dblp.uni-trier.dewww.uni-trier.de

Yuval Ishai

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
71EEYuval Ishai, Manoj Prabhakaran, Amit Sahai: Secure Arithmetic Computation with No Honest Majority. TCC 2009: 294-314
70EEYuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright: Private multiparty sampling and approximation of vector combinations. Theor. Comput. Sci. 410(18): 1730-1745 (2009)
2008
69EEIvan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam Smith: Scalable Multiparty Computation with Nearly Optimal Work and Resilience. CRYPTO 2008: 241-261
68EEYuval Ishai, Manoj Prabhakaran, Amit Sahai: Founding Cryptography on Oblivious Transfer - Efficiently. CRYPTO 2008: 572-591
67EEJens Groth, Yuval Ishai: Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle. EUROCRYPT 2008: 379-396
66EEYuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai: Cryptography with constant computational overhead. STOC 2008: 433-442
65EEOmer Barkol, Yuval Ishai, Enav Weinreb: Communication in the presence of replication. STOC 2008: 661-670
64EEDanny Harnik, Yuval Ishai, Eyal Kushilevitz, Jesper Buus Nielsen: OT-Combiners via Secure Computation. TCC 2008: 393-411
63EEEli Biham, Yaron J. Goren, Yuval Ishai: Basing Weak Public-Key Cryptography on Strong One-Way Functions. TCC 2008: 55-72
62EEYuval Ishai, Manoj Prabhakaran, Amit Sahai: Secure Arithmetic Computation with No Honest Majority CoRR abs/0811.0475: (2008)
61EEBenny Applebaum, Yuval Ishai, Eyal Kushilevitz: On Pseudorandom Generators with Linear Stretch in NC0. Computational Complexity 17(1): 38-69 (2008)
2007
60EEOmer Barkol, Yuval Ishai, Enav Weinreb: On Locally Decodable Codes, Self-correctable Codes, and t -Private PIR. APPROX-RANDOM 2007: 311-325
59EEDanny Harnik, Yuval Ishai, Eyal Kushilevitz: How Many Oblivious Transfers Are Needed for Secure Multiparty Computation? CRYPTO 2007: 284-302
58EEBenny Applebaum, Yuval Ishai, Eyal Kushilevitz: Cryptography with Constant Input Locality. CRYPTO 2007: 92-110
57EEYuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright: Private Multiparty Sampling and Approximation of Vector Combinations. ICALP 2007: 243-254
56EEYuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky: Efficient Arguments without Short PCPs. IEEE Conference on Computational Complexity 2007: 278-291
55EEYuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai: Zero-knowledge from secure multiparty computation. STOC 2007: 21-30
54EEYuval Ishai, Anat Paskin: Evaluating Branching Programs on Encrypted Data. TCC 2007: 575-594
53EEPrahladh Harsha, Yuval Ishai, Joe Kilian, Kobbi Nissim, Srinivasan Venkatesh: Communication vs. Computation. Computational Complexity 16(1): 1-33 (2007)
2006
52EEBenny Applebaum, Yuval Ishai, Eyal Kushilevitz: On Pseudorandom Generators with Linear Stretch in NC0. APPROX-RANDOM 2006: 260-271
51EEYuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank: On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. CRYPTO 2006: 483-500
50EEIvan Damgård, Yuval Ishai: Scalable Secure Multiparty Computation. CRYPTO 2006: 501-520
49EEYuval Ishai, Manoj Prabhakaran, Amit Sahai, David Wagner: Private Circuits II: Keeping Secrets in Tamperable Circuits. EUROCRYPT 2006: 308-327
48EEYuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai: Cryptography from Anonymity. FOCS 2006: 239-248
47EEBella Dubrov, Yuval Ishai: On the randomness complexity of efficient sampling. STOC 2006: 711-720
46EEYuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank: Black-box constructions for secure computation. STOC 2006: 99-108
45EEJoan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright: Secure multiparty computation of approximations. ACM Transactions on Algorithms 2(3): 435-472 (2006)
44EEBenny Applebaum, Yuval Ishai, Eyal Kushilevitz: Computationally Private Randomizing Polynomials and Their Applications. Computational Complexity 15(2): 115-162 (2006)
