}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3564246.3585119}, doi = {10.1145/3564246.3585119}, timestamp = {Mon, 22 May 2023 13:01:48 +0200}, biburl = {https://dblp.org/rec/conf/stoc/GhosalIKKLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ApplebaumBIKLV23, author = {Benny Applebaum and Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Tianren Liu and Vinod Vaikuntanathan}, editor = {Barna Saha and Rocco A. Servedio}, title = {Succinct Computational Secret Sharing}, booktitle = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing, {STOC} 2023, Orlando, FL, USA, June 20-23, 2023}, pages = {1553--1566}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3564246.3585127}, doi = {10.1145/3564246.3585127}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/ApplebaumBIKLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiKR23, author = {Yuval Ishai and Eyal Kushnir and Ron D. Rothblum}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Combinatorially Homomorphic Encryption}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14370}, pages = {251--278}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48618-0\_9}, doi = {10.1007/978-3-031-48618-0\_9}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AbramBIKN23, author = {Damiano Abram and Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Cryptography from Planted Graphs: Security with Logarithmic-Size Messages}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14369}, pages = {286--315}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48615-9\_11}, doi = {10.1007/978-3-031-48615-9\_11}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AbramBIKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-00334, author = {Andrej Bogdanov and Krishnamoorthy Dinesh and Yuval Filmus and Yuval Ishai and Avi Kaplan and Sruthi Sekar}, title = {Bounded Simultaneous Messages}, journal = {CoRR}, volume = {abs/2310.00334}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.00334}, doi = {10.48550/ARXIV.2310.00334}, eprinttype = {arXiv}, eprint = {2310.00334}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-00334.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ApplebaumBIKLV23, author = {Benny Applebaum and Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Tianren Liu and Vinod Vaikuntanathan}, title = {Succinct Computational Secret Sharing}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR23-091}}, year = {2023}, url = {https://eccc.weizmann.ac.il/report/2023/091}, eprinttype = {ECCC}, eprint = {TR23-091}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ApplebaumBIKLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GhosalIKKLS23, author = {Riddhi Ghosal and Yuval Ishai and Alexis Korb and Eyal Kushilevitz and Paul Lou and Amit Sahai}, title = {Hard Languages in {\textdollar}{\textbackslash}text\{NP\}{\textbackslash}cap{\textbackslash}text\{coNP\}{\textdollar} and {NIZK} Proofs from Unstructured Hardness}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR23-213}}, year = {2023}, url = {https://eccc.weizmann.ac.il/report/2023/213}, eprinttype = {ECCC}, eprint = {TR23-213}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/GhosalIKKLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGIK23, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Victor I. Kolobov}, title = {Information-Theoretic Distributed Point Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2023}, url = {https://eprint.iacr.org/2023/028}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGIK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidKIKN23, author = {Bernardo David and Anders Konring and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan}, title = {Perfect {MPC} over Layered Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2023}, url = {https://eprint.iacr.org/2023/330}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidKIKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Black-Box Reusable {NISC} with Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2023}, url = {https://eprint.iacr.org/2023/514}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChongchitmateILO23, author = {Wutichai Chongchitmate and Yuval Ishai and Steve Lu and Rafail Ostrovsky}, title = {{PSI} from ring-OLE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {745}, year = {2023}, url = {https://eprint.iacr.org/2023/745}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChongchitmateILO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGIKRS23, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Nicolas Resch and Peter Scholl}, title = {Oblivious Transfer with Constant Computational Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {817}, year = {2023}, url = {https://eprint.iacr.org/2023/817}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGIKRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviIKR23, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, title = {Additive Randomized Encodings and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {870}, year = {2023}, url = {https://eprint.iacr.org/2023/870}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviIKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumBIKLV23, author = {Benny Applebaum and Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Tianren Liu and Vinod Vaikuntanathan}, title = {Succinct Computational Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {955}, year = {2023}, url = {https://eprint.iacr.org/2023/955}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumBIKLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehBCGI23, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {Arithmetic Sketching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2023}, url = {https://eprint.iacr.org/2023/1012}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehBCGI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS23a, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Round-Optimal Black-Box {MPC} in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2023}, url = {https://eprint.iacr.org/2023/1173}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKNZ23, author = {Yuval Ishai and Mahimna Kelkar and Varun Narayanan and Liav Zafar}, title = {One-Message Secure Reductions: On the Cost of Converting Correlations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1225}, year = {2023}, url = {https://eprint.iacr.org/2023/1225}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKNZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiJLSZ23, author = {Yuval Ishai and Aayush Jain and Paul Lou and Amit Sahai and Mark Zhandry}, title = {Computational Wiretap Coding from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1270}, year = {2023}, url = {https://eprint.iacr.org/2023/1270}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiJLSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaoIJL23, author = {Quang Dao and Yuval Ishai and Aayush Jain and Huijia Lin}, title = {Multi-Party Homomorphic Secret Sharing and Sublinear {MPC} from Sparse {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1593}, year = {2023}, url = {https://eprint.iacr.org/2023/1593}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DaoIJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbramBIKN23, author = {Damiano Abram and Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan}, title = {Cryptography from Planted Graphs: Security with Logarithmic-Size Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1929}, year = {2023}, url = {https://eprint.iacr.org/2023/1929}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AbramBIKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhosalIKKLS23, author = {Riddhi Ghosal and Yuval Ishai and Alexis Korb and Eyal Kushilevitz and Paul Lou and Amit Sahai}, title = {Hard Languages in {\textdollar}{\textbackslash}mathsf\{NP\} {\textbackslash}cap {\textbackslash}mathsf\{coNP\}{\textdollar} and {NIZK} Proofs from Unstructured Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1972}, year = {2023}, url = {https://eprint.iacr.org/2023/1972}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GhosalIKKLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKR23, author = {Yuval Ishai and Eyal Kushnir and Ron D. Rothblum}, title = {Combinatorially Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1973}, year = {2023}, url = {https://eprint.iacr.org/2023/1973}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BogdanovIS22, author = {Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan}, title = {Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage}, journal = {J. Cryptol.}, volume = {35}, number = {1}, pages = {2}, year = {2022}, url = {https://doi.org/10.1007/s00145-021-09412-0}, doi = {10.1007/S00145-021-09412-0}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BogdanovIS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BogdanovIS22a, author = {Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan}, title = {Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage}, journal = {J. Cryptol.}, volume = {35}, number = {2}, pages = {7}, year = {2022}, url = {https://doi.org/10.1007/s00145-021-09417-9}, doi = {10.1007/S00145-021-09417-9}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BogdanovIS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BitanskyCIOP22, author = {Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth}, title = {Succinct Non-Interactive Arguments via Linear Interactive Proofs}, journal = {J. Cryptol.}, volume = {35}, number = {3}, pages = {15}, year = {2022}, url = {https://doi.org/10.1007/s00145-022-09424-4}, doi = {10.1007/S00145-022-09424-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BitanskyCIOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChongchitmateIL22, author = {Wutichai Chongchitmate and Yuval Ishai and Steve Lu and Rafail Ostrovsky}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {{PSI} from Ring-OLE}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {531--545}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559378}, doi = {10.1145/3548606.3559378}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChongchitmateIL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DittmerILO22, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {829--841}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559385}, doi = {10.1145/3548606.3559385}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DittmerILO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/BadrinarayananI22, author = {Saikrishna Badrinarayanan and Yuval Ishai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, editor = {Dana Dachman{-}Soled}, title = {Refuting the Dream {XOR} Lemma via Ideal Obfuscation and Resettable {MPC}}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {10:1--10:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.10}, doi = {10.4230/LIPICS.ITC.2022.10}, timestamp = {Thu, 30 Jun 2022 16:13:48 +0200}, biburl = {https://dblp.org/rec/conf/citc/BadrinarayananI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/BoyleGIK22, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Victor I. Kolobov}, editor = {Dana Dachman{-}Soled}, title = {Information-Theoretic Distributed Point Functions}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {17:1--17:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.17}, doi = {10.4230/LIPICS.ITC.2022.17}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/BoyleGIK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DittmerILO22, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Authenticated Garbling from Simple Correlations}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {57--87}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_3}, doi = {10.1007/978-3-031-15985-5\_3}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DittmerILO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleGIK22, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Victor I. Kolobov}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Programmable Distributed Point Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {121--151}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_5}, doi = {10.1007/978-3-031-15985-5\_5}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleGIK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumIKP22, author = {Benny Applebaum and Yuval Ishai and Or Karni and Arpita Patra}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {453--482}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_16}, doi = {10.1007/978-3-031-15985-5\_16}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumIKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalIS22, author = {Vipul Goyal and Yuval Ishai and Yifan Song}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Tight Bounds on the Randomness Complexity of Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {483--513}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_17}, doi = {10.1007/978-3-031-15985-5\_17}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalIS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKLS22, author = {Yuval Ishai and Alexis Korb and Paul Lou and Amit Sahai}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Beyond the Csisz{\'{a}}r-Korner Bound: Best-Possible Wiretap Coding via Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {573--602}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_20}, doi = {10.1007/978-3-031-15979-4\_20}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleCGIKRS22, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Nicolas Resch and Peter Scholl}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Correlated Pseudorandomness from Expand-Accumulate Codes}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {603--633}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_21}, doi = {10.1007/978-3-031-15979-4\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BoyleCGIKRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoyalIS22, author = {Vipul Goyal and Yuval Ishai and Yifan Song}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Private Circuits with Quasilinear Randomness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {192--221}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_8}, doi = {10.1007/978-3-031-07082-2\_8}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoyalIS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS22, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Round-Optimal Black-Box Protocol Compilers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {210--240}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_8}, doi = {10.1007/978-3-031-06944-4\_8}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CastroHIVV22, author = {Leo de Castro and Carmit Hazay and Yuval Ishai and Vinod Vaikuntanathan and Muthuramakrishnan Venkitasubramaniam}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Asymptotically Quasi-Optimal Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {303--334}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_11}, doi = {10.1007/978-3-031-06944-4\_11}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CastroHIVV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleGIN22, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Secure Multiparty Computation with Sublinear Preprocessing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {427--457}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_15}, doi = {10.1007/978-3-031-06944-4\_15}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleGIN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/Bogdanov0FIKS22, author = {Andrej Bogdanov and Krishnamoorthy Dinesh and Yuval Filmus and Yuval Ishai and Avi Kaplan and Akshayaram Srinivasan}, editor = {Mark Braverman}, title = {Bounded Indistinguishability for Simple Sources}, booktitle = {13th Innovations in Theoretical Computer Science Conference, {ITCS} 2022, January 31 - February 3, 2022, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {215}, pages = {26:1--26:18}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2022.26}, doi = {10.4230/LIPICS.ITCS.2022.26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/Bogdanov0FIKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BoyleDGIKK22, author = {Elette Boyle and Itai Dinur and Niv Gilboa and Yuval Ishai and Nathan Keller and Ohad Klein}, editor = {Mark Braverman}, title = {Locality-Preserving Hashing for Shifts with Connections to Cryptography}, booktitle = {13th Innovations in Theoretical Computer Science Conference, {ITCS} 2022, January 31 - February 3, 2022, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {215}, pages = {27:1--27:24}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2022.27}, doi = {10.4230/LIPICS.ITCS.2022.27}, timestamp = {Wed, 26 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BoyleDGIKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/FosliIKW22, author = {Ingerid Fosli and Yuval Ishai and Victor I. Kolobov and Mary Wootters}, editor = {Mark Braverman}, title = {On the Download Rate of Homomorphic Secret Sharing}, booktitle = {13th Innovations in Theoretical Computer Science Conference, {ITCS} 2022, January 31 - February 3, 2022, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {215}, pages = {71:1--71:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2022.71}, doi = {10.4230/LIPICS.ITCS.2022.71}, timestamp = {Wed, 26 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/FosliIKW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DittmerILOEKSS22, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky and Mohamed Elsabagh and Nikolaos Kiourtis and Brian Schulte and Angelos Stavrou}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {Streaming and Unbalanced {PSI} from Function Secret Sharing}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {564--587}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_25}, doi = {10.1007/978-3-031-14791-3\_25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DittmerILOEKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiKSS22, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious {OT}}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {441--469}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_16}, doi = {10.1007/978-3-031-22365-5\_16}, timestamp = {Fri, 23 Dec 2022 17:47:38 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiPPRS22, author = {Yuval Ishai and Arpita Patra and Sikhar Patranabis and Divya Ravi and Akshayaram Srinivasan}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Fully-Secure {MPC} with Minimal Trust}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {470--501}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_17}, doi = {10.1007/978-3-031-22365-5\_17}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiPPRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-03041, author = {Elette Boyle and Itai Dinur and Niv Gilboa and Yuval Ishai and Nathan Keller and Ohad Klein}, title = {Locality-Preserving Hashing for Shifts with Connections to Cryptography}, journal = {CoRR}, volume = {abs/2201.03041}, year = {2022}, url = {https://arxiv.org/abs/2201.03041}, eprinttype = {arXiv}, eprint = {2201.03041}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-03041.