Personal profile
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
Cryptography with Weak Privacy
Beimel, A., Ishai, Y., Kushilevitz, E. & Li, H., 1 Jan 2026, Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings. Applebaum, B. & Lin, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 415-447 33 p. (Lecture Notes in Computer Science; vol. 16271 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Polynomial Secret Sharing Schemes and Algebraic Matroids
Beimel, A., Farràs, O. & Moya, A., 1 Jan 2026, Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings. Applebaum, B. & Lin, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 428-461 34 p. (Lecture Notes in Computer Science; vol. 16269 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes
Alon, B., Beimel, A. & Lasri, O., 1 Jan 2026, Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings. Applebaum, B. & Lin, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 365-398 34 p. (Lecture Notes in Computer Science; vol. 16269 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Distributed Oblivious Transfer
Beimel, A., 1 Jan 2025, Encyclopedia of Cryptography, Security and Privacy, Third Edition. Springer Nature, p. 686-688 3 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › peer-review
-
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs
Alon, B., Beimel, A., Ben David, T., Omri, E. & Paskin-Cherniavsky, A., 1 Jan 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 548-580 33 p. (Lecture Notes in Computer Science; vol. 15367 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
4 Scopus citations -
Robust Private Information Retrieval
Beimel, A., 1 Jan 2025, Encyclopedia of Cryptography, Security and Privacy, Third Edition. Springer Nature, p. 2122-2124 3 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › peer-review
-
Secret-Sharing Schemes for High Slices
Beimel, A., Farràs, O., Lasri, O. & Nir, O., 1 Jan 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 581-613 33 p. (Lecture Notes in Computer Science; vol. 15367 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
1 Scopus citations -
COMPLETE CHARACTERIZATION OF FAIRNESS IN SECURE TWO-PARTY COMPUTATION OF BOOLEAN FUNCTIONS∗
Asharov, G., Beimel, A., Makriyannis, N. & Omri, E., 1 Jan 2024, In: SIAM Journal on Computing. 53, 5, p. 1381-1408 28 p.Research output: Contribution to journal › Article › peer-review
-
Structural Lower Bounds on Black-Box Constructions of Pseudorandom Functions
Beimel, A., Malkin, T. & Mazor, N., 1 Jan 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 459-488 30 p. (Lecture Notes in Computer Science; vol. 14924 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
3 Scopus citations -
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages
Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V., 1 Jan 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 286-315 30 p. (Lecture Notes in Computer Science; vol. 14369 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access6 Scopus citations
-
Computational and Perfect Secret Sharing and Its Applications to Secure Computation
Beimel, A. (PI) & Omri, E. (CoPI)
1/01/25 → 31/12/29
Project: Research
-
-
Secure Computation without an Honest Majority -- Theory, Practice, and the Interplay between Them
Beimel, A. (PI) & Omri, E. (CoPI)
1/01/17 → 31/12/20
Project: Research
-
Secure Computation – Feasibility, Infeasibility, and Applications to Differential Privacy
Beimel, A. (PI) & Omri, E. (CoPI)
1/01/13 → 1/01/17
Project: Research
-