BibTeX records: Yuval Ishai

download as .bib file

@article{DBLP:journals/joc/IshaiKLS24,
  author       = {Yuval Ishai and
                  Alexis Korb and
                  Paul Lou and
                  Amit Sahai},
  title        = {Beyond the Csisz{\'{a}}r-K{\"{o}}rner Bound: Best-Possible
                  Wiretap Coding via Obfuscation},
  journal      = {J. Cryptol.},
  volume       = {37},
  number       = {1},
  pages        = {1},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00145-023-09482-2},
  doi          = {10.1007/S00145-023-09482-2},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/IshaiKLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiS24,
  author       = {Yuval Ishai and
                  Yifan Song},
  title        = {Leakage-Tolerant Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/332},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AmesHIV23,
  author       = {Scott Ames and
                  Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Ligero: lightweight sublinear arguments without a trusted setup},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3379--3424},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01222-8},
  doi          = {10.1007/S10623-023-01222-8},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AmesHIV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/BenSassonCIKS23,
  author       = {Eli Ben{-}Sasson and
                  Dan Carmon and
                  Yuval Ishai and
                  Swastik Kopparty and
                  Shubhangi Saraf},
  title        = {Proximity Gaps for Reed-Solomon Codes},
  journal      = {J. {ACM}},
  volume       = {70},
  number       = {5},
  pages        = {31:1--31:57},
  year         = {2023},
  url          = {https://doi.org/10.1145/3614423},
  doi          = {10.1145/3614423},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/BenSassonCIKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayIV23,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Actively Secure Garbled Circuits with Constant Communication Overhead
                  in the Plain Model},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {3},
  pages        = {26},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09465-3},
  doi          = {10.1007/S00145-023-09465-3},
  timestamp    = {Sat, 24 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayIV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiOS23,
  author       = {Yuval Ishai and
                  Rafail Ostrovsky and
                  Akash Shah},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Succinct Arguments for {RAM} Programs via Projection Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {159--192},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_6},
  doi          = {10.1007/978-3-031-38545-2\_6},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehBCGI23,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Arithmetic Sketching},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {171--202},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_6},
  doi          = {10.1007/978-3-031-38557-5\_6},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehBCGI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviIKR23,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Additive Randomized Encodings and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {203--235},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_7},
  doi          = {10.1007/978-3-031-38557-5\_7},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviIKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiJLSZ23,
  author       = {Yuval Ishai and
                  Aayush Jain and
                  Paul Lou and
                  Amit Sahai and
                  Mark Zhandry},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Computational Wiretap Coding from Indistinguishability Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {263--293},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_9},
  doi          = {10.1007/978-3-031-38551-3\_9},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiJLSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DaoIJL23,
  author       = {Quang Dao and
                  Yuval Ishai and
                  Aayush Jain and
                  Huijia Lin},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Multi-party Homomorphic Secret Sharing and Sublinear {MPC} from Sparse
                  {LPN}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {315--348},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_11},
  doi          = {10.1007/978-3-031-38545-2\_11},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DaoIJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DavidDGIKKLN23,
  author       = {Bernardo David and
                  Giovanni Deligios and
                  Aarushi Goel and
                  Yuval Ishai and
                  Anders Konring and
                  Eyal Kushilevitz and
                  Chen{-}Da Liu{-}Zhang and
                  Varun Narayanan},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Perfect {MPC} over Layered Graphs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {360--392},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_12},
  doi          = {10.1007/978-3-031-38557-5\_12},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DavidDGIKKLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKSS23,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Round-Optimal Black-Box {MPC} in the Plain Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {393--426},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_13},
  doi          = {10.1007/978-3-031-38557-5\_13},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKNZ23,
  author       = {Yuval Ishai and
                  Mahimna Kelkar and
                  Varun Narayanan and
                  Liav Zafar},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {One-Message Secure Reductions: On the Cost of Converting Correlations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {515--547},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_17},
  doi          = {10.1007/978-3-031-38557-5\_17},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKNZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS23,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Black-Box Reusable {NISC} with Random Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14005},
  pages        = {68--97},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30617-4\_3},
  doi          = {10.1007/978-3-031-30617-4\_3},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyleCGIKRS23,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Nicolas Resch and
                  Peter Scholl},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Oblivious Transfer with Constant Computational Overhead},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14004},
  pages        = {271--302},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30545-0\_10},
  doi          = {10.1007/978-3-031-30545-0\_10},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyleCGIKRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/Bogdanov0FIKS23,
  author       = {Andrej Bogdanov and
                  Krishnamoorthy Dinesh and
                  Yuval Filmus and
                  Yuval Ishai and
                  Avi Kaplan and
                  Sruthi Sekar},
  editor       = {Patricia Bouyer and
                  Srikanth Srinivasan},
  title        = {Bounded Simultaneous Messages},
  booktitle    = {43rd {IARCS} Annual Conference on Foundations of Software Technology
                  and Theoretical Computer Science, {FSTTCS} 2023, December 18-20, 2023,
                  {IIIT} Hyderabad, Telangana, India},
  series       = {LIPIcs},
  volume       = {284},
  pages        = {23:1--23:17},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2023.23},
  doi          = {10.4230/LIPICS.FSTTCS.2023.23},
  timestamp    = {Wed, 13 Dec 2023 14:08:06 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/Bogdanov0FIKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BoyleIMRY23,
  author       = {Elette Boyle and
                  Yuval Ishai and
                  Pierre Meyer and
                  Robert Robere and
                  Gal Yehuda},
  editor       = {Yael Tauman Kalai},
  title        = {On Low-End Obfuscation and Learning},
  booktitle    = {14th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, {USA}},
  series       = {LIPIcs},
  volume       = {251},
  pages        = {23:1--23:28},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2023.23},
  doi          = {10.4230/LIPICS.ITCS.2023.23},
  timestamp    = {Thu, 02 Feb 2023 12:50:42 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BoyleIMRY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GhosalIKKLS23,
  author       = {Riddhi Ghosal and
                  Yuval Ishai and
                  Alexis Korb and
                  Eyal Kushilevitz and
                  Paul Lou and
                  Amit Sahai},
  editor       = {Barna Saha and
                  Rocco A. Servedio},
  title        = {Hard Languages in {NP} {\(\cap\)} coNP and {NIZK} Proofs from Unstructured
                  Hardness},
  booktitle    = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2023, Orlando, FL, USA, June 20-23, 2023},
  pages        = {1243--1256},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3564246.3585119},
  doi          = {10.1145/3564246.3585119},
  timestamp    = {Mon, 22 May 2023 13:01:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/GhosalIKKLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ApplebaumBIKLV23,
  author       = {Benny Applebaum and
                  Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tianren Liu and
                  Vinod Vaikuntanathan},
  editor       = {Barna Saha and
                  Rocco A. Servedio},
  title        = {Succinct Computational Secret Sharing},
  booktitle    = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2023, Orlando, FL, USA, June 20-23, 2023},
  pages        = {1553--1566},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3564246.3585127},
  doi          = {10.1145/3564246.3585127},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/ApplebaumBIKLV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiKR23,
  author       = {Yuval Ishai and
                  Eyal Kushnir and
                  Ron D. Rothblum},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Combinatorially Homomorphic Encryption},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14370},
  pages        = {251--278},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48618-0\_9},
  doi          = {10.1007/978-3-031-48618-0\_9},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AbramBIKN23,
  author       = {Damiano Abram and
                  Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Varun Narayanan},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Cryptography from Planted Graphs: Security with Logarithmic-Size Messages},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14369},
  pages        = {286--315},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48615-9\_11},
  doi          = {10.1007/978-3-031-48615-9\_11},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AbramBIKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-00334,
  author       = {Andrej Bogdanov and
                  Krishnamoorthy Dinesh and
                  Yuval Filmus and
                  Yuval Ishai and
                  Avi Kaplan and
                  Sruthi Sekar},
  title        = {Bounded Simultaneous Messages},
  journal      = {CoRR},
  volume       = {abs/2310.00334},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.00334},
  doi          = {10.48550/ARXIV.2310.00334},
  eprinttype    = {arXiv},
  eprint       = {2310.00334},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-00334.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ApplebaumBIKLV23,
  author       = {Benny Applebaum and
                  Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tianren Liu and
                  Vinod Vaikuntanathan},
  title        = {Succinct Computational Secret Sharing},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR23-091}},
  year         = {2023},
  url          = {https://eccc.weizmann.ac.il/report/2023/091},
  eprinttype    = {ECCC},
  eprint       = {TR23-091},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ApplebaumBIKLV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GhosalIKKLS23,
  author       = {Riddhi Ghosal and
                  Yuval Ishai and
                  Alexis Korb and
                  Eyal Kushilevitz and
                  Paul Lou and
                  Amit Sahai},
  title        = {Hard Languages in {\textdollar}{\textbackslash}text\{NP\}{\textbackslash}cap{\textbackslash}text\{coNP\}{\textdollar}
                  and {NIZK} Proofs from Unstructured Hardness},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR23-213}},
  year         = {2023},
  url          = {https://eccc.weizmann.ac.il/report/2023/213},
  eprinttype    = {ECCC},
  eprint       = {TR23-213},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/GhosalIKKLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGIK23,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Victor I. Kolobov},
  title        = {Information-Theoretic Distributed Point Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/028},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGIK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidKIKN23,
  author       = {Bernardo David and
                  Anders Konring and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Varun Narayanan},
  title        = {Perfect {MPC} over Layered Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/330},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidKIKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKSS23,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  title        = {Black-Box Reusable {NISC} with Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/514},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChongchitmateILO23,
  author       = {Wutichai Chongchitmate and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky},
  title        = {{PSI} from ring-OLE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {745},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/745},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChongchitmateILO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIKRS23,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Nicolas Resch and
                  Peter Scholl},
  title        = {Oblivious Transfer with Constant Computational Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {817},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/817},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGIKRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviIKR23,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  title        = {Additive Randomized Encodings and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {870},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/870},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviIKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumBIKLV23,
  author       = {Benny Applebaum and
                  Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tianren Liu and
                  Vinod Vaikuntanathan},
  title        = {Succinct Computational Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {955},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/955},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumBIKLV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehBCGI23,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Arithmetic Sketching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1012},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehBCGI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKSS23a,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  title        = {Round-Optimal Black-Box {MPC} in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1173},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1173},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKSS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKNZ23,
  author       = {Yuval Ishai and
                  Mahimna Kelkar and
                  Varun Narayanan and
                  Liav Zafar},
  title        = {One-Message Secure Reductions: On the Cost of Converting Correlations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1225},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1225},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKNZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiJLSZ23,
  author       = {Yuval Ishai and
                  Aayush Jain and
                  Paul Lou and
                  Amit Sahai and
                  Mark Zhandry},
  title        = {Computational Wiretap Coding from Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1270},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1270},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiJLSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaoIJL23,
  author       = {Quang Dao and
                  Yuval Ishai and
                  Aayush Jain and
                  Huijia Lin},
  title        = {Multi-Party Homomorphic Secret Sharing and Sublinear {MPC} from Sparse
                  {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1593},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1593},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DaoIJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbramBIKN23,
  author       = {Damiano Abram and
                  Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Varun Narayanan},
  title        = {Cryptography from Planted Graphs: Security with Logarithmic-Size Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1929},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1929},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AbramBIKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhosalIKKLS23,
  author       = {Riddhi Ghosal and
                  Yuval Ishai and
                  Alexis Korb and
                  Eyal Kushilevitz and
                  Paul Lou and
                  Amit Sahai},
  title        = {Hard Languages in {\textdollar}{\textbackslash}mathsf\{NP\} {\textbackslash}cap
                  {\textbackslash}mathsf\{coNP\}{\textdollar} and {NIZK} Proofs from
                  Unstructured Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1972},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1972},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GhosalIKKLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKR23,
  author       = {Yuval Ishai and
                  Eyal Kushnir and
                  Ron D. Rothblum},
  title        = {Combinatorially Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1973},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1973},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BogdanovIS22,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  title        = {Correction to: Unconditionally Secure Computation Against Low-Complexity
                  Leakage},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {1},
  pages        = {2},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-021-09412-0},
  doi          = {10.1007/S00145-021-09412-0},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BogdanovIS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BogdanovIS22a,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  title        = {Correction to: Unconditionally Secure Computation Against Low-Complexity
                  Leakage},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {2},
  pages        = {7},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-021-09417-9},
  doi          = {10.1007/S00145-021-09417-9},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BogdanovIS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BitanskyCIOP22,
  author       = {Nir Bitansky and
                  Alessandro Chiesa and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Omer Paneth},
  title        = {Succinct Non-Interactive Arguments via Linear Interactive Proofs},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {3},
  pages        = {15},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-022-09424-4},
  doi          = {10.1007/S00145-022-09424-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BitanskyCIOP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChongchitmateIL22,
  author       = {Wutichai Chongchitmate and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {{PSI} from Ring-OLE},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {531--545},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559378},
  doi          = {10.1145/3548606.3559378},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChongchitmateIL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DittmerILO22,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Improving Line-Point Zero Knowledge: Two Multiplications for the Price
                  of One},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {829--841},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559385},
  doi          = {10.1145/3548606.3559385},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DittmerILO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/BadrinarayananI22,
  author       = {Saikrishna Badrinarayanan and
                  Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  editor       = {Dana Dachman{-}Soled},
  title        = {Refuting the Dream {XOR} Lemma via Ideal Obfuscation and Resettable
                  {MPC}},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {10:1--10:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.10},
  doi          = {10.4230/LIPICS.ITC.2022.10},
  timestamp    = {Thu, 30 Jun 2022 16:13:48 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/BadrinarayananI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/BoyleGIK22,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Victor I. Kolobov},
  editor       = {Dana Dachman{-}Soled},
  title        = {Information-Theoretic Distributed Point Functions},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {17:1--17:14},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.17},
  doi          = {10.4230/LIPICS.ITC.2022.17},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/BoyleGIK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DittmerILO22,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Authenticated Garbling from Simple Correlations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {57--87},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_3},
  doi          = {10.1007/978-3-031-15985-5\_3},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DittmerILO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleGIK22,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Victor I. Kolobov},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Programmable Distributed Point Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {121--151},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_5},
  doi          = {10.1007/978-3-031-15985-5\_5},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleGIK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumIKP22,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Or Karni and
                  Arpita Patra},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Quadratic Multiparty Randomized Encodings Beyond Honest Majority and