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleDGIKK22, author = {Elette Boyle and Itai Dinur and Niv Gilboa and Yuval Ishai and Nathan Keller and Ohad Klein}, title = {Locality-Preserving Hashing for Shifts with Connections to Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2022}, url = {https://eprint.iacr.org/2022/028}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoyleDGIKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalIS22, author = {Vipul Goyal and Yuval Ishai and Yifan Song}, title = {Private Circuits with Quasilinear Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2022}, url = {https://eprint.iacr.org/2022/250}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GoyalIS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGIN22, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, title = {Sublinear GMW-Style Compiler for {MPC} with Preprocessing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2022}, url = {https://eprint.iacr.org/2022/261}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGIN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKLS22, author = {Yuval Ishai and Alexis Korb and Paul Lou and Amit Sahai}, title = {Beyond the Csisz{\'{a}}r-K{\"{o}}rner Bound: Best-Possible Wiretap Coding via Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2022}, url = {https://eprint.iacr.org/2022/343}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DittmerILO22, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky}, title = {Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2022}, url = {https://eprint.iacr.org/2022/552}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DittmerILO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananI22, author = {Saikrishna Badrinarayanan and Yuval Ishai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Refuting the Dream {XOR} Lemma via Ideal Obfuscation and Resettable {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2022}, url = {https://eprint.iacr.org/2022/681}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalIS22a, author = {Vipul Goyal and Yuval Ishai and Yifan Song}, title = {Tight Bounds on the Randomness Complexity of Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {799}, year = {2022}, url = {https://eprint.iacr.org/2022/799}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalIS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumIKP22, author = {Benny Applebaum and Yuval Ishai and Or Karni and Arpita Patra}, title = {Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {813}, year = {2022}, url = {https://eprint.iacr.org/2022/813}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumIKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DittmerILO22a, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky}, title = {Authenticated Garbling from Simple Correlations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {836}, year = {2022}, url = {https://eprint.iacr.org/2022/836}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DittmerILO22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS22, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Round-Optimal Black-Box Protocol Compilers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {887}, year = {2022}, url = {https://eprint.iacr.org/2022/887}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGIKRS22, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Nicolas Resch and Peter Scholl}, title = {Correlated Pseudorandomness from Expand-Accumulate Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1014}, year = {2022}, url = {https://eprint.iacr.org/2022/1014}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGIKRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGIKS22, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, title = {Efficient Pseudorandom Correlation Generators from Ring-LPN}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1035}, year = {2022}, url = {https://eprint.iacr.org/2022/1035}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGIKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGIK22, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Victor I. Kolobov}, title = {Programmable Distributed Point Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1060}, year = {2022}, url = {https://eprint.iacr.org/2022/1060}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGIK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiPPRS22, author = {Yuval Ishai and Arpita Patra and Sikhar Patranabis and Divya Ravi and Akshayaram Srinivasan}, title = {Fully-Secure {MPC} with Minimal Trust}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1248}, year = {2022}, url = {https://eprint.iacr.org/2022/1248}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiPPRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS22a, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious {OT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1288}, year = {2022}, url = {https://eprint.iacr.org/2022/1288}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmesHIV22, author = {Scott Ames and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Ligero: Lightweight Sublinear Arguments Without a Trusted Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1608}, year = {2022}, url = {https://eprint.iacr.org/2022/1608}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AmesHIV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BenhamoudaDIR21, author = {Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin}, title = {On the Local Leakage Resilience of Linear Secret Sharing Schemes}, journal = {J. Cryptol.}, volume = {34}, number = {2}, pages = {10}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09375-2}, doi = {10.1007/S00145-021-09375-2}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BenhamoudaDIR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BogdanovIS21, author = {Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan}, title = {Unconditionally Secure Computation Against Low-Complexity Leakage}, journal = {J. Cryptol.}, volume = {34}, number = {4}, pages = {38}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09402-2}, doi = {10.1007/S00145-021-09402-2}, timestamp = {Tue, 31 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BogdanovIS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IshaiSW21, author = {Yuval Ishai and Hang Su and David J. Wu}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {212--234}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484572}, doi = {10.1145/3460120.3484572}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/IshaiSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/DittmerIO21, author = {Samuel Dittmer and Yuval Ishai and Rafail Ostrovsky}, editor = {Stefano Tessaro}, title = {Line-Point Zero Knowledge and Its Applications}, booktitle = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021, July 23-26, 2021, Virtual Conference}, series = {LIPIcs}, volume = {199}, pages = {5:1--5:24}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITC.2021.5}, doi = {10.4230/LIPICS.ITC.2021.5}, timestamp = {Thu, 16 Sep 2021 15:58:53 +0200}, biburl = {https://dblp.org/rec/conf/citc/DittmerIO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalIKNPPR21, author = {Shweta Agrawal and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran and Alon Rosen}, editor = {Tal Malkin and Chris Peikert}, title = {Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {124--154}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_5}, doi = {10.1007/978-3-030-84245-1\_5}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalIKNPPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKSS21, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Tal Malkin and Chris Peikert}, title = {On the Round Complexity of Black-Box Secure {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {214--243}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_8}, doi = {10.1007/978-3-030-84245-1\_8}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleGIN21, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, editor = {Tal Malkin and Chris Peikert}, title = {Sublinear GMW-Style Compiler for {MPC} with Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {457--485}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_16}, doi = {10.1007/978-3-030-84245-1\_16}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleGIN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleCGIKS21, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, editor = {Tal Malkin and Chris Peikert}, title = {Low-Complexity Weak Pseudorandom Functions in {\textdollar}{\textbackslash}mathtt \{AC\}0[{\textbackslash}mathtt \{MOD\}2]{\textdollar}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {487--516}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_17}, doi = {10.1007/978-3-030-84259-8\_17}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleCGIKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurGHIKSZ21, author = {Itai Dinur and Steven Goldfeder and Tzipora Halevi and Yuval Ishai and Mahimna Kelkar and Vivek Sharma and Greg Zaverucha}, editor = {Tal Malkin and Chris Peikert}, title = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {517--547}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_18}, doi = {10.1007/978-3-030-84259-8\_18}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurGHIKSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleCG0I0R21, author = {Elette Boyle and Nishanth Chandran and Niv Gilboa and Divya Gupta and Yuval Ishai and Nishant Kumar and Mayank Rathee}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {871--900}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_30}, doi = {10.1007/978-3-030-77886-6\_30}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleCG0I0R21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IshaiLM21, author = {Yuval Ishai and Russell W. F. Lai and Giulio Malavolta}, editor = {Juan A. Garay}, title = {A Geometric Approach to Homomorphic Secret Sharing}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {92--119}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_4}, doi = {10.1007/978-3-030-75248-4\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/IshaiLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenHIKMRSVW21, author = {Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam and Ruihan Wang}, title = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest Majority}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {590--607}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00025}, doi = {10.1109/SP40001.2021.00025}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChenHIKMRSVW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BonehBCGI21, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {Lightweight Techniques for Private Heavy Hitters}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {762--776}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00048}, doi = {10.1109/SP40001.2021.00048}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BonehBCGI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BenhamoudaBGHIN21, author = {Fabrice Benhamouda and Elette Boyle and Niv Gilboa and Shai Halevi and Yuval Ishai and Ariel Nof}, editor = {Kobbi Nissim and Brent Waters}, title = {Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, pages = {129--161}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1\_5}, doi = {10.1007/978-3-030-90453-1\_5}, timestamp = {Mon, 08 Nov 2021 11:43:29 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BenhamoudaBGHIN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-10126, author = {Ingerid Fosli and Yuval Ishai and Victor I. Kolobov and Mary Wootters}, title = {On the Download Rate of Homomorphic Secret Sharing}, journal = {CoRR}, volume = {abs/2111.10126}, year = {2021}, url = {https://arxiv.org/abs/2111.10126}, eprinttype = {arXiv}, eprint = {2111.10126}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-10126.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BogdanovDFIKS21, author = {Andrej Bogdanov and Krishnamoorthy Dinesh and Yuval Filmus and Yuval Ishai and Avi Kaplan and Akshayaram Srinivasan}, title = {Bounded Indistinguishability for Simple Sources}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR21-093}}, year = {2021}, url = {https://eccc.weizmann.ac.il/report/2021/093}, eprinttype = {ECCC}, eprint = {TR21-093}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BogdanovDFIKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehBCGI21, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {Lightweight Techniques for Private Heavy Hitters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2021}, url = {https://eprint.iacr.org/2021/017}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BonehBCGI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiLM21, author = {Yuval Ishai and Russell W. F. Lai and Giulio Malavolta}, title = {A Geometric Approach to Homomorphic Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2021}, url = {https://eprint.iacr.org/2021/260}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurGHIKSZ21, author = {Itai Dinur and Steven Goldfeder and Tzipora Halevi and Yuval Ishai and Mahimna Kelkar and Vivek Sharma and Greg Zaverucha}, title = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2021}, url = {https://eprint.iacr.org/2021/885}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurGHIKSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiSW21, author = {Yuval Ishai and Hang Su and David J. Wu}, title = {Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {977}, year = {2021}, url = {https://eprint.iacr.org/2021/977}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaBGHIN21, author = {Fabrice Benhamouda and Elette Boyle and Niv Gilboa and Shai Halevi and Yuval Ishai and Ariel Nof}, title = {Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1223}, year = {2021}, url = {https://eprint.iacr.org/2021/1223}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaBGHIN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS21, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {On the Round Complexity of Black-box Secure {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1467}, year = {2021}, url = {https://eprint.iacr.org/2021/1467}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FosliIKW21, author = {Ingerid Fosli and Yuval Ishai and Victor I. Kolobov and Mary Wootters}, title = {On the Download Rate of Homomorphic Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1532}, year = {2021}, url = {https://eprint.iacr.org/2021/1532}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FosliIKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoyleGIN20, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {244--276}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_9}, doi = {10.1007/978-3-030-64840-4\_9}, timestamp = {Thu, 10 Dec 2020 10:11:44 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoyleGIN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalIKNPPR20, author = {Shweta Agrawal and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran and Alon Rosen}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Cryptography from One-Way Communication: On Completeness of Finite Channels}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {653--685}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_22}, doi = {10.1007/978-3-030-64840-4\_22}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalIKNPPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbascalSHIV20, author = {Jackson Abascal and Mohammad Hossein Faghihi Sereshgi and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Is the Classical {GMW} Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1591--1605}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423366}, doi = {10.1145/3372297.3423366}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AbascalSHIV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/FilmusIKK20, author = {Yuval Filmus and Yuval Ishai and Avi Kaplan and Guy Kindler}, editor = {Shubhangi Saraf}, title = {Limits of Preprocessing}, booktitle = {35th Computational Complexity Conference, {CCC} 2020, July 28-31, 2020, Saarbr{\"{u}}cken, Germany (Virtual Conference)}, series = {LIPIcs}, volume = {169}, pages = {17:1--17:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.CCC.2020.17}, doi = {10.4230/LIPICS.CCC.2020.17}, timestamp = {Thu, 02 Feb 2023 13:27:04 +0100}, biburl = {https://dblp.org/rec/conf/coco/FilmusIKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleCGIKS20, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Efficient Pseudorandom Correlation Generators from Ring-LPN}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {387--416}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_14}, doi = {10.1007/978-3-030-56880-1\_14}, timestamp = {Thu, 13 Aug 2020 16:42:10 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleCGIKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartaIOW20, author = {Ohad Barta and Yuval Ishai and Rafail Ostrovsky and David J. Wu}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {On Succinct Arguments and Witness Encryption from Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {776--806}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_26}, doi = {10.1007/978-3-030-56784-2\_26}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartaIOW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Ben-SassonCIKS20, author = {Eli Ben{-}Sasson and Dan Carmon and Yuval Ishai and Swastik Kopparty and Shubhangi Saraf}, editor = {Sandy Irani}, title = {Proximity Gaps for Reed-Solomon Codes}, booktitle = {61st {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2020, Durham, NC, USA, November 16-19, 2020}, pages = {900--909}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/FOCS46700.2020.00088}, doi = {10.1109/FOCS46700.2020.00088}, timestamp = {Wed, 15 Dec 2021 10:49:16 +0100}, biburl = {https://dblp.org/rec/conf/focs/Ben-SassonCIKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BoyleCGIKS20, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, editor = {Sandy Irani}, title = {Correlated Pseudorandom Functions from Variable-Density {LPN}}, booktitle = {61st {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2020, Durham, NC, USA, November 16-19, 2020}, pages = {1069--1080}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/FOCS46700.2020.00103}, doi = {10.1109/FOCS46700.2020.00103}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BoyleCGIKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/ApplebaumBGIS20, author = {Benny Applebaum and Zvika Brakerski and Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan}, editor = {Thomas Vidick}, title = {Separating Two-Round Secure Computation From Oblivious Transfer}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {71:1--71:18}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.71}, doi = {10.4230/LIPICS.ITCS.2020.71}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/ApplebaumBGIS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BartusekIJMSZ20, author = {James Bartusek and Yuval Ishai and Aayush Jain and Fermi Ma and Amit Sahai and Mark Zhandry}, editor = {Thomas Vidick}, title = {Affine Determinant Programs: {A} Framework for Obfuscation and Witness Encryption}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {82:1--82:39}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.82}, doi = {10.4230/LIPICS.ITCS.2020.82}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/BartusekIJMSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BallHILM20, author = {Marshall Ball and Justin Holmgren and Yuval Ishai and Tianren Liu and Tal Malkin}, editor = {Thomas Vidick}, title = {On the Complexity of Decomposable Randomized Encodings, Or: How Friendly Can a Garbling-Friendly {PRF} Be?