43EEBenny Applebaum, Yuval Ishai, Eyal Kushilevitz: Cryptography in NC0. SIAM J. Comput. 36(4): 845-888 (2006)
2005
42EEIvan Damgård, Yuval Ishai: Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. CRYPTO 2005: 378-394
41EEOmer Barkol, Yuval Ishai: Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems. CRYPTO 2005: 395-411
40EEBenny Applebaum, Yuval Ishai, Eyal Kushilevitz: Computationally Private Randomizing Polynomials and Their Applications. IEEE Conference on Computational Complexity 2005: 260-274
39EEMichael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold: Keyword Search and Oblivious Pseudorandom Functions. TCC 2005: 303-324
38EERonald Cramer, Ivan Damgård, Yuval Ishai: Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. TCC 2005: 342-362
37EEYuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky: Sufficient Conditions for Collision-Resistant Hashing. TCC 2005: 445-456
36EEAmos Beimel, Yuval Ishai, Eyal Kushilevitz: General constructions for information-theoretic private information retrieval. J. Comput. Syst. Sci. 71(2): 213-247 (2005)
2004
35EEYuval Ishai, Eyal Kushilevitz: On the Hardness of Information-Theoretic Multiparty Computation. EUROCRYPT 2004: 439-455
34EEBenny Applebaum, Yuval Ishai, Eyal Kushilevitz: Cryptography in NC0. FOCS 2004: 166-175
33EEPrahladh Harsha, Yuval Ishai, Joe Kilian, Kobbi Nissim, Srinivasan Venkatesh: Communication Versus Computation. ICALP 2004: 745-756
32EEYuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai: Batch codes and their applications. STOC 2004: 262-271
31EEAmos Beimel, Yuval Ishai, Tal Malkin: Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing. J. Cryptology 17(2): 125-151 (2004)
30EERan Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: Adaptive versus Non-Adaptive Security of Multi-Party Protocols. J. Cryptology 17(3): 153-207 (2004)
2003
29EEYuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank: Extending Oblivious Transfers Efficiently. CRYPTO 2003: 145-161
28EEYuval Ishai, Amit Sahai, David Wagner: Private Circuits: Securing Hardware against Probing Attacks. CRYPTO 2003: 463-481
27EERonald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz: Efficient Multi-party Computation over Rings. EUROCRYPT 2003: 596-613
26EEJózsef Balogh, János A. Csirik, Yuval Ishai, Eyal Kushilevitz: Private computation using a PEZ dispenser. Theor. Comput. Sci. 306(1-3): 69-84 (2003)
2002
25EERosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin: On 2-Round Secure Multiparty Computation. CRYPTO 2002: 178-193
24EEAmos Beimel, Yuval Ishai, Eyal Kushilevitz, Jean-François Raymond: Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval. FOCS 2002: 261-270
23EEYuval Ishai, Eyal Kushilevitz: Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials. ICALP 2002: 244-256
2001
22EEWilliam Aiello, Yuval Ishai, Omer Reingold: Priced Oblivious Transfer: How to Sell Digital Goods. EUROCRYPT 2001: 119-135
21EERan Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: On Adaptive vs. Non-adaptive Security of Multiparty Protocols. EUROCRYPT 2001: 262-279
20EEAmos Beimel, Yuval Ishai: Information-Theoretic Private Information Retrieval: A Unified Construction. ICALP 2001: 912-926
19EEJoan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright: Secure Multiparty Computation of Approximations. ICALP 2001: 927-938
18EEAmos Beimel, Yuval Ishai: On the Power of Nonlinear Secrect-Sharing. IEEE Conference on Computational Complexity 2001: 188-202
17EERan Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright: Selective private function evaluation with applications to private statistics. PODC 2001: 293-304
16EERosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin: The round complexity of verifiable secret sharing and secure multicast. STOC 2001: 580-589