                  Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {453--482},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_16},
  doi          = {10.1007/978-3-031-15985-5\_16},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumIKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalIS22,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Yifan Song},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Tight Bounds on the Randomness Complexity of Secure Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {483--513},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_17},
  doi          = {10.1007/978-3-031-15985-5\_17},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalIS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKLS22,
  author       = {Yuval Ishai and
                  Alexis Korb and
                  Paul Lou and
                  Amit Sahai},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Beyond the Csisz{\'{a}}r-Korner Bound: Best-Possible Wiretap
                  Coding via Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {573--602},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_20},
  doi          = {10.1007/978-3-031-15979-4\_20},
  timestamp    = {Wed, 19 Oct 2022 17:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCGIKRS22,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Nicolas Resch and
                  Peter Scholl},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Correlated Pseudorandomness from Expand-Accumulate Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {603--633},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_21},
  doi          = {10.1007/978-3-031-15979-4\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleCGIKRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GoyalIS22,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Yifan Song},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Private Circuits with Quasilinear Randomness},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {192--221},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_8},
  doi          = {10.1007/978-3-031-07082-2\_8},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GoyalIS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS22,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Round-Optimal Black-Box Protocol Compilers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {210--240},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_8},
  doi          = {10.1007/978-3-031-06944-4\_8},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CastroHIVV22,
  author       = {Leo de Castro and
                  Carmit Hazay and
                  Yuval Ishai and
                  Vinod Vaikuntanathan and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Asymptotically Quasi-Optimal Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {303--334},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_11},
  doi          = {10.1007/978-3-031-06944-4\_11},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CastroHIVV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyleGIN22,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Ariel Nof},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Secure Multiparty Computation with Sublinear Preprocessing},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {427--457},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_15},
  doi          = {10.1007/978-3-031-06944-4\_15},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyleGIN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/Bogdanov0FIKS22,
  author       = {Andrej Bogdanov and
                  Krishnamoorthy Dinesh and
                  Yuval Filmus and
                  Yuval Ishai and
                  Avi Kaplan and
                  Akshayaram Srinivasan},
  editor       = {Mark Braverman},
  title        = {Bounded Indistinguishability for Simple Sources},
  booktitle    = {13th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2022, January 31 - February 3, 2022, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {215},
  pages        = {26:1--26:18},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2022.26},
  doi          = {10.4230/LIPICS.ITCS.2022.26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/Bogdanov0FIKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BoyleDGIKK22,
  author       = {Elette Boyle and
                  Itai Dinur and
                  Niv Gilboa and
                  Yuval Ishai and
                  Nathan Keller and
                  Ohad Klein},
  editor       = {Mark Braverman},
  title        = {Locality-Preserving Hashing for Shifts with Connections to Cryptography},
  booktitle    = {13th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2022, January 31 - February 3, 2022, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {215},
  pages        = {27:1--27:24},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2022.27},
  doi          = {10.4230/LIPICS.ITCS.2022.27},
  timestamp    = {Wed, 26 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BoyleDGIKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/FosliIKW22,
  author       = {Ingerid Fosli and
                  Yuval Ishai and
                  Victor I. Kolobov and
                  Mary Wootters},
  editor       = {Mark Braverman},
  title        = {On the Download Rate of Homomorphic Secret Sharing},
  booktitle    = {13th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2022, January 31 - February 3, 2022, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {215},
  pages        = {71:1--71:22},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2022.71},
  doi          = {10.4230/LIPICS.ITCS.2022.71},
  timestamp    = {Wed, 26 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/FosliIKW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DittmerILOEKSS22,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky and
                  Mohamed Elsabagh and
                  Nikolaos Kiourtis and
                  Brian Schulte and
                  Angelos Stavrou},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {Streaming and Unbalanced {PSI} from Function Secret Sharing},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {564--587},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_25},
  doi          = {10.1007/978-3-031-14791-3\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DittmerILOEKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiKSS22,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious
                  {OT}},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {441--469},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_16},
  doi          = {10.1007/978-3-031-22365-5\_16},
  timestamp    = {Fri, 23 Dec 2022 17:47:38 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiPPRS22,
  author       = {Yuval Ishai and
                  Arpita Patra and
                  Sikhar Patranabis and
                  Divya Ravi and
                  Akshayaram Srinivasan},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Fully-Secure {MPC} with Minimal Trust},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {470--501},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_17},
  doi          = {10.1007/978-3-031-22365-5\_17},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiPPRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-03041,
  author       = {Elette Boyle and
                  Itai Dinur and
                  Niv Gilboa and
                  Yuval Ishai and
                  Nathan Keller and
                  Ohad Klein},
  title        = {Locality-Preserving Hashing for Shifts with Connections to Cryptography},
  journal      = {CoRR},
  volume       = {abs/2201.03041},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.03041},
  eprinttype    = {arXiv},
  eprint       = {2201.03041},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-03041.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleDGIKK22,
  author       = {Elette Boyle and
                  Itai Dinur and
                  Niv Gilboa and
                  Yuval Ishai and
                  Nathan Keller and
                  Ohad Klein},
  title        = {Locality-Preserving Hashing for Shifts with Connections to Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/028},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleDGIKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalIS22,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Yifan Song},
  title        = {Private Circuits with Quasilinear Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/250},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalIS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGIN22,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Ariel Nof},
  title        = {Sublinear GMW-Style Compiler for {MPC} with Preprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/261},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGIN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKLS22,
  author       = {Yuval Ishai and
                  Alexis Korb and
                  Paul Lou and
                  Amit Sahai},
  title        = {Beyond the Csisz{\'{a}}r-K{\"{o}}rner Bound: Best-Possible
                  Wiretap Coding via Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/343},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DittmerILO22,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky},
  title        = {Improving Line-Point Zero Knowledge: Two Multiplications for the Price
                  of One},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {552},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/552},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DittmerILO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananI22,
  author       = {Saikrishna Badrinarayanan and
                  Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  title        = {Refuting the Dream {XOR} Lemma via Ideal Obfuscation and Resettable
                  {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/681},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalIS22a,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Yifan Song},
  title        = {Tight Bounds on the Randomness Complexity of Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {799},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/799},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalIS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumIKP22,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Or Karni and
                  Arpita Patra},
  title        = {Quadratic Multiparty Randomized Encodings Beyond Honest Majority and
                  Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {813},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/813},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumIKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DittmerILO22a,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky},
  title        = {Authenticated Garbling from Simple Correlations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {836},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/836},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DittmerILO22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKSS22,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  title        = {Round-Optimal Black-Box Protocol Compilers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {887},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/887},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIKRS22,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Nicolas Resch and
                  Peter Scholl},
  title        = {Correlated Pseudorandomness from Expand-Accumulate Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1014},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1014},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGIKRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIKS22,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Scholl},
  title        = {Efficient Pseudorandom Correlation Generators from Ring-LPN},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1035},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1035},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGIKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGIK22,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Victor I. Kolobov},
  title        = {Programmable Distributed Point Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1060},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1060},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGIK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiPPRS22,
  author       = {Yuval Ishai and
                  Arpita Patra and
                  Sikhar Patranabis and
                  Divya Ravi and
                  Akshayaram Srinivasan},
  title        = {Fully-Secure {MPC} with Minimal Trust},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1248},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1248},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiPPRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKSS22a,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  title        = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious
                  {OT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1288},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1288},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKSS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmesHIV22,
  author       = {Scott Ames and
                  Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Ligero: Lightweight Sublinear Arguments Without a Trusted Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1608},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1608},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AmesHIV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BenhamoudaDIR21,
  author       = {Fabrice Benhamouda and
                  Akshay Degwekar and
                  Yuval Ishai and
                  Tal Rabin},
  title        = {On the Local Leakage Resilience of Linear Secret Sharing Schemes},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {2},
  pages        = {10},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09375-2},
  doi          = {10.1007/S00145-021-09375-2},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BenhamoudaDIR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BogdanovIS21,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  title        = {Unconditionally Secure Computation Against Low-Complexity Leakage},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {4},
  pages        = {38},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09402-2},
  doi          = {10.1007/S00145-021-09402-2},
  timestamp    = {Tue, 31 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BogdanovIS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IshaiSW21,
  author       = {Yuval Ishai and
                  Hang Su and
                  David J. Wu},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from
                  Lattices},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {212--234},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484572},
  doi          = {10.1145/3460120.3484572},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/IshaiSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/DittmerIO21,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Rafail Ostrovsky},
  editor       = {Stefano Tessaro},
  title        = {Line-Point Zero Knowledge and Its Applications},
  booktitle    = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021,
                  July 23-26, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {199},
  pages        = {5:1--5:24},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2021.5},
  doi          = {10.4230/LIPICS.ITC.2021.5},
  timestamp    = {Thu, 16 Sep 2021 15:58:53 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/DittmerIO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalIKNPPR21,
  author       = {Shweta Agrawal and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Varun Narayanan and
                  Manoj Prabhakaran and
                  Vinod M. Prabhakaran and
                  Alon Rosen},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Secure Computation from One-Way Noisy Communication, or: Anti-correlation
                  via Anti-concentration},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {124--154},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_5},
  doi          = {10.1007/978-3-030-84245-1\_5},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalIKNPPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKSS21,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {On the Round Complexity of Black-Box Secure {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {214--243},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_8},
  doi          = {10.1007/978-3-030-84245-1\_8},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleGIN21,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Ariel Nof},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Sublinear GMW-Style Compiler for {MPC} with Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {457--485},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_16},
  doi          = {10.1007/978-3-030-84245-1\_16},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleGIN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCGIKS21,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Scholl},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Low-Complexity Weak Pseudorandom Functions in {\textdollar}{\textbackslash}mathtt
                  \{AC\}0[{\textbackslash}mathtt \{MOD\}2]{\textdollar}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {487--516},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_17},
  doi          = {10.1007/978-3-030-84259-8\_17},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleCGIKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurGHIKSZ21,
  author       = {Itai Dinur and
                  Steven Goldfeder and
                  Tzipora Halevi and
                  Yuval Ishai and
                  Mahimna Kelkar and
                  Vivek Sharma and
                  Greg Zaverucha},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates,
                  Protocols, and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {517--547},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_18},
  doi          = {10.1007/978-3-030-84259-8\_18},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurGHIKSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyleCG0I0R21,
  author       = {Elette Boyle and
                  Nishanth Chandran and
                  Niv Gilboa and
                  Divya Gupta and
                  Yuval Ishai and
                  Nishant Kumar and
                  Mayank Rathee},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12697},
  pages        = {871--900},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77886-6\_30},
  doi          = {10.1007/978-3-030-77886-6\_30},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyleCG0I0R21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IshaiLM21,
  author       = {Yuval Ishai and
                  Russell W. F. Lai and
                  Giulio Malavolta},
  editor       = {Juan A. Garay},
  title        = {A Geometric Approach to Homomorphic Secret Sharing},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {92--119},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_4},
  doi          = {10.1007/978-3-030-75248-4\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/IshaiLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenHIKMRSVW21,
  author       = {Megan Chen and
                  Carmit Hazay and
                  Yuval Ishai and
                  Yuriy Kashnikov and
                  Daniele Micciancio and
                  Tarik Riviere and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam and
                  Ruihan Wang},
  title        = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest
                  Majority},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {590--607},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00025},
  doi          = {10.1109/SP40001.2021.00025},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChenHIKMRSVW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BonehBCGI21,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Lightweight Techniques for Private Heavy Hitters},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {762--776},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00048},
  doi          = {10.1109/SP40001.2021.00048},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BonehBCGI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BenhamoudaBGHIN21,
  author       = {Fabrice Benhamouda and
                  Elette Boyle and
                  Niv Gilboa and
                  Shai Halevi and
                  Yuval Ishai and
                  Ariel Nof},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient
                  Secure Computation},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  pages        = {129--161},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1\_5},
  doi          = {10.1007/978-3-030-90453-1\_5},
  timestamp    = {Mon, 08 Nov 2021 11:43:29 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BenhamoudaBGHIN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-10126,
  author       = {Ingerid Fosli and
                  Yuval Ishai and
                  Victor I. Kolobov and
                  Mary Wootters},
  title        = {On the Download Rate of Homomorphic Secret Sharing},
  journal      = {CoRR},
  volume       = {abs/2111.10126},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.10126},
  eprinttype    = {arXiv},
  eprint       = {2111.10126},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-10126.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BogdanovDFIKS21,
  author       = {Andrej Bogdanov and
                  Krishnamoorthy Dinesh and
                  Yuval Filmus and
                  Yuval Ishai and
                  Avi Kaplan and
                  Akshayaram Srinivasan},
  title        = {Bounded Indistinguishability for Simple Sources},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR21-093}},
  year         = {2021},
  url          = {https://eccc.weizmann.ac.il/report/2021/093},
  eprinttype    = {ECCC},
  eprint       = {TR21-093},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BogdanovDFIKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehBCGI21,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Lightweight Techniques for Private Heavy Hitters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/017},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehBCGI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiLM21,
  author       = {Yuval Ishai and
                  Russell W. F. Lai and
                  Giulio Malavolta},
  title        = {A Geometric Approach to Homomorphic Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/260},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurGHIKSZ21,
  author       = {Itai Dinur and
                  Steven Goldfeder and
                  Tzipora Halevi and
                  Yuval Ishai and
                  Mahimna Kelkar and
                  Vivek Sharma and
                  Greg Zaverucha},
  title        = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates,