}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {86:1--86:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.86}, doi = {10.4230/LIPICS.ITCS.2020.86}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BallHILM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HongIKL20, author = {Matthew M. Hong and Yuval Ishai and Victor I. Kolobov and Russell W. F. Lai}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {On Computational Shortcuts for Information-Theoretic {PIR}}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {504--534}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_18}, doi = {10.1007/978-3-030-64375-1\_18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HongIKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrikolaCIJS20, author = {Thomas Agrikola and Geoffroy Couteau and Yuval Ishai and Stanislaw Jarecki and Amit Sahai}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {On Pseudorandom Encodings}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12552}, pages = {639--669}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64381-2\_23}, doi = {10.1007/978-3-030-64381-2\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrikolaCIJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2020-1, editor = {Anne Canteaut and Yuval Ishai}, title = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1}, doi = {10.1007/978-3-030-45721-1}, isbn = {978-3-030-45720-4}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2020-2, editor = {Anne Canteaut and Yuval Ishai}, title = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2}, doi = {10.1007/978-3-030-45724-2}, isbn = {978-3-030-45723-5}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2020-3, editor = {Anne Canteaut and Yuval Ishai}, title = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3}, doi = {10.1007/978-3-030-45727-3}, isbn = {978-3-030-45726-6}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2020-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-13053, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky and Mohamed Elsabagh and Nikolaos Kiourtis and Brian Schulte and Angelos Stavrou}, title = {Function Secret Sharing for {PSI-CA:} With Applications to Private Contact Tracing}, journal = {CoRR}, volume = {abs/2012.13053}, year = {2020}, url = {https://arxiv.org/abs/2012.13053}, eprinttype = {arXiv}, eprint = {2012.13053}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-13053.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-14884, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {Lightweight Techniques for Private Heavy Hitters}, journal = {CoRR}, volume = {abs/2012.14884}, year = {2020}, url = {https://arxiv.org/abs/2012.14884}, eprinttype = {arXiv}, eprint = {2012.14884}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-14884.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/Ben-SassonCIKS20, author = {Eli Ben{-}Sasson and Dan Carmon and Yuval Ishai and Swastik Kopparty and Shubhangi Saraf}, title = {Proximity Gaps for Reed-Solomon Codes}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR20-083}}, year = {2020}, url = {https://eccc.weizmann.ac.il/report/2020/083}, eprinttype = {ECCC}, eprint = {TR20-083}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/Ben-SassonCIKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumBGIS20, author = {Benny Applebaum and Zvika Brakerski and Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan}, title = {Separating Two-Round Secure Computation from Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2020}, url = {https://eprint.iacr.org/2020/116}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumBGIS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenHIKMRSVW20, author = {Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam and Ruihan Wang}, title = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2020}, url = {https://eprint.iacr.org/2020/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenHIKMRSVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayIMV20, author = {Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam}, title = {LevioSA: Lightweight Secure Arithmetic Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2020}, url = {https://eprint.iacr.org/2020/393}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayIMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrikolaCIJS20, author = {Thomas Agrikola and Geoffroy Couteau and Yuval Ishai and Stanislaw Jarecki and Amit Sahai}, title = {On Pseudorandom Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2020}, url = {https://eprint.iacr.org/2020/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrikolaCIJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ishai20, author = {Yuval Ishai}, title = {How Low Can We Go?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {576}, year = {2020}, url = {https://eprint.iacr.org/2020/576}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ishai20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonCIKS20, author = {Eli Ben{-}Sasson and Dan Carmon and Yuval Ishai and Swastik Kopparty and Shubhangi Saraf}, title = {Proximity Gaps for Reed-Solomon Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2020}, url = {https://eprint.iacr.org/2020/654}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonCIKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekIJMSZ20, author = {James Bartusek and Yuval Ishai and Aayush Jain and Fermi Ma and Amit Sahai and Mark Zhandry}, title = {Affine Determinant Programs: {A} Framework for Obfuscation and Witness Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {889}, year = {2020}, url = {https://eprint.iacr.org/2020/889}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekIJMSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartaIOW20, author = {Ohad Barta and Yuval Ishai and Rafail Ostrovsky and David J. Wu}, title = {On Succinct Arguments and Witness Encryption from Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1319}, year = {2020}, url = {https://eprint.iacr.org/2020/1319}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartaIOW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGGIKR20, author = {Elette Boyle and Nishanth Chandran and Niv Gilboa and Divya Gupta and Yuval Ishai and Nishant Kumar and Mayank Rathee}, title = {Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1392}, year = {2020}, url = {https://eprint.iacr.org/2020/1392}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGGIKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGIKS20, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, title = {Correlated Pseudorandom Functions from Variable-Density {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1417}, year = {2020}, url = {https://eprint.iacr.org/2020/1417}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGIKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongIKL20, author = {Matthew M. Hong and Yuval Ishai and Victor I. Kolobov and Russell W. F. Lai}, title = {On Computational Shortcuts for Information-Theoretic {PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1429}, year = {2020}, url = {https://eprint.iacr.org/2020/1429}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HongIKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DittmerIO20, author = {Samuel Dittmer and Yuval Ishai and Rafail Ostrovsky}, title = {Line-Point Zero Knowledge and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1446}, year = {2020}, url = {https://eprint.iacr.org/2020/1446}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DittmerIO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGIN20, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, title = {Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1451}, year = {2020}, url = {https://eprint.iacr.org/2020/1451}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGIN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DittmerILOEKSS20, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky and Mohamed Elsabagh and Nikolaos Kiourtis and Brian Schulte and Angelos Stavrou}, title = {Function Secret Sharing for {PSI-CA:} With Applications to Private Contact Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1599}, year = {2020}, url = {https://eprint.iacr.org/2020/1599}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DittmerILOEKSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyleCGIKRS19, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Rindal and Peter Scholl}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Efficient Two-Round {OT} Extension and Silent Non-Interactive Secure Computation}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {291--308}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354255}, doi = {10.1145/3319535.3354255}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyleCGIKRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HazayIMV19, author = {Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {LevioSA: Lightweight Secure Arithmetic Computation}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {327--344}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354258}, doi = {10.1145/3319535.3354258}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HazayIMV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyleGIN19, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {869--886}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363227}, doi = {10.1145/3319535.3363227}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyleGIN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DottlingGIMMO19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Yuval Ishai and Giulio Malavolta and Tamer Mour and Rafail Ostrovsky}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Trapdoor Hash Functions and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {3--32}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_1}, doi = {10.1007/978-3-030-26954-8\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DottlingGIMMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehBCGI19, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {67--97}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_3}, doi = {10.1007/978-3-030-26954-8\_3}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehBCGI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BogdanovIS19, author = {Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Unconditionally Secure Computation Against Low-Complexity Leakage}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {387--416}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_14}, doi = {10.1007/978-3-030-26951-7\_14}, timestamp = {Fri, 09 Aug 2019 14:22:41 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BogdanovIS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaseDIKLOV19, author = {Melissa Chase and Yevgeniy Dodis and Yuval Ishai and Daniel Kraschewski and Tianren Liu and Rafail Ostrovsky and Vinod Vaikuntanathan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Reusable Non-Interactive Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {462--488}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_15}, doi = {10.1007/978-3-030-26954-8\_15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ChaseDIKLOV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleCGIKS19, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Efficient Pseudorandom Correlation Generators: Silent {OT} Extension and More}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {489--518}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_16}, doi = {10.1007/978-3-030-26954-8\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleCGIKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKOS19, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Cryptographic Sensing}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {583--604}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_19}, doi = {10.1007/978-3-030-26954-8\_19}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaleviIKMR19, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Nikolaos Makriyannis and Tal Rabin}, editor = {Dennis Hofheinz and Alon Rosen}, title = {On Fully Secure {MPC} with Solitary Output}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {312--340}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_13}, doi = {10.1007/978-3-030-36030-6\_13}, timestamp = {Mon, 25 Nov 2019 13:58:16 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HaleviIKMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BoyleGI19, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Secure Computation with Preprocessing via Function Secret Sharing}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {341--371}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_14}, doi = {10.1007/978-3-030-36030-6\_14}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BoyleGI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2019-1, editor = {Yuval Ishai and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2}, doi = {10.1007/978-3-030-17653-2}, isbn = {978-3-030-17652-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2019-2, editor = {Yuval Ishai and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3}, doi = {10.1007/978-3-030-17656-3}, isbn = {978-3-030-17655-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2019-3, editor = {Yuval Ishai and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4}, doi = {10.1007/978-3-030-17659-4}, isbn = {978-3-030-17658-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2019-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehBCGI19, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2019}, url = {https://eprint.iacr.org/2019/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehBCGI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGI19, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai}, title = {Compressing Vector {OLE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2019}, url = {https://eprint.iacr.org/2019/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGIKS19, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, title = {Efficient Pseudorandom Correlation Generators: Silent {OT} Extension and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2019}, url = {https://eprint.iacr.org/2019/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGIKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovIS19, author = {Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan}, title = {Unconditionally Secure Computation Against Low-Complexity Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2019}, url = {https://eprint.iacr.org/2019/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovIS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKOS19, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptographic Sensing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2019}, url = {https://eprint.iacr.org/2019/637}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGIMMO19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Yuval Ishai and Giulio Malavolta and Tamer Mour and Rafail Ostrovsky}, title = {Trapdoor Hash Functions and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {639}, year = {2019}, url = {https://eprint.iacr.org/2019/639}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGIMMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaDIR19, author = {Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin}, title = {On the Local Leakage Resilience of Linear Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {653}, year = {2019}, url = {https://eprint.iacr.org/2019/653}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaDIR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviIKMR19, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Nikolaos Makriyannis and Tal Rabin}, title = {On Fully Secure {MPC} with Solitary Output}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1032}, year = {2019}, url = {https://eprint.iacr.org/2019/1032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviIKMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGI19, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, title = {Secure Computation with Preprocessing via Function Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1095}, year = {2019}, url = {https://eprint.iacr.org/2019/1095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGIKRS19, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Rindal and Peter Scholl}, title = {Efficient Two-Round {OT} Extension and Silent Non-Interactive Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1159}, year = {2019}, url = {https://eprint.iacr.org/2019/1159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGIKRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGIN19, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, title = {Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1390}, year = {2019}, url = {https://eprint.iacr.org/2019/1390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGIN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ApplebaumIK18, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {Minimizing Locality of One-Way Functions via Semi-private Randomized Encodings}, journal = {J. Cryptol.