Cryptographers' World
 

Yuval Ishai


Author's Web Page Link

35 papers in database with 1178 citations StarStar

H-number: 19

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Ran Canetti,  Ivan Damgard,  Stefan Dziembowski,  Yuval Ishai,  Tal Malkin,  Adaptive versus Non-Adaptive Security of Multi-Party Protocols, Journal of Cryptology, Volume 17(3), pp. 153 - 207, Springer, 2004.

[Cited 4 times ]

2. Amos Beimel,  Yuval Ishai,  Tal Malkin,  Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing, Journal of Cryptology, Volume 17(2), pp. 125 - 151, Springer, 2004.

[Cited 60 times Red Star]

3. Giovanni Di Crescenzo,  Yuval Ishai,  Rafail Ostrovsky,  Universal Service-Providers for Private Information Retrieval, Journal of Cryptology, Volume 14(1), pp. 37 - 74, Springer, 2001.

[Cited 36 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yuval Ishai,  Manoj Prabhakaran,  Amit Sahai,  Secure Arithmetic Computation with No Honest Majority, pp. 294 - 314, TCC 2009.

[Electronic Edition][Cited 10 times ]

2. Ivan Damgard,  Yuval Ishai,  Mikkel Krøigaard,  Jesper Buus Nielsen,  Adam Smith,  Scalable Multiparty Computation with Nearly Optimal Work and Resilience, pp. 241 - 261, CRYPTO 2008.

[Electronic Edition][Cited 6 times ]

3. Yuval Ishai,  Manoj Prabhakaran,  Amit Sahai,  Founding Cryptography on Oblivious Transfer - Efficiently, pp. 572 - 591, CRYPTO 2008.

[Electronic Edition][Cited 44 times ]

4. Yuval Ishai,  Eyal Kushilevitz,  Rafail Ostrovsky,  Amit Sahai,  Cryptography with constant computational overhead, pp. 433 - 442, STOC 2008.

[Electronic Edition][Cited 12 times ]

5. Jens Groth,  Yuval Ishai,  Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle, pp. 379 - 396, EUROCRYPT 2008.

[Electronic Edition][Cited 16 times ]

6. Danny Harnik,  Yuval Ishai,  Eyal Kushilevitz,  Jesper Buus Nielsen,  OT-Combiners via Secure Computation, pp. 393 - 411, TCC 2008.

[Electronic Edition][Cited 12 times ]

7. Eli Biham,  Yaron J. Goren,  Yuval Ishai,  Basing Weak Public-Key Cryptography on Strong One-Way Functions, pp. 55 - 72, TCC 2008.

[Electronic Edition][Cited 5 times ]

8. Yuval Ishai,  Eyal Kushilevitz,  Rafail Ostrovsky,  Amit Sahai,  Zero-knowledge from secure multiparty computation, pp. 21 - 30, STOC 2007.

[Electronic Edition][Cited 23 times ]

9. Yuval Ishai,  Anat Paskin,  Evaluating Branching Programs on Encrypted Data, pp. 575 - 594, TCC 2007.

[Electronic Edition][Cited 28 times ]

10. Danny Harnik,  Yuval Ishai,  Eyal Kushilevitz,  How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?, pp. 284 - 302, CRYPTO 2007.

[Electronic Edition][Cited 5 times ]

11. Benny Applebaum,  Yuval Ishai,  Eyal Kushilevitz,  Cryptography with Constant Input Locality, pp. 92 - 110, CRYPTO 2007.

[Electronic Edition][Cited 10 times ]

12. Yuval Ishai,  Eyal Kushilevitz,  Rafail Ostrovsky,  Amit Sahai,  Cryptography from Anonymity, pp. 239 - 248, FOCS 2006.

[Electronic Edition][Cited 15 times ]

13. Yuval Ishai,  Eyal Kushilevitz,  Yehuda Lindell,  Erez Petrank,  Black-box constructions for secure computation, pp. 99 - 108, STOC 2006.

[Electronic Edition][Cited 22 times ]

14. Yuval Ishai,  Manoj Prabhakaran,  Amit Sahai,  David Wagner,  Private Circuits II: Keeping Secrets in Tamperable Circuits, pp. 308 - 327, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 26 times ]

15. Yuval Ishai,  Eyal Kushilevitz,  Yehuda Lindell,  Erez Petrank,  On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation, pp. 483 - 500, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

16. Ivan Damgard,  Yuval Ishai,  Scalable Secure Multiparty Computation, pp. 501 - 520, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

17. Ivan Damgard,  Yuval Ishai,  Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator, pp. 378 - 394, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 44 times ]

18. Omer Barkol,  Yuval Ishai,  Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems, pp. 395 - 411, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

19. Yuval Ishai,  Eyal Kushilevitz,  Rafail Ostrovsky,  Sufficient Conditions for Collision-Resistant Hashing, pp. 445 - 456, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

20. Ronald Cramer,  Ivan Damgard,  Yuval Ishai,  Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation, pp. 342 - 362, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

21. Michael J. Freedman,  Yuval Ishai,  Benny Pinkas,  Omer Reingold,  Keyword Search and Oblivious Pseudorandom Functions, pp. 303 - 324, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 58 times Red Star]

22. Benny Applebaum,  Yuval Ishai,  Eyal Kushilevitz,  Cryptography in NC, pp. 166 - 175, FOCS 2004.

[Electronic Edition][Cited 33 times ]

23. Yuval Ishai,  Eyal Kushilevitz,  On the Hardness of Information-Theoretic Multiparty Computation, pp. 439 - 455, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 7 times ]

24. Yuval Ishai,  Joe Kilian,  Kobbi Nissim,  Erez Petrank,  Extending Oblivious Transfers Efficiently, pp. 145 - 161, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 73 times Red Star]

25. Yuval Ishai,  Amit Sahai,  David Wagner,  Private Circuits: Securing Hardware against Probing Attacks, pp. 463 - 481, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 84 times Red Star]

26. Ronald Cramer,  Serge Fehr,  Yuval Ishai,  Eyal Kushilevitz,  Efficient Multi-party Computation over Rings, pp. 596 - 613, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

27. Rosario Gennaro,  Yuval Ishai,  Eyal Kushilevitz,  Tal Rabin,  On 2-Round Secure Multiparty Computation, pp. 178 - 193, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

28. Amos Beimel,  Yuval Ishai,  Eyal Kushilevitz,  Jean-François Raymond,  Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval, pp. 261 - 270, FOCS 2002.

[Electronic Edition][Cited 97 times Red Star]

29. Ran Canetti,  Ivan Damgard,  Stefan Dziembowski,  Yuval Ishai,  Tal Malkin,  On Adaptive vs. Non-adaptive Security of Multiparty Protocols, pp. 262 - 279, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

30. William Aiello,  Yuval Ishai,  Omer Reingold,  Priced Oblivious Transfer: How to Sell Digital Goods, pp. 119 - 135, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 184 times Red StarRed Star]

31. Amos Beimel,  Yuval Ishai,  Tal Malkin,  Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing, pp. 55 - 73, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 83 times Red Star]

32. Niv Gilboa,  Yuval Ishai,  Compressing Cryptographic Resources, pp. 591 - 608, CRYPTO 1999.

[Electronic Edition][Cited 9 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...