15EEAmos Beimel, Yuval Ishai: Information-Theoretic Private Information Retrieval: A Unified Construction Electronic Colloquium on Computational Complexity (ECCC) 8(15): (2001)
14 Benny Chor, Yuval Ishai: On Privacy and Partition Arguments. Inf. Comput. 167(1): 2-9 (2001)
13EEGiovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovsky: Universal Service-Providers for Private Information Retrieval. J. Cryptology 14(1): 37-74 (2001)
2000
12EEAmos Beimel, Yuval Ishai, Tal Malkin: Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. CRYPTO 2000: 55-73
11 Yuval Ishai, Eyal Kushilevitz: Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. FOCS 2000: 294-304
10 Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin: Protecting Data Privacy in Private Information Retrieval Schemes. J. Comput. Syst. Sci. 60(3): 592-629 (2000)
1999
9EENiv Gilboa, Yuval Ishai: Compressing Cryptographic Resources. CRYPTO 1999: 591-608
8EEYuval Ishai, Eyal Kushilevitz: Improved Upper Bounds on Information-Theoretic Private Information Retrieval (Extended Abstract). STOC 1999: 79-88
7EEAmos Beimel, Yuval Ishai, Eyal Kushilevitz, Tal Malkin: One-Way Functions Are Essential for Single-Server Private Information Retrieval. STOC 1999: 89-98
1998
6EEGiovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovsky: Universal Service-Providers for Database Private Information Retrieval (Extended Abstract). PODC 1998: 91-100
5EEGiovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovsky: Non-Interactive and Non-Malleable Commitment. STOC 1998: 141-150
4EEYael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin: Protecting Data Privacy in Private Information Retrieval Schemes. STOC 1998: 151-160
1997
3EEYuval Ishai, Eyal Kushilevitz: Private Simultaneous Messages Protocols with Applications. ISTCS 1997: 174-184
1996
2 Benny Chor, Yuval Ishai: On Privacy and Partition Arguments. ISTCS 1996: 191-194
1 Martin Anthony, Peter L. Bartlett, Yuval Ishai, John Shawe-Taylor: Valid Generalisation from Approximate Interpolation. Combinatorics, Probability & Computing 5: 191-214 (1996)

Coauthor Index

1William Aiello [22]
2Martin Anthony [1]
3Benny Applebaum [34] [40] [43] [44] [52] [58] [61]
4József Balogh [26]
5Omer Barkol [41] [60] [65]
6Peter L. Bartlett [1]
7Amos Beimel [7] [12] [15] [18] [20] [24] [31] [36]
8Eli Biham [63]
9Ran Canetti [17] [21] [30]
10Benny Chor [2] [14]
11Ronald Cramer [27] [38]
12Giovanni Di Crescenzo [5] [6] [13]
13János A. Csirik [26]
14Ivan Damgård [21] [30] [38] [42] [50] [69]
15Bella Dubrov [47]
16Stefan Dziembowski [21] [30]
17Serge Fehr [27]
18Joan Feigenbaum [19] [45]
19Michael J. Freedman [39]
20Rosario Gennaro [16] [25]
21Yael Gertner [4] [10]
22Niv Gilboa [9]
23Yaron J. Goren [63]
24Jens Groth [67]
25Danny Harnik [59] [64]
26Prahladh Harsha [33] [53]
27Joe Kilian [29] [33] [53]
28Mikkel Krøigaard [69]
29Ravi Kumar (S. Ravi Kumar) [17]
30Eyal Kushilevitz [3] [4] [7] [8] [10] [11] [16] [23] [24] [25] [26] [27] [32] [34] [35] [36] [37] [40] [43] [44] [46] [48] [51] [52] [55] [56] [58] [59] [61] [64] [66]
31Yehuda Lindell (Andrew Y. Lindell) [46] [51]
32Tal Malkin [4] [7] [10] [12] [19] [21] [30] [31] [45] [57] [70]
33Jesper Buus Nielsen [64] [69]
34Kobbi Nissim [19] [29] [33] [45] [53]
35Rafail Ostrovsky [5] [6] [13] [32] [37] [48] [55] [56] [66]
36Anat Paskin [54]
37Erez Petrank [29] [46] [51]
38Benny Pinkas [39]
39Manoj Prabhakaran [49] [62] [68] [71]
40Tal Rabin [16] [25]
41Jean-François Raymond [24]
42Omer Reingold [22] [39]
43Michael K. Reiter [17]
44Ronitt Rubinfeld [17]
45Amit Sahai [28] [32] [48] [49] [55] [62] [66] [68] [71]
46John Shawe-Taylor [1]
47Adam Smith [69]
48Martin Strauss (Martin J. Strauss) [19] [45] [57] [70]
49Srinivasan Venkatesh [33] [53]
50David Wagner [28] [49]
51Enav Weinreb [60] [65]
52Rebecca N. Wright [17] [19] [45] [57] [70]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)