}, volume = {31}, number = {1}, pages = {1--22}, year = {2018}, url = {https://doi.org/10.1007/s00145-016-9244-6}, doi = {10.1007/S00145-016-9244-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ApplebaumIK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyleCGI18, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Compressing Vector {OLE}}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {896--912}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243868}, doi = {10.1145/3243734.3243868}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyleCGI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleIP18, author = {Elette Boyle and Yuval Ishai and Antigoni Polychroniadou}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Limits of Practical Sublinear Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {302--332}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_11}, doi = {10.1007/978-3-319-96878-0\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleIP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthIS18, author = {Prabhanjan Ananth and Yuval Ishai and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Private Circuits: {A} Modular Approach}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {427--455}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_15}, doi = {10.1007/978-3-319-96878-0\_15}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BenhamoudaDIR18, author = {Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {On the Local Leakage Resilience of Linear Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {531--561}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_18}, doi = {10.1007/978-3-319-96884-1\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BenhamoudaDIR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehISW18, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {222--255}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_8}, doi = {10.1007/978-3-319-78372-7\_8}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehISW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BoyleGILT18, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Huijia Lin and Stefano Tessaro}, editor = {Anna R. Karlin}, title = {Foundations of Homomorphic Secret Sharing}, booktitle = {9th Innovations in Theoretical Computer Science Conference, {ITCS} 2018, January 11-14, 2018, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {94}, pages = {21:1--21:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2018.21}, doi = {10.4230/LIPICS.ITCS.2018.21}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BoyleGILT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IshaiMO18, author = {Yuval Ishai and Manika Mittal and Rafail Ostrovsky}, editor = {Michel Abdalla and Ricardo Dahab}, title = {On the Message Complexity of Secure Multiparty Computation}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {698--711}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_24}, doi = {10.1007/978-3-319-76578-5\_24}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IshaiMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargIS18, author = {Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Two-Round {MPC:} Information-Theoretic and Black-Box}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {123--151}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_5}, doi = {10.1007/978-3-030-03807-6\_5}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaleviIKR18, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Best Possible Information-Theoretic {MPC}}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {255--281}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_10}, doi = {10.1007/978-3-030-03810-6\_10}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaleviIKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BonehIPSW18, author = {Dan Boneh and Yuval Ishai and Alain Passel{\`{e}}gue and Amit Sahai and David J. Wu}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Exploring Crypto Dark Matter: - New Simple {PRF} Candidates and Their Applications}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {699--729}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_25}, doi = {10.1007/978-3-030-03810-6\_25}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BonehIPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-01372, author = {Siddharth Garg and Zahra Ghodsi and Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam}, title = {Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation}, journal = {CoRR}, volume = {abs/1812.01372}, year = {2018}, url = {http://arxiv.org/abs/1812.01372}, eprinttype = {arXiv}, eprint = {1812.01372}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-01372.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiMO18, author = {Yuval Ishai and Manika Mittal and Rafail Ostrovsky}, title = {On the Message Complexity of Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2018}, url = {http://eprint.iacr.org/2018/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehISW18, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2018}, url = {http://eprint.iacr.org/2018/133}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehISW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGIO18, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Michele Orr{\`{u}}}, title = {Homomorphic Secret Sharing: Optimizations and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2018}, url = {https://eprint.iacr.org/2018/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGIO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthIS18, author = {Prabhanjan Ananth and Yuval Ishai and Amit Sahai}, title = {Private Circuits: {A} Modular Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2018}, url = {https://eprint.iacr.org/2018/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleIP18, author = {Elette Boyle and Yuval Ishai and Antigoni Polychroniadou}, title = {Limits of Practical Sublinear Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2018}, url = {https://eprint.iacr.org/2018/571}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleIP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGI18, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, title = {Function Secret Sharing: Improvements and Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2018}, url = {https://eprint.iacr.org/2018/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargIS18, author = {Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan}, title = {Two-Round {MPC:} Information-Theoretic and Black-Box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {909}, year = {2018}, url = {https://eprint.iacr.org/2018/909}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviIKR18, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, title = {Best Possible Information-Theoretic {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {913}, year = {2018}, url = {https://eprint.iacr.org/2018/913}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviIKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseDIKLOV18, author = {Melissa Chase and Yevgeniy Dodis and Yuval Ishai and Daniel Kraschewski and Tianren Liu and Rafail Ostrovsky and Vinod Vaikuntanathan}, title = {Reusable Non-Interactive Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {940}, year = {2018}, url = {https://eprint.iacr.org/2018/940}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseDIKLOV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehIPSW18, author = {Dan Boneh and Yuval Ishai and Alain Passel{\`{e}}gue and Amit Sahai and David J. Wu}, title = {Exploring Crypto Dark Matter: New Simple {PRF} Candidates and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1218}, year = {2018}, url = {https://eprint.iacr.org/2018/1218}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehIPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HaleviI0KSY17, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Ilan Komargodski and Amit Sahai and Eylon Yogev}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Non-Interactive Multiparty Computation Without Correlated Randomness}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {181--211}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_7}, doi = {10.1007/978-3-319-70700-6\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HaleviI0KSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BadrinarayananG17, author = {Saikrishna Badrinarayanan and Sanjam Garg and Yuval Ishai and Amit Sahai and Akshay Wadia}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {275--303}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_10}, doi = {10.1007/978-3-319-70700-6\_10}, timestamp = {Wed, 22 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BadrinarayananG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AmesHIV17, author = {Scott Ames and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Ligero: Lightweight Sublinear Arguments Without a Trusted Setup}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2087--2104}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134104}, doi = {10.1145/3133956.3134104}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AmesHIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyleCGIO17, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Michele Orr{\`{u}}}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Homomorphic Secret Sharing: Optimizations and Applications}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2105--2122}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134107}, doi = {10.1145/3133956.3134107}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyleCGIO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumDI0Z17, author = {Benny Applebaum and Ivan Damg{\aa}rd and Yuval Ishai and Michael Nielsen and Lior Zichron}, editor = {Jonathan Katz and Hovav Shacham}, title = {Secure Arithmetic Computation with Constant Computational Overhead}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {223--254}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_8}, doi = {10.1007/978-3-319-63688-7\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumDI0Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarayIOZ17, author = {Juan A. Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, editor = {Jonathan Katz and Hovav Shacham}, title = {The Price of Low Communication in Secure Multi-party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {420--446}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_14}, doi = {10.1007/978-3-319-63688-7\_14}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarayIOZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleGI17, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {163--193}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_6}, doi = {10.1007/978-3-319-56614-6\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleGI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehISW17, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {247--277}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_9}, doi = {10.1007/978-3-319-56617-7\_9}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehISW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeimelIK17, author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Ad Hoc {PSM} Protocols: Secure Computation Without Coordination}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {580--608}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_20}, doi = {10.1007/978-3-319-56617-7\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeimelIK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/ApplebaumHIKV17, author = {Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan}, editor = {Christos H. Papadimitriou}, title = {Low-Complexity Cryptographic Hash Functions}, booktitle = {8th Innovations in Theoretical Computer Science Conference, {ITCS} 2017, January 9-11, 2017, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {67}, pages = {7:1--7:31}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2017.7}, doi = {10.4230/LIPICS.ITCS.2017.7}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/innovations/ApplebaumHIKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayIV17, author = {Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, editor = {Yael Kalai and Leonid Reyzin}, title = {Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {3--39}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_1}, doi = {10.1007/978-3-319-70503-3\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HazayIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GenkinIW17, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, editor = {Yael Kalai and Leonid Reyzin}, title = {How to Construct a Leakage-Resilient (Stateless) Trusted Party}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {209--244}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_7}, doi = {10.1007/978-3-319-70503-3\_7}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GenkinIW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChengI017, author = {Kuan Cheng and Yuval Ishai and Xin Li}, editor = {Yael Kalai and Leonid Reyzin}, title = {Near-Optimal Secret Sharing and Error Correcting Codes in {\textbackslash}mathsf AC{\^{}}0 {AC} 0}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {424--458}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_14}, doi = {10.1007/978-3-319-70503-3\_14}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/ChengI017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BoyleIPW17, author = {Elette Boyle and Yuval Ishai and Rafael Pass and Mary Wootters}, editor = {Yael Kalai and Leonid Reyzin}, title = {Can We Access a Database Both Locally and Privately?}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {662--693}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_22}, doi = {10.1007/978-3-319-70503-3\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BoyleIPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ApplebaumHIKV17, author = {Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan}, title = {Low-Complexity Cryptographic Hash Functions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-008}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/008}, eprinttype = {ECCC}, eprint = {TR17-008}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ApplebaumHIKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumHIKV17, author = {Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan}, title = {Low-Complexity Cryptographic Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2017}, url = {http://eprint.iacr.org/2017/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumHIKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelIK17, author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz}, title = {Ad Hoc {PSM} Protocols: Secure Computation Without Coordination}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2017}, url = {http://eprint.iacr.org/2017/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelIK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGI17, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, title = {Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2017}, url = {http://eprint.iacr.org/2017/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiW17, author = {Yuval Ishai and Mor Weiss}, title = {Probabilistically Checkable Proofs of Proximity with Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2017}, url = {http://eprint.iacr.org/2017/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehISW17, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2017}, url = {http://eprint.iacr.org/2017/240}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehISW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17a, author = {Saikrishna Badrinarayanan and Sanjam Garg and Yuval Ishai and Amit Sahai and Akshay Wadia}, title = {Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2017}, url = {http://eprint.iacr.org/2017/433}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayIOZ17, author = {Juan A. Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, title = {The Price of Low Communication in Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2017}, url = {http://eprint.iacr.org/2017/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayIOZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleIPW17, author = {Elette Boyle and Yuval Ishai and Rafael Pass and Mary Wootters}, title = {Can We Access a Database Both Locally and Privately?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2017}, url = {http://eprint.iacr.org/2017/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleIPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumDINZ17, author = {Benny Applebaum and Ivan Damg{\aa}rd and Yuval Ishai and Michael Nielsen and Lior Zichron}, title = {Secure Arithmetic Computation with Constant Computational Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2017}, url = {http://eprint.iacr.org/2017/617}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumDINZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviI0KSY17, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Ilan Komargodski and Amit Sahai and Eylon Yogev}, title = {Non-Interactive Multiparty Computation without Correlated Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2017}, url = {http://eprint.iacr.org/2017/871}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviI0KSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinIW17, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, title = {How to Construct a Leakage-Resilient (Stateless) Trusted Party}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {926}, year = {2017}, url = {http://eprint.iacr.org/2017/926}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinIW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengI017, author = {Kuan Cheng and Yuval Ishai and Xin Li}, title = {Near-Optimal Secret Sharing and Error Correcting Codes in {AC0}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {927}, year = {2017}, url = {http://eprint.iacr.org/2017/927}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengI017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayIV17, author = {Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {947}, year = {2017}, url = {http://eprint.iacr.org/2017/947}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGILT17, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Huijia Lin and Stefano Tessaro}, title = {Foundations of Homomorphic Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1248}, year = {2017}, url = {http://eprint.iacr.org/2017/1248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGILT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/AspnesIM16, author = {James Aspnes and Yuval Ishai and Peter Bro Miltersen}, title = {Special Section on the Forty-Fifth Annual {ACM} Symposium on the Theory of Computing {(STOC} 2013)}, journal = {{SIAM} J. Comput.}, volume = {45}, number = {2}, pages = {459--460}, year = {2016}, url = {https://doi.org/10.1137/16N97405X}, doi = {10.1137/16N97405X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/AspnesIM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/HardtIMW16, author = {Moritz Hardt and Yuval Ishai and Raghu Meka and Virginia Vassilevska Williams}, title = {Special Section on the Fifty-Fourth Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2013)}, journal = {{SIAM} J. Comput.}, volume = {45}, number = {3}, pages = {881}, year = {2016}, url = {https://doi.org/10.1137/16N974115}, doi = {10.1137/16N974115}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/HardtIMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyleGI16, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Function Secret Sharing: Improvements and Extensions}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1292--1303}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978429}, doi = {10.1145/2976749.2978429}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyleGI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKPSY16, author = {Yuval Ishai and Eyal Kushilevitz and Manoj Prabhakaran and Amit Sahai and Ching{-}Hua Yu}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Secure Protocol Transformations}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {430--458}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_15}, doi = {10.1007/978-3-662-53008-5\_15}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleGI16, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Breaking the Circuit Size Barrier for Secure Computation Under {DDH}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {509--539}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_19}, doi = {10.1007/978-3-662-53018-4\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleGI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BogdanovIVW16, author = {Andrej Bogdanov and Yuval Ishai and Emanuele Viola and Christopher Williamson}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Bounded Indistinguishability and the Complexity of Recovering Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {593--618}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_21}, doi = {10.1007/978-3-662-53015-3\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BogdanovIVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/IshaiKLO16, author = {Yuval Ishai and Eyal Kushilevitz and Steve Lu and Rafail Ostrovsky}, editor = {Kazue Sako}, title = {Private Large-Scale Databases with Distributed Searchable Symmetric Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {90--107}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_6}, doi = {10.1007/978-3-319-29485-8\_6}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/IshaiKLO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoyalIMSS16, author = {Vipul Goyal and Yuval Ishai and Hemanta K. Maji and Amit Sahai and Alexander A. Sherstov}, editor = {Irit Dinur}, title = {Bounded-Communication Leakage Resilience via Parity-Resilient Circuits}, booktitle = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS} 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FOCS.2016.10}, doi = {10.1109/FOCS.2016.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoyalIMSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BeimelGIK16, author = {Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz}, editor = {Madhu Sudan}, title = {Distribution Design}, booktitle = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016}, pages = {81--92}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2840728.2840759}, doi = {10.1145/2840728.2840759}, timestamp = {Tue, 14 Jun 2022 13:12:41 +0200}, biburl = {https://dblp.org/rec/conf/innovations/BeimelGIK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/HaleviIJKR16, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Eyal Kushilevitz and Tal Rabin}, editor = {Madhu Sudan}, title = {Secure Multiparty Computation with General Interaction Patterns}, booktitle = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016}, pages = {157--168}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2840728.2840760}, doi = {10.1145/2840728.2840760}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/HaleviIJKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Ben-SassonBDIR16, author = {Eli Ben{-}Sasson and Iddo Bentov and Ivan Damg{\aa}rd and Yuval Ishai and Noga Ron{-}Zewi}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {On Public Key Encryption from Noisy Codewords}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {417--446}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_16}, doi = {10.1007/978-3-662-49387-8\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Ben-SassonBDIR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiWY16, author = {Yuval Ishai and Mor Weiss and Guang Yang}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {3--32}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_1}, doi = {10.1007/978-3-662-49099-0\_1}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GenkinIW16, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, editor = {Martin Hirt and Adam D. Smith}, title = {Binary {AMD} Circuits from Secure Multiparty Computation}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {336--366}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_14}, doi = {10.1007/978-3-662-53641-4\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GenkinIW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKPSY16, author = {Yuval Ishai and Eyal Kushilevitz and Manoj Prabhakaran and Amit Sahai and Ching{-}Hua Yu}, title = {Secure Protocol Transformations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2016}, url = {http://eprint.iacr.org/2016/456}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovIVW16, author = {Andrej Bogdanov and Yuval Ishai and Emanuele Viola and Christopher Williamson}, title = {Bounded Indistinguishability and the Complexity of Recovering Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {565}, year = {2016}, url = {http://eprint.iacr.org/2016/565}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovIVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGI16, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, title = {Breaking the Circuit Size Barrier for Secure Computation Under {DDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2016}, url = {http://eprint.iacr.org/2016/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinIW16, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, title = {Binary {AMD} Circuits from Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {809}, year = {2016}, url = {http://eprint.iacr.org/2016/809}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinIW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GentryGIPSS15, author = {Craig Gentry and Jens Groth and Yuval Ishai and Chris Peikert and Amit Sahai and Adam D. Smith}, title = {Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs}, journal = {J. Cryptol.}, volume = {28}, number = {4}, pages = {820--843}, year = {2015}, url = {https://doi.org/10.1007/s00145-014-9184-y}, doi = {10.1007/S00145-014-9184-Y}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GentryGIPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/ApplebaumIKW15, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters}, title = {Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys}, journal = {{SIAM} J. Comput.}, volume = {44}, number = {2}, pages = {433--466}, year = {2015}, url = {https://doi.org/10.1137/130929643}, doi = {10.1137/130929643}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/ApplebaumIKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaitnerIOS15, author = {Iftach Haitner and Yuval Ishai and Eran Omri and Ronen Shaltiel}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Parallel Hashing via List Recoverability}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {173--190}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_9}, doi = {10.1007/978-3-662-48000-7\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaitnerIOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargIKOS15, author = {Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Cryptography with One-Way Communication}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {191--208}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_10}, doi = {10.1007/978-3-662-48000-7\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargIKOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKKP15, author = {Yuval Ishai and Ranjit Kumaresan and Eyal Kushilevitz and Anat Paskin{-}Cherniavsky}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Secure Computation with Minimal Interaction, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {359--378}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_18}, doi = {10.1007/978-3-662-48000-7\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001IMS15, author = {Divya Gupta and Yuval Ishai and Hemanta K. Maji and Amit Sahai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Secure Computation from Leaky Correlated Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {701--720}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_34}, doi = {10.1007/978-3-662-48000-7\_34}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001IMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GenkinIP15, author = {Daniel Genkin and Yuval Ishai and Antigoni Polychroniadou}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Efficient Multi-party Computation: From Passive to Active Security via Secure {SIMD} Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {721--741}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_35}, doi = {10.1007/978-3-662-48000-7\_35}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GenkinIP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleGI15, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Function Secret Sharing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {337--367}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_12}, doi = {10.1007/978-3-662-46803-6\_12}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleGI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AgrawalIKP15, author = {Shweta Agrawal and Yuval Ishai and Dakshita Khurana and Anat Paskin{-}Cherniavsky}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Kazuo Iwama and Naoki Kobayashi and Bettina Speckmann}, title = {Statistical Randomized Encodings: {A} Complexity Theoretic View}, booktitle = {Automata, Languages, and Programming - 42nd International Colloquium, {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9134}, pages = {1--13}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47672-7\_1}, doi = {10.1007/978-3-662-47672-7\_1}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/AgrawalIKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiPS15, author = {Yuval Ishai and Omkant Pandey and Amit Sahai}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Public-Coin Differing-Inputs Obfuscation and Its Applications}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {668--697}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_26}, doi = {10.1007/978-3-662-46497-7\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/IshaiPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ApplebaumIK15, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {Minimizing Locality of One-Way Functions via Semi-Private Randomized Encodings}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR15-045}}, year = {2015}, url = {https://eccc.weizmann.ac.il/report/2015/045}, eprinttype = {ECCC}, eprint = {TR15-045}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ApplebaumIK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/Ben-SassonBDIR15, author = {Eli Ben{-}Sasson and Iddo Bentov and Ivan Bjerre Damg{\aa}rd and Yuval Ishai and Noga Ron{-}Zewi}, title = {On Public Key Encryption from Noisy Codewords}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR15-094}}, year = {2015}, url = {https://eccc.weizmann.ac.il/report/2015/094}, eprinttype = {ECCC}, eprint = {TR15-094}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/Ben-SassonBDIR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BogdanovIVW15, author = {Andrej Bogdanov and Yuval Ishai and Emanuele Viola and Christopher Williamson}, title = {Bounded Indistinguishability and the Complexity of Recovering Secrets}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR15-182}}, year = {2015}, url = {https://eccc.weizmann.ac.il/report/2015/182}, eprinttype = {ECCC}, eprint = {TR15-182}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BogdanovIVW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinIPST15, author = {Daniel Genkin and Yuval Ishai and Manoj Prabhakaran and Amit Sahai and Eran Tromer}, title = {Circuits Resilient to Additive Attacks with Applications to Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2015}, url = {http://eprint.iacr.org/2015/154}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinIPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiOZ15, author = {Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, title = {Secure Multi-Party Computation with Identifiable Abort}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {325}, year = {2015}, url = {http://eprint.iacr.org/2015/325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonBDIR15, author = {Eli Ben{-}Sasson and Iddo Bentov and Ivan Damg{\aa}rd and Yuval Ishai and Noga Ron{-}Zewi}, title = {On Public Key Encryption from Noisy Codewords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2015}, url = {http://eprint.iacr.org/2015/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonBDIR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiWY15, author = {Yuval Ishai and Mor Weiss and Guang Yang}, title = {Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1055}, year = {2015}, url = {http://eprint.iacr.org/2015/1055}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/IshaiWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviIJKR15, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Eyal Kushilevitz and Tal Rabin}, title = {Secure Multiparty Computation with General Interaction Patterns}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2015}, url = {http://eprint.iacr.org/2015/1173}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviIJKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshalKLO15, author = {Yuval Ishai and Eyal Kushilevitz and Steve Lu and Rafail Ostrovsky}, title = {Private Large-Scale Databases with Distributed Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1190}, year = {2015}, url = {http://eprint.iacr.org/2015/1190}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/IshalKLO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/ApplebaumIK14, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {How to Garble Arithmetic Circuits}, journal = {{SIAM} J. Comput.}, volume = {43}, number = {2}, pages = {905--929}, year = {2014}, url = {https://doi.org/10.1137/120875193}, doi = {10.1137/120875193}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/ApplebaumIK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BaronIO14, author = {Joshua Baron and Yuval Ishai and Rafail Ostrovsky}, title = {On linear-size pseudorandom generators and hardcore functions}, journal = {Theor. Comput. Sci.}, volume = {554}, pages = {50--63}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.06.013}, doi = {10.1016/J.TCS.2014.06.013}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BaronIO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AnanthGIS14, author = {Prabhanjan Vijendra Ananth and Divya Gupta and Yuval Ishai and Amit Sahai}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Optimizing Obfuscation: Avoiding Barrington's Theorem}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {646--658}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660342}, doi = {10.1145/2660267.2660342}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AnanthGIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiOZ14, author = {Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Secure Multi-Party Computation with Identifiable Abort}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {369--386}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_21}, doi = {10.1007/978-3-662-44381-1\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiOZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelGIKMP14, author = {Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin{-}Cherniavsky}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Non-Interactive Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {387--404}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_22}, doi = {10.1007/978-3-662-44381-1\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BeimelGIKMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GilboaI14, author = {Niv Gilboa and Yuval Ishai}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Distributed Point Functions and Their Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {640--658}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_35}, doi = {10.1007/978-3-642-55220-5\_35}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GilboaI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GarayIKW14, author = {Juan A. Garay and Yuval Ishai and Ranjit Kumaresan and Hoeteck Wee}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {On the Complexity of {UC} Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {677--694}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_37}, doi = {10.1007/978-3-642-55220-5\_37}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GarayIKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/IshaiW14, author = {Yuval Ishai and Hoeteck Wee}, editor = {Javier Esparza and Pierre Fraigniaud and Thore Husfeldt and Elias Koutsoupias}, title = {Partial Garbling Schemes and Their Applications}, booktitle = {Automata, Languages, and Programming - 41st International Colloquium, {ICALP} 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8572}, pages = {650--662}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43948-7\_54}, doi = {10.1007/978-3-662-43948-7\_54}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/IshaiW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/DrukI14, author = {Erez Druk and Yuval Ishai}, editor = {Moni Naor}, title = {Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications}, booktitle = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ, USA, January 12-14, 2014}, pages = {169--182}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554797.2554815}, doi = {10.1145/2554797.2554815}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/DrukI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/IshaiMSW14, author = {Yuval Ishai and Hemanta K. Maji and Amit Sahai and J{\"{u}}rg Wullschleger}, title = {Single-use ot combiners with near-optimal resilience}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1544--1548}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6875092}, doi = {10.1109/ISIT.2014.6875092}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/IshaiMSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GenkinIPST14, author = {Daniel Genkin and Yuval Ishai and Manoj Prabhakaran and Amit Sahai and Eran Tromer}, editor = {David B. Shmoys}, title = {Circuits resilient to additive attacks with applications to secure computation}, booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA, May 31 - June 03, 2014}, pages = {495--504}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2591796.2591861}, doi = {10.1145/2591796.2591861}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/GenkinIPST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiW14, author = {Yuval Ishai and Mor Weiss}, editor = {Yehuda Lindell}, title = {Probabilistically Checkable Proofs of Proximity with Zero-Knowledge}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {121--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_6}, doi = {10.1007/978-3-642-54242-8\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/IshaiW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BeimelIKK14, author = {Amos Beimel and Yuval Ishai and Ranjit Kumaresan and Eyal Kushilevitz}, editor = {Yehuda Lindell}, title = {On the Cryptographic Complexity of the Worst Functions}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {317--342}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_14}, doi = {10.1007/978-3-642-54242-8\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BeimelIKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthGIS14, author = {Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai}, title = {Optimizing Obfuscation: Avoiding Barrington's Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2014}, url = {http://eprint.iacr.org/2014/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthGIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargIKOS14, author = {Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptography with One-Way Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {914}, year = {2014}, url = {http://eprint.iacr.org/2014/914}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargIKOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiPS14, author = {Yuval Ishai and Omkant Pandey and Amit Sahai}, title = {Public-Coin Differing-Inputs Obfuscation and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {942}, year = {2014}, url = {http://eprint.iacr.org/2014/942}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelGIKMP14, author = {Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin{-}Cherniavsky}, title = {Non-Interactive Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {960}, year = {2014}, url = {http://eprint.iacr.org/2014/960}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelGIKMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiW14, author = {Yuval Ishai and Hoeteck Wee}, title = {Partial Garbling Schemes and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {995}, year = {2014}, url = {http://eprint.iacr.org/2014/995}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/IshaiSVW13, author = {Yuval Ishai and Amit Sahai and Michael Viderman