                  Protocols, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {885},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/885},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurGHIKSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiSW21,
  author       = {Yuval Ishai and
                  Hang Su and
                  David J. Wu},
  title        = {Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from
                  Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {977},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/977},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaBGHIN21,
  author       = {Fabrice Benhamouda and
                  Elette Boyle and
                  Niv Gilboa and
                  Shai Halevi and
                  Yuval Ishai and
                  Ariel Nof},
  title        = {Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient
                  Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1223},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1223},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaBGHIN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKSS21,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  title        = {On the Round Complexity of Black-box Secure {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1467},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1467},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FosliIKW21,
  author       = {Ingerid Fosli and
                  Yuval Ishai and
                  Victor I. Kolobov and
                  Mary Wootters},
  title        = {On the Download Rate of Homomorphic Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1532},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1532},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FosliIKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoyleGIN20,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Ariel Nof},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Efficient Fully Secure Computation via Distributed Zero-Knowledge
                  Proofs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {244--276},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_9},
  doi          = {10.1007/978-3-030-64840-4\_9},
  timestamp    = {Thu, 10 Dec 2020 10:11:44 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoyleGIN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AgrawalIKNPPR20,
  author       = {Shweta Agrawal and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Varun Narayanan and
                  Manoj Prabhakaran and
                  Vinod M. Prabhakaran and
                  Alon Rosen},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Cryptography from One-Way Communication: On Completeness of Finite
                  Channels},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {653--685},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_22},
  doi          = {10.1007/978-3-030-64840-4\_22},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AgrawalIKNPPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbascalSHIV20,
  author       = {Jackson Abascal and
                  Mohammad Hossein Faghihi Sereshgi and
                  Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Is the Classical {GMW} Paradigm Practical? The Case of Non-Interactive
                  Actively Secure 2PC},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1591--1605},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423366},
  doi          = {10.1145/3372297.3423366},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AbascalSHIV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/FilmusIKK20,
  author       = {Yuval Filmus and
                  Yuval Ishai and
                  Avi Kaplan and
                  Guy Kindler},
  editor       = {Shubhangi Saraf},
  title        = {Limits of Preprocessing},
  booktitle    = {35th Computational Complexity Conference, {CCC} 2020, July 28-31,
                  2020, Saarbr{\"{u}}cken, Germany (Virtual Conference)},
  series       = {LIPIcs},
  volume       = {169},
  pages        = {17:1--17:22},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.CCC.2020.17},
  doi          = {10.4230/LIPICS.CCC.2020.17},
  timestamp    = {Thu, 02 Feb 2023 13:27:04 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/FilmusIKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCGIKS20,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Scholl},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Efficient Pseudorandom Correlation Generators from Ring-LPN},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {387--416},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_14},
  doi          = {10.1007/978-3-030-56880-1\_14},
  timestamp    = {Thu, 13 Aug 2020 16:42:10 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleCGIKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartaIOW20,
  author       = {Ohad Barta and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  David J. Wu},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {On Succinct Arguments and Witness Encryption from Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {776--806},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_26},
  doi          = {10.1007/978-3-030-56784-2\_26},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartaIOW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Ben-SassonCIKS20,
  author       = {Eli Ben{-}Sasson and
                  Dan Carmon and
                  Yuval Ishai and
                  Swastik Kopparty and
                  Shubhangi Saraf},
  editor       = {Sandy Irani},
  title        = {Proximity Gaps for Reed-Solomon Codes},
  booktitle    = {61st {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2020, Durham, NC, USA, November 16-19, 2020},
  pages        = {900--909},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/FOCS46700.2020.00088},
  doi          = {10.1109/FOCS46700.2020.00088},
  timestamp    = {Wed, 15 Dec 2021 10:49:16 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Ben-SassonCIKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BoyleCGIKS20,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Scholl},
  editor       = {Sandy Irani},
  title        = {Correlated Pseudorandom Functions from Variable-Density {LPN}},
  booktitle    = {61st {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2020, Durham, NC, USA, November 16-19, 2020},
  pages        = {1069--1080},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/FOCS46700.2020.00103},
  doi          = {10.1109/FOCS46700.2020.00103},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BoyleCGIKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/ApplebaumBGIS20,
  author       = {Benny Applebaum and
                  Zvika Brakerski and
                  Sanjam Garg and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  editor       = {Thomas Vidick},
  title        = {Separating Two-Round Secure Computation From Oblivious Transfer},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {71:1--71:18},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.71},
  doi          = {10.4230/LIPICS.ITCS.2020.71},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/ApplebaumBGIS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BartusekIJMSZ20,
  author       = {James Bartusek and
                  Yuval Ishai and
                  Aayush Jain and
                  Fermi Ma and
                  Amit Sahai and
                  Mark Zhandry},
  editor       = {Thomas Vidick},
  title        = {Affine Determinant Programs: {A} Framework for Obfuscation and Witness
                  Encryption},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {82:1--82:39},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.82},
  doi          = {10.4230/LIPICS.ITCS.2020.82},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/BartusekIJMSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BallHILM20,
  author       = {Marshall Ball and
                  Justin Holmgren and
                  Yuval Ishai and
                  Tianren Liu and
                  Tal Malkin},
  editor       = {Thomas Vidick},
  title        = {On the Complexity of Decomposable Randomized Encodings, Or: How Friendly
                  Can a Garbling-Friendly {PRF} Be?},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {86:1--86:22},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.86},
  doi          = {10.4230/LIPICS.ITCS.2020.86},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BallHILM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HongIKL20,
  author       = {Matthew M. Hong and
                  Yuval Ishai and
                  Victor I. Kolobov and
                  Russell W. F. Lai},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {On Computational Shortcuts for Information-Theoretic {PIR}},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {504--534},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_18},
  doi          = {10.1007/978-3-030-64375-1\_18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HongIKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrikolaCIJS20,
  author       = {Thomas Agrikola and
                  Geoffroy Couteau and
                  Yuval Ishai and
                  Stanislaw Jarecki and
                  Amit Sahai},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {On Pseudorandom Encodings},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12552},
  pages        = {639--669},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64381-2\_23},
  doi          = {10.1007/978-3-030-64381-2\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrikolaCIJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2020-1,
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1},
  doi          = {10.1007/978-3-030-45721-1},
  isbn         = {978-3-030-45720-4},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2020-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2020-2,
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2},
  doi          = {10.1007/978-3-030-45724-2},
  isbn         = {978-3-030-45723-5},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2020-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2020-3,
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12107},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45727-3},
  doi          = {10.1007/978-3-030-45727-3},
  isbn         = {978-3-030-45726-6},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2020-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-13053,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky and
                  Mohamed Elsabagh and
                  Nikolaos Kiourtis and
                  Brian Schulte and
                  Angelos Stavrou},
  title        = {Function Secret Sharing for {PSI-CA:} With Applications to Private
                  Contact Tracing},
  journal      = {CoRR},
  volume       = {abs/2012.13053},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.13053},
  eprinttype    = {arXiv},
  eprint       = {2012.13053},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-13053.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-14884,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Lightweight Techniques for Private Heavy Hitters},
  journal      = {CoRR},
  volume       = {abs/2012.14884},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.14884},
  eprinttype    = {arXiv},
  eprint       = {2012.14884},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-14884.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/Ben-SassonCIKS20,
  author       = {Eli Ben{-}Sasson and
                  Dan Carmon and
                  Yuval Ishai and
                  Swastik Kopparty and
                  Shubhangi Saraf},
  title        = {Proximity Gaps for Reed-Solomon Codes},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR20-083}},
  year         = {2020},
  url          = {https://eccc.weizmann.ac.il/report/2020/083},
  eprinttype    = {ECCC},
  eprint       = {TR20-083},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/Ben-SassonCIKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumBGIS20,
  author       = {Benny Applebaum and
                  Zvika Brakerski and
                  Sanjam Garg and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  title        = {Separating Two-Round Secure Computation from Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/116},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumBGIS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenHIKMRSVW20,
  author       = {Megan Chen and
                  Carmit Hazay and
                  Yuval Ishai and
                  Yuriy Kashnikov and
                  Daniele Micciancio and
                  Tarik Riviere and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam and
                  Ruihan Wang},
  title        = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest
                  Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenHIKMRSVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayIMV20,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Antonio Marcedone and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {LevioSA: Lightweight Secure Arithmetic Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayIMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrikolaCIJS20,
  author       = {Thomas Agrikola and
                  Geoffroy Couteau and
                  Yuval Ishai and
                  Stanislaw Jarecki and
                  Amit Sahai},
  title        = {On Pseudorandom Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrikolaCIJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ishai20,
  author       = {Yuval Ishai},
  title        = {How Low Can We Go?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {576},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/576},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ishai20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCIKS20,
  author       = {Eli Ben{-}Sasson and
                  Dan Carmon and
                  Yuval Ishai and
                  Swastik Kopparty and
                  Shubhangi Saraf},
  title        = {Proximity Gaps for Reed-Solomon Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {654},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/654},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonCIKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekIJMSZ20,
  author       = {James Bartusek and
                  Yuval Ishai and
                  Aayush Jain and
                  Fermi Ma and
                  Amit Sahai and
                  Mark Zhandry},
  title        = {Affine Determinant Programs: {A} Framework for Obfuscation and Witness
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {889},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/889},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekIJMSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartaIOW20,
  author       = {Ohad Barta and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  David J. Wu},
  title        = {On Succinct Arguments and Witness Encryption from Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1319},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1319},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartaIOW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGGIKR20,
  author       = {Elette Boyle and
                  Nishanth Chandran and
                  Niv Gilboa and
                  Divya Gupta and
                  Yuval Ishai and
                  Nishant Kumar and
                  Mayank Rathee},
  title        = {Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1392},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1392},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGGIKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIKS20,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Scholl},
  title        = {Correlated Pseudorandom Functions from Variable-Density {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1417},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1417},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGIKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongIKL20,
  author       = {Matthew M. Hong and
                  Yuval Ishai and
                  Victor I. Kolobov and
                  Russell W. F. Lai},
  title        = {On Computational Shortcuts for Information-Theoretic {PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1429},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1429},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HongIKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DittmerIO20,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Rafail Ostrovsky},
  title        = {Line-Point Zero Knowledge and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1446},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1446},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DittmerIO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGIN20,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Ariel Nof},
  title        = {Efficient Fully Secure Computation via Distributed Zero-Knowledge
                  Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1451},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1451},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGIN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DittmerILOEKSS20,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky and
                  Mohamed Elsabagh and
                  Nikolaos Kiourtis and
                  Brian Schulte and
                  Angelos Stavrou},
  title        = {Function Secret Sharing for {PSI-CA:} With Applications to Private
                  Contact Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1599},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1599},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DittmerILOEKSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGIKRS19,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Rindal and
                  Peter Scholl},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Efficient Two-Round {OT} Extension and Silent Non-Interactive Secure
                  Computation},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {291--308},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354255},
  doi          = {10.1145/3319535.3354255},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyleCGIKRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HazayIMV19,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Antonio Marcedone and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {LevioSA: Lightweight Secure Arithmetic Computation},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {327--344},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354258},
  doi          = {10.1145/3319535.3354258},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HazayIMV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleGIN19,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Ariel Nof},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Practical Fully Secure Three-Party Computation via Sublinear Distributed
                  Zero-Knowledge Proofs},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {869--886},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363227},
  doi          = {10.1145/3319535.3363227},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyleGIN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DottlingGIMMO19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Yuval Ishai and
                  Giulio Malavolta and
                  Tamer Mour and
                  Rafail Ostrovsky},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Trapdoor Hash Functions and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_1},
  doi          = {10.1007/978-3-030-26954-8\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DottlingGIMMO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehBCGI19,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_3},
  doi          = {10.1007/978-3-030-26954-8\_3},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehBCGI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BogdanovIS19,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Unconditionally Secure Computation Against Low-Complexity Leakage},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {387--416},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_14},
  doi          = {10.1007/978-3-030-26951-7\_14},
  timestamp    = {Fri, 09 Aug 2019 14:22:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BogdanovIS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaseDIKLOV19,
  author       = {Melissa Chase and
                  Yevgeniy Dodis and
                  Yuval Ishai and
                  Daniel Kraschewski and
                  Tianren Liu and
                  Rafail Ostrovsky and
                  Vinod Vaikuntanathan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Reusable Non-Interactive Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {462--488},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_15},
  doi          = {10.1007/978-3-030-26954-8\_15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaseDIKLOV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCGIKS19,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Scholl},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Efficient Pseudorandom Correlation Generators: Silent {OT} Extension
                  and More},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {489--518},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_16},
  doi          = {10.1007/978-3-030-26954-8\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleCGIKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKOS19,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Cryptographic Sensing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {583--604},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_19},
  doi          = {10.1007/978-3-030-26954-8\_19},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaleviIKMR19,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Nikolaos Makriyannis and
                  Tal Rabin},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {On Fully Secure {MPC} with Solitary Output},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11891},
  pages        = {312--340},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36030-6\_13},
  doi          = {10.1007/978-3-030-36030-6\_13},
  timestamp    = {Mon, 25 Nov 2019 13:58:16 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HaleviIKMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BoyleGI19,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Secure Computation with Preprocessing via Function Secret Sharing},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11891},
  pages        = {341--371},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36030-6\_14},
  doi          = {10.1007/978-3-030-36030-6\_14},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BoyleGI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2019-1,
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2},
  doi          = {10.1007/978-3-030-17653-2},
  isbn         = {978-3-030-17652-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2019-2,
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11477},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17656-3},
  doi          = {10.1007/978-3-030-17656-3},
  isbn         = {978-3-030-17655-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2019-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2019-3,
