2007 |
8 | EE | Yael Gertner,
Tal Malkin,
Steven Myers:
Towards a Separation of Semantic and CCA Security for Public Key Encryption.
TCC 2007: 434-455 |
2005 |
7 | EE | Rosario Gennaro,
Yael Gertner,
Jonathan Katz,
Luca Trevisan:
Bounds on the Efficiency of Generic Cryptographic Constructions.
SIAM J. Comput. 35(1): 217-246 (2005) |
2003 |
6 | EE | Rosario Gennaro,
Yael Gertner,
Jonathan Katz:
Lower bounds on the efficiency of encryption and digital signature schemes.
STOC 2003: 417-425 |
2001 |
5 | | Yael Gertner,
Tal Malkin,
Omer Reingold:
On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates.
FOCS 2001: 126-135 |
2000 |
4 | | Yael Gertner,
Sampath Kannan,
Tal Malkin,
Omer Reingold,
Mahesh Viswanathan:
The Relationship between Public Key Encryption and Oblivious Transfer.
FOCS 2000: 325-335 |
3 | | Yael Gertner,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
Protecting Data Privacy in Private Information Retrieval Schemes.
J. Comput. Syst. Sci. 60(3): 592-629 (2000) |
1998 |
2 | EE | Yael Gertner,
Shafi Goldwasser,
Tal Malkin:
A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication.
RANDOM 1998: 200-217 |
1 | EE | Yael Gertner,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
Protecting Data Privacy in Private Information Retrieval Schemes.
STOC 1998: 151-160 |