Eyal Kushilevitz

From MaRDI portal
Person:294743

Available identifiers

zbMath Open kushilevitz.eyalDBLPk/EyalKushilevitzWikidataQ27996487 ScholiaQ27996487MaRDI QIDQ294743

List of research outcomes





PublicationDate of PublicationType
Anonymous permutation routing2024-08-02Paper
Cryptography from planted graphs: security with logarithmic-size messages2024-08-01Paper
Hard languages in NP \(\cap\) coNP and NIZK proofs from unstructured hardness2024-05-08Paper
Succinct computational secret sharing2024-05-08Paper
Additive randomized encodings and their applications2024-02-02Paper
Perfect MPC over layered graphs2024-02-02Paper
Random-index oblivious RAM2023-08-14Paper
Cryptography from one-way communication: on completeness of finite channels2023-03-29Paper
Two-party direct-sum questions through the lens of multiparty communication complexity2023-02-03Paper
Efficient 3-party distributed ORAM2022-12-16Paper
CNF-FSS and Its Applications2022-07-08Paper
Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration2022-04-22Paper
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND2021-03-30Paper
On fully secure MPC with solitary output2020-04-30Paper
Lower and upper bounds on the randomness complexity of private computations of AND2020-04-30Paper
Cryptographic sensing2020-03-09Paper
Sub-logarithmic distributed oblivious RAM with small block size2020-01-28Paper
https://portal.mardi4nfdi.de/entity/Q57433852019-05-10Paper
Best possible information-theoretic MPC2018-12-06Paper
The complexity of multiparty PSM protocols and related models2018-07-09Paper
https://portal.mardi4nfdi.de/entity/Q46380562018-05-03Paper
Minimizing locality of one-way functions via semi-private randomized encodings2018-04-26Paper
An Ω(D log(N/D)) lower bound for broadcast in radio networks2017-09-29Paper
Randomness vs. fault-tolerance2017-09-29Paper
Randomized mutual exclusion algorithms revisited2017-08-21Paper
Ad Hoc PSM Protocols: Secure Computation Without Coordination2017-06-23Paper
https://portal.mardi4nfdi.de/entity/Q29578812017-01-30Paper
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys2017-01-13Paper
Secure Protocol Transformations2016-10-27Paper
From randomizing polynomials to parallel algorithms2016-10-07Paper
Improved upper bounds on information-theoretic private information retrieval (extended abstract)2016-09-29Paper
One-way functions are essential for single-server private information retrieval2016-09-29Paper
Learning unions of high-dimensional boxes over the reals2016-06-16Paper
Secure multiparty computation with general interaction patterns2016-04-15Paper
Distribution design2016-04-15Paper
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption2016-04-08Paper
Amortizing randomness in private multiparty computations2016-03-02Paper
Secure Computation with Minimal Interaction, Revisited2015-12-10Paper
Cryptography with One-Way Communication2015-12-10Paper
Randomness in private computations2015-09-11Paper
Lower bounds for randomized mutual exclusion2015-05-07Paper
The round complexity of verifiable secret sharing and secure multicast2015-02-27Paper
Private approximation of NP-hard functions2015-02-27Paper
On the complexity of communication complexity2015-02-04Paper
Information-theoretically secure protocols and security under composition2014-11-25Paper
Black-box constructions for secure computation2014-11-25Paper
Choosing, agreeing, and eliminating in communication complexity2014-09-25Paper
Non-Interactive Secure Multiparty Computation2014-08-07Paper
How to Garble Arithmetic Circuits2014-07-30Paper
How to Garble Arithmetic Circuits2014-07-30Paper
The Communication Complexity of Set-Disjointness with Small Sets and 0-1 Intersection2014-07-25Paper
Extracting Correlations2014-07-25Paper
On the Cryptographic Complexity of the Worst Functions2014-02-18Paper
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys2013-09-17Paper
Robust Pseudorandom Generators2013-08-06Paper
On the Power of Correlated Randomness in Secure Computation2013-03-18Paper
Constant-Rate Oblivious Transfer from Noisy Channels2011-08-12Paper
Black-Box Constructions of Protocols for Secure Computation2011-07-29Paper
Partition arguments in multiparty communication complexity2011-06-07Paper
Efficient Non-interactive Secure Computation2011-05-27Paper
On Achieving the “Best of Both Worlds” in Secure Multiparty Computation2011-05-17Paper
Information-Theoretically Secure Protocols and Security under Composition2010-11-04Paper
Choosing, Agreeing, and Eliminating in Communication Complexity2010-09-07Paper
From Secrecy to Soundness: Efficient Verification via Secure Computation2010-09-07Paper
Secure Multiparty Computation with Minimal Interaction2010-08-24Paper
Learning with attribute costs2010-08-16Paper
Batch codes and their applications2010-08-15Paper
Zero-Knowledge Proofs from Secure Multiparty Computation2010-07-07Paper
Approximation, Randomization, and Combinatorial Optimization.. Algorithms and Techniques2010-05-26Paper
Cryptography with constant input locality2009-11-13Paper
Partition Arguments in Multiparty Communication Complexity2009-07-14Paper
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?2009-03-10Paper
Public Key Encryption That Allows PIR Queries2009-03-10Paper
Cryptography with Constant Input Locality2009-03-10Paper
https://portal.mardi4nfdi.de/entity/Q35497282009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35495932009-01-05Paper
Testing monotonicity over graph products2008-09-04Paper
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)2008-08-20Paper
Distribution-Free Property-Testing2008-08-14Paper
Distribution-free connectivity testing for sparse graphs2008-05-27Paper
OT-Combiners via Secure Computation2008-03-05Paper
Computationally private randomizing polynomials and their applications2007-11-05Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Cryptography in $NC^0$2007-09-07Paper
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation2007-09-04Paper
On Pseudorandom Generators with Linear Stretch in NC02007-08-28Paper
On the limitations of universally composable two-party computation without set-up assumptions2006-08-14Paper
Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques2006-07-07Paper
https://portal.mardi4nfdi.de/entity/Q33749032006-03-01Paper
Theory of Cryptography2005-12-07Paper
Computation in Noisy Radio Networks2005-09-16Paper
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques2005-08-25Paper
Automata, Languages and Programming2005-08-24Paper
General constructions for information-theoretic private information retrieval2005-08-03Paper
Private information retrieval2005-01-25Paper
https://portal.mardi4nfdi.de/entity/Q47371612004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44713712004-07-28Paper
Private computation using a PEZ dispenser.2004-03-14Paper
Amortizing Randomness in Private Multiparty Computations2004-01-08Paper
https://portal.mardi4nfdi.de/entity/Q44348692003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44349012003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44142642003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q44091172003-06-30Paper
Learning functions represented as multiplicity automata2003-06-25Paper
PAC learning with nasty noise.2003-01-21Paper
The query complexity of finding local minima in the lattice2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q27244302002-10-28Paper
https://portal.mardi4nfdi.de/entity/Q45425322002-09-17Paper
https://portal.mardi4nfdi.de/entity/Q45425542002-09-17Paper
https://portal.mardi4nfdi.de/entity/Q45425842002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q45269972001-02-28Paper
Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces2000-10-18Paper
Protecting data privacy in private information retrieval schemes2000-08-27Paper
Adaptive packet routing for bursty adversarial traffic2000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q49553132000-07-24Paper
Computing Functions of a Shared Secret2000-07-20Paper
Randomness versus fault-tolerance2000-05-08Paper
https://portal.mardi4nfdi.de/entity/Q42319092000-04-26Paper
Reducibility and Completeness in Private Computations2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42493222000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q49407122000-03-01Paper
The linear-array conjecture in communication complexity is false1999-12-08Paper
https://portal.mardi4nfdi.de/entity/Q42285091999-10-04Paper
Characterizing linear size circuits in terms of privacy1999-09-22Paper
https://portal.mardi4nfdi.de/entity/Q42341051999-06-29Paper
https://portal.mardi4nfdi.de/entity/Q42496301999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42501871999-06-17Paper
Learning boxes in high dimension1999-05-18Paper
https://portal.mardi4nfdi.de/entity/Q42284481999-05-18Paper
Log-Space Polynomial End-to-End Communication1998-09-21Paper
Lower Bounds for Randomized Mutual Exclusion1998-09-21Paper
On Learning Read-k-Satisfy-j DNF1998-09-21Paper
A simple algorithm for learning O(log n)-term DNF1998-07-23Paper
A Randomness-Rounds Tradeoff in Private Computation1998-05-11Paper
An $\Omega(D\log (N/D))$ Lower Bound for Broadcast in Radio Networks1998-05-10Paper
Randomness in Private Computations1998-02-09Paper
Online learning versus offline learning1997-12-17Paper
On learning visual concepts and DNF formulae1996-11-04Paper
Communication Complexity1996-04-24Paper
Witness sets for families of binary vectors1996-02-26Paper
Amortized Communication Complexity1996-01-28Paper
Fractional Covers and Communication Complexity1995-07-10Paper
Learning by distances1995-07-10Paper
Private Computations over the Integers1995-06-27Paper
On Lotteries with Unique Winners1995-05-04Paper
Learning Decision Trees Using the Fourier Spectrum1994-11-24Paper
Privacy, additional information and communication1994-10-26Paper
On the structure of the privacy hierarchy1994-05-26Paper
Secret sharing over infinite domains1993-08-29Paper
A perfect zero-knowledge proof system for a problem equivalent to the discrete logarithm1993-08-29Paper
A communication-privacy tradeoff for modular addition1993-05-16Paper
Privacy and Communication Complexity1992-09-27Paper
A Zero-One Law for Boolean Privacy1991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q57504021990-01-01Paper

Research outcomes over time

This page was built for person: Eyal Kushilevitz