| 2009 |
| 71 | EE | Yuval Ishai,
Manoj Prabhakaran,
Amit Sahai:
Secure Arithmetic Computation with No Honest Majority.
TCC 2009: 294-314 |
| 70 | EE | Yuval Ishai,
Tal Malkin,
Martin J. Strauss,
Rebecca N. Wright:
Private multiparty sampling and approximation of vector combinations.
Theor. Comput. Sci. 410(18): 1730-1745 (2009) |
| 2008 |
| 69 | EE | Ivan Damgård,
Yuval Ishai,
Mikkel Krøigaard,
Jesper Buus Nielsen,
Adam Smith:
Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
CRYPTO 2008: 241-261 |
| 68 | EE | Yuval Ishai,
Manoj Prabhakaran,
Amit Sahai:
Founding Cryptography on Oblivious Transfer - Efficiently.
CRYPTO 2008: 572-591 |
| 67 | EE | Jens Groth,
Yuval Ishai:
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle.
EUROCRYPT 2008: 379-396 |
| 66 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky,
Amit Sahai:
Cryptography with constant computational overhead.
STOC 2008: 433-442 |
| 65 | EE | Omer Barkol,
Yuval Ishai,
Enav Weinreb:
Communication in the presence of replication.
STOC 2008: 661-670 |
| 64 | EE | Danny Harnik,
Yuval Ishai,
Eyal Kushilevitz,
Jesper Buus Nielsen:
OT-Combiners via Secure Computation.
TCC 2008: 393-411 |
| 63 | EE | Eli Biham,
Yaron J. Goren,
Yuval Ishai:
Basing Weak Public-Key Cryptography on Strong One-Way Functions.
TCC 2008: 55-72 |
| 62 | EE | Yuval Ishai,
Manoj Prabhakaran,
Amit Sahai:
Secure Arithmetic Computation with No Honest Majority
CoRR abs/0811.0475: (2008) |
| 61 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
On Pseudorandom Generators with Linear Stretch in NC0.
Computational Complexity 17(1): 38-69 (2008) |
| 2007 |
| 60 | EE | Omer Barkol,
Yuval Ishai,
Enav Weinreb:
On Locally Decodable Codes, Self-correctable Codes, and t -Private PIR.
APPROX-RANDOM 2007: 311-325 |
| 59 | EE | Danny Harnik,
Yuval Ishai,
Eyal Kushilevitz:
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
CRYPTO 2007: 284-302 |
| 58 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
Cryptography with Constant Input Locality.
CRYPTO 2007: 92-110 |
| 57 | EE | Yuval Ishai,
Tal Malkin,
Martin J. Strauss,
Rebecca N. Wright:
Private Multiparty Sampling and Approximation of Vector Combinations.
ICALP 2007: 243-254 |
| 56 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky:
Efficient Arguments without Short PCPs.
IEEE Conference on Computational Complexity 2007: 278-291 |
| 55 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky,
Amit Sahai:
Zero-knowledge from secure multiparty computation.
STOC 2007: 21-30 |
| 54 | EE | Yuval Ishai,
Anat Paskin:
Evaluating Branching Programs on Encrypted Data.
TCC 2007: 575-594 |
| 53 | EE | Prahladh Harsha,
Yuval Ishai,
Joe Kilian,
Kobbi Nissim,
Srinivasan Venkatesh:
Communication vs. Computation.
Computational Complexity 16(1): 1-33 (2007) |
| 2006 |
| 52 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
On Pseudorandom Generators with Linear Stretch in NC0.
APPROX-RANDOM 2006: 260-271 |
| 51 | EE | Yuval Ishai,
Eyal Kushilevitz,
Yehuda Lindell,
Erez Petrank:
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.
CRYPTO 2006: 483-500 |
| 50 | EE | Ivan Damgård,
Yuval Ishai:
Scalable Secure Multiparty Computation.
CRYPTO 2006: 501-520 |
| 49 | EE | Yuval Ishai,
Manoj Prabhakaran,
Amit Sahai,
David Wagner:
Private Circuits II: Keeping Secrets in Tamperable Circuits.
EUROCRYPT 2006: 308-327 |
| 48 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky,
Amit Sahai:
Cryptography from Anonymity.
