1997 …2025

Research activity per year

Fingerprint

Dive into the research topics where Niv Yehuda Gilboa is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Improved Constructions for Distributed Multi-Point Functions

    Boyle, E., Gilboa, N., Hamilis, M., Ishai, Y. & Tu, Y., 1 Jan 2025, Proceedings - 46th IEEE Symposium on Security and Privacy, SP 2025. Blanton, M., Enck, W. & Nita-Rotaru, C. (eds.). Institute of Electrical and Electronics Engineers, p. 2414-2432 19 p. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer

    Boyle, E., Gilboa, N., Hamilis, M., Ishai, Y. & Nof, A., 1 Jan 2025, Proceedings - 46th IEEE Symposium on Security and Privacy, SP 2025. Blanton, M., Enck, W. & Nita-Rotaru, C. (eds.). Institute of Electrical and Electronics Engineers, p. 2433-2452 20 p. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators

    Agarwal, A., Boyle, E., Gilboa, N., Ishai, Y., Kelkar, M. & Ma, Y., 1 Jan 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 346-383 38 p. (Lecture Notes in Computer Science; vol. 14927 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Prune+PlumTree - Finding Eviction Sets at Scale

    Kessous, T. & Gilboa, N., 1 Jan 2024, Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers, p. 3754-3772 19 p. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Secure Sorting and Selection via Function Secret Sharing

    Agarwal, A., Boyle, E., Chandran, N., Gilboa, N., Gupta, D., Ishai, Y., Kelkar, M. & Ma, Y., 9 Dec 2024, CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 3023-3037 15 p. (CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Arithmetic Sketching

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 1 Jan 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 171-202 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Characterization and Detection of Cross-Router Covert Channels

    Shvartzman, O., Ovadya, A., Zvi, K., Shwartz, O., Ogen, R., Mallah, Y., Gilboa, N. & Oren, Y., 1 Apr 2023, In: Computers and Security. 127, 103125.

    Research output: Contribution to journalArticlepeer-review

    4 Scopus citations
  • Oblivious Transfer with Constant Computational Overhead

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N. & Scholl, P., 1 Jan 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 271-302 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14004 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Correlated Pseudorandomness from Expand-Accumulate Codes

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N. & Scholl, P., 1 Jan 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 603-633 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13508 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    26 Scopus citations
  • Information-Theoretic Distributed Point Functions

    Boyle, E., Gilboa, N., Ishai, Y. & Kolobov, V. I., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 17. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations