Yuval Ishai
Yuval Ishai
Unknown affiliation
Verified email at cs.technion.ac.il
Title
Cited by
Cited by
Year
Private circuits: Securing hardware against probing attacks
Y Ishai, A Sahai, D Wagner
Annual International Cryptology Conference, 463-481, 2003
7302003
Extending oblivious transfers efficiently
Y Ishai, J Kilian, K Nissim, E Petrank
Annual International Cryptology Conference, 145-161, 2003
5852003
Protecting data privacy in private information retrieval schemes
Y Gertner, Y Ishai, E Kushilevitz, T Malkin
Journal of Computer and System Sciences 60 (3), 592-629, 2000
5262000
Priced oblivious transfer: How to sell digital goods
B Aiello, Y Ishai, O Reingold
International Conference on the Theory and Applications of Cryptographic …, 2001
4532001
Founding cryptography on oblivious transfer–efficiently
Y Ishai, M Prabhakaran, A Sahai
Annual international cryptology conference, 572-591, 2008
3992008
Keyword search and oblivious pseudorandom functions
MJ Freedman, Y Ishai, B Pinkas, O Reingold
Theory of Cryptography Conference, 303-324, 2005
3432005
Breaking the O (n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval
A Beimel, Y Ishai, E Kushilevitz, JF Raymond
The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002 …, 2002
2812002
Cryptography in
B Applebaum, Y Ishai, E Kushilevitz
SIAM Journal on Computing 36 (4), 845-888, 2006
2722006
Zero-knowledge proofs from secure multiparty computation
Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai
SIAM Journal on Computing 39 (3), 1121-1152, 2009
264*2009
Randomizing polynomials: A new representation with applications to round-efficient secure computation
Y Ishai, E Kushilevitz
Proceedings 41st Annual Symposium on Foundations of Computer Science, 294-304, 2000
2492000
Secure multiparty computation of approximations
J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright
ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006
228*2006
Succinct non-interactive arguments via linear interactive proofs
N Bitansky, A Chiesa, Y Ishai, O Paneth, R Ostrovsky
Theory of Cryptography Conference, 315-333, 2013
2182013
Evaluating branching programs on encrypted data
Y Ishai, A Paskin
Theory of Cryptography Conference, 575-594, 2007
2132007
Share conversion, pseudorandom secret-sharing and applications to secure computation
R Cramer, I Damgård, Y Ishai
Theory of Cryptography Conference, 342-362, 2005
2032005
From secrecy to soundness: Efficient verification via secure computation
B Applebaum, Y Ishai, E Kushilevitz
International Colloquium on Automata, Languages, and Programming, 152-163, 2010
1982010
Non-interactive and non-malleable commitment
G Di Crescenzo, Y Ishai, R Ostrovsky
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
1961998
Founding cryptography on tamper-proof hardware tokens
V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia
Theory of Cryptography Conference, 308-326, 2010
1892010
Batch codes and their applications
Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
1892004
Constant-round multiparty computation using a black-box pseudorandom generator
I Damgård, Y Ishai
Annual International Cryptology Conference, 378-394, 2005
1742005
Private circuits II: Keeping secrets in tamperable circuits
Y Ishai, M Prabhakaran, A Sahai, D Wagner
Annual International Conference on the Theory and Applications of …, 2006
1702006
The system can't perform the operation now. Try again later.
Articles 1–20