dblp.uni-trier.dewww.uni-trier.de

Benny Pinkas

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
43EEDanny Bickson, Tzachy Reinman, Danny Dolev, Benny Pinkas: Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries CoRR abs/0901.2689: (2009)
42EEYehuda Lindell, Benny Pinkas: A Proof of Security of Yao's Protocol for Two-Party Computation. J. Cryptology 22(2): 161-188 (2009)
2008
41EEAssaf Ben-David, Noam Nisan, Benny Pinkas: FairplayMP: a system for secure multi-party computation. ACM Conference on Computer and Communications Security 2008: 257-266
40EEDanny Bickson, Danny Dolev, Genia Bezman, Benny Pinkas: Peer-to-Peer Secure Multi-party Numerical Computation. Peer-to-Peer Computing 2008: 257-266
39EEYehuda Lindell, Benny Pinkas, Nigel P. Smart: Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. SCN 2008: 2-20
38EEDanny Bickson, Genia Bezman, Danny Dolev, Benny Pinkas: Peer-to-Peer Secure Multi-Party Numerical Computation CoRR abs/0810.1624: (2008)
2007
37EELeo Dorrendorf, Zvi Gutterman, Benny Pinkas: Cryptanalysis of the windows random number generator. ACM Conference on Computer and Communications Security 2007: 476-485
36EEYehuda Lindell, Benny Pinkas: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. EUROCRYPT 2007: 52-78
35EERonen Gradwohl, Moni Naor, Benny Pinkas, Guy N. Rothblum: Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. FUN 2007: 166-182
2006
34EEZvi Gutterman, Benny Pinkas, Tzachy Reinman: Analysis of the Linux Random Number Generator. IEEE Symposium on Security and Privacy 2006: 371-385
33EEMoni Naor, Benny Pinkas: Oblivious Polynomial Evaluation. SIAM J. Comput. 35(5): 1254-1281 (2006)
2005
32EEMichael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold: Keyword Search and Oblivious Pseudorandom Functions. TCC 2005: 303-324
31EEBenny Pinkas: Traitor Tracing. Encyclopedia of Cryptography and Security 2005
30EEMoni Naor, Benny Pinkas: Computationally Secure Oblivious Transfer. J. Cryptology 18(1): 1-35 (2005)
2004
29EEMichael J. Freedman, Kobbi Nissim, Benny Pinkas: Efficient Private Matching and Set Intersection. EUROCRYPT 2004: 1-19
28EEGagan Aggarwal, Nina Mishra, Benny Pinkas: Secure Computation of the k th-Ranked Element. EUROCRYPT 2004: 40-55
27EEDahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella: Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!). USENIX Security Symposium 2004: 287-302
26EEYehuda Lindell, Benny Pinkas: A Proof of Yao's Protocol for Secure Two-Party Computation Electronic Colloquium on Computational Complexity (ECCC)(063): (2004)
25 Benny Pinkas: Efficient State Updates for Key Management. Proceedings of the IEEE 92(6): 910-917 (2004)
2003
24EEBenny Pinkas: Fair Secure Two-Party Computation. EUROCRYPT 2003: 87-105
23EEEu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle: The Design and Implementation of Protocol-Based Hidden Key Recovery. ISC 2003: 165-179
2002
22EEBenny Pinkas, Tomas Sander: Securing passwords against dictionary attacks. ACM Conference on Computer and Communications Security 2002: 161-170
21EEYehuda Lindell, Benny Pinkas: Privacy Preserving Data Mining. J. Cryptology 15(3): 177-206 (2002)
20EEBenny Pinkas: Cryptographic Techniques for Privacy-Preserving Data Mining. SIGKDD Explorations 4(2): 12-19 (2002)
2001
19EEStuart Haber, Benny Pinkas: Securely combining public-key cryptosystems. ACM Conference on Computer and Communications Security 2001: 215-224
18EEBill G. Horne, Benny Pinkas, Tomas Sander: Escrow services and incentives in peer-to-peer networks. ACM Conference on Electronic Commerce 2001: 85-94
17EEBenny Pinkas: Efficient State Updates for Key Management. Digital Rights Management Workshop 2001: 40-56
16EEMoni Naor, Benny Pinkas: Efficient oblivious transfer protocols. SODA 2001: 448-457
2000
15EEMoni Naor, Benny Pinkas: Distributed Oblivious Transfer. ASIACRYPT 2000: 205-219
14EEYehuda Lindell, Benny Pinkas: Privacy Preserving Data Mining. CRYPTO 2000: 36-54
13EEMoni Naor, Benny Pinkas: Efficient Trace and Revoke Schemes. Financial Cryptography 2000: 1-20
12 Benny Chor, Amos Fiat, Moni Naor, Benny Pinkas: Tracing traitors. IEEE Transactions on Information Theory 46(3): 893-910 (2000)
1999
11EEMoni Naor, Benny Pinkas, Reuban Sumner: Privacy preserving auctions and mechanism design. ACM Conference on Electronic Commerce 1999: 129-139
10EEMoni Naor, Benny Pinkas: Oblivious Transfer with Adaptive Queries. CRYPTO 1999: 573-590
9EEMoni Naor, Benny Pinkas, Omer Reingold: Distributed Pseudo-random Functions and KDCs. EUROCRYPT 1999: 327-346
8 Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Micciancio, Moni Naor, Benny Pinkas: Multicast Security: A Taxonomy and Some Efficient Constructions. INFOCOM 1999: 708-716
7EEMoni Naor, Benny Pinkas: Oblivious Transfer and Polynomial Evaluation. STOC 1999: 245-254
6EEVinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny Pinkas, Michael K. Reiter: On the Security of Pay-per-Click and Other Web Advertising Schemes. Computer Networks 31(11-16): 1091-1100 (1999)
1998
5EEMoni Naor, Benny Pinkas: Threshold Traitor Tracing. CRYPTO 1998: 502-517
4EEMoni Naor, Benny Pinkas: Secure and Efficient Metering. EUROCRYPT 1998: 576-590
3EEMoni Naor, Benny Pinkas: Secure Accounting and Auditing on the Web. Computer Networks 30(1-7): 541-550 (1998)
1997
2EEMoni Naor, Benny Pinkas: Visual Authentication and Identification. CRYPTO 1997: 322-336
1990
1EEJames L. McInnes, Benny Pinkas: On the Impossibility of Private Key Cryptography with Weakly Random Keys. CRYPTO 1990: 421-435

Coauthor Index

1Gagan Aggarwal [28]
2Vinod Anupam [6]
3Assaf Ben-David [41]
4Genia Bezman [38] [40]
5Danny Bickson [38] [40] [43]
6Dan Boneh [23]
7Ran Canetti [8]
8Benny Chor [12]
9Danny Dolev [38] [40] [43]
10Leo Dorrendorf [37]
11Amos Fiat [12]
12Michael J. Freedman [29] [32]
13Juan A. Garay [8]
14Eu-Jin Goh [23]
15Philippe Golle [23]
16Ronen Gradwohl [35]
17Zvi Gutterman [34] [37]
18Stuart Haber [19]
19Bill G. Horne [18]
20Yuval Ishai [32]
21Gene Itkis [8]
22Yehuda Lindell (Andrew Y. Lindell) [14] [21] [26] [36] [39] [42]
23Dahlia Malkhi (Dalia Malki) [27]
24Alain J. Mayer [6]
25James L. McInnes [1]
26Daniele Micciancio [8]
27Nina Mishra [28]
28Moni Naor [2] [3] [4] [5] [7] [8] [9] [10] [11] [12] [13] [15] [16] [30] [33] [35]
29Noam Nisan [27] [41]
30Kobbi Nissim [6] [29]
31Omer Reingold [9] [32]
32Tzachy Reinman [34] [43]
33Michael K. Reiter [6]
34Guy N. Rothblum [35]
35Tomas Sander [18] [22]
36Yaron Sella [27]
37Nigel P. Smart [39]
38Reuban Sumner [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)