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11478},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17659-4},
  doi          = {10.1007/978-3-030-17659-4},
  isbn         = {978-3-030-17658-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2019-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehBCGI19,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via
                  Fully Linear PCPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehBCGI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGI19,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Compressing Vector {OLE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIKS19,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Scholl},
  title        = {Efficient Pseudorandom Correlation Generators: Silent {OT} Extension
                  and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGIKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovIS19,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  title        = {Unconditionally Secure Computation Against Low-Complexity Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovIS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKOS19,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  title        = {Cryptographic Sensing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/637},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGIMMO19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Yuval Ishai and
                  Giulio Malavolta and
                  Tamer Mour and
                  Rafail Ostrovsky},
  title        = {Trapdoor Hash Functions and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {639},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/639},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGIMMO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaDIR19,
  author       = {Fabrice Benhamouda and
                  Akshay Degwekar and
                  Yuval Ishai and
                  Tal Rabin},
  title        = {On the Local Leakage Resilience of Linear Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {653},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/653},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaDIR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviIKMR19,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Nikolaos Makriyannis and
                  Tal Rabin},
  title        = {On Fully Secure {MPC} with Solitary Output},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1032},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviIKMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGI19,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Secure Computation with Preprocessing via Function Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1095},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIKRS19,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Rindal and
                  Peter Scholl},
  title        = {Efficient Two-Round {OT} Extension and Silent Non-Interactive Secure
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1159},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGIKRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGIN19,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Ariel Nof},
  title        = {Practical Fully Secure Three-Party Computation via Sublinear Distributed
                  Zero-Knowledge Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1390},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGIN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ApplebaumIK18,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Minimizing Locality of One-Way Functions via Semi-private Randomized
                  Encodings},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {1},
  pages        = {1--22},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-016-9244-6},
  doi          = {10.1007/S00145-016-9244-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ApplebaumIK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGI18,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Compressing Vector {OLE}},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {896--912},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243868},
  doi          = {10.1145/3243734.3243868},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyleCGI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleIP18,
  author       = {Elette Boyle and
                  Yuval Ishai and
                  Antigoni Polychroniadou},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Limits of Practical Sublinear Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {302--332},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_11},
  doi          = {10.1007/978-3-319-96878-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleIP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthIS18,
  author       = {Prabhanjan Ananth and
                  Yuval Ishai and
                  Amit Sahai},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Private Circuits: {A} Modular Approach},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {427--455},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_15},
  doi          = {10.1007/978-3-319-96878-0\_15},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaDIR18,
  author       = {Fabrice Benhamouda and
                  Akshay Degwekar and
                  Yuval Ishai and
                  Tal Rabin},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {On the Local Leakage Resilience of Linear Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {531--561},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_18},
  doi          = {10.1007/978-3-319-96884-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BenhamoudaDIR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehISW18,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Amit Sahai and
                  David J. Wu},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {222--255},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_8},
  doi          = {10.1007/978-3-319-78372-7\_8},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehISW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BoyleGILT18,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Huijia Lin and
                  Stefano Tessaro},
  editor       = {Anna R. Karlin},
  title        = {Foundations of Homomorphic Secret Sharing},
  booktitle    = {9th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2018, January 11-14, 2018, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {94},
  pages        = {21:1--21:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2018},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2018.21},
  doi          = {10.4230/LIPICS.ITCS.2018.21},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BoyleGILT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IshaiMO18,
  author       = {Yuval Ishai and
                  Manika Mittal and
                  Rafail Ostrovsky},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {On the Message Complexity of Secure Multiparty Computation},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {698--711},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_24},
  doi          = {10.1007/978-3-319-76578-5\_24},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IshaiMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargIS18,
  author       = {Sanjam Garg and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Two-Round {MPC:} Information-Theoretic and Black-Box},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {123--151},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_5},
  doi          = {10.1007/978-3-030-03807-6\_5},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GargIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaleviIKR18,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Best Possible Information-Theoretic {MPC}},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {255--281},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_10},
  doi          = {10.1007/978-3-030-03810-6\_10},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaleviIKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BonehIPSW18,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Alain Passel{\`{e}}gue and
                  Amit Sahai and
                  David J. Wu},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Exploring Crypto Dark Matter: - New Simple {PRF} Candidates and Their
                  Applications},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {699--729},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_25},
  doi          = {10.1007/978-3-030-03810-6\_25},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BonehIPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-01372,
  author       = {Siddharth Garg and
                  Zahra Ghodsi and
                  Carmit Hazay and
                  Yuval Ishai and
                  Antonio Marcedone and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Outsourcing Private Machine Learning via Lightweight Secure Arithmetic
                  Computation},
  journal      = {CoRR},
  volume       = {abs/1812.01372},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.01372},
  eprinttype    = {arXiv},
  eprint       = {1812.01372},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-01372.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiMO18,
  author       = {Yuval Ishai and
                  Manika Mittal and
                  Rafail Ostrovsky},
  title        = {On the Message Complexity of Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehISW18,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Amit Sahai and
                  David J. Wu},
  title        = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/133},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehISW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIO18,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Michele Orr{\`{u}}},
  title        = {Homomorphic Secret Sharing: Optimizations and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGIO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthIS18,
  author       = {Prabhanjan Ananth and
                  Yuval Ishai and
                  Amit Sahai},
  title        = {Private Circuits: {A} Modular Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/566},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleIP18,
  author       = {Elette Boyle and
                  Yuval Ishai and
                  Antigoni Polychroniadou},
  title        = {Limits of Practical Sublinear Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/571},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleIP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGI18,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Function Secret Sharing: Improvements and Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargIS18,
  author       = {Sanjam Garg and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  title        = {Two-Round {MPC:} Information-Theoretic and Black-Box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {909},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/909},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviIKR18,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  title        = {Best Possible Information-Theoretic {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {913},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/913},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviIKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseDIKLOV18,
  author       = {Melissa Chase and
                  Yevgeniy Dodis and
                  Yuval Ishai and
                  Daniel Kraschewski and
                  Tianren Liu and
                  Rafail Ostrovsky and
                  Vinod Vaikuntanathan},
  title        = {Reusable Non-Interactive Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {940},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/940},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseDIKLOV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehIPSW18,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Alain Passel{\`{e}}gue and
                  Amit Sahai and
                  David J. Wu},
  title        = {Exploring Crypto Dark Matter: New Simple {PRF} Candidates and Their
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1218},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1218},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehIPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HaleviI0KSY17,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Abhishek Jain and
                  Ilan Komargodski and
                  Amit Sahai and
                  Eylon Yogev},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Non-Interactive Multiparty Computation Without Correlated Randomness},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10626},
  pages        = {181--211},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70700-6\_7},
  doi          = {10.1007/978-3-319-70700-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HaleviI0KSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BadrinarayananG17,
  author       = {Saikrishna Badrinarayanan and
                  Sanjam Garg and
                  Yuval Ishai and
                  Amit Sahai and
                  Akshay Wadia},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Two-Message Witness Indistinguishability and Secure Computation in
                  the Plain Model from New Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10626},
  pages        = {275--303},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70700-6\_10},
  doi          = {10.1007/978-3-319-70700-6\_10},
  timestamp    = {Wed, 22 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BadrinarayananG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AmesHIV17,
  author       = {Scott Ames and
                  Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Ligero: Lightweight Sublinear Arguments Without a Trusted Setup},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2087--2104},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134104},
  doi          = {10.1145/3133956.3134104},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AmesHIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGIO17,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Michele Orr{\`{u}}},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Homomorphic Secret Sharing: Optimizations and Applications},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2105--2122},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134107},
  doi          = {10.1145/3133956.3134107},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyleCGIO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumDI0Z17,
  author       = {Benny Applebaum and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Michael Nielsen and
                  Lior Zichron},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Secure Arithmetic Computation with Constant Computational Overhead},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {223--254},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_8},
  doi          = {10.1007/978-3-319-63688-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumDI0Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarayIOZ17,
  author       = {Juan A. Garay and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {The Price of Low Communication in Secure Multi-party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {420--446},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_14},
  doi          = {10.1007/978-3-319-63688-7\_14},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarayIOZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyleGI17,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Group-Based Secure Computation: Optimizing Rounds, Communication,
                  and Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10211},
  pages        = {163--193},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56614-6\_6},
  doi          = {10.1007/978-3-319-56614-6\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyleGI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehISW17,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Amit Sahai and
                  David J. Wu},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10212},
  pages        = {247--277},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56617-7\_9},
  doi          = {10.1007/978-3-319-56617-7\_9},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehISW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BeimelIK17,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Ad Hoc {PSM} Protocols: Secure Computation Without Coordination},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10212},
  pages        = {580--608},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56617-7\_20},
  doi          = {10.1007/978-3-319-56617-7\_20},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BeimelIK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/ApplebaumHIKV17,
  author       = {Benny Applebaum and
                  Naama Haramaty and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Vinod Vaikuntanathan},
  editor       = {Christos H. Papadimitriou},
  title        = {Low-Complexity Cryptographic Hash Functions},
  booktitle    = {8th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2017, January 9-11, 2017, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {67},
  pages        = {7:1--7:31},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2017.7},
  doi          = {10.4230/LIPICS.ITCS.2017.7},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/ApplebaumHIKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayIV17,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Actively Secure Garbled Circuits with Constant Communication Overhead
                  in the Plain Model},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {3--39},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_1},
  doi          = {10.1007/978-3-319-70503-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GenkinIW17,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {How to Construct a Leakage-Resilient (Stateless) Trusted Party},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {209--244},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_7},
  doi          = {10.1007/978-3-319-70503-3\_7},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GenkinIW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChengI017,
  author       = {Kuan Cheng and
                  Yuval Ishai and
                  Xin Li},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Near-Optimal Secret Sharing and Error Correcting Codes in {\textbackslash}mathsf
                  AC{\^{}}0 {AC} 0},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {424--458},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_14},
  doi          = {10.1007/978-3-319-70503-3\_14},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/ChengI017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BoyleIPW17,
  author       = {Elette Boyle and
                  Yuval Ishai and
                  Rafael Pass and
                  Mary Wootters},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Can We Access a Database Both Locally and Privately?},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {662--693},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_22},
  doi          = {10.1007/978-3-319-70503-3\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BoyleIPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ApplebaumHIKV17,
  author       = {Benny Applebaum and
                  Naama Haramaty and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Vinod Vaikuntanathan},
  title        = {Low-Complexity Cryptographic Hash Functions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR17-008}},
  year         = {2017},
  url          = {https://eccc.weizmann.ac.il/report/2017/008},
  eprinttype    = {ECCC},
  eprint       = {TR17-008},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ApplebaumHIKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumHIKV17,
  author       = {Benny Applebaum and
                  Naama Haramaty and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Vinod Vaikuntanathan},
  title        = {Low-Complexity Cryptographic Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumHIKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelIK17,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Ad Hoc {PSM} Protocols: Secure Computation Without Coordination},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelIK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGI17,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Group-Based Secure Computation: Optimizing Rounds, Communication,
                  and Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiW17,
  author       = {Yuval Ishai and
                  Mor Weiss},
  title        = {Probabilistically Checkable Proofs of Proximity with Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehISW17,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Amit Sahai and
                  David J. Wu},
  title        = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/240},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehISW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananG17a,
  author       = {Saikrishna Badrinarayanan and
                  Sanjam Garg and
                  Yuval Ishai and
                  Amit Sahai and
                  Akshay Wadia},
  title        = {Two-Message Witness Indistinguishability and Secure Computation in
                  the Plain Model from New Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/433},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayIOZ17,
  author       = {Juan A. Garay and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {The Price of Low Communication in Secure Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayIOZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleIPW17,
  author       = {Elette Boyle and
                  Yuval Ishai and
                  Rafael Pass and
                  Mary Wootters},
  title        = {Can We Access a Database Both Locally and Privately?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleIPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumDINZ17,
  author       = {Benny Applebaum and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Michael Nielsen and
                  Lior Zichron},
  title        = {Secure Arithmetic Computation with Constant Computational Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/617},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumDINZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviI0KSY17,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Abhishek Jain and
                  Ilan Komargodski and
                  Amit Sahai and
                  Eylon Yogev},
  title        = {Non-Interactive Multiparty Computation without Correlated Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {871},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/871},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviI0KSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIW17,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  title        = {How to Construct a Leakage-Resilient (Stateless) Trusted Party},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {926},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/926},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinIW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengI017,
