Seguir
Avishay Yanai
Avishay Yanai
VMware Research
Dirección de correo verificada de biu.ac.il - Página principal
Título
Citado por
Citado por
Año
SpOT-light: lightweight private set intersection from sparse OT extension
B Pinkas, M Rosulek, N Trieu, A Yanai
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
1852019
Efficient circuit-based PSI with linear communication
B Pinkas, T Schneider, O Tkachenko, A Yanai
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
1682019
PSI from PaXoS: fast, malicious private set intersection
B Pinkas, M Rosulek, N Trieu, A Yanai
Annual International Conference on the Theory and Applications of …, 2020
1602020
Efficient constant-round multi-party computation combining BMR and SPDZ
Y Lindell, B Pinkas, NP Smart, A Yanai
Journal of Cryptology 32, 1026-1069, 2019
1502019
Oblivious key-value stores and amplification for private set intersection
G Garimella, B Pinkas, M Rosulek, N Trieu, A Yanai
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
722021
Blinder--Scalable, Robust Anonymous Committed Broadcast
I Abraham, B Pinkas, A Yanai
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
652020
Senate: a {Maliciously-Secure}{MPC} platform for collaborative analytics
R Poddar, S Kalra, A Yanai, R Deng, RA Popa, JM Hellerstein
30th USENIX Security Symposium (USENIX Security 21), 2129-2146, 2021
592021
Simple, fast malicious multiparty private set intersection
O Nevo, N Trieu, A Yanai
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
442021
Efficient maliciously secure multiparty computation for RAM
M Keller, A Yanai
Annual International Conference on the Theory and Applications of …, 2018
412018
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020
362020
Committed MPC: Maliciously secure multiparty computation from homomorphic commitments
TK Frederiksen, B Pinkas, A Yanai
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
242018
Utt: Decentralized ecash with accountable privacy
A Tomescu, A Bhat, B Applebaum, I Abraham, G Gueta, B Pinkas, A Yanai
Cryptology ePrint Archive, 2022
222022
Constant-round maliciously secure two-party computation in the RAM model
C Hazay, A Yanai
Journal of Cryptology 32 (4), 1144-1199, 2019
202019
A privacy preserving collusion secure DCOP algorithm
T Tassa, T Grinshpoun, A Yanai
arXiv preprint arXiv:1905.09013, 2019
152019
PC-SyncBB: A privacy preserving collusion secure DCOP algorithm
T Tassa, T Grinshpoun, A Yanai
Artificial Intelligence 297, 103501, 2021
142021
Fear not, vote truthfully: Secure Multiparty Computation of score based rules
L Dery, T Tassa, A Yanai
Expert Systems with Applications 168, 114434, 2021
122021
Multiparty Private Set Intersection Cardinality and Its Applications.
N Trieu, A Yanai, J Gao
IACR Cryptol. ePrint Arch. 2022, 735, 2022
11*2022
Efficient perfectly secure computation with optimal resilience
I Abraham, G Asharov, A Yanai
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
82021
Scionfl: Secure quantized aggregation for federated learning
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
CoRR, vol. abs/2210.07376, 2022
72022
A secure voting system for score based elections
L Dery, T Tassa, A Yanai, A Zamarin
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
62021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20