FOCS 2006: 239-248 |
| 47 | EE | Bella Dubrov,
Yuval Ishai:
On the randomness complexity of efficient sampling.
STOC 2006: 711-720 |
| 46 | EE | Yuval Ishai,
Eyal Kushilevitz,
Yehuda Lindell,
Erez Petrank:
Black-box constructions for secure computation.
STOC 2006: 99-108 |
| 45 | EE | Joan Feigenbaum,
Yuval Ishai,
Tal Malkin,
Kobbi Nissim,
Martin J. Strauss,
Rebecca N. Wright:
Secure multiparty computation of approximations.
ACM Transactions on Algorithms 2(3): 435-472 (2006) |
| 44 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
Computationally Private Randomizing Polynomials and Their Applications.
Computational Complexity 15(2): 115-162 (2006) |
| 43 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
Cryptography in NC0.
SIAM J. Comput. 36(4): 845-888 (2006) |
| 2005 |
| 42 | EE | Ivan Damgård,
Yuval Ishai:
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator.
CRYPTO 2005: 378-394 |
| 41 | EE | Omer Barkol,
Yuval Ishai:
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems.
CRYPTO 2005: 395-411 |
| 40 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
Computationally Private Randomizing Polynomials and Their Applications.
IEEE Conference on Computational Complexity 2005: 260-274 |
| 39 | EE | Michael J. Freedman,
Yuval Ishai,
Benny Pinkas,
Omer Reingold:
Keyword Search and Oblivious Pseudorandom Functions.
TCC 2005: 303-324 |
| 38 | EE | Ronald Cramer,
Ivan Damgård,
Yuval Ishai:
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation.
TCC 2005: 342-362 |
| 37 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky:
Sufficient Conditions for Collision-Resistant Hashing.
TCC 2005: 445-456 |
| 36 | EE | Amos Beimel,
Yuval Ishai,
Eyal Kushilevitz:
General constructions for information-theoretic private information retrieval.
J. Comput. Syst. Sci. 71(2): 213-247 (2005) |
| 2004 |
| 35 | EE | Yuval Ishai,
Eyal Kushilevitz:
On the Hardness of Information-Theoretic Multiparty Computation.
EUROCRYPT 2004: 439-455 |
| 34 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
Cryptography in NC0.
FOCS 2004: 166-175 |
| 33 | EE | Prahladh Harsha,
Yuval Ishai,
Joe Kilian,
Kobbi Nissim,
Srinivasan Venkatesh:
Communication Versus Computation.
ICALP 2004: 745-756 |
| 32 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky,
Amit Sahai:
Batch codes and their applications.
STOC 2004: 262-271 |
| 31 | EE | Amos Beimel,
Yuval Ishai,
Tal Malkin:
Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing.
J. Cryptology 17(2): 125-151 (2004) |
| 30 | EE | Ran Canetti,
Ivan Damgård,
Stefan Dziembowski,
Yuval Ishai,
Tal Malkin:
Adaptive versus Non-Adaptive Security of Multi-Party Protocols.
J. Cryptology 17(3): 153-207 (2004) |
| 2003 |
| 29 | EE | Yuval Ishai,
Joe Kilian,
Kobbi Nissim,
Erez Petrank:
Extending Oblivious Transfers Efficiently.
CRYPTO 2003: 145-161 |
| 28 | EE | Yuval Ishai,
Amit Sahai,
David Wagner:
Private Circuits: Securing Hardware against Probing Attacks.
CRYPTO 2003: 463-481 |
| 27 | EE | Ronald Cramer,
Serge Fehr,
Yuval Ishai,
Eyal Kushilevitz:
Efficient Multi-party Computation over Rings.
EUROCRYPT 2003: 596-613 |
| 26 | EE | József Balogh,
János A. Csirik,
Yuval Ishai,
Eyal Kushilevitz:
Private computation using a PEZ dispenser.
Theor. Comput. Sci. 306(1-3): 69-84 (2003) |
| 2002 |
| 25 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
On 2-Round Secure Multiparty Computation.
CRYPTO 2002: 178-193 |
| 24 | EE | Amos Beimel,
Yuval Ishai,
Eyal Kushilevitz,
Jean-François Raymond:
Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval.
FOCS 2002: 261-270 |
| 23 | EE | Yuval Ishai,
Eyal Kushilevitz:
Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials.
