Shai Halevi

From MaRDI portal
(Redirected from Person:421034)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Achievable \textsf{CCA2} relaxation for homomorphic encryption
Journal of Cryptology
2024-12-27Paper
Weighted secret sharing from wiretap channels
 
2024-11-22Paper
SPRINT: high-throughput robust distributed Schnorr signatures
 
2024-11-13Paper
Security with functional re-encryption from CPA
 
2024-08-02Paper
Additive randomized encodings and their applications
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Random-index oblivious RAM
Theory of Cryptography
2023-08-14Paper
Achievable \textsf{CCA2} relaxation for homomorphic encryption
Theory of Cryptography
2023-08-14Paper
Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation
 
2023-04-13Paper
Random-index PIR and applications
 
2023-04-13Paper
Homomorphic Encryption Standard
Protecting Privacy through Homomorphic Encryption
2022-11-02Paper
Practical non-interactive publicly verifiable secret sharing with thousands of parties
 
2022-08-30Paper
YOSO: You only speak once. Secure MPC with stateless ephemeral roles
 
2022-04-22Paper
Homomorphic encryption
Tutorials on the Foundations of Cryptography
2022-01-12Paper
Can a public blockchain keep a secret?
 
2021-12-01Paper
Round-optimal secure multi-party computation
Journal of Cryptology
2021-07-30Paper
Bootstrapping for helib
Journal of Cryptology
2021-04-07Paper
Homomorphic encryption for finite automata
 
2020-05-05Paper
On fully secure MPC with solitary output
 
2020-04-30Paper
Compressible FHE with applications to PIR
 
2020-04-30Paper
An improved RNS variant of the BFV homomorphic encryption scheme
 
2020-01-28Paper
Best possible information-theoretic MPC
 
2018-12-06Paper
Round-optimal secure multi-party computation
Lecture Notes in Computer Science
2018-09-26Paper
Faster homomorphic linear transformations in HElib
 
2018-09-12Paper
MMH: Software message authentication in the Gbit/second rates
Fast Software Encryption
2018-05-09Paper
Non-interactive multiparty computation without correlated randomness
 
