Follow
Yehuda Lindell
Yehuda Lindell
Cryptographer at Coinbase; Professor of Computer Science, Bar-Ilan University (on leave
Verified email at biu.ac.il - Homepage
Title
Cited by
Cited by
Year
Introduction to modern cryptography
J Katz, Y Lindell
CRC PRESS, 2007
3445*2007
Privacy preserving data mining
Y Lindell, B Pinkas
Journal of cryptology 15 (3), 177-206, 2002
23592002
Secure multiparty computation for privacy preserving data mining
Y Lindell
Encyclopedia of Data Warehousing and Mining, 1005-1009, 2005
8632005
A proof of security of yao’s protocol for two-party computation
Y Lindell, B Pinkas
Journal of Cryptology 22 (2), 161-188, 2009
8352009
Universally composable two-party and multi-party secure computation
R Canetti, Y Lindell, R Ostrovsky, A Sahai
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002
8352002
An efficient protocol for secure two-party computation in the presence of malicious adversaries
Y Lindell, B Pinkas
Journal of Cryptology 28 (2), 312-350, 2015
555*2015
Security against covert adversaries: Efficient protocols for realistic adversaries
Y Aumann, Y Lindell
Journal of cryptology 23 (2), 281-343, 2010
4172010
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
C Hazay, Y Lindell
Theory of Cryptography, 155-175, 2008
4112008
More efficient oblivious transfer and extensions for faster secure computation
G Asharov, Y Lindell, T Schneider, M Zohner
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3992013
A framework for password-based authenticated key exchange
R Gennaro, Y Lindell
International Conference on the Theory and Applications of Cryptographic …, 2003
3992003
A statistical theory for quantitative association rules
Y Aumann, Y Lindell
Journal of Intelligent Information Systems 20 (3), 255-283, 2003
3842003
Efficient Secure Two-Party Protocols: Techniques and Constructions
C Hazay, Y Lindell
Springer-Verlag New York Inc, 2010
3682010
Session-key generation using human passwords only
O Goldreich, Y Lindell
Journal of Cryptology 19 (3), 241-340, 2006
334*2006
Universally composable password-based key exchange
R Canetti, S Halevi, J Katz, Y Lindell, P MacKenzie
Advances in Cryptology–Eurocrypt 2005, 557-557, 2005
3162005
Secure two-party computation via cut-and-choose oblivious transfer
Y Lindell, B Pinkas
Theory of Cryptography, 329-346, 2011
3122011
Text mining at the term level
R Feldman, M Fresko, Y Kinar, Y Lindell, O Liphstat, M Rajman, Y Schler, ...
Principles of Data Mining and Knowledge Discovery, 65-73, 1998
3041998
On the limitations of universally composable two-party computation without set-up assumptions
R Canetti, E Kushilevitz, Y Lindell
Journal of Cryptology 19 (2), 135-167, 2006
2772006
High-throughput semi-honest secure three-party computation with an honest majority
T Araki, J Furukawa, Y Lindell, A Nof, K Ohara
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2732016
How to simulate it–a tutorial on the simulation proof technique
Y Lindell
Tutorials on the Foundations of Cryptography, 277-346, 2017
2652017
Aggregate message authentication codes
J Katz, AY Lindell
Cryptographers’ Track at the RSA Conference, 155-169, 2008
2632008
The system can't perform the operation now. Try again later.
Articles 1–20