Cryptographers' World
 

Benny Pinkas


Author's Web Page Link

18 papers in database with 2969 citations StarStarStar

H-number: 16

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Moni Naor,  Benny Pinkas,  Computationally Secure Oblivious Transfer, Journal of Cryptology, Volume 18(1), pp. 1 - 35, Springer, 2005.

[Cited 26 times ]

2. Yehuda Lindell,  Benny Pinkas,  Privacy Preserving Data Mining, Journal of Cryptology, Volume 15(3), pp. 177 - 206, Springer, 2002.

[Cited 946 times Red StarRed StarRed StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Benny Pinkas,  Thomas Schneider,  Nigel P. Smart,  Stephen C. Williams,  Secure Two-Party Computation Is Practical, pp. 250 - 267, ASIACRYPT 2009.

[Electronic Edition][Cited 19 times ]

2. Ayman Jarrous,  Benny Pinkas,  Secure Hamming Distance Based Computation and Its Applications, pp. 107 - 124, ACNS 2009.

[Electronic Edition][Cited 9 times ]

3. Yehuda Lindell,  Benny Pinkas,  An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries, pp. 52 - 78, EUROCRYPT 2007.

[Electronic Edition][Cited 68 times Red Star]

4. Michael J. Freedman,  Yuval Ishai,  Benny Pinkas,  Omer Reingold,  Keyword Search and Oblivious Pseudorandom Functions, pp. 303 - 324, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 58 times Red Star]

5. Michael J. Freedman,  Kobbi Nissim,  Benny Pinkas,  Efficient Private Matching and Set Intersection, pp. 1 - 19, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 344 times Red StarRed StarRed Star]

6. Gagan Aggarwal,  Nina Mishra,  Benny Pinkas,  Secure Computation of the k th-Ranked Element, pp. 40 - 55, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 111 times Red StarRed Star]

7. Benny Pinkas,  Fair Secure Two-Party Computation, pp. 87 - 105, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 54 times Red Star]

8. Moni Naor,  Benny Pinkas,  Distributed Oblivious Transfer, pp. 205 - 219, ASIACRYPT 2000.

[Electronic Edition][Cited 57 times Red Star]

9. Yehuda Lindell,  Benny Pinkas,  Privacy Preserving Data Mining, pp. 36 - 54, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1514 times Red StarRed StarRed StarRed StarRed Star]

10. Moni Naor,  Benny Pinkas,  Efficient Trace and Revoke Schemes, pp. 1 - 20, FC 2000.

[Electronic Edition][Cited 172 times Red StarRed Star]

11. Moni Naor,  Benny Pinkas,  Oblivious Transfer with Adaptive Queries, pp. 573 - 590, CRYPTO 1999.

[Electronic Edition][Cited 80 times Red Star]

12. Moni Naor,  Benny Pinkas,  Omer Reingold,  Distributed Pseudo-random Functions and KDCs, pp. 327 - 346, EUROCRYPT 1999.

[Electronic Edition][Cited 81 times Red Star]

13. Moni Naor,  Benny Pinkas,  Threshold Traitor Tracing, pp. 502 - 517, CRYPTO 1998.

[Electronic Edition][Cited 113 times Red StarRed Star]

14. Moni Naor,  Benny Pinkas,  Secure and Efficient Metering, pp. 576 - 590, EUROCRYPT 1998.

[Electronic Edition][Cited 79 times Red Star]

15. Moni Naor,  Benny Pinkas,  Visual Authentication and Identification, pp. 322 - 336, CRYPTO 1997.

[Electronic Edition][Cited 164 times Red StarRed Star]

16. James L. McInnes,  Benny Pinkas,  On the Impossibility of Private Key Cryptography with Weakly Random Keys, pp. 421 - 435, CRYPTO 1990.

[Electronic Edition][Cited 20 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...