  author       = {Kuan Cheng and
                  Yuval Ishai and
                  Xin Li},
  title        = {Near-Optimal Secret Sharing and Error Correcting Codes in {AC0}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {927},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/927},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengI017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayIV17,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Actively Secure Garbled Circuits with Constant Communication Overhead
                  in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {947},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/947},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGILT17,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Huijia Lin and
                  Stefano Tessaro},
  title        = {Foundations of Homomorphic Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1248},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGILT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/AspnesIM16,
  author       = {James Aspnes and
                  Yuval Ishai and
                  Peter Bro Miltersen},
  title        = {Special Section on the Forty-Fifth Annual {ACM} Symposium on the Theory
                  of Computing {(STOC} 2013)},
  journal      = {{SIAM} J. Comput.},
  volume       = {45},
  number       = {2},
  pages        = {459--460},
  year         = {2016},
  url          = {https://doi.org/10.1137/16N97405X},
  doi          = {10.1137/16N97405X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/AspnesIM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/HardtIMW16,
  author       = {Moritz Hardt and
                  Yuval Ishai and
                  Raghu Meka and
                  Virginia Vassilevska Williams},
  title        = {Special Section on the Fifty-Fourth Annual {IEEE} Symposium on Foundations
                  of Computer Science {(FOCS} 2013)},
  journal      = {{SIAM} J. Comput.},
  volume       = {45},
  number       = {3},
  pages        = {881},
  year         = {2016},
  url          = {https://doi.org/10.1137/16N974115},
  doi          = {10.1137/16N974115},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/HardtIMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleGI16,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Function Secret Sharing: Improvements and Extensions},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1292--1303},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978429},
  doi          = {10.1145/2976749.2978429},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyleGI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKPSY16,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  Ching{-}Hua Yu},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Secure Protocol Transformations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {430--458},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_15},
  doi          = {10.1007/978-3-662-53008-5\_15},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleGI16,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Breaking the Circuit Size Barrier for Secure Computation Under {DDH}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {509--539},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_19},
  doi          = {10.1007/978-3-662-53018-4\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleGI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BogdanovIVW16,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Emanuele Viola and
                  Christopher Williamson},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Bounded Indistinguishability and the Complexity of Recovering Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {593--618},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_21},
  doi          = {10.1007/978-3-662-53015-3\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BogdanovIVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/IshaiKLO16,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Steve Lu and
                  Rafail Ostrovsky},
  editor       = {Kazue Sako},
  title        = {Private Large-Scale Databases with Distributed Searchable Symmetric
                  Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {90--107},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_6},
  doi          = {10.1007/978-3-319-29485-8\_6},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/IshaiKLO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoyalIMSS16,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Hemanta K. Maji and
                  Amit Sahai and
                  Alexander A. Sherstov},
  editor       = {Irit Dinur},
  title        = {Bounded-Communication Leakage Resilience via Parity-Resilient Circuits},
  booktitle    = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS}
                  2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FOCS.2016.10},
  doi          = {10.1109/FOCS.2016.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoyalIMSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BeimelGIK16,
  author       = {Amos Beimel and
                  Ariel Gabizon and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Madhu Sudan},
  title        = {Distribution Design},
  booktitle    = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical
                  Computer Science, Cambridge, MA, USA, January 14-16, 2016},
  pages        = {81--92},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2840728.2840759},
  doi          = {10.1145/2840728.2840759},
  timestamp    = {Tue, 14 Jun 2022 13:12:41 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/BeimelGIK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/HaleviIJKR16,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Abhishek Jain and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Madhu Sudan},
  title        = {Secure Multiparty Computation with General Interaction Patterns},
  booktitle    = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical
                  Computer Science, Cambridge, MA, USA, January 14-16, 2016},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2840728.2840760},
  doi          = {10.1145/2840728.2840760},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/HaleviIJKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Ben-SassonBDIR16,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Noga Ron{-}Zewi},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {On Public Key Encryption from Noisy Codewords},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {417--446},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_16},
  doi          = {10.1007/978-3-662-49387-8\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Ben-SassonBDIR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiWY16,
  author       = {Yuval Ishai and
                  Mor Weiss and
                  Guang Yang},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient
                  Circuits},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0\_1},
  doi          = {10.1007/978-3-662-49099-0\_1},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GenkinIW16,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Binary {AMD} Circuits from Secure Multiparty Computation},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {336--366},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_14},
  doi          = {10.1007/978-3-662-53641-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GenkinIW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKPSY16,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  Ching{-}Hua Yu},
  title        = {Secure Protocol Transformations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/456},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovIVW16,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Emanuele Viola and
                  Christopher Williamson},
  title        = {Bounded Indistinguishability and the Complexity of Recovering Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {565},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/565},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovIVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGI16,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Breaking the Circuit Size Barrier for Secure Computation Under {DDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIW16,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  title        = {Binary {AMD} Circuits from Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {809},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/809},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinIW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GentryGIPSS15,
  author       = {Craig Gentry and
                  Jens Groth and
                  Yuval Ishai and
                  Chris Peikert and
                  Amit Sahai and
                  Adam D. Smith},
  title        = {Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative
                  Zero-Knowledge Proofs},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {4},
  pages        = {820--843},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-014-9184-y},
  doi          = {10.1007/S00145-014-9184-Y},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GentryGIPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/ApplebaumIKW15,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Brent Waters},
  title        = {Encoding Functions with Constant Online Rate, or How to Compress Garbled
                  Circuit Keys},
  journal      = {{SIAM} J. Comput.},
  volume       = {44},
  number       = {2},
  pages        = {433--466},
  year         = {2015},
  url          = {https://doi.org/10.1137/130929643},
  doi          = {10.1137/130929643},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/ApplebaumIKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaitnerIOS15,
  author       = {Iftach Haitner and
                  Yuval Ishai and
                  Eran Omri and
                  Ronen Shaltiel},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Parallel Hashing via List Recoverability},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {173--190},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_9},
  doi          = {10.1007/978-3-662-48000-7\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaitnerIOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargIKOS15,
  author       = {Sanjam Garg and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Cryptography with One-Way Communication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {191--208},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_10},
  doi          = {10.1007/978-3-662-48000-7\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargIKOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKKP15,
  author       = {Yuval Ishai and
                  Ranjit Kumaresan and
                  Eyal Kushilevitz and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Secure Computation with Minimal Interaction, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {359--378},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_18},
  doi          = {10.1007/978-3-662-48000-7\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001IMS15,
  author       = {Divya Gupta and
                  Yuval Ishai and
                  Hemanta K. Maji and
                  Amit Sahai},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Secure Computation from Leaky Correlated Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {701--720},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_34},
  doi          = {10.1007/978-3-662-48000-7\_34},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0001IMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GenkinIP15,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Antigoni Polychroniadou},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Efficient Multi-party Computation: From Passive to Active Security
                  via Secure {SIMD} Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {721--741},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_35},
  doi          = {10.1007/978-3-662-48000-7\_35},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GenkinIP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyleGI15,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Function Secret Sharing},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {337--367},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_12},
  doi          = {10.1007/978-3-662-46803-6\_12},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyleGI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AgrawalIKP15,
  author       = {Shweta Agrawal and
                  Yuval Ishai and
                  Dakshita Khurana and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Kazuo Iwama and
                  Naoki Kobayashi and
                  Bettina Speckmann},
  title        = {Statistical Randomized Encodings: {A} Complexity Theoretic View},
  booktitle    = {Automata, Languages, and Programming - 42nd International Colloquium,
                  {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9134},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47672-7\_1},
  doi          = {10.1007/978-3-662-47672-7\_1},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/AgrawalIKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiPS15,
  author       = {Yuval Ishai and
                  Omkant Pandey and
                  Amit Sahai},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Public-Coin Differing-Inputs Obfuscation and Its Applications},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {668--697},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_26},
  doi          = {10.1007/978-3-662-46497-7\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ApplebaumIK15,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Minimizing Locality of One-Way Functions via Semi-Private Randomized
                  Encodings},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR15-045}},
  year         = {2015},
  url          = {https://eccc.weizmann.ac.il/report/2015/045},
  eprinttype    = {ECCC},
  eprint       = {TR15-045},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ApplebaumIK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/Ben-SassonBDIR15,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Ivan Bjerre Damg{\aa}rd and
                  Yuval Ishai and
                  Noga Ron{-}Zewi},
  title        = {On Public Key Encryption from Noisy Codewords},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR15-094}},
  year         = {2015},
  url          = {https://eccc.weizmann.ac.il/report/2015/094},
  eprinttype    = {ECCC},
  eprint       = {TR15-094},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/Ben-SassonBDIR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BogdanovIVW15,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Emanuele Viola and
                  Christopher Williamson},
  title        = {Bounded Indistinguishability and the Complexity of Recovering Secrets},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR15-182}},
  year         = {2015},
  url          = {https://eccc.weizmann.ac.il/report/2015/182},
  eprinttype    = {ECCC},
  eprint       = {TR15-182},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BogdanovIVW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIPST15,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  Eran Tromer},
  title        = {Circuits Resilient to Additive Attacks with Applications to Secure
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/154},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinIPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiOZ15,
  author       = {Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {Secure Multi-Party Computation with Identifiable Abort},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonBDIR15,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Noga Ron{-}Zewi},
  title        = {On Public Key Encryption from Noisy Codewords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonBDIR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiWY15,
  author       = {Yuval Ishai and
                  Mor Weiss and
                  Guang Yang},
  title        = {Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient
                  Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1055},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1055},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviIJKR15,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Abhishek Jain and
                  Eyal Kushilevitz and
                  Tal Rabin},
  title        = {Secure Multiparty Computation with General Interaction Patterns},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1173},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1173},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviIJKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshalKLO15,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Steve Lu and
                  Rafail Ostrovsky},
  title        = {Private Large-Scale Databases with Distributed Searchable Symmetric
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1190},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1190},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/IshalKLO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/ApplebaumIK14,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {How to Garble Arithmetic Circuits},
  journal      = {{SIAM} J. Comput.},
  volume       = {43},
  number       = {2},
  pages        = {905--929},
  year         = {2014},
  url          = {https://doi.org/10.1137/120875193},
  doi          = {10.1137/120875193},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/ApplebaumIK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BaronIO14,
  author       = {Joshua Baron and
                  Yuval Ishai and
                  Rafail Ostrovsky},
  title        = {On linear-size pseudorandom generators and hardcore functions},
  journal      = {Theor. Comput. Sci.},
  volume       = {554},
  pages        = {50--63},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.06.013},
  doi          = {10.1016/J.TCS.2014.06.013},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BaronIO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AnanthGIS14,
  author       = {Prabhanjan Vijendra Ananth and
                  Divya Gupta and
                  Yuval Ishai and
                  Amit Sahai},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Optimizing Obfuscation: Avoiding Barrington's Theorem},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {646--658},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660342},
  doi          = {10.1145/2660267.2660342},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AnanthGIS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiOZ14,
  author       = {Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Secure Multi-Party Computation with Identifiable Abort},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {369--386},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_21},
  doi          = {10.1007/978-3-662-44381-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiOZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeimelGIKMP14,
  author       = {Amos Beimel and
                  Ariel Gabizon and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Sigurd Meldgaard and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Non-Interactive Secure Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {387--404},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_22},
  doi          = {10.1007/978-3-662-44381-1\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BeimelGIKMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GilboaI14,
  author       = {Niv Gilboa and
                  Yuval Ishai},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Distributed Point Functions and Their Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {640--658},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_35},
  doi          = {10.1007/978-3-642-55220-5\_35},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GilboaI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GarayIKW14,
  author       = {Juan A. Garay and
                  Yuval Ishai and
                  Ranjit Kumaresan and
                  Hoeteck Wee},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {On the Complexity of {UC} Commitments},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {677--694},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_37},
  doi          = {10.1007/978-3-642-55220-5\_37},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GarayIKW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/IshaiW14,
  author       = {Yuval Ishai and
                  Hoeteck Wee},
  editor       = {Javier Esparza and
                  Pierre Fraigniaud and
                  Thore Husfeldt and
                  Elias Koutsoupias},
  title        = {Partial Garbling Schemes and Their Applications},
  booktitle    = {Automata, Languages, and Programming - 41st International Colloquium,
                  {ICALP} 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8572},
  pages        = {650--662},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43948-7\_54},
  doi          = {10.1007/978-3-662-43948-7\_54},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/IshaiW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DrukI14,
  author       = {Erez Druk and
                  Yuval Ishai},
  editor       = {Moni Naor},
  title        = {Linear-time encodable codes meeting the gilbert-varshamov bound and
                  their cryptographic applications},
  booktitle    = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ,
                  USA, January 12-14, 2014},
  pages        = {169--182},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554797.2554815},
  doi          = {10.1145/2554797.2554815},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/DrukI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/IshaiMSW14,
  author       = {Yuval Ishai and
                  Hemanta K. Maji and
                  Amit Sahai and
                  J{\"{u}}rg Wullschleger},
  title        = {Single-use ot combiners with near-optimal resilience},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {1544--1548},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6875092},
  doi          = {10.1109/ISIT.2014.6875092},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/IshaiMSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GenkinIPST14,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  Eran Tromer},
  editor       = {David B. Shmoys},
  title        = {Circuits resilient to additive attacks with applications to secure
                  computation},
  booktitle    = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
                  May 31 - June 03, 2014},
  pages        = {495--504},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2591796.2591861},
  doi          = {10.1145/2591796.2591861},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/GenkinIPST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiW14,
  author       = {Yuval Ishai and
                  Mor Weiss},
  editor       = {Yehuda Lindell},
  title        = {Probabilistically Checkable Proofs of Proximity with Zero-Knowledge},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {121--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_6},
