BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Canada
1 × Denmark
1 × Finland
1 × France
1 × Japan
1 × Latvia
1 × Poland
1 × Spain
2 × Greece
6 × USA
Collaborated with:
E.Kushilevitz R.Ostrovsky A.Sahai T.Malkin A.Beimel H.Wee B.Dubrov R.N.Wright K.Nissim M.Prabhakaran B.Applebaum O.Barkol E.Weinreb G.D.Crescenzo S.Agrawal D.Khurana A.Paskin-Cherniavsky M.J.Strauss Y.Lindell E.Petrank R.Gennaro T.Rabin Y.Gertner D.Genkin E.Tromer P.Harsha J.Kilian S.Venkatesh J.Feigenbaum M.Strauss X.Li D.Zuckerman
Talks about:
comput (8) secur (7) inform (6) privat (5) retriev (4) multiparti (3) theoret (3) complex (3) random (3) applic (3)

Person: Yuval Ishai

DBLP DBLP: Ishai:Yuval

Contributed to:

ICALP (1) 20152015
ICALP (1) 20142014
STOC 20142014
ICALP (1) 20132013
ICALP (1) 20102010
STOC 20082008
ICALP 20072007
STOC 20072007
STOC 20062006
ICALP 20042004
STOC 20042004
ICALP 20022002
ICALP 20012001
STOC 20012001
STOC 19991999
STOC 19981998

Wrote 21 papers:

ICALP-v1-2015-AgrawalIKP #complexity #encoding #perspective #random #statistics
Statistical Randomized Encodings: A Complexity Theoretic View (SA, YI, DK, APC), pp. 1–13.
Partial Garbling Schemes and Their Applications (YI, HW), pp. 650–662.
Circuits resilient to additive attacks with applications to secure computation (DG, YI, MP, AS, ET), pp. 495–504.
ICALP-v1-2013-IshaiKLOPSZ #generative #pseudo #robust
Robust Pseudorandom Generators (YI, EK, XL, RO, MP, AS, DZ), pp. 576–588.
ICALP-v1-2010-ApplebaumIK #performance #verification
From Secrecy to Soundness: Efficient Verification via Secure Computation (BA, YI, EK), pp. 152–163.
STOC-2008-BarkolIW #communication #replication
Communication in the presence of replication (OB, YI, EW), pp. 661–670.
STOC-2008-IshaiKOS #constant #encryption
Cryptography with constant computational overhead (YI, EK, RO, AS), pp. 433–442.
ICALP-2007-IshaiMSW #approximate #multi
Private Multiparty Sampling and Approximation of Vector Combinations (YI, TM, MJS, RNW), pp. 243–254.
STOC-2007-IshaiKOS #multi
Zero-knowledge from secure multiparty computation (YI, EK, RO, AS), pp. 21–30.
STOC-2006-DubrovI #complexity #on the #performance
On the randomness complexity of efficient sampling (BD, YI), pp. 711–720.
STOC-2006-IshaiKLP #black box
Black-box constructions for secure computation (YI, EK, YL, EP), pp. 99–108.
ICALP-2004-HarshaIKNV #communication
Communication Versus Computation (PH, YI, JK, KN, SV), pp. 745–756.
Batch codes and their applications (YI, EK, RO, AS), pp. 262–271.
Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials (YI, EK), pp. 244–256.
ICALP-2001-BeimelI #information retrieval
Information-Theoretic Private Information Retrieval: A Unified Construction (AB, YI), pp. 912–926.
ICALP-2001-FeigenbaumIMNSW #approximate #multi
Secure Multiparty Computation of Approximations (JF, YI, TM, KN, MS, RNW), pp. 927–938.
STOC-2001-GennaroIKR #complexity #multi
The round complexity of verifiable secret sharing and secure multicast (RG, YI, EK, TR), pp. 580–589.
STOC-1999-BeimelIKM #information retrieval
One-Way Functions Are Essential for Single-Server Private Information Retrieval (AB, YI, EK, TM), pp. 89–98.
STOC-1999-IshaiK #bound #information retrieval
Improved Upper Bounds on Information-Theoretic Private Information Retrieval (YI, EK), pp. 79–88.
Non-Interactive and Non-Malleable Commitment (GDC, YI, RO), pp. 141–150.
STOC-1998-GertnerIKM #information retrieval #privacy
Protecting Data Privacy in Private Information Retrieval Schemes (YG, YI, EK, TM), pp. 151–160.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.