and Mor Weiss}, editor = {Prasad Raghavendra and Sofya Raskhodnikova and Klaus Jansen and Jos{\'{e}} D. P. Rolim}, title = {Zero Knowledge LTCs and Their Applications}, booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 16th International Workshop, {APPROX} 2013, and 17th International Workshop, {RANDOM} 2013, Berkeley, CA, USA, August 21-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8096}, pages = {607--622}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40328-6\_42}, doi = {10.1007/978-3-642-40328-6\_42}, timestamp = {Tue, 21 Sep 2021 09:36:24 +0200}, biburl = {https://dblp.org/rec/conf/approx/IshaiSVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/BaronIO13, author = {Joshua Baron and Yuval Ishai and Rafail Ostrovsky}, editor = {Ding{-}Zhu Du and Guochuan Zhang}, title = {On Linear-Size Pseudorandom Generators and Hardcore Functions}, booktitle = {Computing and Combinatorics, 19th International Conference, {COCOON} 2013, Hangzhou, China, June 21-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7936}, pages = {169--181}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38768-5\_17}, doi = {10.1007/978-3-642-38768-5\_17}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/BaronIO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumIKW13, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {166--184}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_10}, doi = {10.1007/978-3-642-40084-1\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumIKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenDIKMRR13, author = {Gil Cohen and Ivan Bjerre Damg{\aa}rd and Yuval Ishai and Jonas K{\"{o}}lker and Peter Bro Miltersen and Ran Raz and Ron D. Rothblum}, editor = {Ran Canetti and Juan A. Garay}, title = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {185--202}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_11}, doi = {10.1007/978-3-642-40084-1\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CohenDIKMRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/IshaiKLOPSZ13, author = {Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman}, editor = {Fedor V. Fomin and Rusins Freivalds and Marta Z. Kwiatkowska and David Peleg}, title = {Robust Pseudorandom Generators}, booktitle = {Automata, Languages, and Programming - 40th International Colloquium, {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {7965}, pages = {576--588}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39206-1\_49}, doi = {10.1007/978-3-642-39206-1\_49}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/IshaiKLOPSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/IshaiKS13, author = {Yuval Ishai and Eyal Kushilevitz and Omer Strulovich}, editor = {Natacha Portier and Thomas Wilke}, title = {Lossy Chains and Fractional Secret Sharing}, booktitle = {30th International Symposium on Theoretical Aspects of Computer Science, {STACS} 2013, February 27 - March 2, 2013, Kiel, Germany}, series = {LIPIcs}, volume = {20}, pages = {160--171}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2013}, url = {https://doi.org/10.4230/LIPIcs.STACS.2013.160}, doi = {10.4230/LIPICS.STACS.2013.160}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/stacs/IshaiKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BitanskyCIPO13, author = {Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth}, editor = {Amit Sahai}, title = {Succinct Non-interactive Arguments via Linear Interactive Proofs}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {315--333}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_18}, doi = {10.1007/978-3-642-36594-2\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BitanskyCIPO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BitanskyCIPO13a, author = {Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth}, editor = {Amit Sahai}, title = {Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_41}, doi = {10.1007/978-3-642-36594-2\_41}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BitanskyCIPO13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiKMOP13, author = {Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Claudio Orlandi and Anat Paskin{-}Cherniavsky}, editor = {Amit Sahai}, title = {On the Power of Correlated Randomness in Secure Computation}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {600--620}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_34}, doi = {10.1007/978-3-642-36594-2\_34}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiKMOP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/Ishai13, author = {Yuval Ishai}, editor = {Manoj Prabhakaran and Amit Sahai}, title = {Randomization Techniques for Secure Computation}, booktitle = {Secure Multi-Party Computation}, series = {Cryptology and Information Security Series}, volume = {10}, pages = {222--248}, publisher = {{IOS} Press}, year = {2013}, url = {https://doi.org/10.3233/978-1-61499-169-4-222}, doi = {10.3233/978-1-61499-169-4-222}, timestamp = {Wed, 17 Apr 2024 21:39:22 +0200}, biburl = {https://dblp.org/rec/series/ciss/Ishai13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/CohenDIKMRR13, author = {Gil Cohen and Ivan Bjerre Damg{\aa}rd and Yuval Ishai and Jonas K{\"{o}}lker and Peter Bro Miltersen and Ran Raz and Ron Rothblum}, title = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR13-107}}, year = {2013}, url = {https://eccc.weizmann.ac.il/report/2013/107}, eprinttype = {ECCC}, eprint = {TR13-107}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/CohenDIKMRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/IshaiKLOPSZ13, author = {Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman}, title = {Robust Pseudorandom Generators}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR13-143}}, year = {2013}, url = {https://eccc.weizmann.ac.il/report/2013/143}, eprinttype = {ECCC}, eprint = {TR13-143}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/IshaiKLOPSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKS13, author = {Yuval Ishai and Eyal Kushilevitz and Omer Strulovich}, title = {Lossy Chains and Fractional Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2013}, url = {http://eprint.iacr.org/2013/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenDIKMRR13, author = {Gil Cohen and Ivan Bjerre Damg{\aa}rd and Yuval Ishai and Jonas K{\"{o}}lker and Peter Bro Miltersen and Ran Raz and Ron D. Rothblum}, title = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2013}, url = {http://eprint.iacr.org/2013/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenDIKMRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKLOPSZ13, author = {Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman}, title = {Robust Pseudorandom Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2013}, url = {http://eprint.iacr.org/2013/671}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKLOPSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/BeimelIKO12, author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Ilan Orlov}, title = {Share Conversion and Private Information Retrieval}, booktitle = {Proceedings of the 27th Conference on Computational Complexity, {CCC} 2012, Porto, Portugal, June 26-29, 2012}, pages = {258--268}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CCC.2012.23}, doi = {10.1109/CCC.2012.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/BeimelIKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/IshaiKP12, author = {Yuval Ishai and Eyal Kushilevitz and Anat Paskin{-}Cherniavsky}, editor = {Shafi Goldwasser}, title = {From randomizing polynomials to parallel algorithms}, booktitle = {Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, January 8-10, 2012}, pages = {76--89}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2090236.2090244}, doi = {10.1145/2090236.2090244}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/IshaiKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/Ishai12, author = {Yuval Ishai}, title = {The complexity of information theoretic secure computation}, booktitle = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September 3-7, 2012}, pages = {80}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ITW.2012.6404768}, doi = {10.1109/ITW.2012.6404768}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/Ishai12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiOS12, author = {Yuval Ishai and Rafail Ostrovsky and Hakan Seyalioglu}, editor = {Ronald Cramer}, title = {Identifying Cheaters without an Honest Majority}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {21--38}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_2}, doi = {10.1007/978-3-642-28914-9\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/IshaiOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiMS12, author = {Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, editor = {Ronald Cramer}, title = {On Efficient Zero-Knowledge PCPs}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {151--168}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_9}, doi = {10.1007/978-3-642-28914-9\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ApplebaumIK12, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {How to Garble Arithmetic Circuits}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-058}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/058}, eprinttype = {ECCC}, eprint = {TR12-058}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ApplebaumIK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumIK12, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {How to Garble Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2012}, url = {http://eprint.iacr.org/2012/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumIK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumIKW12, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters}, title = {Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {693}, year = {2012}, url = {http://eprint.iacr.org/2012/693}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumIKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCIOP12, author = {Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth}, title = {Succinct Non-Interactive Arguments via Linear Interactive Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2012}, url = {http://eprint.iacr.org/2012/718}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCIOP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/IshaiKKLP11, author = {Yuval Ishai and Jonathan Katz and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank}, title = {On Achieving the "Best of Both Worlds" in Secure Multiparty Computation}, journal = {{SIAM} J. Comput.}, volume = {40}, number = {1}, pages = {122--141}, year = {2011}, url = {https://doi.org/10.1137/100783224}, doi = {10.1137/100783224}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/IshaiKKLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/HaitnerIKLP11, author = {Iftach Haitner and Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank}, title = {Black-Box Constructions of Protocols for Secure Computation}, journal = {{SIAM} J. Comput.}, volume = {40}, number = {2}, pages = {225--266}, year = {2011}, url = {https://doi.org/10.1137/100790537}, doi = {10.1137/100790537}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/HaitnerIKLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKOPSW11, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and J{\"{u}}rg Wullschleger}, editor = {Phillip Rogaway}, title = {Constant-Rate Oblivious Transfer from Noisy Channels}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {667--684}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_38}, doi = {10.1007/978-3-642-22792-9\_38}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKOPSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKOPS11, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai}, editor = {Kenneth G. Paterson}, title = {Efficient Non-interactive Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {406--425}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_23}, doi = {10.1007/978-3-642-20465-4\_23}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKOPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/ApplebaumIK11, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, editor = {Rafail Ostrovsky}, title = {How to Garble Arithmetic Circuits}, booktitle = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS} 2011, Palm Springs, CA, USA, October 22-25, 2011}, pages = {120--129}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FOCS.2011.40}, doi = {10.1109/FOCS.2011.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/ApplebaumIK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Ishai11, author = {Yuval Ishai}, editor = {Serge Fehr}, title = {Correlation Extractors and Their Applications - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {1--5}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_1}, doi = {10.1007/978-3-642-20728-0\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/Ishai11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/ApplebaumHI11, author = {Benny Applebaum and Danny Harnik and Yuval Ishai}, editor = {Bernard Chazelle}, title = {Semantic Security under Related-Key Attacks and Applications}, booktitle = {Innovations in Computer Science - {ICS} 2011, Tsinghua University, Beijing, China, January 7-9, 2011. Proceedings}, pages = {45--60}, publisher = {Tsinghua University Press}, year = {2011}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/30.html}, timestamp = {Mon, 23 Mar 2020 08:26:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/ApplebaumHI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2011, editor = {Yuval Ishai}, title = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6}, doi = {10.1007/978-3-642-19571-6}, isbn = {978-3-642-19570-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/BarkolIW10, author = {Omer Barkol and Yuval Ishai and Enav Weinreb}, title = {On Locally Decodable Codes, Self-Correctable Codes, and \emph{t}-Private {PIR}}, journal = {Algorithmica}, volume = {58}, number = {4}, pages = {831--859}, year = {2010}, url = {https://doi.org/10.1007/s00453-008-9272-1}, doi = {10.1007/S00453-008-9272-1}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/BarkolIW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BarkolIW10, author = {Omer Barkol and Yuval Ishai and Enav Weinreb}, title = {On \emph{d}-Multiplicative Secret Sharing}, journal = {J. Cryptol.}, volume = {23}, number = {4}, pages = {580--593}, year = {2010}, url = {https://doi.org/10.1007/s00145-010-9056-z}, doi = {10.1007/S00145-010-9056-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BarkolIW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/IshaiKOS10, author = {Yuval Ishai and Abishek Kumarasubramanian and Claudio Orlandi and Amit Sahai}, editor = {Masayuki Abe}, title = {On Invertible Sampling and Adaptive Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {466--482}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_27}, doi = {10.1007/978-3-642-17373-8\_27}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/IshaiKOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, editor = {Tal Rabin}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {173--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_10}, doi = {10.1007/978-3-642-14623-7\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKP10, author = {Yuval Ishai and Eyal Kushilevitz and Anat Paskin}, editor = {Tal Rabin}, title = {Secure Multiparty Computation with Minimal Interaction}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {577--594}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_31}, doi = {10.1007/978-3-642-14623-7\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarakHHI10, author = {Boaz Barak and Iftach Haitner and Dennis Hofheinz and Yuval Ishai}, editor = {Henri Gilbert}, title = {Bounded Key-Dependent Message Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {423--444}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_22}, doi = {10.1007/978-3-642-13190-5\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarakHHI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardIK10, author = {Ivan Damg{\aa}rd and Yuval Ishai and Mikkel Kr{\o}igaard}, editor = {Henri Gilbert}, title = {Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {445--465}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_23}, doi = {10.1007/978-3-642-13190-5\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardIK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/ApplebaumIK10, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, editor = {Samson Abramsky and Cyril Gavoille and Claude Kirchner and Friedhelm Meyer auf der Heide and Paul G. Spirakis}, title = {From Secrecy to Soundness: Efficient Verification via Secure Computation}, booktitle = {Automata, Languages and Programming, 37th International Colloquium, {ICALP} 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6198}, pages = {152--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14165-2\_14}, doi = {10.1007/978-3-642-14165-2\_14}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/ApplebaumIK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/ApplebaumIK10, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, editor = {Andrew Chi{-}Chih Yao}, title = {Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?}, booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University, Beijing, China, January 5-7, 2010. Proceedings}, pages = {1--19}, publisher = {Tsinghua University Press}, year = {2010}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/1.html}, timestamp = {Wed, 04 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/ApplebaumIK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Ishai10, author = {Yuval Ishai}, editor = {Daniele Micciancio}, title = {Secure Computation and Its Diverse Applications}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {90}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_6}, doi = {10.1007/978-3-642-11799-2\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Ishai10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GordonIMOS10, author = {S. Dov Gordon and Yuval Ishai and Tal Moran and Rafail Ostrovsky and Amit Sahai}, editor = {Daniele Micciancio}, title = {On Complete Primitives for Fairness}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {91--108}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_7}, doi = {10.1007/978-3-642-11799-2\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GordonIMOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalISVW10, author = {Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia}, editor = {Daniele Micciancio}, title = {Founding Cryptography on Tamper-Proof Hardware Tokens}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {308--326}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_19}, doi = {10.1007/978-3-642-11799-2\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoyalISVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR10-020}}, year = {2010}, url = {https://eccc.weizmann.ac.il/report/2010/020}, eprinttype = {ECCC}, eprint = {TR10-020}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKKLP10, author = {Yuval Ishai and Jonathan Katz and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank}, title = {On Achieving the "Best of Both Worlds" in Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2010}, url = {http://eprint.iacr.org/2010/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKKLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2010}, url = {http://eprint.iacr.org/2010/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardIK10, author = {Ivan Damg{\aa}rd and Yuval Ishai and Mikkel Kr{\o}igaard}, title = {Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2010}, url = {http://eprint.iacr.org/2010/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardIK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalISVW10, author = {Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia}, title = {Founding Cryptography on Tamper-Proof Hardware Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2010}, url = {http://eprint.iacr.org/2010/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalISVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaitnerIKLP10, author = {Iftach Haitner and Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank}, title = {Black-Box Constructions of Protocols for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2010}, url = {http://eprint.iacr.org/2010/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaitnerIKLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumHI10, author = {Benny Applebaum and Danny Harnik and Yuval Ishai}, title = {Semantic Security Under Related-Key Attacks and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2010}, url = {http://eprint.iacr.org/2010/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumHI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ApplebaumIK09, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {Cryptography with Constant Input Locality}, journal = {J. Cryptol.