|
Search the dblp DataBase
Benny Pinkas:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Moni Naor, Benny Pinkas
Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:205-219 [Conf]
- Stuart Haber, Benny Pinkas
Securely combining public-key cryptosystems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2001, pp:215-224 [Conf]
- Benny Pinkas
Efficient State Updates for Key Management. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2001, pp:40-56 [Conf]
- Benny Pinkas, Tomas Sander
Securing passwords against dictionary attacks. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:161-170 [Conf]
- Yehuda Lindell, Benny Pinkas
Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:36-54 [Conf]
- Moni Naor, Benny Pinkas
Visual Authentication and Identification. [Citation Graph (0, 0)][DBLP] CRYPTO, 1997, pp:322-336 [Conf]
- Moni Naor, Benny Pinkas
Threshold Traitor Tracing. [Citation Graph (0, 0)][DBLP] CRYPTO, 1998, pp:502-517 [Conf]
- Moni Naor, Benny Pinkas
Oblivious Transfer with Adaptive Queries. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:573-590 [Conf]
- James L. McInnes, Benny Pinkas
On the Impossibility of Private Key Cryptography with Weakly Random Keys. [Citation Graph (0, 0)][DBLP] CRYPTO, 1990, pp:421-435 [Conf]
- Gagan Aggarwal, Nina Mishra, Benny Pinkas
Secure Computation of the k th-Ranked Element. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:40-55 [Conf]
- Michael J. Freedman, Kobbi Nissim, Benny Pinkas
Efficient Private Matching and Set Intersection. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:1-19 [Conf]
- Moni Naor, Benny Pinkas
Secure and Efficient Metering. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:576-590 [Conf]
- Moni Naor, Benny Pinkas, Omer Reingold
Distributed Pseudo-random Functions and KDCs. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:327-346 [Conf]
- Benny Pinkas
Fair Secure Two-Party Computation. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:87-105 [Conf]
- Moni Naor, Benny Pinkas
Efficient Trace and Revoke Schemes. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2000, pp:1-20 [Conf]
- Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Micciancio, Moni Naor, Benny Pinkas
Multicast Security: A Taxonomy and Some Efficient Constructions. [Citation Graph (0, 0)][DBLP] INFOCOM, 1999, pp:708-716 [Conf]
- Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
The Design and Implementation of Protocol-Based Hidden Key Recovery. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:165-179 [Conf]
- Bill G. Horne, Benny Pinkas, Tomas Sander
Escrow services and incentives in peer-to-peer networks. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2001, pp:85-94 [Conf]
- Moni Naor, Benny Pinkas, Reuban Sumner
Privacy preserving auctions and mechanism design. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 1999, pp:129-139 [Conf]
- Moni Naor, Benny Pinkas
Efficient oblivious transfer protocols. [Citation Graph (0, 0)][DBLP] SODA, 2001, pp:448-457 [Conf]
- Zvi Gutterman, Benny Pinkas, Tzachy Reinman
Analysis of the Linux Random Number Generator. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:371-385 [Conf]
- Moni Naor, Benny Pinkas
Oblivious Transfer and Polynomial Evaluation. [Citation Graph (0, 0)][DBLP] STOC, 1999, pp:245-254 [Conf]
- Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold
Keyword Search and Oblivious Pseudorandom Functions. [Citation Graph (0, 0)][DBLP] TCC, 2005, pp:303-324 [Conf]
- Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella
Fairplay - Secure Two-Party Computation System. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:287-302 [Conf]
- Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny Pinkas, Michael K. Reiter
On the Security of Pay-per-Click and Other Web Advertising Schemes. [Citation Graph (0, 0)][DBLP] Computer Networks, 1999, v:31, n:11-16, pp:1091-1100 [Journal]
- Moni Naor, Benny Pinkas
Secure Accounting and Auditing on the Web. [Citation Graph (0, 0)][DBLP] Computer Networks, 1998, v:30, n:1-7, pp:541-550 [Journal]
- Yehuda Lindell, Benny Pinkas
A Proof of Yao's Protocol for Secure Two-Party Computation [Citation Graph (0, 0)][DBLP] Electronic Colloquium on Computational Complexity (ECCC), 2004, v:, n:063, pp:- [Journal]
- Yehuda Lindell, Benny Pinkas
Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2002, v:15, n:3, pp:177-206 [Journal]
- Moni Naor, Benny Pinkas
Computationally Secure Oblivious Transfer. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2005, v:18, n:1, pp:1-35 [Journal]
- Benny Pinkas
Efficient State Updates for Key Management. [Citation Graph (0, 0)][DBLP] Proceedings of the IEEE, 2004, v:92, n:6, pp:910-917 [Journal]
- Moni Naor, Benny Pinkas
Oblivious Polynomial Evaluation. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 2006, v:35, n:5, pp:1254-1281 [Journal]
- Benny Pinkas
Cryptographic Techniques for Privacy-Preserving Data Mining. [Citation Graph (0, 0)][DBLP] SIGKDD Explorations, 2002, v:4, n:2, pp:12-19 [Journal]
- Benny Chor, Amos Fiat, Moni Naor, Benny Pinkas
Tracing traitors. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:893-910 [Journal]
- Yehuda Lindell, Benny Pinkas
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2007, pp:52-78 [Conf]
- Ronen Gradwohl, Moni Naor, Benny Pinkas, Guy N. Rothblum
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. [Citation Graph (0, 0)][DBLP] FUN, 2007, pp:166-182 [Conf]
Secure Hamming Distance Based Computation and Its Applications. [Citation Graph (, )][DBLP]
Privacy-Preserving Group Discovery with Linear Complexity. [Citation Graph (, )][DBLP]
Secure Two-Party Computation Is Practical. [Citation Graph (, )][DBLP]
Cryptanalysis of the windows random number generator. [Citation Graph (, )][DBLP]
FairplayMP: a system for secure multi-party computation. [Citation Graph (, )][DBLP]
Oblivious RAM Revisited. [Citation Graph (, )][DBLP]
Peer-to-Peer Secure Multi-party Numerical Computation. [Citation Graph (, )][DBLP]
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. [Citation Graph (, )][DBLP]
SCiFI - A System for Secure Face Identification. [Citation Graph (, )][DBLP]
Peer-to-Peer Secure Multi-Party Numerical Computation [Citation Graph (, )][DBLP]
Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.455secs
|