2018-02-23Paper
Four round secure computation without setup
 
2018-01-19Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
Algorithmica
2018-01-05Paper
Potential function analysis of greedy hot-potato routing
Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing - PODC '94
2017-09-29Paper
Maintaining authenticated communication in the presence of break-ins
Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97
2017-09-29Paper
Cryptanalyses of Candidate Branching Program Obfuscators
Lecture Notes in Computer Science
2017-06-23Paper
Spooky Encryption and Its Applications
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Candidate indistinguishability obfuscation and functional encryption for all circuits
SIAM Journal on Computing
2016-07-04Paper
Secure multiparty computation with general interaction patterns
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Functional encryption without obfuscation
Theory of Cryptography
2016-04-08Paper
Private database access with HE-over-ORAM architecture
Applied Cryptography and Network Security
2016-03-10Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
Lecture Notes in Computer Science
2015-12-10Paper
Practical and provably-secure commitment schemes from collision-free hashing
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Bootstrapping for HElib
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Graph-induced multilinear maps from lattices
Theory of Cryptography
2015-07-06Paper
Clock synchronization with faults and recoveries (extended abstract)
Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing
2015-03-03Paper
Private approximation of NP-hard functions
Proceedings of the thirty-third annual ACM symposium on Theory of computing
2015-02-27Paper
Optimizing ORAM and Using It Efficiently for Secure Computation
Privacy Enhancing Technologies
2014-08-19Paper
Algorithms in HElib
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Garbled RAM revisited
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Two-round secure MPC from indistinguishability obfuscation
Theory of Cryptography
2014-02-18Paper
Private database queries using somewhat homomorphic encryption
Applied Cryptography and Network Security
2014-01-24Paper
Discrete Gaussian leftover hash lemma over infinite domains
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Attribute-based encryption for circuits from multilinear maps
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Candidate Multilinear Maps from Ideal Lattices
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Packed ciphertexts in LWE-based homomorphic encryption
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Ring switching in BGV-style homomorphic encryption
Lecture Notes in Computer Science
2012-09-25Paper
Homomorphic evaluation of the AES circuit
Lecture Notes in Computer Science
2012-09-25Paper
Better bootstrapping in fully homomorphic encryption
Public Key Cryptography – PKC 2012
2012-07-20Paper
Fully homomorphic encryption with polylog overhead
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Leakage-Tolerant Interactive Protocols
Theory of Cryptography
2012-06-15Paper
Smooth projective hashing and two-message oblivious transfer
Journal of Cryptology
2012-05-23Paper
Program obfuscation with leaky hardware
Lecture Notes in Computer Science
2011-12-02Paper
Collision-free hashing from lattice problems
Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation
2011-08-19Paper
Secure computation on the web: computing without simultaneous interaction
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Implementing Gentry's fully-homomorphic encryption scheme
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
After-the-fact leakage in public-key encryption
Theory of Cryptography
2011-05-19Paper
One-pass HMQV and asymmetric key-wrapping
Public Key Cryptography – PKC 2011
2011-03-15Paper
The random oracle methodology, revisited.
Journal of the ACM
2011-02-01Paper
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Fully homomorphic encryption over the integers
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
A simple BGN-type cryptosystem from LWE
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
More on key wrapping
Selected Areas in Cryptography
2009-12-09Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Invertible Universal Hashing and the TET Encryption Mode
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Hierarchical Identity Based Encryption with Polynomially Many Levels
Theory of Cryptography
2009-03-03Paper
Circular-Secure Encryption from Decision Diffie-Hellman
Lecture Notes in Computer Science
2009-02-10Paper
Universally Composable Password-Based Key Exchange
Lecture Notes in Computer Science
2008-05-06Paper
Cryptanalysis of ISO/IEC 9796-1
Journal of Cryptology
2008-04-16Paper
Threshold RSA for Dynamic and Ad-Hoc Groups
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
On Seed-Incompressible Functions
Theory of Cryptography
2008-03-05Paper
Degradation and Amplification of Computational Hardness
Theory of Cryptography
2008-03-05Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Chosen‐Ciphertext Security from Identity‐Based Encryption
SIAM Journal on Computing
2007-10-22Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Strengthening Digital Signatures Via Randomized Hashing
Lecture Notes in Computer Science
2007-09-04Paper
Mitigating Dictionary Attacks on Password-Protected Local Storage
Lecture Notes in Computer Science
2007-09-04Paper
A forward-secure public-key encryption scheme
Journal of Cryptology
2007-08-20Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Exposure-resilient functions and all-or-nothing transforms
 
2006-03-01Paper
Computing inverses over a shared secret modulus
 
2006-03-01Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
scientific article; zbMATH DE number 2089137 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 2081057 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2009960 (Why is no real title available?)
 
2003-11-26Paper
scientific article; zbMATH DE number 1942441 (Why is no real title available?)
 
2003-06-30Paper
scientific article; zbMATH DE number 1848287 (Why is no real title available?)
 
2003-02-04Paper
scientific article; zbMATH DE number 1775406 (Why is no real title available?)
 
2002-09-24Paper
scientific article; zbMATH DE number 1759774 (Why is no real title available?)
 
2002-07-28Paper
scientific article; zbMATH DE number 1418297 (Why is no real title available?)
 
2000-07-26Paper
Efficient commitment schemes with bounded sender and unbounded receiver
Journal of Cryptology
2000-05-22Paper
Maintaining authenticated communication in the presence of break-ins
Journal of Cryptology
2000-05-08Paper
scientific article; zbMATH DE number 1302853 (Why is no real title available?)
 
1999-06-17Paper
Secure Hash-and-Sign Signatures Without the Random Oracle
Advances in Cryptology — EUROCRYPT ’99
1999-01-01Paper
Potential function analysis of greedy hot-potato routing
Theory of Computing Systems
1998-08-03Paper
scientific article; zbMATH DE number 1088230 (Why is no real title available?)
 
1998-06-25Paper
scientific article; zbMATH DE number 1088229 (Why is no real title available?)
 
1998-01-07Paper
scientific article; zbMATH DE number 1030983 (Why is no real title available?)
 
1997-11-23Paper


Research outcomes over time


This page was built for person: Shai Halevi