Private Circuits: Securing Hardware against Probing Attacks. Y Ishai, A Sahai, DA Wagner
CRYPTO 2729, 463-481, 2003
996 2003 Extending Oblivious Transfers Efficiently. Y Ishai, J Kilian, K Nissim, E Petrank
Crypto 2729, 145-161, 2003
809 2003 Protecting data privacy in private information retrieval schemes Y Gertner, Y Ishai, E Kushilevitz, T Malkin
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
637 1998 Priced oblivious transfer: How to sell digital goods B Aiello, Y Ishai, O Reingold
Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001
524 2001 Founding cryptography on oblivious transfer–efficiently Y Ishai, M Prabhakaran, A Sahai
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
522 2008 Zero-knowledge proofs from secure multiparty computation Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai
SIAM Journal on Computing 39 (3), 1121-1152, 2009
460 * 2009 Keyword Search and Oblivious Pseudorandom Functions. MJ Freedman, Y Ishai, B Pinkas, O Reingold
TCC 3378, 303-324, 2005
452 2005 Succinct Non-interactive Arguments via Linear Interactive Proofs. N Bitansky, A Chiesa, Y Ishai, R Ostrovsky, O Paneth
TCC 7785, 315-333, 2013
342 2013 Cryptography in B Applebaum, Y Ishai, E Kushilevitz
SIAM Journal on Computing 36 (4), 845-888, 2006
338 2006 Breaking the o (n/sup 1/(2k-1)/) barrier for information-theoretic private information retrieval A Beimel, Y Ishai, E Kushilevitz, JF Raymond
The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002 …, 2002
309 2002 Ligero: Lightweight sublinear arguments without a trusted setup S Ames, C Hazay, Y Ishai, M Venkitasubramaniam
Proceedings of the 2017 acm sigsac conference on computer and communications …, 2017
306 2017 Randomizing polynomials: A new representation with applications to round-efficient secure computation Y Ishai, E Kushilevitz
Proceedings 41st Annual Symposium on Foundations of Computer Science, 294-304, 2000
303 2000 Share conversion, pseudorandom secret-sharing and applications to secure computation R Cramer, I Damgård, Y Ishai
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
270 2005 Evaluating branching programs on encrypted data Y Ishai, A Paskin
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
267 2007 Secure multiparty computation of approximations J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright
ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006
248 * 2006 Batch codes and their applications Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
246 2004 Function secret sharing E Boyle, N Gilboa, Y Ishai
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
235 2015 From secrecy to soundness: Efficient verification via secure computation B Applebaum, Y Ishai, E Kushilevitz
Work 716835, 0627781, 2010
219 2010 Founding cryptography on tamper-proof hardware tokens V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
217 2010 Non-interactive and non-malleable commitment G Di Crescenzo, Y Ishai, R Ostrovsky
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
216 1998