ICALP 2002: 244-256 |
| 2001 |
| 22 | EE | William Aiello,
Yuval Ishai,
Omer Reingold:
Priced Oblivious Transfer: How to Sell Digital Goods.
EUROCRYPT 2001: 119-135 |
| 21 | EE | Ran Canetti,
Ivan Damgård,
Stefan Dziembowski,
Yuval Ishai,
Tal Malkin:
On Adaptive vs. Non-adaptive Security of Multiparty Protocols.
EUROCRYPT 2001: 262-279 |
| 20 | EE | Amos Beimel,
Yuval Ishai:
Information-Theoretic Private Information Retrieval: A Unified Construction.
ICALP 2001: 912-926 |
| 19 | EE | Joan Feigenbaum,
Yuval Ishai,
Tal Malkin,
Kobbi Nissim,
Martin Strauss,
Rebecca N. Wright:
Secure Multiparty Computation of Approximations.
ICALP 2001: 927-938 |
| 18 | EE | Amos Beimel,
Yuval Ishai:
On the Power of Nonlinear Secrect-Sharing.
IEEE Conference on Computational Complexity 2001: 188-202 |
| 17 | EE | Ran Canetti,
Yuval Ishai,
Ravi Kumar,
Michael K. Reiter,
Ronitt Rubinfeld,
Rebecca N. Wright:
Selective private function evaluation with applications to private statistics.
PODC 2001: 293-304 |
| 16 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
The round complexity of verifiable secret sharing and secure multicast.
STOC 2001: 580-589 |
| 15 | EE | Amos Beimel,
Yuval Ishai:
Information-Theoretic Private Information Retrieval: A Unified Construction
Electronic Colloquium on Computational Complexity (ECCC) 8(15): (2001) |
| 14 | | Benny Chor,
Yuval Ishai:
On Privacy and Partition Arguments.
Inf. Comput. 167(1): 2-9 (2001) |
| 13 | EE | Giovanni Di Crescenzo,
Yuval Ishai,
Rafail Ostrovsky:
Universal Service-Providers for Private Information Retrieval.
J. Cryptology 14(1): 37-74 (2001) |
| 2000 |
| 12 | EE | Amos Beimel,
Yuval Ishai,
Tal Malkin:
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing.
CRYPTO 2000: 55-73 |
| 11 | | Yuval Ishai,
Eyal Kushilevitz:
Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation.
FOCS 2000: 294-304 |
| 10 | | Yael Gertner,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
Protecting Data Privacy in Private Information Retrieval Schemes.
J. Comput. Syst. Sci. 60(3): 592-629 (2000) |
| 1999 |
| 9 | EE | Niv Gilboa,
Yuval Ishai:
Compressing Cryptographic Resources.
CRYPTO 1999: 591-608 |
| 8 | EE | Yuval Ishai,
Eyal Kushilevitz:
Improved Upper Bounds on Information-Theoretic Private Information Retrieval (Extended Abstract).
STOC 1999: 79-88 |
| 7 | EE | Amos Beimel,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
One-Way Functions Are Essential for Single-Server Private Information Retrieval.
STOC 1999: 89-98 |
| 1998 |
| 6 | EE | Giovanni Di Crescenzo,
Yuval Ishai,
Rafail Ostrovsky:
Universal Service-Providers for Database Private Information Retrieval (Extended Abstract).
PODC 1998: 91-100 |
| 5 | EE | Giovanni Di Crescenzo,
Yuval Ishai,
Rafail Ostrovsky:
Non-Interactive and Non-Malleable Commitment.
STOC 1998: 141-150 |
| 4 | EE | Yael Gertner,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
Protecting Data Privacy in Private Information Retrieval Schemes.
STOC 1998: 151-160 |
| 1997 |
| 3 | EE | Yuval Ishai,
Eyal Kushilevitz:
Private Simultaneous Messages Protocols with Applications.
ISTCS 1997: 174-184 |
| 1996 |
| 2 | | Benny Chor,
Yuval Ishai:
On Privacy and Partition Arguments.
ISTCS 1996: 191-194 |
| 1 | | Martin Anthony,
Peter L. Bartlett,
Yuval Ishai,
John Shawe-Taylor:
Valid Generalisation from Approximate Interpolation.
Combinatorics, Probability & Computing 5: 191-214 (1996) |