  doi          = {10.1007/978-3-642-54242-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BeimelIKK14,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Ranjit Kumaresan and
                  Eyal Kushilevitz},
  editor       = {Yehuda Lindell},
  title        = {On the Cryptographic Complexity of the Worst Functions},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {317--342},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_14},
  doi          = {10.1007/978-3-642-54242-8\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BeimelIKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthGIS14,
  author       = {Prabhanjan Ananth and
                  Divya Gupta and
                  Yuval Ishai and
                  Amit Sahai},
  title        = {Optimizing Obfuscation: Avoiding Barrington's Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthGIS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargIKOS14,
  author       = {Sanjam Garg and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  title        = {Cryptography with One-Way Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {914},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/914},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargIKOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiPS14,
  author       = {Yuval Ishai and
                  Omkant Pandey and
                  Amit Sahai},
  title        = {Public-Coin Differing-Inputs Obfuscation and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {942},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/942},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelGIKMP14,
  author       = {Amos Beimel and
                  Ariel Gabizon and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Sigurd Meldgaard and
                  Anat Paskin{-}Cherniavsky},
  title        = {Non-Interactive Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {960},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/960},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelGIKMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiW14,
  author       = {Yuval Ishai and
                  Hoeteck Wee},
  title        = {Partial Garbling Schemes and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {995},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/995},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/IshaiSVW13,
  author       = {Yuval Ishai and
                  Amit Sahai and
                  Michael Viderman and
                  Mor Weiss},
  editor       = {Prasad Raghavendra and
                  Sofya Raskhodnikova and
                  Klaus Jansen and
                  Jos{\'{e}} D. P. Rolim},
  title        = {Zero Knowledge LTCs and Their Applications},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
                  and Techniques - 16th International Workshop, {APPROX} 2013, and 17th
                  International Workshop, {RANDOM} 2013, Berkeley, CA, USA, August 21-23,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8096},
  pages        = {607--622},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40328-6\_42},
  doi          = {10.1007/978-3-642-40328-6\_42},
  timestamp    = {Tue, 21 Sep 2021 09:36:24 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/IshaiSVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/BaronIO13,
  author       = {Joshua Baron and
                  Yuval Ishai and
                  Rafail Ostrovsky},
  editor       = {Ding{-}Zhu Du and
                  Guochuan Zhang},
  title        = {On Linear-Size Pseudorandom Generators and Hardcore Functions},
  booktitle    = {Computing and Combinatorics, 19th International Conference, {COCOON}
                  2013, Hangzhou, China, June 21-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7936},
  pages        = {169--181},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38768-5\_17},
  doi          = {10.1007/978-3-642-38768-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/BaronIO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumIKW13,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Encoding Functions with Constant Online Rate or How to Compress Garbled
                  Circuits Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {166--184},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_10},
  doi          = {10.1007/978-3-642-40084-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumIKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenDIKMRR13,
  author       = {Gil Cohen and
                  Ivan Bjerre Damg{\aa}rd and
                  Yuval Ishai and
                  Jonas K{\"{o}}lker and
                  Peter Bro Miltersen and
                  Ran Raz and
                  Ron D. Rothblum},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae -
                  (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {185--202},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_11},
  doi          = {10.1007/978-3-642-40084-1\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenDIKMRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/IshaiKLOPSZ13,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Xin Li and
                  Rafail Ostrovsky and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  David Zuckerman},
  editor       = {Fedor V. Fomin and
                  Rusins Freivalds and
                  Marta Z. Kwiatkowska and
                  David Peleg},
  title        = {Robust Pseudorandom Generators},
  booktitle    = {Automata, Languages, and Programming - 40th International Colloquium,
                  {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7965},
  pages        = {576--588},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39206-1\_49},
  doi          = {10.1007/978-3-642-39206-1\_49},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/IshaiKLOPSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/IshaiKS13,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Omer Strulovich},
  editor       = {Natacha Portier and
                  Thomas Wilke},
  title        = {Lossy Chains and Fractional Secret Sharing},
  booktitle    = {30th International Symposium on Theoretical Aspects of Computer Science,
                  {STACS} 2013, February 27 - March 2, 2013, Kiel, Germany},
  series       = {LIPIcs},
  volume       = {20},
  pages        = {160--171},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2013},
  url          = {https://doi.org/10.4230/LIPIcs.STACS.2013.160},
  doi          = {10.4230/LIPICS.STACS.2013.160},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/stacs/IshaiKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyCIPO13,
  author       = {Nir Bitansky and
                  Alessandro Chiesa and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Omer Paneth},
  editor       = {Amit Sahai},
  title        = {Succinct Non-interactive Arguments via Linear Interactive Proofs},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {315--333},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_18},
  doi          = {10.1007/978-3-642-36594-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BitanskyCIPO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyCIPO13a,
  author       = {Nir Bitansky and
                  Alessandro Chiesa and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Omer Paneth},
  editor       = {Amit Sahai},
  title        = {Erratum: Succinct Non-interactive Arguments via Linear Interactive
                  Proofs},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_41},
  doi          = {10.1007/978-3-642-36594-2\_41},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BitanskyCIPO13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiKMOP13,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Sigurd Meldgaard and
                  Claudio Orlandi and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Amit Sahai},
  title        = {On the Power of Correlated Randomness in Secure Computation},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {600--620},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_34},
  doi          = {10.1007/978-3-642-36594-2\_34},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiKMOP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ciss/Ishai13,
  author       = {Yuval Ishai},
  editor       = {Manoj Prabhakaran and
                  Amit Sahai},
  title        = {Randomization Techniques for Secure Computation},
  booktitle    = {Secure Multi-Party Computation},
  series       = {Cryptology and Information Security Series},
  volume       = {10},
  pages        = {222--248},
  publisher    = {{IOS} Press},
  year         = {2013},
  url          = {https://doi.org/10.3233/978-1-61499-169-4-222},
  doi          = {10.3233/978-1-61499-169-4-222},
  timestamp    = {Wed, 17 Apr 2024 21:39:22 +0200},
  biburl       = {https://dblp.org/rec/series/ciss/Ishai13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/CohenDIKMRR13,
  author       = {Gil Cohen and
                  Ivan Bjerre Damg{\aa}rd and
                  Yuval Ishai and
                  Jonas K{\"{o}}lker and
                  Peter Bro Miltersen and
                  Ran Raz and
                  Ron Rothblum},
  title        = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR13-107}},
  year         = {2013},
  url          = {https://eccc.weizmann.ac.il/report/2013/107},
  eprinttype    = {ECCC},
  eprint       = {TR13-107},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/CohenDIKMRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/IshaiKLOPSZ13,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Xin Li and
                  Rafail Ostrovsky and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  David Zuckerman},
  title        = {Robust Pseudorandom Generators},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR13-143}},
  year         = {2013},
  url          = {https://eccc.weizmann.ac.il/report/2013/143},
  eprinttype    = {ECCC},
  eprint       = {TR13-143},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/IshaiKLOPSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKS13,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Omer Strulovich},
  title        = {Lossy Chains and Fractional Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenDIKMRR13,
  author       = {Gil Cohen and
                  Ivan Bjerre Damg{\aa}rd and
                  Yuval Ishai and
                  Jonas K{\"{o}}lker and
                  Peter Bro Miltersen and
                  Ran Raz and
                  Ron D. Rothblum},
  title        = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenDIKMRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKLOPSZ13,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Xin Li and
                  Rafail Ostrovsky and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  David Zuckerman},
  title        = {Robust Pseudorandom Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/671},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKLOPSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/BeimelIKO12,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Ilan Orlov},
  title        = {Share Conversion and Private Information Retrieval},
  booktitle    = {Proceedings of the 27th Conference on Computational Complexity, {CCC}
                  2012, Porto, Portugal, June 26-29, 2012},
  pages        = {258--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCC.2012.23},
  doi          = {10.1109/CCC.2012.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/BeimelIKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/IshaiKP12,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Shafi Goldwasser},
  title        = {From randomizing polynomials to parallel algorithms},
  booktitle    = {Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA,
                  January 8-10, 2012},
  pages        = {76--89},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2090236.2090244},
  doi          = {10.1145/2090236.2090244},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/IshaiKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/Ishai12,
  author       = {Yuval Ishai},
  title        = {The complexity of information theoretic secure computation},
  booktitle    = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September
                  3-7, 2012},
  pages        = {80},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ITW.2012.6404768},
  doi          = {10.1109/ITW.2012.6404768},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/Ishai12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiOS12,
  author       = {Yuval Ishai and
                  Rafail Ostrovsky and
                  Hakan Seyalioglu},
  editor       = {Ronald Cramer},
  title        = {Identifying Cheaters without an Honest Majority},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_2},
  doi          = {10.1007/978-3-642-28914-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiMS12,
  author       = {Yuval Ishai and
                  Mohammad Mahmoody and
                  Amit Sahai},
  editor       = {Ronald Cramer},
  title        = {On Efficient Zero-Knowledge PCPs},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_9},
  doi          = {10.1007/978-3-642-28914-9\_9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ApplebaumIK12,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {How to Garble Arithmetic Circuits},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-058}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/058},
  eprinttype    = {ECCC},
  eprint       = {TR12-058},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ApplebaumIK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumIK12,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {How to Garble Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumIK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumIKW12,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Brent Waters},
  title        = {Encoding Functions with Constant Online Rate or How to Compress Keys
                  in Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {693},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/693},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumIKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCIOP12,
  author       = {Nir Bitansky and
                  Alessandro Chiesa and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Omer Paneth},
  title        = {Succinct Non-Interactive Arguments via Linear Interactive Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/718},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCIOP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/IshaiKKLP11,
  author       = {Yuval Ishai and
                  Jonathan Katz and
                  Eyal Kushilevitz and
                  Yehuda Lindell and
                  Erez Petrank},
  title        = {On Achieving the "Best of Both Worlds" in Secure Multiparty
                  Computation},
  journal      = {{SIAM} J. Comput.},
  volume       = {40},
  number       = {1},
  pages        = {122--141},
  year         = {2011},
  url          = {https://doi.org/10.1137/100783224},
  doi          = {10.1137/100783224},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/IshaiKKLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/HaitnerIKLP11,
  author       = {Iftach Haitner and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Yehuda Lindell and
                  Erez Petrank},
  title        = {Black-Box Constructions of Protocols for Secure Computation},
  journal      = {{SIAM} J. Comput.},
  volume       = {40},
  number       = {2},
  pages        = {225--266},
  year         = {2011},
  url          = {https://doi.org/10.1137/100790537},
  doi          = {10.1137/100790537},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/HaitnerIKLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKOPSW11,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  J{\"{u}}rg Wullschleger},
  editor       = {Phillip Rogaway},
  title        = {Constant-Rate Oblivious Transfer from Noisy Channels},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {667--684},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_38},
  doi          = {10.1007/978-3-642-22792-9\_38},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKOPSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IshaiKOPS11,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Non-interactive Secure Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {406--425},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_23},
  doi          = {10.1007/978-3-642-20465-4\_23},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IshaiKOPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/ApplebaumIK11,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Rafail Ostrovsky},
  title        = {How to Garble Arithmetic Circuits},
  booktitle    = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS}
                  2011, Palm Springs, CA, USA, October 22-25, 2011},
  pages        = {120--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FOCS.2011.40},
  doi          = {10.1109/FOCS.2011.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/ApplebaumIK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Ishai11,
  author       = {Yuval Ishai},
  editor       = {Serge Fehr},
  title        = {Correlation Extractors and Their Applications - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_1},
  doi          = {10.1007/978-3-642-20728-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Ishai11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/ApplebaumHI11,
  author       = {Benny Applebaum and
                  Danny Harnik and
                  Yuval Ishai},
  editor       = {Bernard Chazelle},
  title        = {Semantic Security under Related-Key Attacks and Applications},
  booktitle    = {Innovations in Computer Science - {ICS} 2011, Tsinghua University,
                  Beijing, China, January 7-9, 2011. Proceedings},
  pages        = {45--60},
  publisher    = {Tsinghua University Press},
  year         = {2011},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/30.html},
  timestamp    = {Mon, 23 Mar 2020 08:26:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/ApplebaumHI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2011,
  editor       = {Yuval Ishai},
  title        = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6},
  doi          = {10.1007/978-3-642-19571-6},
  isbn         = {978-3-642-19570-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/BarkolIW10,
  author       = {Omer Barkol and
                  Yuval Ishai and
                  Enav Weinreb},
  title        = {On Locally Decodable Codes, Self-Correctable Codes, and \emph{t}-Private
                  {PIR}},
  journal      = {Algorithmica},
  volume       = {58},
  number       = {4},
  pages        = {831--859},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00453-008-9272-1},
  doi          = {10.1007/S00453-008-9272-1},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/BarkolIW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BarkolIW10,
  author       = {Omer Barkol and
                  Yuval Ishai and
                  Enav Weinreb},
  title        = {On \emph{d}-Multiplicative Secret Sharing},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {4},
  pages        = {580--593},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-010-9056-z},
  doi          = {10.1007/S00145-010-9056-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BarkolIW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/IshaiKOS10,
  author       = {Yuval Ishai and
                  Abishek Kumarasubramanian and
                  Claudio Orlandi and
                  Amit Sahai},
  editor       = {Masayuki Abe},
  title        = {On Invertible Sampling and Adaptive Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {466--482},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_27},
  doi          = {10.1007/978-3-642-17373-8\_27},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/IshaiKOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalIMS10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Mohammad Mahmoody and
                  Amit Sahai},
  editor       = {Tal Rabin},
  title        = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {173--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_10},
  doi          = {10.1007/978-3-642-14623-7\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalIMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKP10,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Anat Paskin},
  editor       = {Tal Rabin},
  title        = {Secure Multiparty Computation with Minimal Interaction},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {577--594},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_31},
  doi          = {10.1007/978-3-642-14623-7\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BarakHHI10,
  author       = {Boaz Barak and
                  Iftach Haitner and
                  Dennis Hofheinz and
                  Yuval Ishai},
  editor       = {Henri Gilbert},
  title        = {Bounded Key-Dependent Message Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {423--444},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_22},
  doi          = {10.1007/978-3-642-13190-5\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BarakHHI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardIK10,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Mikkel Kr{\o}igaard},
  editor       = {Henri Gilbert},
  title        = {Perfectly Secure Multiparty Computation and the Computational Overhead
                  of Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {445--465},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_23},
  doi          = {10.1007/978-3-642-13190-5\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardIK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ApplebaumIK10,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Samson Abramsky and
                  Cyril Gavoille and
                  Claude Kirchner and
                  Friedhelm Meyer auf der Heide and
                  Paul G. Spirakis},
  title        = {From Secrecy to Soundness: Efficient Verification via Secure Computation},
  booktitle    = {Automata, Languages and Programming, 37th International Colloquium,
                  {ICALP} 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6198},
  pages        = {152--163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14165-2\_14},
  doi          = {10.1007/978-3-642-14165-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/ApplebaumIK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/ApplebaumIK10,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Andrew Chi{-}Chih Yao},
  title        = {Cryptography by Cellular Automata or How Fast Can Complexity Emerge
                  in Nature?},
  booktitle    = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
                  Beijing, China, January 5-7, 2010. Proceedings},
  pages        = {1--19},
  publisher    = {Tsinghua University Press},
  year         = {2010},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/1.html},
  timestamp    = {Wed, 04 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/ApplebaumIK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Ishai10,
  author       = {Yuval Ishai},
  editor       = {Daniele Micciancio},
  title        = {Secure Computation and Its Diverse Applications},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {90},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_6},
