Benny Pinkas

From MaRDI portal
Person:244225

Available identifiers

zbMath Open pinkas.bennyMaRDI QIDQ244225

List of research outcomes

PublicationDate of PublicationType
How to recover a secret with \(O(n)\) additions2024-02-02Paper
Oblivious key-value stores and amplification for private set intersection2022-04-22Paper
PSI from PaXoS: fast, malicious private set intersection2022-03-23Paper
SpOT-light: lightweight private set intersection from sparse OT extension2020-03-09Paper
Efficient circuit-based PSI with linear communication2020-02-04Paper
Efficient constant-round multi-party computation combining BMR and SPDZ2019-08-13Paper
Efficient scalable multiparty private set-intersection via garbled Bloom filters2018-10-17Paper
Fast distributed RSA key generation for semi-honest and malicious adversaries2018-09-26Paper
Fast garbling of circuits under standard assumptions2018-09-14Paper
Distributed SSH key management with proactive RSA threshold signatures2018-08-10Paper
Efficient circuit-based PSI via cuckoo hashing2018-07-17Paper
Committed MPC -- maliciously secure multiparty computation from homomorphic commitments2018-05-16Paper
Asymptotically Tight Bounds for Composing ORAM with PIR2017-06-13Paper
Oblivious transfer and polynomial evaluation2016-09-29Paper
Efficient set intersection with simulation-based security2016-04-07Paper
Efficient Constant Round Multi-party Computation Combining BMR and SPDZ2015-12-10Paper
An efficient protocol for secure two-party computation in the presence of malicious adversaries2015-05-12Paper
Non-Interactive Secure Computation Based on Cut-and-Choose2014-05-27Paper
Secure computation of functionalities based on Hamming distance and its application to computing document similarity2013-11-15Paper
Secure two-party computation via cut-and-choose oblivious transfer2013-01-04Paper
Secure Computation on the Web: Computing without Simultaneous Interaction2011-08-12Paper
The IPS Compiler: Optimizations, Variants and Concrete Efficiency2011-08-12Paper
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer2011-05-19Paper
Secure Set Intersection with Untrusted Hardware Tokens2011-02-11Paper
Secure computation of the median (and other elements of specified ranks)2010-09-21Paper
Oblivious RAM Revisited2010-08-24Paper
Privacy-Preserving Group Discovery with Linear Complexity2010-07-06Paper
The Design and Implementation of Protocol-Based Hidden Key Recovery2010-02-09Paper
Secure Two-Party Computation Is Practical2009-12-15Paper
Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles2009-08-06Paper
A proof of security of Yao's protocol for two-party computation2009-05-08Paper
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries2008-11-20Paper
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries2007-11-29Paper
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles2007-11-15Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Oblivious Polynomial Evaluation2006-06-01Paper
Theory of Cryptography2005-12-07Paper
Computationally secure oblivious transfer2005-05-13Paper
https://portal.mardi4nfdi.de/entity/Q47389372004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44348702003-11-26Paper
Privacy preserving data mining2002-12-01Paper
https://portal.mardi4nfdi.de/entity/Q45362842002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q27683322002-09-01Paper
Tracing traitors2002-08-15Paper
https://portal.mardi4nfdi.de/entity/Q45367932002-08-06Paper
https://portal.mardi4nfdi.de/entity/Q27074162001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q49418802000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42496671999-11-29Paper
https://portal.mardi4nfdi.de/entity/Q42493541999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42507711999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43645611997-11-17Paper
On the Impossibility of Private Key Cryptography with Weakly Random Keys1994-02-17Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Benny Pinkas