Private circuits: Securing hardware against probing attacks Y Ishai, A Sahai, D Wagner
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
1275 2003 Extending oblivious transfers efficiently Y Ishai, J Kilian, K Nissim, E Petrank
Annual International Cryptology Conference, 145-161, 2003
1016 2003 Protecting data privacy in private information retrieval schemes Y Gertner, Y Ishai, E Kushilevitz, T Malkin
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
709 1998 Zero-knowledge proofs from secure multiparty computation Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai
SIAM Journal on Computing 39 (3), 1121-1152, 2009
698 * 2009 Founding cryptography on oblivious transfer–efficiently Y Ishai, M Prabhakaran, A Sahai
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
619 2008 Keyword search and oblivious pseudorandom functions MJ Freedman, Y Ishai, B Pinkas, O Reingold
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
594 2005 Priced oblivious transfer: How to sell digital goods B Aiello, Y Ishai, O Reingold
International Conference on the Theory and Applications of Cryptographic …, 2001
576 2001 Ligero: Lightweight sublinear arguments without a trusted setup S Ames, C Hazay, Y Ishai, M Venkitasubramaniam
Proceedings of the 2017 acm sigsac conference on computer and communications …, 2017
508 2017 Succinct non-interactive arguments via linear interactive proofs N Bitansky, A Chiesa, Y Ishai, R Ostrovsky, O Paneth
Journal of Cryptology 35 (3), 15, 2022
448 * 2022 Function secret sharing E Boyle, N Gilboa, Y Ishai
Annual international conference on the theory and applications of …, 2015
425 2015 Cryptography in B Applebaum, Y Ishai, E Kushilevitz
SIAM Journal on Computing 36 (4), 845-888, 2006
404 2006 Function secret sharing: Improvements and extensions E Boyle, N Gilboa, Y Ishai
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
366 2016 Share conversion, pseudorandom secret-sharing and applications to secure computation R Cramer, I Damgård, Y Ishai
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
356 2005 Breaking the o (n/sup 1/(2k-1)/) barrier for information-theoretic private information retrieval A Beimel, Y Ishai, E Kushilevitz, JF Raymond
The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002 …, 2002
347 2002 Randomizing polynomials: A new representation with applications to round-efficient secure computation Y Ishai, E Kushilevitz
Proceedings 41st Annual Symposium on Foundations of Computer Science, 294-304, 2000
345 2000 Evaluating branching programs on encrypted data Y Ishai, A Paskin
Theory of Cryptography Conference, 575-594, 2007
315 2007 Batch codes and their applications Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
312 2004 Reducing the servers' computation in private information retrieval: PIR with preprocessing A Beimel, Y Ishai, T Malkin
Journal of Cryptology 17 (2), 125-151, 2004
289 * 2004 Distributed point functions and their applications N Gilboa, Y Ishai
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
285 2014 Efficient pseudorandom correlation generators: Silent OT extension and more E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
281 2019