Private circuits: Securing hardware against probing attacks Y Ishai, A Sahai, D Wagner Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003 | 1044 | 2003 |
Extending Oblivious Transfers Efficiently. Y Ishai, J Kilian, K Nissim, E Petrank Crypto 2729, 145-161, 2003 | 842 | 2003 |
Protecting data privacy in private information retrieval schemes Y Gertner, Y Ishai, E Kushilevitz, T Malkin Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 648 | 1998 |
Founding cryptography on oblivious transfer–efficiently Y Ishai, M Prabhakaran, A Sahai Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 542 | 2008 |
Priced oblivious transfer: How to sell digital goods B Aiello, Y Ishai, O Reingold Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001 | 531 | 2001 |
Zero-knowledge proofs from secure multiparty computation Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai SIAM Journal on Computing 39 (3), 1121-1152, 2009 | 483* | 2009 |
Keyword Search and Oblivious Pseudorandom Functions. MJ Freedman, Y Ishai, B Pinkas, O Reingold TCC 3378, 303-324, 2005 | 473 | 2005 |
Succinct Non-Interactive Arguments via Linear Interactive Proofs N Bitansky, A Chiesa, Y Ishai, R Ostrovsky, O Paneth Journal of Cryptology 35 (3), 15, 2022 | 359* | 2022 |
Cryptography in B Applebaum, Y Ishai, E Kushilevitz SIAM Journal on Computing 36 (4), 845-888, 2006 | 350 | 2006 |
Ligero: Lightweight sublinear arguments without a trusted setup S Ames, C Hazay, Y Ishai, M Venkitasubramaniam Proceedings of the 2017 acm sigsac conference on computer and communications …, 2017 | 320 | 2017 |
Breaking the o (n/sup 1/(2k-1)/) barrier for information-theoretic private information retrieval A Beimel, Y Ishai, E Kushilevitz, JF Raymond The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002 …, 2002 | 318 | 2002 |
Randomizing polynomials: A new representation with applications to round-efficient secure computation Y Ishai, E Kushilevitz Proceedings 41st Annual Symposium on Foundations of Computer Science, 294-304, 2000 | 310 | 2000 |
Share conversion, pseudorandom secret-sharing and applications to secure computation R Cramer, I Damgård, Y Ishai Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 284 | 2005 |
Evaluating branching programs on encrypted data Y Ishai, A Paskin Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007 | 275 | 2007 |
Function secret sharing E Boyle, N Gilboa, Y Ishai Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 259 | 2015 |
Batch codes and their applications Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004 | 254 | 2004 |
Secure multiparty computation of approximations J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006 | 251* | 2006 |
From secrecy to soundness: Efficient verification via secure computation B Applebaum, Y Ishai, E Kushilevitz Work 716835, 0627781, 2010 | 224 | 2010 |
Founding cryptography on tamper-proof hardware tokens V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 220 | 2010 |
Reducing the servers' computation in private information retrieval: PIR with preprocessing A Beimel, Y Ishai, T Malkin Journal of Cryptology 17 (2), 125-151, 2004 | 220* | 2004 |