  doi          = {10.1007/978-3-642-11799-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Ishai10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GordonIMOS10,
  author       = {S. Dov Gordon and
                  Yuval Ishai and
                  Tal Moran and
                  Rafail Ostrovsky and
                  Amit Sahai},
  editor       = {Daniele Micciancio},
  title        = {On Complete Primitives for Fairness},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_7},
  doi          = {10.1007/978-3-642-11799-2\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GordonIMOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalISVW10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Amit Sahai and
                  Ramarathnam Venkatesan and
                  Akshay Wadia},
  editor       = {Daniele Micciancio},
  title        = {Founding Cryptography on Tamper-Proof Hardware Tokens},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {308--326},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_19},
  doi          = {10.1007/978-3-642-11799-2\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalISVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoyalIMS10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Mohammad Mahmoody and
                  Amit Sahai},
  title        = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR10-020}},
  year         = {2010},
  url          = {https://eccc.weizmann.ac.il/report/2010/020},
  eprinttype    = {ECCC},
  eprint       = {TR10-020},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoyalIMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKKLP10,
  author       = {Yuval Ishai and
                  Jonathan Katz and
                  Eyal Kushilevitz and
                  Yehuda Lindell and
                  Erez Petrank},
  title        = {On Achieving the "Best of Both Worlds" in Secure Multiparty
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKKLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalIMS10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Mohammad Mahmoody and
                  Amit Sahai},
  title        = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalIMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardIK10,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Mikkel Kr{\o}igaard},
  title        = {Perfectly Secure Multiparty Computation and the Computational Overhead
                  of Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardIK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalISVW10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Amit Sahai and
                  Ramarathnam Venkatesan and
                  Akshay Wadia},
  title        = {Founding Cryptography on Tamper-Proof Hardware Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalISVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerIKLP10,
  author       = {Iftach Haitner and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Yehuda Lindell and
                  Erez Petrank},
  title        = {Black-Box Constructions of Protocols for Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaitnerIKLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumHI10,
  author       = {Benny Applebaum and
                  Danny Harnik and
                  Yuval Ishai},
  title        = {Semantic Security Under Related-Key Attacks and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumHI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ApplebaumIK09,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Cryptography with Constant Input Locality},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {4},
  pages        = {429--469},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-009-9039-0},
  doi          = {10.1007/S00145-009-9039-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ApplebaumIK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/IshaiKOS09,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  title        = {Zero-Knowledge Proofs from Secure Multiparty Computation},
  journal      = {{SIAM} J. Comput.},
  volume       = {39},
  number       = {3},
  pages        = {1121--1152},
  year         = {2009},
  url          = {https://doi.org/10.1137/080725398},
  doi          = {10.1137/080725398},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/IshaiKOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/IshaiMSW09,
  author       = {Yuval Ishai and
                  Tal Malkin and
                  Martin J. Strauss and
                  Rebecca N. Wright},
  title        = {Private multiparty sampling and approximation of vector combinations},
  journal      = {Theor. Comput. Sci.},
  volume       = {410},
  number       = {18},
  pages        = {1730--1745},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.tcs.2008.12.062},
  doi          = {10.1016/J.TCS.2008.12.062},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/IshaiMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/IshaiKOS09,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  title        = {Extracting Correlations},
  booktitle    = {50th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2009, October 25-27, 2009, Atlanta, Georgia, {USA}},
  pages        = {261--270},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FOCS.2009.56},
  doi          = {10.1109/FOCS.2009.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/IshaiKOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiPS09,
  author       = {Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {Omer Reingold},
  title        = {Secure Arithmetic Computation with No Honest Majority},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {294--314},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_18},
  doi          = {10.1007/978-3-642-00457-5\_18},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakHHI09,
  author       = {Boaz Barak and
                  Iftach Haitner and
                  Dennis Hofheinz and
                  Yuval Ishai},
  title        = {Bounded Key-Dependent Message Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakHHI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/ApplebaumIK08,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {On Pseudorandom Generators with Linear Stretch in NC\({}^{\mbox{0}}\)},
  journal      = {Comput. Complex.},
  volume       = {17},
  number       = {1},
  pages        = {38--69},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00037-007-0237-6},
  doi          = {10.1007/S00037-007-0237-6},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/ApplebaumIK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardIKNS08,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Mikkel Kr{\o}igaard and
                  Jesper Buus Nielsen and
                  Adam D. Smith},
  editor       = {David A. Wagner},
  title        = {Scalable Multiparty Computation with Nearly Optimal Work and Resilience},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {241--261},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_14},
  doi          = {10.1007/978-3-540-85174-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardIKNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiPS08,
  author       = {Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {David A. Wagner},
  title        = {Founding Cryptography on Oblivious Transfer - Efficiently},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {572--591},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_32},
  doi          = {10.1007/978-3-540-85174-5\_32},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GrothI08,
  author       = {Jens Groth and
                  Yuval Ishai},
  editor       = {Nigel P. Smart},
  title        = {Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {379--396},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_22},
  doi          = {10.1007/978-3-540-78967-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GrothI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/IshaiKOS08,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  editor       = {Cynthia Dwork},
  title        = {Cryptography with constant computational overhead},
  booktitle    = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
                  Victoria, British Columbia, Canada, May 17-20, 2008},
  pages        = {433--442},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374376.1374438},
  doi          = {10.1145/1374376.1374438},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/IshaiKOS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BarkolIW08,
  author       = {Omer Barkol and
                  Yuval Ishai and
                  Enav Weinreb},
  editor       = {Cynthia Dwork},
  title        = {Communication in the presence of replication},
  booktitle    = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
                  Victoria, British Columbia, Canada, May 17-20, 2008},
  pages        = {661--670},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374376.1374472},
  doi          = {10.1145/1374376.1374472},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BarkolIW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BihamGI08,
  author       = {Eli Biham and
                  Yaron J. Goren and
                  Yuval Ishai},
  editor       = {Ran Canetti},
  title        = {Basing Weak Public-Key Cryptography on Strong One-Way Functions},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_4},
  doi          = {10.1007/978-3-540-78524-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BihamGI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HarnikIKN08,
  author       = {Danny Harnik and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Jesper Buus Nielsen},
  editor       = {Ran Canetti},
  title        = {OT-Combiners via Secure Computation},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {393--411},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_22},
  doi          = {10.1007/978-3-540-78524-8\_22},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HarnikIKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0811-0475,
  author       = {Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {Secure Arithmetic Computation with No Honest Majority},
  journal      = {CoRR},
  volume       = {abs/0811.0475},
  year         = {2008},
  url          = {http://arxiv.org/abs/0811.0475},
  eprinttype    = {arXiv},
  eprint       = {0811.0475},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0811-0475.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiPS08,
  author       = {Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {Secure Arithmetic Computation with No Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/465},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/HarshaIKNV07,
  author       = {Prahladh Harsha and
                  Yuval Ishai and
                  Joe Kilian and
                  Kobbi Nissim and
                  Srinivasan Venkatesh},
  title        = {Communication vs. Computation},
  journal      = {Comput. Complex.},
  volume       = {16},
  number       = {1},
  pages        = {1--33},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00037-007-0224-y},
  doi          = {10.1007/S00037-007-0224-Y},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/HarshaIKNV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/BarkolIW07,
  author       = {Omer Barkol and
                  Yuval Ishai and
                  Enav Weinreb},
  editor       = {Moses Charikar and
                  Klaus Jansen and
                  Omer Reingold and
                  Jos{\'{e}} D. P. Rolim},
  title        = {On Locally Decodable Codes, Self-correctable Codes, and \emph{t} -Private
                  {PIR}},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
                  and Techniques, 10th International Workshop, {APPROX} 2007, and 11th
                  International Workshop, {RANDOM} 2007, Princeton, NJ, USA, August
                  20-22, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4627},
  pages        = {311--325},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74208-1\_23},
  doi          = {10.1007/978-3-540-74208-1\_23},
  timestamp    = {Sat, 30 Sep 2023 09:34:32 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/BarkolIW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/IshaiKO07,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky},
  title        = {Efficient Arguments without Short PCPs},
  booktitle    = {22nd Annual {IEEE} Conference on Computational Complexity {(CCC} 2007),
                  13-16 June 2007, San Diego, California, {USA}},
  pages        = {278--291},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CCC.2007.10},
  doi          = {10.1109/CCC.2007.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/IshaiKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumIK07,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Alfred Menezes},
  title        = {Cryptography with Constant Input Locality},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {92--110},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_6},
  doi          = {10.1007/978-3-540-74143-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumIK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HarnikIK07,
  author       = {Danny Harnik and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Alfred Menezes},
  title        = {How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {284--302},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_16},
  doi          = {10.1007/978-3-540-74143-5\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HarnikIK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/IshaiMSW07,
  author       = {Yuval Ishai and
                  Tal Malkin and
                  Martin J. Strauss and
                  Rebecca N. Wright},
  editor       = {Lars Arge and
                  Christian Cachin and
                  Tomasz Jurdzinski and
                  Andrzej Tarlecki},
  title        = {Private Multiparty Sampling and Approximation of Vector Combinations},
  booktitle    = {Automata, Languages and Programming, 34th International Colloquium,
                  {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4596},
  pages        = {243--254},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73420-8\_23},
  doi          = {10.1007/978-3-540-73420-8\_23},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/IshaiMSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/IshaiKOS07,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  editor       = {David S. Johnson and
                  Uriel Feige},
  title        = {Zero-knowledge from secure multiparty computation},
  booktitle    = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing,
                  San Diego, California, USA, June 11-13, 2007},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1250790.1250794},
  doi          = {10.1145/1250790.1250794},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/IshaiKOS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiP07,
  author       = {Yuval Ishai and
                  Anat Paskin},
  editor       = {Salil P. Vadhan},
  title        = {Evaluating Branching Programs on Encrypted Data},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {575--594},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_31},
  doi          = {10.1007/978-3-540-70936-7\_31},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/ApplebaumIK06,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Computationally Private Randomizing Polynomials and Their Applications},
  journal      = {Comput. Complex.},
  volume       = {15},
  number       = {2},
  pages        = {115--162},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00037-006-0211-8},
  doi          = {10.1007/S00037-006-0211-8},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/ApplebaumIK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/ApplebaumIK06,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Cryptography in NC\({}^{\mbox{0}}\)},
  journal      = {{SIAM} J. Comput.},
  volume       = {36},
  number       = {4},
  pages        = {845--888},
  year         = {2006},
  url          = {https://doi.org/10.1137/S0097539705446950},
  doi          = {10.1137/S0097539705446950},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/ApplebaumIK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talg/FeigenbaumIMNSW06,
  author       = {Joan Feigenbaum and
                  Yuval Ishai and
                  Tal Malkin and
                  Kobbi Nissim and
                  Martin J. Strauss and
                  Rebecca N. Wright},
  title        = {Secure multiparty computation of approximations},
  journal      = {{ACM} Trans. Algorithms},
  volume       = {2},
  number       = {3},
  pages        = {435--472},
  year         = {2006},
  url          = {https://doi.org/10.1145/1159892.1159900},
  doi          = {10.1145/1159892.1159900},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/talg/FeigenbaumIMNSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/ApplebaumIK06,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Josep D{\'{\i}}az and
                  Klaus Jansen and
                  Jos{\'{e}} D. P. Rolim and
                  Uri Zwick},
  title        = {On Pseudorandom Generators with Linear Stretch in NC\({}^{\mbox{0}}\)},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
                  and Techniques, 9th International Workshop on Approximation Algorithms
                  for Combinatorial Optimization Problems, {APPROX} 2006 and 10th International
                  Workshop on Randomization and Computation, {RANDOM} 2006, Barcelona,
                  Spain, August 28-30 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4110},
  pages        = {260--271},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11830924\_25},
  doi          = {10.1007/11830924\_25},
  timestamp    = {Tue, 21 Sep 2021 09:36:24 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/ApplebaumIK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKLP06,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Yehuda Lindell and
                  Erez Petrank},
  editor       = {Cynthia Dwork},
  title        = {On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty
                  Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {483--500},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_29},
  doi          = {10.1007/11818175\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardI06,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai},
  editor       = {Cynthia Dwork},
  title        = {Scalable Secure Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {501--520},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_30},
  doi          = {10.1007/11818175\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IshaiPSW06,
  author       = {Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  David A. Wagner},
  editor       = {Serge Vaudenay},
  title        = {Private Circuits {II:} Keeping Secrets in Tamperable Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {308--327},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_19},
  doi          = {10.1007/11761679\_19},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IshaiPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/IshaiKOS06,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  title        = {Cryptography from Anonymity},
  booktitle    = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2006), 21-24 October 2006, Berkeley, California, USA, Proceedings},
  pages        = {239--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/FOCS.2006.25},
  doi          = {10.1109/FOCS.2006.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/IshaiKOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/IshaiKLP06,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Yehuda Lindell and
                  Erez Petrank},
  editor       = {Jon M. Kleinberg},
  title        = {Black-box constructions for secure computation},
  booktitle    = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing,
                  Seattle, WA, USA, May 21-23, 2006},
  pages        = {99--108},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1132516.1132531},
  doi          = {10.1145/1132516.1132531},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/IshaiKLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DubrovI06,
  author       = {Bella Dubrov and
                  Yuval Ishai},
  editor       = {Jon M. Kleinberg},
  title        = {On the randomness complexity of efficient sampling},
  booktitle    = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing,
                  Seattle, WA, USA, May 21-23, 2006},
  pages        = {711--720},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1132516.1132615},
  doi          = {10.1145/1132516.1132615},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DubrovI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKOS06,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  title        = {Cryptography from Anonymity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/BeimelIK05,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {General constructions for information-theoretic private information
                  retrieval},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {71},
  number       = {2},
  pages        = {213--247},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jcss.2005.03.002},
  doi          = {10.1016/J.JCSS.2005.03.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/BeimelIK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/ApplebaumIK05,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Computationally Private Randomizing Polynomials and Their Applications},
  booktitle    = {20th Annual {IEEE} Conference on Computational Complexity {(CCC} 2005),
                  11-15 June 2005, San Jose, CA, {USA}},
  pages        = {260--274},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CCC.2005.9},
  doi          = {10.1109/CCC.2005.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/ApplebaumIK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardI05,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai},
  editor       = {Victor Shoup},
  title        = {Constant-Round Multiparty Computation Using a Black-Box Pseudorandom
                  Generator},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {378--394},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_23},
  doi          = {10.1007/11535218\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarkolI05,
  author       = {Omer Barkol and
                  Yuval Ishai},
  editor       = {Victor Shoup},
  title        = {Secure Computation of Constant-Depth Circuits with Applications to
                  Database Search Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {395--411},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_24},
  doi          = {10.1007/11535218\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarkolI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FreedmanIPR05,
  author       = {Michael J. Freedman and
                  Yuval Ishai and
                  Benny Pinkas and
                  Omer Reingold},
  editor       = {Joe Kilian},
  title        = {Keyword Search and Oblivious Pseudorandom Functions},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {303--324},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_17},
  doi          = {10.1007/978-3-540-30576-7\_17},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FreedmanIPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CramerDI05,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai},