}, volume = {22}, number = {4}, pages = {429--469}, year = {2009}, url = {https://doi.org/10.1007/s00145-009-9039-0}, doi = {10.1007/S00145-009-9039-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ApplebaumIK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/IshaiKOS09, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Zero-Knowledge Proofs from Secure Multiparty Computation}, journal = {{SIAM} J. Comput.}, volume = {39}, number = {3}, pages = {1121--1152}, year = {2009}, url = {https://doi.org/10.1137/080725398}, doi = {10.1137/080725398}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/IshaiKOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/IshaiMSW09, author = {Yuval Ishai and Tal Malkin and Martin J. Strauss and Rebecca N. Wright}, title = {Private multiparty sampling and approximation of vector combinations}, journal = {Theor. Comput. Sci.}, volume = {410}, number = {18}, pages = {1730--1745}, year = {2009}, url = {https://doi.org/10.1016/j.tcs.2008.12.062}, doi = {10.1016/J.TCS.2008.12.062}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/IshaiMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/IshaiKOS09, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Extracting Correlations}, booktitle = {50th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2009, October 25-27, 2009, Atlanta, Georgia, {USA}}, pages = {261--270}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FOCS.2009.56}, doi = {10.1109/FOCS.2009.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/IshaiKOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiPS09, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, editor = {Omer Reingold}, title = {Secure Arithmetic Computation with No Honest Majority}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {294--314}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_18}, doi = {10.1007/978-3-642-00457-5\_18}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/IshaiPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakHHI09, author = {Boaz Barak and Iftach Haitner and Dennis Hofheinz and Yuval Ishai}, title = {Bounded Key-Dependent Message Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2009}, url = {http://eprint.iacr.org/2009/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakHHI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/ApplebaumIK08, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {On Pseudorandom Generators with Linear Stretch in NC\({}^{\mbox{0}}\)}, journal = {Comput. Complex.}, volume = {17}, number = {1}, pages = {38--69}, year = {2008}, url = {https://doi.org/10.1007/s00037-007-0237-6}, doi = {10.1007/S00037-007-0237-6}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cc/ApplebaumIK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardIKNS08, author = {Ivan Damg{\aa}rd and Yuval Ishai and Mikkel Kr{\o}igaard and Jesper Buus Nielsen and Adam D. Smith}, editor = {David A. Wagner}, title = {Scalable Multiparty Computation with Nearly Optimal Work and Resilience}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {241--261}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_14}, doi = {10.1007/978-3-540-85174-5\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardIKNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiPS08, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, editor = {David A. Wagner}, title = {Founding Cryptography on Oblivious Transfer - Efficiently}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {572--591}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_32}, doi = {10.1007/978-3-540-85174-5\_32}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrothI08, author = {Jens Groth and Yuval Ishai}, editor = {Nigel P. Smart}, title = {Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {379--396}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_22}, doi = {10.1007/978-3-540-78967-3\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrothI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/IshaiKOS08, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {Cynthia Dwork}, title = {Cryptography with constant computational overhead}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {433--442}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374438}, doi = {10.1145/1374376.1374438}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/IshaiKOS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BarkolIW08, author = {Omer Barkol and Yuval Ishai and Enav Weinreb}, editor = {Cynthia Dwork}, title = {Communication in the presence of replication}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {661--670}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374472}, doi = {10.1145/1374376.1374472}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BarkolIW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BihamGI08, author = {Eli Biham and Yaron J. Goren and Yuval Ishai}, editor = {Ran Canetti}, title = {Basing Weak Public-Key Cryptography on Strong One-Way Functions}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {55--72}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_4}, doi = {10.1007/978-3-540-78524-8\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BihamGI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HarnikIKN08, author = {Danny Harnik and Yuval Ishai and Eyal Kushilevitz and Jesper Buus Nielsen}, editor = {Ran Canetti}, title = {OT-Combiners via Secure Computation}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {393--411}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_22}, doi = {10.1007/978-3-540-78524-8\_22}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HarnikIKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0811-0475, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, title = {Secure Arithmetic Computation with No Honest Majority}, journal = {CoRR}, volume = {abs/0811.0475}, year = {2008}, url = {http://arxiv.org/abs/0811.0475}, eprinttype = {arXiv}, eprint = {0811.0475}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0811-0475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiPS08, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, title = {Secure Arithmetic Computation with No Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2008}, url = {http://eprint.iacr.org/2008/465}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/HarshaIKNV07, author = {Prahladh Harsha and Yuval Ishai and Joe Kilian and Kobbi Nissim and Srinivasan Venkatesh}, title = {Communication vs. Computation}, journal = {Comput. Complex.}, volume = {16}, number = {1}, pages = {1--33}, year = {2007}, url = {https://doi.org/10.1007/s00037-007-0224-y}, doi = {10.1007/S00037-007-0224-Y}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cc/HarshaIKNV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/BarkolIW07, author = {Omer Barkol and Yuval Ishai and Enav Weinreb}, editor = {Moses Charikar and Klaus Jansen and Omer Reingold and Jos{\'{e}} D. P. Rolim}, title = {On Locally Decodable Codes, Self-correctable Codes, and \emph{t} -Private {PIR}}, booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 10th International Workshop, {APPROX} 2007, and 11th International Workshop, {RANDOM} 2007, Princeton, NJ, USA, August 20-22, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4627}, pages = {311--325}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74208-1\_23}, doi = {10.1007/978-3-540-74208-1\_23}, timestamp = {Sat, 30 Sep 2023 09:34:32 +0200}, biburl = {https://dblp.org/rec/conf/approx/BarkolIW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/IshaiKO07, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky}, title = {Efficient Arguments without Short PCPs}, booktitle = {22nd Annual {IEEE} Conference on Computational Complexity {(CCC} 2007), 13-16 June 2007, San Diego, California, {USA}}, pages = {278--291}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CCC.2007.10}, doi = {10.1109/CCC.2007.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/IshaiKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumIK07, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, editor = {Alfred Menezes}, title = {Cryptography with Constant Input Locality}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {92--110}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_6}, doi = {10.1007/978-3-540-74143-5\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumIK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HarnikIK07, author = {Danny Harnik and Yuval Ishai and Eyal Kushilevitz}, editor = {Alfred Menezes}, title = {How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {284--302}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_16}, doi = {10.1007/978-3-540-74143-5\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HarnikIK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/IshaiMSW07, author = {Yuval Ishai and Tal Malkin and Martin J. Strauss and Rebecca N. Wright}, editor = {Lars Arge and Christian Cachin and Tomasz Jurdzinski and Andrzej Tarlecki}, title = {Private Multiparty Sampling and Approximation of Vector Combinations}, booktitle = {Automata, Languages and Programming, 34th International Colloquium, {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4596}, pages = {243--254}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73420-8\_23}, doi = {10.1007/978-3-540-73420-8\_23}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/IshaiMSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/IshaiKOS07, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {David S. Johnson and Uriel Feige}, title = {Zero-knowledge from secure multiparty computation}, booktitle = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007}, pages = {21--30}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1250790.1250794}, doi = {10.1145/1250790.1250794}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/IshaiKOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiP07, author = {Yuval Ishai and Anat Paskin}, editor = {Salil P. Vadhan}, title = {Evaluating Branching Programs on Encrypted Data}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {575--594}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_31}, doi = {10.1007/978-3-540-70936-7\_31}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/IshaiP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/ApplebaumIK06, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {Computationally Private Randomizing Polynomials and Their Applications}, journal = {Comput. Complex.}, volume = {15}, number = {2}, pages = {115--162}, year = {2006}, url = {https://doi.org/10.1007/s00037-006-0211-8}, doi = {10.1007/S00037-006-0211-8}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cc/ApplebaumIK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/ApplebaumIK06, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {Cryptography in NC\({}^{\mbox{0}}\)}, journal = {{SIAM} J. Comput.}, volume = {36}, number = {4}, pages = {845--888}, year = {2006}, url = {https://doi.org/10.1137/S0097539705446950}, doi = {10.1137/S0097539705446950}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/ApplebaumIK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talg/FeigenbaumIMNSW06, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin J. Strauss and Rebecca N. Wright}, title = {Secure multiparty computation of approximations}, journal = {{ACM} Trans. Algorithms}, volume = {2}, number = {3}, pages = {435--472}, year = {2006}, url = {https://doi.org/10.1145/1159892.1159900}, doi = {10.1145/1159892.1159900}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/talg/FeigenbaumIMNSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/ApplebaumIK06, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, editor = {Josep D{\'{\i}}az and Klaus Jansen and Jos{\'{e}} D. P. Rolim and Uri Zwick}, title = {On Pseudorandom Generators with Linear Stretch in NC\({}^{\mbox{0}}\)}, booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 9th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, {APPROX} 2006 and 10th International Workshop on Randomization and Computation, {RANDOM} 2006, Barcelona, Spain, August 28-30 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4110}, pages = {260--271}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11830924\_25}, doi = {10.1007/11830924\_25}, timestamp = {Tue, 21 Sep 2021 09:36:24 +0200}, biburl = {https://dblp.org/rec/conf/approx/ApplebaumIK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKLP06, author = {Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank}, editor = {Cynthia Dwork}, title = {On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {483--500}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_29}, doi = {10.1007/11818175\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardI06, author = {Ivan Damg{\aa}rd and Yuval Ishai}, editor = {Cynthia Dwork}, title = {Scalable Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {501--520}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_30}, doi = {10.1007/11818175\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiPSW06, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai and David A. Wagner}, editor = {Serge Vaudenay}, title = {Private Circuits {II:} Keeping Secrets in Tamperable Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {308--327}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_19}, doi = {10.1007/11761679\_19}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/IshaiKOS06, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptography from Anonymity}, booktitle = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings}, pages = {239--248}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/FOCS.2006.25}, doi = {10.1109/FOCS.2006.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/IshaiKOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/IshaiKLP06, author = {Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank}, editor = {Jon M. Kleinberg}, title = {Black-box constructions for secure computation}, booktitle = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006}, pages = {99--108}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1132516.1132531}, doi = {10.1145/1132516.1132531}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/IshaiKLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DubrovI06, author = {Bella Dubrov and Yuval Ishai}, editor = {Jon M. Kleinberg}, title = {On the randomness complexity of efficient sampling}, booktitle = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006}, pages = {711--720}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1132516.1132615}, doi = {10.1145/1132516.1132615}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DubrovI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKOS06, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptography from Anonymity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2006}, url = {http://eprint.iacr.org/2006/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/BeimelIK05, author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz}, title = {General constructions for information-theoretic private information retrieval}, journal = {J. Comput. Syst. Sci.}, volume = {71}, number = {2}, pages = {213--247}, year = {2005}, url = {https://doi.org/10.1016/j.jcss.2005.03.002}, doi = {10.1016/J.JCSS.2005.03.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/BeimelIK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/ApplebaumIK05, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {Computationally Private Randomizing Polynomials and Their Applications}, booktitle = {20th Annual {IEEE} Conference on Computational Complexity {(CCC} 2005), 11-15 June 2005, San Jose, CA, {USA}}, pages = {260--274}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CCC.2005.9}, doi = {10.1109/CCC.2005.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/ApplebaumIK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardI05, author = {Ivan Damg{\aa}rd and Yuval Ishai}, editor = {Victor Shoup}, title = {Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {378--394}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_23}, doi = {10.1007/11535218\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarkolI05, author = {Omer Barkol and Yuval Ishai}, editor = {Victor Shoup}, title = {Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {395--411}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_24}, doi = {10.1007/11535218\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarkolI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FreedmanIPR05, author = {Michael J. Freedman and Yuval Ishai and Benny Pinkas and Omer Reingold}, editor = {Joe Kilian}, title = {Keyword Search and Oblivious Pseudorandom Functions}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {303--324}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_17}, doi = {10.1007/978-3-540-30576-7\_17}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FreedmanIPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CramerDI05, author = {Ronald Cramer and Ivan Damg{\aa}rd and Yuval Ishai}, editor = {Joe Kilian}, title = {Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {342--362}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_19}, doi = {10.1007/978-3-540-30576-7\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CramerDI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiKO05, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky}, editor = {Joe Kilian}, title = {Sufficient Conditions for Collision-Resistant Hashing}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {445--456}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_24}, doi = {10.1007/978-3-540-30576-7\_24}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiKO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardI05, author = {Ivan Damg{\aa}rd and Yuval Ishai}, title = {Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2005}, url = {http://eprint.iacr.org/2005/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BeimelIM04, author = {Amos Beimel and Yuval Ishai and Tal Malkin}, title = {Reducing the Servers' Computation in Private Information Retrieval: {PIR} with Preprocessing}, journal = {J. Cryptol.}, volume = {17}, number = {2}, pages = {125--151}, year = {2004}, url = {https://doi.org/10.1007/s00145-004-0134-y}, doi = {10.1007/S00145-004-0134-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BeimelIM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CanettiDDIM04, author = {Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, title = {Adaptive versus Non-Adaptive Security of Multi-Party Protocols}, journal = {J. Cryptol.}, volume = {17}, number = {3}, pages = {153--207}, year = {2004}, url = {https://doi.org/10.1007/s00145-004-0135-x}, doi = {10.1007/S00145-004-0135-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CanettiDDIM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiK04, author = {Yuval Ishai and Eyal Kushilevitz}, editor = {Christian Cachin and Jan Camenisch}, title = {On the Hardness of Information-Theoretic Multiparty Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {439--455}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_26}, doi = {10.1007/978-3-540-24676-3\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/ApplebaumIK04, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {Cryptography in NC\({}^{\mbox{0}}\)}, booktitle = {45th Symposium on Foundations of Computer Science {(FOCS} 2004), 17-19 October 2004, Rome, Italy, Proceedings}, pages = {166--175}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/FOCS.2004.20}, doi = {10.1109/FOCS.2004.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/ApplebaumIK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HarshaIKNV04, author = {Prahladh Harsha and Yuval Ishai and Joe Kilian and Kobbi Nissim and Srinivasan Venkatesh}, editor = {Josep D{\'{\i}}az and Juhani Karhum{\"{a}}ki and Arto Lepist{\"{o}} and Donald Sannella}, title = {Communication Versus Computation}, booktitle = {Automata, Languages and Programming: 31st International Colloquium, {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3142}, pages = {745--756}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27836-8\_63}, doi = {10.1007/978-3-540-27836-8\_63}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/HarshaIKNV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/IshaiKOS04, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {L{\'{a}}szl{\'{o}} Babai}, title = {Batch codes and their applications}, booktitle = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004}, pages = {262--271}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1007352.1007396}, doi = {10.1145/1007352.1007396}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/IshaiKOS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BaloghCIK03, author = {J{\'{o}}zsef Balogh and J{\'{a}}nos A. Csirik and Yuval Ishai and Eyal Kushilevitz}, title = {Private computation using a {PEZ} dispenser}, journal = {Theor. Comput. Sci.}, volume = {306}, number = {1-3}, pages = {69--84}, year = {2003}, url = {https://doi.org/10.1016/S0304-3975(03)00210-X}, doi = {10.1016/S0304-3975(03)00210-X}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BaloghCIK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKNP03, author = {Yuval Ishai and Joe Kilian and Kobbi Nissim and Erez Petrank}, editor = {Dan Boneh}, title = {Extending Oblivious Transfers Efficiently}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {145--161}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_9}, doi = {10.1007/978-3-540-45146-4\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiSW03, author = {Yuval Ishai and Amit Sahai and David A. Wagner}, editor = {Dan Boneh}, title = {Private Circuits: Securing Hardware against Probing Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {463--481}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_27}, doi = {10.1007/978-3-540-45146-4\_27}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerFIK03, author = {Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz}, editor = {Eli Biham}, title = {Efficient Multi-party Computation over Rings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {596--613}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_37}, doi = {10.1007/3-540-39200-9\_37}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerFIK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerFIK03, author = {Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz}, title = {Efficient Multi-Party Computation over Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2003}, url = {http://eprint.iacr.org/2003/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerFIK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GennaroIKR02, author = {Rosario Gennaro and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, editor = {Moti Yung}, title = {On 2-Round Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {178--193}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_12}, doi = {10.1007/3-540-45708-9\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GennaroIKR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BeimelIKR02, author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Jean{-}Fran{\c{c}}ois Raymond}, title = {Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval}, booktitle = {43rd Symposium on Foundations of Computer Science {(FOCS} 2002), 16-19 November 2002, Vancouver, BC, Canada, Proceedings}, pages = {261--270}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SFCS.2002.1181949}, doi = {10.1109/SFCS.2002.1181949}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BeimelIKR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/IshaiK02, author = {Yuval Ishai and Eyal Kushilevitz}, editor = {Peter Widmayer and Francisco Triguero Ruiz and Rafael Morales Bueno and Matthew Hennessy and Stephan J. Eidenbenz and Ricardo Conejo}, title = {Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials}, booktitle = {Automata, Languages and Programming, 29th International Colloquium, {ICALP} 2002, Malaga, Spain, July 8-13, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2380}, pages = {244--256}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45465-9\_22}, doi = {10.1007/3-540-45465-9\_22}, timestamp = {Wed, 11 Sep 2019 13:15:53 +0200}, biburl = {https://dblp.org/rec/conf/icalp/IshaiK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ChorI01, author = {Benny Chor and Yuval Ishai}, title = {On Privacy and Partition Arguments}, journal = {Inf. Comput.}, volume = {167}, number = {1}, pages = {2--9}, year = {2001}, url = {https://doi.org/10.1006/inco.2000.3013}, doi = {10.1006/INCO.2000.3013}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ChorI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CrescenzoIO01, author = {Giovanni Di Crescenzo and Yuval Ishai and Rafail Ostrovsky}, title = {Universal Service-Providers for Private Information Retrieval}, journal = {J. Cryptol.}, volume = {14}, number = {1}, pages = {37--74}, year = {2001}, url = {https://doi.org/10.1007/s001450010008}, doi = {10.1007/S001450010008}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CrescenzoIO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/BeimelI01, author = {Amos Beimel and Yuval Ishai}, title = {On the Power of Nonlinear Secrect-Sharing}, booktitle = {Proceedings of the 16th Annual {IEEE} Conference on Computational Complexity, Chicago, Illinois, USA, June 18-21, 2001}, pages = {188--202}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CCC.2001.933886}, doi = {10.1109/CCC.2001.933886}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/BeimelI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AielloIR01, author = {William Aiello and Yuval Ishai and Omer Reingold}, editor = {Birgit Pfitzmann}, title = {Priced Oblivious Transfer: How to Sell Digital Goods}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {119--135}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_8}, doi = {10.1007/3-540-44987-6\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AielloIR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiDDIM01, author = {Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, editor = {Birgit Pfitzmann}, title = {On Adaptive vs. Non-adaptive Security of Multiparty Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {262--279}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_17}, doi = {10.1007/3-540-44987-6\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiDDIM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BeimelI01, author = {Amos Beimel and Yuval Ishai}, editor = {Fernando Orejas and Paul G. Spirakis and Jan van Leeuwen}, title = {Information-Theoretic Private Information Retrieval: {A} Unified Construction}, booktitle = {Automata, Languages and Programming, 28th International Colloquium, {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2076}, pages = {912--926}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-48224-5\_74}, doi = {10.1007/3-540-48224-5\_74}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BeimelI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FeigenbaumIMNSW01, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright}, editor = {Fernando Orejas and Paul G. Spirakis and Jan van Leeuwen}, title = {Secure Multiparty Computation of Approximations}, booktitle = {Automata, Languages and Programming, 28th International Colloquium, {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2076}, pages = {927--938}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-48224-5\_75}, doi = {10.1007/3-540-48224-5\_75}, timestamp = {Tue, 19 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalp/FeigenbaumIMNSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/CanettiIKRRW01, author = {Ran Canetti and Yuval Ishai and Ravi Kumar and Michael K. Reiter and Ronitt Rubinfeld and Rebecca N. Wright}, editor = {Ajay D. Kshemkalyani and Nir Shavit}, title = {Selective private function evaluation with applications to private statistics}, booktitle = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA, August 26-29, 2001}, pages = {293--304}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/383962.384047}, doi = {10.1145/383962.384047}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/CanettiIKRRW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GennaroIKR01, author = {Rosario Gennaro and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, editor = {Jeffrey Scott Vitter and Paul G. Spirakis and Mihalis Yannakakis}, title = {The round complexity of verifiable secret sharing and secure multicast}, booktitle = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing, July 6-8, 2001, Heraklion, Crete, Greece}, pages = {580--589}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/380752.380853}, doi = {10.1145/380752.380853}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GennaroIKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR01-015, author = {Amos Beimel and Yuval Ishai}, title = {Information-Theoretic Private Information Retrieval: {A} Unified Construction}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR01-015}}, year = {2001}, url = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-015/index.html}, eprinttype = {ECCC}, eprint = {TR01-015}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR01-015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiDDIM01, author = {Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, title = {On adaptive vs. non-adaptive security of multiparty protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2001}, url = {http://eprint.iacr.org/2001/017}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiDDIM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeigenbaumIMNSW01, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright}, title = {Secure Multiparty Computation of Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2001}, url = {http://eprint.iacr.org/2001/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeigenbaumIMNSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelI01, author = {Amos Beimel and Yuval Ishai}, title = {On the Power of Nonlinear Secret-Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2001}, url = {http://eprint.iacr.org/2001/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/GertnerIKM00, author = {Yael Gertner and Yuval Ishai and Eyal Kushilevitz and Tal Malkin}, title = {Protecting Data Privacy in Private Information Retrieval Schemes}, journal = {J. Comput. Syst. Sci.}, volume = {60}, number = {3}, pages = {592--629}, year = {2000}, url = {https://doi.org/10.1006/jcss.1999.1689}, doi = {10.1006/JCSS.1999.1689}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/GertnerIKM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelIM00, author = {Amos Beimel and Yuval Ishai and Tal Malkin}, editor = {Mihir Bellare}, title = {Reducing the Servers Computation in Private Information Retrieval: {PIR} with Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {55--73}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_4}, doi = {10.1007/3-540-44598-6\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeimelIM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/IshaiK00, author = {Yuval Ishai and Eyal Kushilevitz}, title = {Randomizing Polynomials: {A} New Representation with Applications to Round-Efficient Secure Computation}, booktitle = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000, 12-14 November 2000, Redondo Beach, California, {USA}}, pages = {294--304}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SFCS.2000.892118}, doi = {10.1109/SFCS.2000.892118}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/IshaiK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/il/Ishai99, author = {Yuval Ishai}, title = {Private computation and correlated randomness}, school = {Technion - Israel Institute of Technology, Israel}, year = {1999}, url = {https://technion.primo.exlibrisgroup.com/permalink/972TEC\_INST/q1jq5o/alma990022104850203971}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/il/Ishai99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GilboaI99, author = {Niv Gilboa and Yuval Ishai}, editor = {Michael J. Wiener}, title = {Compressing Cryptographic Resources}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {591--608}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_37}, doi = {10.1007/3-540-48405-1\_37}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GilboaI99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/IshaiK99, author = {Yuval Ishai and Eyal Kushilevitz}, editor = {Jeffrey Scott Vitter and Lawrence L. Larmore and Frank Thomson Leighton}, title = {Improved Upper Bounds on Information-Theoretic Private Information Retrieval (Extended Abstract)}, booktitle = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of Computing, May 1-4, 1999, Atlanta, Georgia, {USA}}, pages = {79--88}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/301250.301275}, doi = {10.1145/301250.301275}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/IshaiK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BeimelIKM99, author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Tal Malkin}, editor = {Jeffrey Scott Vitter and Lawrence L. Larmore and Frank Thomson Leighton}, title = {One-Way Functions Are Essential for Single-Server Private Information Retrieval}, booktitle = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of Computing, May 1-4, 1999, Atlanta, Georgia, {USA}}, pages = {89--98}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/301250.301277}, doi = {10.1145/301250.301277}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BeimelIKM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/CrescenzoIO98, author = {Giovanni Di Crescenzo and Yuval Ishai and Rafail Ostrovsky}, editor = {Brian A. Coan and Yehuda Afek}, title = {Universal Service-Providers for Database Private Information Retrieval (Extended Abstract)}, booktitle = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June 28 - July 2, 1998}, pages = {91--100}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/277697.277713}, doi = {10.1145/277697.277713}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/CrescenzoIO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CrescenzoIO98, author = {Giovanni Di Crescenzo and Yuval Ishai and Rafail Ostrovsky}, editor = {Jeffrey Scott Vitter}, title = {Non-Interactive and Non-Malleable Commitment}, booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory of Computing, Dallas, Texas, USA, May 23-26, 1998}, pages = {141--150}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/276698.276722}, doi = {10.1145/276698.276722}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CrescenzoIO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GertnerIKM98, author = {Yael Gertner and Yuval Ishai and Eyal Kushilevitz and Tal Malkin}, editor = {Jeffrey Scott Vitter}, title = {Protecting Data Privacy in Private Information Retrieval Schemes}, booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory of Computing, Dallas, Texas, USA, May 23-26, 1998}, pages = {151--160}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/276698.276723}, doi = {10.1145/276698.276723}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GertnerIKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrescenzoIO98, author = {Giovanni Di Crescenzo and Yuval Ishai and Rafail Ostrovsky}, title = {Universal Service Providers for Database Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {1998}, url = {http://eprint.iacr.org/1998/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrescenzoIO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/IshaiK97, author = {Yuval Ishai and Eyal Kushilevitz}, title = {Private Simultaneous Messages Protocols with Applications}, booktitle = {Fifth Israel Symposium on Theory of Computing and Systems, {ISTCS} 1997, Ramat-Gan, Israel, June 17-19, 1997, Proceedings}, pages = {174--184}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ISTCS.1997.595170}, doi = {10.1109/ISTCS.1997.595170}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/istcs/IshaiK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiK97, author = {Yuval Ishai and Eyal Kushilevitz}, title = {Protecting Data Privacy in Private Information Retrieval Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {1997}, url = {http://eprint.iacr.org/1997/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cpc/AnthonyBIS96, author = {Martin Anthony and Peter L. Bartlett and Yuval Ishai and John Shawe{-}Taylor}, title = {Valid Generalisation from Approximate Interpolation}, journal = {Comb. Probab. Comput.}, volume = {5}, pages = {191--214}, year = {1996}, url = {https://doi.org/10.1017/S096354830000198X}, doi = {10.1017/S096354830000198X}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cpc/AnthonyBIS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/ChorI96, author = {Benny Chor and Yuval Ishai}, title = {On Privacy and Partition Arguments}, booktitle = {Fourth Israel Symposium on Theory of Computing and Systems, {ISTCS} 1996, Jerusalem, Israel, June 10-12, 1996, Proceedings}, pages = {191--194}, publisher = {{IEEE} Computer Society}, year = {1996}, timestamp = {Tue, 31 May 2016 15:27:26 +0200}, biburl = {https://dblp.org/rec/conf/istcs/ChorI96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.