2009 |
71 | EE | Yuval Ishai,
Manoj Prabhakaran,
Amit Sahai:
Secure Arithmetic Computation with No Honest Majority.
TCC 2009: 294-314 |
70 | EE | Yuval Ishai,
Tal Malkin,
Martin J. Strauss,
Rebecca N. Wright:
Private multiparty sampling and approximation of vector combinations.
Theor. Comput. Sci. 410(18): 1730-1745 (2009) |
2008 |
69 | EE | Ivan Damgård,
Yuval Ishai,
Mikkel Krøigaard,
Jesper Buus Nielsen,
Adam Smith:
Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
CRYPTO 2008: 241-261 |
68 | EE | Yuval Ishai,
Manoj Prabhakaran,
Amit Sahai:
Founding Cryptography on Oblivious Transfer - Efficiently.
CRYPTO 2008: 572-591 |
67 | EE | Jens Groth,
Yuval Ishai:
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle.
EUROCRYPT 2008: 379-396 |
66 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky,
Amit Sahai:
Cryptography with constant computational overhead.
STOC 2008: 433-442 |
65 | EE | Omer Barkol,
Yuval Ishai,
Enav Weinreb:
Communication in the presence of replication.
STOC 2008: 661-670 |
64 | EE | Danny Harnik,
Yuval Ishai,
Eyal Kushilevitz,
Jesper Buus Nielsen:
OT-Combiners via Secure Computation.
TCC 2008: 393-411 |
63 | EE | Eli Biham,
Yaron J. Goren,
Yuval Ishai:
Basing Weak Public-Key Cryptography on Strong One-Way Functions.
TCC 2008: 55-72 |
62 | EE | Yuval Ishai,
Manoj Prabhakaran,
Amit Sahai:
Secure Arithmetic Computation with No Honest Majority
CoRR abs/0811.0475: (2008) |
61 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
On Pseudorandom Generators with Linear Stretch in NC0.
Computational Complexity 17(1): 38-69 (2008) |
2007 |
60 | EE | Omer Barkol,
Yuval Ishai,
Enav Weinreb:
On Locally Decodable Codes, Self-correctable Codes, and t -Private PIR.
APPROX-RANDOM 2007: 311-325 |
59 | EE | Danny Harnik,
Yuval Ishai,
Eyal Kushilevitz:
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
CRYPTO 2007: 284-302 |
58 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
Cryptography with Constant Input Locality.
CRYPTO 2007: 92-110 |
57 | EE | Yuval Ishai,
Tal Malkin,
Martin J. Strauss,
Rebecca N. Wright:
Private Multiparty Sampling and Approximation of Vector Combinations.
ICALP 2007: 243-254 |
56 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky:
Efficient Arguments without Short PCPs.
IEEE Conference on Computational Complexity 2007: 278-291 |
55 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky,
Amit Sahai:
Zero-knowledge from secure multiparty computation.
STOC 2007: 21-30 |
54 | EE | Yuval Ishai,
Anat Paskin:
Evaluating Branching Programs on Encrypted Data.
TCC 2007: 575-594 |
53 | EE | Prahladh Harsha,
Yuval Ishai,
Joe Kilian,
Kobbi Nissim,
Srinivasan Venkatesh:
Communication vs. Computation.
Computational Complexity 16(1): 1-33 (2007) |
2006 |
52 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
On Pseudorandom Generators with Linear Stretch in NC0.
APPROX-RANDOM 2006: 260-271 |
51 | EE | Yuval Ishai,
Eyal Kushilevitz,
Yehuda Lindell,
Erez Petrank:
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.
CRYPTO 2006: 483-500 |
50 | EE | Ivan Damgård,
Yuval Ishai:
Scalable Secure Multiparty Computation.
CRYPTO 2006: 501-520 |
49 | EE | Yuval Ishai,
Manoj Prabhakaran,
Amit Sahai,
David Wagner:
Private Circuits II: Keeping Secrets in Tamperable Circuits.
EUROCRYPT 2006: 308-327 |
48 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky,
Amit Sahai:
Cryptography from Anonymity.
FOCS 2006: 239-248 |
47 | EE | Bella Dubrov,
Yuval Ishai:
On the randomness complexity of efficient sampling.