  editor       = {Joe Kilian},
  title        = {Share Conversion, Pseudorandom Secret-Sharing and Applications to
                  Secure Computation},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {342--362},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_19},
  doi          = {10.1007/978-3-540-30576-7\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CramerDI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiKO05,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky},
  editor       = {Joe Kilian},
  title        = {Sufficient Conditions for Collision-Resistant Hashing},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {445--456},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_24},
  doi          = {10.1007/978-3-540-30576-7\_24},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiKO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardI05,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai},
  title        = {Constant-Round Multiparty Computation Using a Black-Box Pseudorandom
                  Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BeimelIM04,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Tal Malkin},
  title        = {Reducing the Servers' Computation in Private Information Retrieval:
                  {PIR} with Preprocessing},
  journal      = {J. Cryptol.},
  volume       = {17},
  number       = {2},
  pages        = {125--151},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00145-004-0134-y},
  doi          = {10.1007/S00145-004-0134-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BeimelIM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CanettiDDIM04,
  author       = {Ran Canetti and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Yuval Ishai and
                  Tal Malkin},
  title        = {Adaptive versus Non-Adaptive Security of Multi-Party Protocols},
  journal      = {J. Cryptol.},
  volume       = {17},
  number       = {3},
  pages        = {153--207},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00145-004-0135-x},
  doi          = {10.1007/S00145-004-0135-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CanettiDDIM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IshaiK04,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {On the Hardness of Information-Theoretic Multiparty Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {439--455},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_26},
  doi          = {10.1007/978-3-540-24676-3\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IshaiK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/ApplebaumIK04,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Cryptography in NC\({}^{\mbox{0}}\)},
  booktitle    = {45th Symposium on Foundations of Computer Science {(FOCS} 2004), 17-19
                  October 2004, Rome, Italy, Proceedings},
  pages        = {166--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/FOCS.2004.20},
  doi          = {10.1109/FOCS.2004.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/ApplebaumIK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HarshaIKNV04,
  author       = {Prahladh Harsha and
                  Yuval Ishai and
                  Joe Kilian and
                  Kobbi Nissim and
                  Srinivasan Venkatesh},
  editor       = {Josep D{\'{\i}}az and
                  Juhani Karhum{\"{a}}ki and
                  Arto Lepist{\"{o}} and
                  Donald Sannella},
  title        = {Communication Versus Computation},
  booktitle    = {Automata, Languages and Programming: 31st International Colloquium,
                  {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3142},
  pages        = {745--756},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27836-8\_63},
  doi          = {10.1007/978-3-540-27836-8\_63},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/HarshaIKNV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/IshaiKOS04,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  editor       = {L{\'{a}}szl{\'{o}} Babai},
  title        = {Batch codes and their applications},
  booktitle    = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing,
                  Chicago, IL, USA, June 13-16, 2004},
  pages        = {262--271},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1007352.1007396},
  doi          = {10.1145/1007352.1007396},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/IshaiKOS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BaloghCIK03,
  author       = {J{\'{o}}zsef Balogh and
                  J{\'{a}}nos A. Csirik and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Private computation using a {PEZ} dispenser},
  journal      = {Theor. Comput. Sci.},
  volume       = {306},
  number       = {1-3},
  pages        = {69--84},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0304-3975(03)00210-X},
  doi          = {10.1016/S0304-3975(03)00210-X},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BaloghCIK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKNP03,
  author       = {Yuval Ishai and
                  Joe Kilian and
                  Kobbi Nissim and
                  Erez Petrank},
  editor       = {Dan Boneh},
  title        = {Extending Oblivious Transfers Efficiently},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {145--161},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_9},
  doi          = {10.1007/978-3-540-45146-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiSW03,
  author       = {Yuval Ishai and
                  Amit Sahai and
                  David A. Wagner},
  editor       = {Dan Boneh},
  title        = {Private Circuits: Securing Hardware against Probing Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {463--481},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_27},
  doi          = {10.1007/978-3-540-45146-4\_27},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerFIK03,
  author       = {Ronald Cramer and
                  Serge Fehr and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Eli Biham},
  title        = {Efficient Multi-party Computation over Rings},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {596--613},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_37},
  doi          = {10.1007/3-540-39200-9\_37},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerFIK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerFIK03,
  author       = {Ronald Cramer and
                  Serge Fehr and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Efficient Multi-Party Computation over Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerFIK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GennaroIKR02,
  author       = {Rosario Gennaro and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Moti Yung},
  title        = {On 2-Round Secure Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {178--193},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_12},
  doi          = {10.1007/3-540-45708-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GennaroIKR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BeimelIKR02,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Jean{-}Fran{\c{c}}ois Raymond},
  title        = {Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private
                  Information Retrieval},
  booktitle    = {43rd Symposium on Foundations of Computer Science {(FOCS} 2002), 16-19
                  November 2002, Vancouver, BC, Canada, Proceedings},
  pages        = {261--270},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SFCS.2002.1181949},
  doi          = {10.1109/SFCS.2002.1181949},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BeimelIKR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/IshaiK02,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Peter Widmayer and
                  Francisco Triguero Ruiz and
                  Rafael Morales Bueno and
                  Matthew Hennessy and
                  Stephan J. Eidenbenz and
                  Ricardo Conejo},
  title        = {Perfect Constant-Round Secure Computation via Perfect Randomizing
                  Polynomials},
  booktitle    = {Automata, Languages and Programming, 29th International Colloquium,
                  {ICALP} 2002, Malaga, Spain, July 8-13, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2380},
  pages        = {244--256},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45465-9\_22},
  doi          = {10.1007/3-540-45465-9\_22},
  timestamp    = {Wed, 11 Sep 2019 13:15:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/IshaiK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ChorI01,
  author       = {Benny Chor and
                  Yuval Ishai},
  title        = {On Privacy and Partition Arguments},
  journal      = {Inf. Comput.},
  volume       = {167},
  number       = {1},
  pages        = {2--9},
  year         = {2001},
  url          = {https://doi.org/10.1006/inco.2000.3013},
  doi          = {10.1006/INCO.2000.3013},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ChorI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CrescenzoIO01,
  author       = {Giovanni Di Crescenzo and
                  Yuval Ishai and
                  Rafail Ostrovsky},
  title        = {Universal Service-Providers for Private Information Retrieval},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {37--74},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010008},
  doi          = {10.1007/S001450010008},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CrescenzoIO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/BeimelI01,
  author       = {Amos Beimel and
                  Yuval Ishai},
  title        = {On the Power of Nonlinear Secrect-Sharing},
  booktitle    = {Proceedings of the 16th Annual {IEEE} Conference on Computational
                  Complexity, Chicago, Illinois, USA, June 18-21, 2001},
  pages        = {188--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CCC.2001.933886},
  doi          = {10.1109/CCC.2001.933886},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/BeimelI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AielloIR01,
  author       = {William Aiello and
                  Yuval Ishai and
                  Omer Reingold},
  editor       = {Birgit Pfitzmann},
  title        = {Priced Oblivious Transfer: How to Sell Digital Goods},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {119--135},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_8},
  doi          = {10.1007/3-540-44987-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AielloIR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiDDIM01,
  author       = {Ran Canetti and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Yuval Ishai and
                  Tal Malkin},
  editor       = {Birgit Pfitzmann},
  title        = {On Adaptive vs. Non-adaptive Security of Multiparty Protocols},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {262--279},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_17},
  doi          = {10.1007/3-540-44987-6\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiDDIM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BeimelI01,
  author       = {Amos Beimel and
                  Yuval Ishai},
  editor       = {Fernando Orejas and
                  Paul G. Spirakis and
                  Jan van Leeuwen},
  title        = {Information-Theoretic Private Information Retrieval: {A} Unified Construction},
  booktitle    = {Automata, Languages and Programming, 28th International Colloquium,
                  {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2076},
  pages        = {912--926},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-48224-5\_74},
  doi          = {10.1007/3-540-48224-5\_74},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BeimelI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FeigenbaumIMNSW01,
  author       = {Joan Feigenbaum and
                  Yuval Ishai and
                  Tal Malkin and
                  Kobbi Nissim and
                  Martin Strauss and
                  Rebecca N. Wright},
  editor       = {Fernando Orejas and
                  Paul G. Spirakis and
                  Jan van Leeuwen},
  title        = {Secure Multiparty Computation of Approximations},
  booktitle    = {Automata, Languages and Programming, 28th International Colloquium,
                  {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2076},
  pages        = {927--938},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-48224-5\_75},
  doi          = {10.1007/3-540-48224-5\_75},
  timestamp    = {Tue, 19 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/FeigenbaumIMNSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/CanettiIKRRW01,
  author       = {Ran Canetti and
                  Yuval Ishai and
                  Ravi Kumar and
                  Michael K. Reiter and
                  Ronitt Rubinfeld and
                  Rebecca N. Wright},
  editor       = {Ajay D. Kshemkalyani and
                  Nir Shavit},
  title        = {Selective private function evaluation with applications to private
                  statistics},
  booktitle    = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA,
                  August 26-29, 2001},
  pages        = {293--304},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/383962.384047},
  doi          = {10.1145/383962.384047},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/CanettiIKRRW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GennaroIKR01,
  author       = {Rosario Gennaro and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Jeffrey Scott Vitter and
                  Paul G. Spirakis and
                  Mihalis Yannakakis},
  title        = {The round complexity of verifiable secret sharing and secure multicast},
  booktitle    = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing,
                  July 6-8, 2001, Heraklion, Crete, Greece},
  pages        = {580--589},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/380752.380853},
  doi          = {10.1145/380752.380853},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GennaroIKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR01-015,
  author       = {Amos Beimel and
                  Yuval Ishai},
  title        = {Information-Theoretic Private Information Retrieval: {A} Unified Construction},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR01-015}},
  year         = {2001},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-015/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR01-015},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR01-015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiDDIM01,
  author       = {Ran Canetti and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Yuval Ishai and
                  Tal Malkin},
  title        = {On adaptive vs. non-adaptive security of multiparty protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/017},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiDDIM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeigenbaumIMNSW01,
  author       = {Joan Feigenbaum and
                  Yuval Ishai and
                  Tal Malkin and
                  Kobbi Nissim and
                  Martin Strauss and
                  Rebecca N. Wright},
  title        = {Secure Multiparty Computation of Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeigenbaumIMNSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelI01,
  author       = {Amos Beimel and
                  Yuval Ishai},
  title        = {On the Power of Nonlinear Secret-Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/GertnerIKM00,
  author       = {Yael Gertner and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Protecting Data Privacy in Private Information Retrieval Schemes},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {60},
  number       = {3},
  pages        = {592--629},
  year         = {2000},
  url          = {https://doi.org/10.1006/jcss.1999.1689},
  doi          = {10.1006/JCSS.1999.1689},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/GertnerIKM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeimelIM00,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Tal Malkin},
  editor       = {Mihir Bellare},
  title        = {Reducing the Servers Computation in Private Information Retrieval:
                  {PIR} with Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_4},
  doi          = {10.1007/3-540-44598-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeimelIM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/IshaiK00,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Randomizing Polynomials: {A} New Representation with Applications
                  to Round-Efficient Secure Computation},
  booktitle    = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000,
                  12-14 November 2000, Redondo Beach, California, {USA}},
  pages        = {294--304},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SFCS.2000.892118},
  doi          = {10.1109/SFCS.2000.892118},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/IshaiK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/il/Ishai99,
  author       = {Yuval Ishai},
  title        = {Private computation and correlated randomness},
  school       = {Technion - Israel Institute of Technology, Israel},
  year         = {1999},
  url          = {https://technion.primo.exlibrisgroup.com/permalink/972TEC\_INST/q1jq5o/alma990022104850203971},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/il/Ishai99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GilboaI99,
  author       = {Niv Gilboa and
                  Yuval Ishai},
  editor       = {Michael J. Wiener},
  title        = {Compressing Cryptographic Resources},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {591--608},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_37},
  doi          = {10.1007/3-540-48405-1\_37},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GilboaI99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/IshaiK99,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Jeffrey Scott Vitter and
                  Lawrence L. Larmore and
                  Frank Thomson Leighton},
  title        = {Improved Upper Bounds on Information-Theoretic Private Information
                  Retrieval (Extended Abstract)},
  booktitle    = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of
                  Computing, May 1-4, 1999, Atlanta, Georgia, {USA}},
  pages        = {79--88},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/301250.301275},
  doi          = {10.1145/301250.301275},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/IshaiK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BeimelIKM99,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Malkin},
  editor       = {Jeffrey Scott Vitter and
                  Lawrence L. Larmore and
                  Frank Thomson Leighton},
  title        = {One-Way Functions Are Essential for Single-Server Private Information
                  Retrieval},
  booktitle    = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of
                  Computing, May 1-4, 1999, Atlanta, Georgia, {USA}},
  pages        = {89--98},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/301250.301277},
  doi          = {10.1145/301250.301277},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BeimelIKM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/CrescenzoIO98,
  author       = {Giovanni Di Crescenzo and
                  Yuval Ishai and
                  Rafail Ostrovsky},
  editor       = {Brian A. Coan and
                  Yehuda Afek},
  title        = {Universal Service-Providers for Database Private Information Retrieval
                  (Extended Abstract)},
  booktitle    = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June
                  28 - July 2, 1998},
  pages        = {91--100},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/277697.277713},
  doi          = {10.1145/277697.277713},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/CrescenzoIO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CrescenzoIO98,
  author       = {Giovanni Di Crescenzo and
                  Yuval Ishai and
                  Rafail Ostrovsky},
  editor       = {Jeffrey Scott Vitter},
  title        = {Non-Interactive and Non-Malleable Commitment},
  booktitle    = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
                  of Computing, Dallas, Texas, USA, May 23-26, 1998},
  pages        = {141--150},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/276698.276722},
  doi          = {10.1145/276698.276722},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CrescenzoIO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GertnerIKM98,
  author       = {Yael Gertner and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Malkin},
  editor       = {Jeffrey Scott Vitter},
  title        = {Protecting Data Privacy in Private Information Retrieval Schemes},
  booktitle    = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
                  of Computing, Dallas, Texas, USA, May 23-26, 1998},
  pages        = {151--160},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/276698.276723},
  doi          = {10.1145/276698.276723},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GertnerIKM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrescenzoIO98,
  author       = {Giovanni Di Crescenzo and
                  Yuval Ishai and
                  Rafail Ostrovsky},
  title        = {Universal Service Providers for Database Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrescenzoIO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/IshaiK97,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Private Simultaneous Messages Protocols with Applications},
  booktitle    = {Fifth Israel Symposium on Theory of Computing and Systems, {ISTCS}
                  1997, Ramat-Gan, Israel, June 17-19, 1997, Proceedings},
  pages        = {174--184},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ISTCS.1997.595170},
  doi          = {10.1109/ISTCS.1997.595170},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/istcs/IshaiK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiK97,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Protecting Data Privacy in Private Information Retrieval Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {1997},
  url          = {http://eprint.iacr.org/1997/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cpc/AnthonyBIS96,
  author       = {Martin Anthony and
                  Peter L. Bartlett and
                  Yuval Ishai and
                  John Shawe{-}Taylor},
  title        = {Valid Generalisation from Approximate Interpolation},
  journal      = {Comb. Probab. Comput.},
  volume       = {5},
  pages        = {191--214},
  year         = {1996},
  url          = {https://doi.org/10.1017/S096354830000198X},
  doi          = {10.1017/S096354830000198X},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cpc/AnthonyBIS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/ChorI96,
  author       = {Benny Chor and
                  Yuval Ishai},
  title        = {On Privacy and Partition Arguments},
  booktitle    = {Fourth Israel Symposium on Theory of Computing and Systems, {ISTCS}
                  1996, Jerusalem, Israel, June 10-12, 1996, Proceedings},
  pages        = {191--194},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  timestamp    = {Tue, 31 May 2016 15:27:26 +0200},
  biburl       = {https://dblp.org/rec/conf/istcs/ChorI96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics