|
Search the dblp DataBase
Yuval Ishai:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
On Pseudorandom Generators with Linear Stretch in NC0. [Citation Graph (0, 0)][DBLP] APPROX-RANDOM, 2006, pp:260-271 [Conf]
- Amos Beimel, Yuval Ishai
On the Power of Nonlinear Secrect-Sharing. [Citation Graph (0, 0)][DBLP] IEEE Conference on Computational Complexity, 2001, pp:188-202 [Conf]
- Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
Computationally Private Randomizing Polynomials and Their Applications. [Citation Graph (0, 0)][DBLP] IEEE Conference on Computational Complexity, 2005, pp:260-274 [Conf]
- Omer Barkol, Yuval Ishai
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:395-411 [Conf]
- Amos Beimel, Yuval Ishai, Tal Malkin
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:55-73 [Conf]
- Ivan Damgård, Yuval Ishai
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:378-394 [Conf]
- Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
On 2-Round Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP] CRYPTO, 2002, pp:178-193 [Conf]
- Niv Gilboa, Yuval Ishai
Compressing Cryptographic Resources. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:591-608 [Conf]
- Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank
Extending Oblivious Transfers Efficiently. [Citation Graph (0, 0)][DBLP] CRYPTO, 2003, pp:145-161 [Conf]
- Yuval Ishai, Amit Sahai, David Wagner
Private Circuits: Securing Hardware against Probing Attacks. [Citation Graph (0, 0)][DBLP] CRYPTO, 2003, pp:463-481 [Conf]
- Ivan Damgård, Yuval Ishai
Scalable Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:501-520 [Conf]
- Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:483-500 [Conf]
- William Aiello, Yuval Ishai, Omer Reingold
Priced Oblivious Transfer: How to Sell Digital Goods. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:119-135 [Conf]
- Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
On Adaptive vs. Non-adaptive Security of Multiparty Protocols. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:262-279 [Conf]
- Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz
Efficient Multi-party Computation over Rings. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:596-613 [Conf]
- Yuval Ishai, Eyal Kushilevitz
On the Hardness of Information-Theoretic Multiparty Computation. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:439-455 [Conf]
- Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David Wagner
Private Circuits II: Keeping Secrets in Tamperable Circuits. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:308-327 [Conf]
- Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
Cryptography in NC0. [Citation Graph (0, 0)][DBLP] FOCS, 2004, pp:166-175 [Conf]
- Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Jean-François Raymond
Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval. [Citation Graph (0, 0)][DBLP] FOCS, 2002, pp:261-270 [Conf]
- Yuval Ishai, Eyal Kushilevitz
Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP] FOCS, 2000, pp:294-304 [Conf]
- Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Cryptography from Anonymity. [Citation Graph (0, 0)][DBLP] FOCS, 2006, pp:239-248 [Conf]
- Amos Beimel, Yuval Ishai
Information-Theoretic Private Information Retrieval: A Unified Construction. [Citation Graph (0, 0)][DBLP] ICALP, 2001, pp:912-926 [Conf]
- Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright
Secure Multiparty Computation of Approximations. [Citation Graph (0, 0)][DBLP] ICALP, 2001, pp:927-938 [Conf]
- Prahladh Harsha, Yuval Ishai, Joe Kilian, Kobbi Nissim, Srinivasan Venkatesh
Communication Versus Computation. [Citation Graph (0, 0)][DBLP] ICALP, 2004, pp:745-756 [Conf]
- Yuval Ishai, Eyal Kushilevitz
Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials. [Citation Graph (0, 0)][DBLP] ICALP, 2002, pp:244-256 [Conf]
- Benny Chor, Yuval Ishai
On Privacy and Partition Arguments. [Citation Graph (0, 0)][DBLP] ISTCS, 1996, pp:191-194 [Conf]
- Yuval Ishai, Eyal Kushilevitz
Private Simultaneous Messages Protocols with Applications. [Citation Graph (0, 0)][DBLP] ISTCS, 1997, pp:174-184 [Conf]
- Ran Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright
Selective private function evaluation with applications to private statistics. [Citation Graph (0, 0)][DBLP] PODC, 2001, pp:293-304 [Conf]
- Giovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovsky
Universal Service-Providers for Database Private Information Retrieval (Extended Abstract). [Citation Graph (0, 0)][DBLP] PODC, 1998, pp:91-100 [Conf]
- Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
One-Way Functions Are Essential for Single-Server Private Information Retrieval. [Citation Graph (0, 0)][DBLP] STOC, 1999, pp:89-98 [Conf]
- Giovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovsky
Non-Interactive and Non-Malleable Commitment. [Citation Graph (0, 0)][DBLP] STOC, 1998, pp:141-150 [Conf]
- Bella Dubrov, Yuval Ishai
On the randomness complexity of efficient sampling. [Citation Graph (0, 0)][DBLP] STOC, 2006, pp:711-720 [Conf]
- Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
The round complexity of verifiable secret sharing and secure multicast. [Citation Graph (0, 0)][DBLP] STOC, 2001, pp:580-589 [Conf]
- Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
Protecting Data Privacy in Private Information Retrieval Schemes. [Citation Graph (0, 0)][DBLP] STOC, 1998, pp:151-160 [Conf]
- Yuval Ishai, Eyal Kushilevitz
Improved Upper Bounds on Information-Theoretic Private Information Retrieval (Extended Abstract). [Citation Graph (0, 0)][DBLP] STOC, 1999, pp:79-88 [Conf]
- Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
Black-box constructions for secure computation. [Citation Graph (0, 0)][DBLP] STOC, 2006, pp:99-108 [Conf]
- Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Batch codes and their applications. [Citation Graph (0, 0)][DBLP] STOC, 2004, pp:262-271 [Conf]
- Ronald Cramer, Ivan Damgård, Yuval Ishai
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. [Citation Graph (0, 0)][DBLP] TCC, 2005, pp:342-362 [Conf]
- Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold
Keyword Search and Oblivious Pseudorandom Functions. [Citation Graph (0, 0)][DBLP] TCC, 2005, pp:303-324 [Conf]
- Yuval Ishai, Anat Paskin
Evaluating Branching Programs on Encrypted Data. [Citation Graph (0, 0)][DBLP] TCC, 2007, pp:575-594 [Conf]
- Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky
Sufficient Conditions for Collision-Resistant Hashing. [Citation Graph (0, 0)][DBLP] TCC, 2005, pp:445-456 [Conf]
- Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
Computationally Private Randomizing Polynomials and Their Applications. [Citation Graph (0, 0)][DBLP] Computational Complexity, 2006, v:15, n:2, pp:115-162 [Journal]
- Martin Anthony, Peter L. Bartlett, Yuval Ishai, John Shawe-Taylor
Valid Generalisation from Approximate Interpolation. [Citation Graph (0, 0)][DBLP] Combinatorics, Probability & Computing, 1996, v:5, n:, pp:191-214 [Journal]
- Amos Beimel, Yuval Ishai
Information-Theoretic Private Information Retrieval: A Unified Construction [Citation Graph (0, 0)][DBLP] Electronic Colloquium on Computational Complexity (ECCC), 2001, v:8, n:15, pp:- [Journal]
- Benny Chor, Yuval Ishai
On Privacy and Partition Arguments. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2001, v:167, n:1, pp:2-9 [Journal]
- Amos Beimel, Yuval Ishai, Eyal Kushilevitz
General constructions for information-theoretic private information retrieval. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2005, v:71, n:2, pp:213-247 [Journal]
- Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
Protecting Data Privacy in Private Information Retrieval Schemes. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2000, v:60, n:3, pp:592-629 [Journal]
- Amos Beimel, Yuval Ishai, Tal Malkin
Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2004, v:17, n:2, pp:125-151 [Journal]
- Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
Adaptive versus Non-Adaptive Security of Multi-Party Protocols. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2004, v:17, n:3, pp:153-207 [Journal]
- Giovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovsky
Universal Service-Providers for Private Information Retrieval. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2001, v:14, n:1, pp:37-74 [Journal]
- Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
Cryptography in NC0. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 2006, v:36, n:4, pp:845-888 [Journal]
- Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright
Secure multiparty computation of approximations. [Citation Graph (0, 0)][DBLP] ACM Transactions on Algorithms, 2006, v:2, n:3, pp:435-472 [Journal]
- József Balogh, János A. Csirik, Yuval Ishai, Eyal Kushilevitz
Private computation using a PEZ dispenser. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:306, n:1-3, pp:69-84 [Journal]
- Omer Barkol, Yuval Ishai, Enav Weinreb
On Locally Decodable Codes, Self-correctable Codes, and t -Private PIR. [Citation Graph (0, 0)][DBLP] APPROX-RANDOM, 2007, pp:311-325 [Conf]
- Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky
Efficient Arguments without Short PCPs. [Citation Graph (0, 0)][DBLP] IEEE Conference on Computational Complexity, 2007, pp:278-291 [Conf]
- Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
Cryptography with Constant Input Locality. [Citation Graph (0, 0)][DBLP] CRYPTO, 2007, pp:92-110 [Conf]
- Danny Harnik, Yuval Ishai, Eyal Kushilevitz
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation? [Citation Graph (0, 0)][DBLP] CRYPTO, 2007, pp:284-302 [Conf]
- Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright
Private Multiparty Sampling and Approximation of Vector Combinations. [Citation Graph (0, 0)][DBLP] ICALP, 2007, pp:243-254 [Conf]
- Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Zero-knowledge from secure multiparty computation. [Citation Graph (0, 0)][DBLP] STOC, 2007, pp:21-30 [Conf]
- Prahladh Harsha, Yuval Ishai, Joe Kilian, Kobbi Nissim, Srinivasan Venkatesh
Communication vs. Computation. [Citation Graph (0, 0)][DBLP] Computational Complexity, 2007, v:16, n:1, pp:1-33 [Journal]
Founding Cryptography on Oblivious Transfer - Efficiently. [Citation Graph (, )][DBLP]
Scalable Multiparty Computation with Nearly Optimal Work and Resilience. [Citation Graph (, )][DBLP]
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. [Citation Graph (, )][DBLP]
Secure Multiparty Computation with Minimal Interaction. [Citation Graph (, )][DBLP]
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle. [Citation Graph (, )][DBLP]
Bounded Key-Dependent Message Security. [Citation Graph (, )][DBLP]
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography. [Citation Graph (, )][DBLP]
Extracting Correlations. [Citation Graph (, )][DBLP]
From Secrecy to Soundness: Efficient Verification via Secure Computation. [Citation Graph (, )][DBLP]
Cryptography with constant computational overhead. [Citation Graph (, )][DBLP]
Communication in the presence of replication. [Citation Graph (, )][DBLP]
OT-Combiners via Secure Computation. [Citation Graph (, )][DBLP]
Basing Weak Public-Key Cryptography on Strong One-Way Functions. [Citation Graph (, )][DBLP]
Secure Arithmetic Computation with No Honest Majority. [Citation Graph (, )][DBLP]
Secure Computation and Its Diverse Applications. [Citation Graph (, )][DBLP]
On Complete Primitives for Fairness. [Citation Graph (, )][DBLP]
Founding Cryptography on Tamper-Proof Hardware Tokens. [Citation Graph (, )][DBLP]
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? [Citation Graph (, )][DBLP]
On Pseudorandom Generators with Linear Stretch in NC0. [Citation Graph (, )][DBLP]
Secure Arithmetic Computation with No Honest Majority [Citation Graph (, )][DBLP]
Search in 0.009secs, Finished in 0.012secs
|