STOC 2006: 711-720 |
46 | EE | Yuval Ishai,
Eyal Kushilevitz,
Yehuda Lindell,
Erez Petrank:
Black-box constructions for secure computation.
STOC 2006: 99-108 |
45 | EE | Joan Feigenbaum,
Yuval Ishai,
Tal Malkin,
Kobbi Nissim,
Martin J. Strauss,
Rebecca N. Wright:
Secure multiparty computation of approximations.
ACM Transactions on Algorithms 2(3): 435-472 (2006) |
44 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
Computationally Private Randomizing Polynomials and Their Applications.
Computational Complexity 15(2): 115-162 (2006) |
43 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
Cryptography in NC0.
SIAM J. Comput. 36(4): 845-888 (2006) |
2005 |
42 | EE | Ivan Damgård,
Yuval Ishai:
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator.
CRYPTO 2005: 378-394 |
41 | EE | Omer Barkol,
Yuval Ishai:
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems.
CRYPTO 2005: 395-411 |
40 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
Computationally Private Randomizing Polynomials and Their Applications.
IEEE Conference on Computational Complexity 2005: 260-274 |
39 | EE | Michael J. Freedman,
Yuval Ishai,
Benny Pinkas,
Omer Reingold:
Keyword Search and Oblivious Pseudorandom Functions.
TCC 2005: 303-324 |
38 | EE | Ronald Cramer,
Ivan Damgård,
Yuval Ishai:
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation.
TCC 2005: 342-362 |
37 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky:
Sufficient Conditions for Collision-Resistant Hashing.
TCC 2005: 445-456 |
36 | EE | Amos Beimel,
Yuval Ishai,
Eyal Kushilevitz:
General constructions for information-theoretic private information retrieval.
J. Comput. Syst. Sci. 71(2): 213-247 (2005) |
2004 |
35 | EE | Yuval Ishai,
Eyal Kushilevitz:
On the Hardness of Information-Theoretic Multiparty Computation.
EUROCRYPT 2004: 439-455 |
34 | EE | Benny Applebaum,
Yuval Ishai,
Eyal Kushilevitz:
Cryptography in NC0.
FOCS 2004: 166-175 |
33 | EE | Prahladh Harsha,
Yuval Ishai,
Joe Kilian,
Kobbi Nissim,
Srinivasan Venkatesh:
Communication Versus Computation.
ICALP 2004: 745-756 |
32 | EE | Yuval Ishai,
Eyal Kushilevitz,
Rafail Ostrovsky,
Amit Sahai:
Batch codes and their applications.
STOC 2004: 262-271 |
31 | EE | Amos Beimel,
Yuval Ishai,
Tal Malkin:
Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing.
J. Cryptology 17(2): 125-151 (2004) |
30 | EE | Ran Canetti,
Ivan Damgård,
Stefan Dziembowski,
Yuval Ishai,
Tal Malkin:
Adaptive versus Non-Adaptive Security of Multi-Party Protocols.
J. Cryptology 17(3): 153-207 (2004) |
2003 |
29 | EE | Yuval Ishai,
Joe Kilian,
Kobbi Nissim,
Erez Petrank:
Extending Oblivious Transfers Efficiently.
CRYPTO 2003: 145-161 |
28 | EE | Yuval Ishai,
Amit Sahai,
David Wagner:
Private Circuits: Securing Hardware against Probing Attacks.
CRYPTO 2003: 463-481 |
27 | EE | Ronald Cramer,
Serge Fehr,
Yuval Ishai,
Eyal Kushilevitz:
Efficient Multi-party Computation over Rings.
EUROCRYPT 2003: 596-613 |
26 | EE | József Balogh,
János A. Csirik,
Yuval Ishai,
Eyal Kushilevitz:
Private computation using a PEZ dispenser.
Theor. Comput. Sci. 306(1-3): 69-84 (2003) |
2002 |
25 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
On 2-Round Secure Multiparty Computation.
CRYPTO 2002: 178-193 |
24 | EE | Amos Beimel,
Yuval Ishai,
Eyal Kushilevitz,
Jean-François Raymond:
Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval.
FOCS 2002: 261-270 |
23 | EE | Yuval Ishai,
Eyal Kushilevitz:
Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials.
ICALP 2002: 244-256 |
2001 |
22 | EE | William Aiello,
Yuval Ishai,
Omer Reingold:
Priced Oblivious Transfer: How to Sell Digital Goods.
EUROCRYPT 2001: 119-135 |
21 | EE | Ran Canetti,
Ivan Damgård,
Stefan Dziembowski,
Yuval Ishai,
Tal Malkin:
On Adaptive vs. Non-adaptive Security of Multiparty Protocols.
EUROCRYPT 2001: 262-279 |
20 | EE | Amos Beimel,
Yuval Ishai:
Information-Theoretic Private Information Retrieval: A Unified Construction.
ICALP 2001: 912-926 |
19 | EE | Joan Feigenbaum,
Yuval Ishai,
Tal Malkin,
Kobbi Nissim,
Martin Strauss,
Rebecca N. Wright:
Secure Multiparty Computation of Approximations.
ICALP 2001: 927-938 |
18 | EE | Amos Beimel,
Yuval Ishai:
On the Power of Nonlinear Secrect-Sharing.
IEEE Conference on Computational Complexity 2001: 188-202 |
17 | EE | Ran Canetti,
Yuval Ishai,
Ravi Kumar,
Michael K. Reiter,
Ronitt Rubinfeld,
Rebecca N. Wright:
Selective private function evaluation with applications to private statistics.
PODC 2001: 293-304 |
16 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
The round complexity of verifiable secret sharing and secure multicast.
STOC 2001: 580-589 |
15 | EE | Amos Beimel,
Yuval Ishai:
Information-Theoretic Private Information Retrieval: A Unified Construction
Electronic Colloquium on Computational Complexity (ECCC) 8(15): (2001) |
14 | | Benny Chor,
Yuval Ishai:
On Privacy and Partition Arguments.
Inf. Comput. 167(1): 2-9 (2001) |
13 | EE | Giovanni Di Crescenzo,
Yuval Ishai,
Rafail Ostrovsky:
Universal Service-Providers for Private Information Retrieval.
J. Cryptology 14(1): 37-74 (2001) |
2000 |
12 | EE | Amos Beimel,
Yuval Ishai,
Tal Malkin:
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing.
CRYPTO 2000: 55-73 |
11 | | Yuval Ishai,
Eyal Kushilevitz:
Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation.
FOCS 2000: 294-304 |
10 | | Yael Gertner,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
Protecting Data Privacy in Private Information Retrieval Schemes.
J. Comput. Syst. Sci. 60(3): 592-629 (2000) |
1999 |
9 | EE | Niv Gilboa,
Yuval Ishai:
Compressing Cryptographic Resources.
CRYPTO 1999: 591-608 |
8 | EE | Yuval Ishai,
Eyal Kushilevitz:
Improved Upper Bounds on Information-Theoretic Private Information Retrieval (Extended Abstract).
STOC 1999: 79-88 |
7 | EE | Amos Beimel,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
One-Way Functions Are Essential for Single-Server Private Information Retrieval.
STOC 1999: 89-98 |
1998 |
6 | EE | Giovanni Di Crescenzo,
Yuval Ishai,
Rafail Ostrovsky:
Universal Service-Providers for Database Private Information Retrieval (Extended Abstract).
PODC 1998: 91-100 |
5 | EE | Giovanni Di Crescenzo,
Yuval Ishai,
Rafail Ostrovsky:
Non-Interactive and Non-Malleable Commitment.
STOC 1998: 141-150 |
4 | EE | Yael Gertner,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
Protecting Data Privacy in Private Information Retrieval Schemes.
STOC 1998: 151-160 |
1997 |
3 | EE | Yuval Ishai,
Eyal Kushilevitz:
Private Simultaneous Messages Protocols with Applications.
ISTCS 1997: 174-184 |
1996 |
2 | | Benny Chor,
Yuval Ishai:
On Privacy and Partition Arguments.
ISTCS 1996: 191-194 |
1 | | Martin Anthony,
Peter L. Bartlett,
Yuval Ishai,
John Shawe-Taylor:
Valid Generalisation from Approximate Interpolation.
Combinatorics, Probability & Computing 5: 191-214 (1996) |