If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2022

    Correlated Pseudorandomness from Expand-Accumulate Codes

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N. & Scholl, P., 1 Jan 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 603-633 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13508 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Information-Theoretic Distributed Point Functions

    Boyle, E., Gilboa, N., Ishai, Y. & Kolobov, V. I., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 17. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Locality-Preserving Hashing for Shifts with Connections to Cryptography

    Boyle, E., Dinur, I., Gilboa, N., Ishai, Y., Keller, N. & Klein, O., 25 Jan 2022, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022. Braverman, M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 27:1-27:24 (Leibniz International Proceedings in Informatics, LIPIcs; vol. 215).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Programmable Distributed Point Functions

    Boyle, E., Gilboa, N., Ishai, Y. & Kolobov, V. I., 1 Jan 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 121-151 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure Multiparty Computation with Sublinear Preprocessing

    Boyle, E., Gilboa, N., Ishai, Y. & Nof, A., 1 Jan 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 427-457 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation

    Boyle, E., Chandran, N., Gilboa, N., Gupta, D., Ishai, Y., Kumar, N. & Rathee, M., 1 Jan 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F-X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 871-900 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12697 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation

    Benhamouda, F., Boyle, E., Gilboa, N., Halevi, S., Ishai, Y. & Nof, A., 1 Jan 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 129-161 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Lightweight techniques for private heavy hitters

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 1 May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers, p. 762-776 15 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • Low-Complexity Weak Pseudorandom Functions in AC0 [ MOD2 ]

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 1 Jan 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 487-516 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12828 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Sublinear GMW-Style Compiler for MPC with Preprocessing

    Boyle, E., Gilboa, N., Ishai, Y. & Nof, A., 1 Jan 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 457-485 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2020

    Correlated pseudorandom functions from variable-density lpn

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 1 Nov 2020, Proceedings - 2020 IEEE 61st Annual Symposium on Foundations of Computer Science, FOCS 2020. Institute of Electrical and Electronics Engineers, p. 1069-1080 12 p. 9317926. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs

    Boyle, E., Gilboa, N., Ishai, Y. & Nof, A., 1 Jan 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 244-276 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12493 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Efficient pseudorandom correlation generators from ring-lpn

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 1 Jan 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 387-416 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2019

    Efficient Pseudorandom Correlation Generators: Silent OT Extension and More

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 489-518 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    39 Scopus citations
  • Efficient two-round OT extension and silent non-interactive secure computation

    Boyle, E., Ishai, Y., Couteau, G., Kohl, L., Scholl, P., Gilboa, N. & Rindal, P., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 291-308 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    52 Scopus citations
  • Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs

    Boyle, E., Ishai, Y., Gilboa, N. & Nof, A., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 869-886 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • Secure Computation with Preprocessing via Function Secret Sharing

    Boyle, E., Gilboa, N. & Ishai, Y., 1 Jan 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Springer, p. 341-371 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11891 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • Spectre without shared memory

    Amos, B., Gilboa, N. & Levy, A., 1 Jan 2019, Proceedings of the ACM Symposium on Applied Computing. Association for Computing Machinery, p. 1944-1951 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F147772).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 67-97 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • 2018

    Compressing vector OLE

    Boyle, E., Couteau, G., Gilboa, N. & Ishai, Y., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 896-912 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    60 Scopus citations
  • Foundations of homomorphic secret sharing

    Boyle, E., Gilboa, N., Ishai, Y., Lin, H. & Tessaro, S., 1 Jan 2018, 9th Innovations in Theoretical Computer Science, ITCS 2018. Karlin, A. R. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 21. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 94).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • MIKELANGELO: MIcro KErneL virtualizAtioN for hiGh pErfOrmance cLOud and HPC Systems

    Struckmann, N., Sandoval, Y., Har’El, N., Chen, F., Fan, S., Činkelj, J., Berginc, G., Chronz, P., Gilboa, N., Scalosub, G., Meth, K. & Kennedy, J., 1 Jan 2018, Advances in Service-Oriented and Cloud Computing - Workshops of ESOCC 2017, Revised Selected Papers. Mann, Z. A. & Stolz, V. (eds.). Springer Verlag, p. 175-180 6 p. (Communications in Computer and Information Science; vol. 824).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2017

    Broadcast encryption with both temporary and permanent revocation

    Brownstein, D., Dolev, S. & Gilboa, N., 1 Jan 2017, Stabilization, Safety, and Security of Distributed Systems - 19th International Symposium, SSS 2017, Proceedings. Tsigas, P. & Spirakis, P. (eds.). Springer Verlag, p. 469-483 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10616 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Group-based secure computation: Optimizing rounds, communication, and computation

    Boyle, E., Gilboa, N. & Ishai, Y., 1 Jan 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 163-193 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    41 Scopus citations
  • Homomorphic secret sharing: Optimizations and applications

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y. & Orrù, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2105-2122 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    36 Scopus citations
  • 2016

    Breaking the circuit size barrier for secure computation under DDH

    Boyle, E., Gilboa, N. & Ishai, Y., 1 Jan 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 509-539 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    64 Scopus citations
  • Function secret sharing: Improvements and extensions

    Boyle, E., Gilboa, N. & Ishai, Y., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1292-1303 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    91 Scopus citations
  • SSSDB: Database with private information search

    Avni, H., Dolev, S., Gilboa, N. & Li, X., 1 Jan 2016, Algorithmic Aspects of Cloud Computing - 1st International Workshop, ALGOCLOUD 2015, Revised Selected Papers. Triantafillou, P., Karydis, I., Sioutas, S. & Tsoumakos, D. (eds.). Springer Verlag, p. 49-61 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9511).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2015

    Accumulating automata and cascaded equations automata: For communicationless information theoretically secure multi-party computation

    Dolev, S., Gilboa, N. & Li, X., 14 Apr 2015, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 21-29 9 p. (SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Functional encryption for cascade automata (Extended abstract)

    Brownstein, D., Dolev, S. & Gilboa, N., 1 Jan 2015, Stabilization, Safety and Security of Distributed Systems - 17th International Symposium, SSS 2015, Proceedings. Pelc, A. & Schwarzmann, A. A. (eds.). Springer Verlag, p. 94-108 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9212).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Function secret sharing

    Boyle, E., Gilboa, N. & Ishai, Y., 1 Jan 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 337-367 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    110 Scopus citations
  • 2014

    Distributed point functions and their applications

    Gilboa, N. & Ishai, Y., 1 Jan 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 640-658 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    57 Scopus citations
  • 2013

    Towards efficient private distributed computation on unbounded input streams (extended abstract)

    Dolev, S., Garay, J., Gilboa, N., Kolesnikov, V. & Yuditsky, Y., 12 Jul 2013, Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Proceedings. p. 69-83 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7954 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2012

    Brief announcement: Efficient private distributed computation on unbounded input streams

    Dolev, S., Garay, J., Gilboa, N., Kolesnikov, V. & Yuditsky, Y., 9 Nov 2012, Distributed Computing - 26th International Symposium, DISC 2012, Proceedings. p. 431-432 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Brief announcement: Arbitrators in the security infrastructure

    Dolev, S., Gilboa, N. & Hermoni, O., 7 Nov 2012, Stabilization, Safety, and Security of Distributed Systems - 14th International Symposium, SSS 2012, Proceedings. p. 236-238 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7596 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Permanent revocation in attribute based broadcast encryption

    Dolev, S., Gilboa, N. & Kopeetsky, M., 1 Jan 2012, Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012. Institute of Electrical and Electronics Engineers, p. 203-208 6 p. 6542545. (Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    Poster: arbitrators in the security infrastructure, supporting positive anonymity.

    Dolev, S., Gilboa, N. & Hermoni, O., 2011, CCS '11: Proceedings of the 18th ACM conference on Computer and communications security. p. 753-756 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Rendezvous tunnel for anonymous publishing: Clean slate and tor based designs

    Hermoni, O., Gilboa, N., Felstaine, E., Elovici, Y. & Dolev, S., 21 Oct 2011, Stabilization, Safety, and Security of Distributed Systems - 13th International Symposium, SSS 2011, Proceedings. p. 223-237 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6976 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2010

    Brief announcement: Swarming secrets

    Dolev, S., Garay, J., Gilboa, N. & Kolesnikov, V., 8 Sep 2010, PODC'10 - Proceedings of the 2010 ACM Symposium on Principles of Distributed Computing. p. 231-232 2 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Computing multi-party trust privately: In O(n) time units sending one (possibly large) message at a time

    Dolev, S., Gilboa, N. & Kopeetsky, M., 23 Jul 2010, APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing. p. 1460-1465 6 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • Information security for sensors by overwhelming random sequences and permutations

    Dolev, S., Gilboa, N., Kopeetsky, M., Persiano, G. & Spirakis, P. G., 25 Nov 2010, Proceedings of the 6th International Workshop on Foundations of Mobile Computing, DIALM-POMC '10. p. 43-48 6 p. (Proceedings of the 6th International Workshop on Foundations of Mobile Computing, DIALM-POMC '10).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Information security for sensors by overwhelming random sequences and permutations

    Dolev, S., Gilboa, N., Kopeetsky, M., Persiano, G. & Spirakis, P. G., 16 Dec 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 669-671 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Rendezvous tunnel for anonymous publishing

    Hermoni, O., Gilboa, N., Felstaine, E., Elovici, Y. & Dolev, S., 16 Dec 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 690-692 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Schemes for privately computing trust and reputation

    Oz, N. G., Gilboa, N. & Gudes, E., 1 Jan 2010, Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Proceedings. Nishigaki, M., Jøsang, A., Murayama, Y. & Marsh, S. (eds.). Springer New York LLC, p. 1-16 16 p. (IFIP Advances in Information and Communication Technology; vol. 321).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Scopus citations
  • 2009

    Swarming secrets

    Dolev, S., Garay, J., Gilboa, N. & Kolesnikov, V., 1 Jan 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009. Institute of Electrical and Electronics Engineers, p. 1438-1445 8 p. 5394507. (2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • 2008

    Anonymity scheme for interactive P2P services

    Shitrit, S., Felstaine, E., Gilboa, N. & Hermoni, O., 5 Sep 2008, Proceedings CCGRID 2008 - 8th IEEE International Symposium on Cluster Computing and the Grid. p. 33-40 8 p. 4534199. (Proceedings CCGRID 2008 - 8th IEEE International Symposium on Cluster Computing and the Grid).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Deniability - An alibi for users in P2P networks

    Hermoni, O., Gilboa, N., Felstaine, E. & Shitrit, S., 1 Jan 2008, 3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE. Institute of Electrical and Electronics Engineers, p. 310-317 8 p. 4554432. (3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Distributed flow detection over multi path sessions

    Felstaine, E., Chai, E., Gilboa, N. & Elisha, A., 1 Dec 2008, Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08. 3. (Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 1999

    Compressing cryptographic resources

    Gilboa, N. & Ishai, Y., 1 Jan 1999, Advances in Cryptology – CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Wiener, M. (ed.). Springer Verlag, p. 591-608 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1666).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    10 Scopus citations
  • Two party RSA key generation

    Gilboa, N., 1 Jan 1999, Advances in Cryptology – CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Wiener, M. (ed.). Springer Verlag, p. 116-129 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1666).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    100 Scopus citations