Benny applebaum
Benny applebaum
Electrical Engineering School, Tel-Aviv University
Bestätigte E-Mail-Adresse bei post.tau.ac.il - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
B Applebaum, D Cash, C Peikert, A Sahai
Annual International Cryptology Conference, 595-618, 2009
5752009
Cryptography in NC 0
B Applebaum, Y Ishai, E Kushilevitz
SIAM Journal on Computing 36 (4), 845-888, 2006
2842006
From secrecy to soundness: Efficient verification via secure computation
B Applebaum, Y Ishai, E Kushilevitz
International Colloquium on Automata, Languages, and Programming, 152-163, 2010
2072010
Public-key cryptography from different assumptions
B Applebaum, B Barak, A Wigderson
Proceedings of the forty-second ACM symposium on Theory of computing, 171-180, 2010
1392010
Computationally private randomizing polynomials and their applications
B Applebaum, Y Ishai, E Kushilevitz
computational complexity 15 (2), 115-162, 2006
1362006
Obfuscating circuits via composite-order graded encoding
B Applebaum, Z Brakerski
Theory of Cryptography Conference, 528-556, 2015
1012015
Key-dependent message security: Generic amplification and completeness
B Applebaum
Journal of cryptology 27 (3), 429-451, 2014
1012014
How to garble arithmetic circuits
B Applebaum, Y Ishai, E Kushilevitz
SIAM Journal on Computing 43 (2), 905-929, 2014
892014
Cryptography with constant input locality
B Applebaum, Y Ishai, E Kushilevitz
Journal of Cryptology 22 (4), 429-469, 2009
872009
Pseudorandom generators with long stretch and low locality from random local one-way functions
B Applebaum
SIAM Journal on Computing 42 (5), 2008-2037, 2013
802013
Semantic Security under Related-Key Attacks and Applications.
B Applebaum, D Harnik, Y Ishai
ICS 2011, 45-60, 2011
792011
On Pseudorandom Generators with Linear Stretch in NC0
B Applebaum, Y Ishai, E Kushilevitz
Computational Complexity 17 (1), 38-69, 2008
752008
Collaborative, privacy-preserving data aggregation at scale
B Applebaum, H Ringberg, MJ Freedman, M Caesar, J Rexford
International Symposium on Privacy Enhancing Technologies Symposium, 56-74, 2010
692010
Encoding functions with constant online rate, or how to compress garbled circuit keys
B Applebaum, Y Ishai, E Kushilevitz, B Waters
SIAM Journal on Computing 44 (2), 433-466, 2015
532015
Algebraic attacks against random local functions and their countermeasures
B Applebaum, S Lovett
SIAM Journal on Computing 47 (1), 52-79, 2018
482018
Bootstrapping obfuscators via fast pseudorandom functions
B Applebaum
International Conference on the Theory and Application of Cryptology and …, 2014
482014
Cryptographic hardness of random local functions
B Applebaum
Computational complexity 25 (3), 667-722, 2016
462016
Secure arithmetic computation with constant computational overhead
B Applebaum, I Damgård, Y Ishai, M Nielsen, L Zichron
Annual International Cryptology Conference, 223-254, 2017
412017
A dichotomy for local small-bias generators
B Applebaum, A Bogdanov, A Rosen
Journal of Cryptology 29 (3), 577-596, 2016
412016
On basing lower-bounds for learning on worst-case assumptions
B Applebaum, B Barak, D Xiao
2008 49th Annual IEEE Symposium on Foundations of Computer Science, 211-220, 2008
412008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20