Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Benny Pinkas
@article{DBLP:journals/iacr/AsharovHIKNPT24, author = {Gilad Asharov and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Ariel Nof and Benny Pinkas and Junichi Tomida}, title = {Secure Statistical Analysis on Multiple Datasets: Join and Group-By}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2024}, url = {https://eprint.iacr.org/2024/141}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AsharovHIKNPT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasPTX24, author = {Sourav Das and Benny Pinkas and Alin Tomescu and Zhuolun Xiang}, title = {Distributed Randomness using Weighted VRFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2024}, url = {https://eprint.iacr.org/2024/198}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DasPTX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AsharovHKNPT23, author = {Gilad Asharov and Koki Hamada and Ryo Kikuchi and Ariel Nof and Benny Pinkas and Junichi Tomida}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Secure Statistical Analysis on Multiple Datasets: Join and Group-By}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3298--3312}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623119}, doi = {10.1145/3576915.3623119}, timestamp = {Wed, 22 Nov 2023 17:56:33 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AsharovHKNPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumNP23, author = {Benny Applebaum and Oded Nir and Benny Pinkas}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {How to Recover a Secret with O(n) Additions}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {236--262}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_8}, doi = {10.1007/978-3-031-38557-5\_8}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ApplebaumNP23, author = {Benny Applebaum and Oded Nir and Benny Pinkas}, title = {How to Recover a Secret with {\textdollar}O(n){\textdollar} Additions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR23-087}}, year = {2023}, url = {https://eccc.weizmann.ac.il/report/2023/087}, eprinttype = {ECCC}, eprint = {TR23-087}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ApplebaumNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenItzhakMPSSTVWYY23, author = {Yaniv Ben{-}Itzhak and Helen M{\"{o}}llering and Benny Pinkas and Thomas Schneider and Ajith Suresh and Oleksandr Tkachenko and Shay Vargaftik and Christian Weinert and Hossein Yalame and Avishay Yanai}, title = {ScionFL: Efficient and Robust Secure Quantized Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2023}, url = {https://eprint.iacr.org/2023/652}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenItzhakMPSSTVWYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumNP23, author = {Benny Applebaum and Oded Nir and Benny Pinkas}, title = {How to Recover a Secret with O(n) Additions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {838}, year = {2023}, url = {https://eprint.iacr.org/2023/838}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasXTSPR23, author = {Sourav Das and Zhuolun Xiang and Alin Tomescu and Alexander Spiegelman and Benny Pinkas and Ling Ren}, title = {A New Paradigm for Verifiable Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1196}, year = {2023}, url = {https://eprint.iacr.org/2023/1196}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasXTSPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AsharovHIKNPTT22, author = {Gilad Asharov and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Ariel Nof and Benny Pinkas and Katsumi Takahashi and Junichi Tomida}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {125--138}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560691}, doi = {10.1145/3548606.3560691}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AsharovHIKNPTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0004HJMP0S22, author = {Daniel G{\"{u}}nther and Marco Holz and Benjamin Judkewitz and Helen M{\"{o}}llering and Benny Pinkas and Thomas Schneider and Ajith Suresh}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3351--3353}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563497}, doi = {10.1145/3548606.3563497}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0004HJMP0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0004HP022, author = {Daniel G{\"{u}}nther and Maurice Heymann and Benny Pinkas and Thomas Schneider}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {GPU-accelerated {PIR} with Client-Independent Preprocessing for Large-Scale Applications}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1759--1776}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/gunther}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/0004HP022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-00539, author = {Daniel G{\"{u}}nther and Marco Holz and Benjamin Judkewitz and Helen M{\"{o}}llering and Benny Pinkas and Thomas Schneider and Ajith Suresh}, title = {Privacy-Preserving Epidemiological Modeling on Mobile Graphs}, journal = {CoRR}, volume = {abs/2206.00539}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.00539}, doi = {10.48550/ARXIV.2206.00539}, eprinttype = {arXiv}, eprint = {2206.00539}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-00539.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-07376, author = {Yaniv Ben{-}Itzhak and Helen M{\"{o}}llering and Benny Pinkas and Thomas Schneider and Ajith Suresh and Oleksandr Tkachenko and Shay Vargaftik and Christian Weinert and Hossein Yalame and Avishay Yanai}, title = {ScionFL: Secure Quantized Aggregation for Federated Learning}, journal = {CoRR}, volume = {abs/2210.07376}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.07376}, doi = {10.48550/ARXIV.2210.07376}, eprinttype = {arXiv}, eprint = {2210.07376}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-07376.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TomescuBAAGPY22, author = {Alin Tomescu and Adithya Bhat and Benny Applebaum and Ittai Abraham and Guy Gueta and Benny Pinkas and Avishay Yanai}, title = {{UTT:} Decentralized Ecash with Accountable Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2022}, url = {https://eprint.iacr.org/2022/452}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TomescuBAAGPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovHIKNPTT22, author = {Gilad Asharov and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Ariel Nof and Benny Pinkas and Katsumi Takahashi and Junichi Tomida}, title = {Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1595}, year = {2022}, url = {https://eprint.iacr.org/2022/1595}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AsharovHIKNPTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aies/SegalAPBGK21, author = {Shahar Segal and Yossi Adi and Benny Pinkas and Carsten Baum and Chaya Ganesh and Joseph Keshet}, editor = {Marion Fourcade and Benjamin Kuipers and Seth Lazar and Deirdre K. Mulligan}, title = {Fairness in the Eyes of the Data: Certifying Machine-Learning Models}, booktitle = {{AIES} '21: {AAAI/ACM} Conference on AI, Ethics, and Society, Virtual Event, USA, May 19-21, 2021}, pages = {926--935}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3461702.3462554}, doi = {10.1145/3461702.3462554}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aies/SegalAPBGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Araki0OPRT21, author = {Toshinori Araki and Jun Furukawa and Kazuma Ohara and Benny Pinkas and Hanan Rosemarin and Hikaru Tsuchida}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Secure Graph Analysis at Scale}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {610--629}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484560}, doi = {10.1145/3460120.3484560}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Araki0OPRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarimellaPRTY21, author = {Gayathri Garimella and Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, editor = {Tal Malkin and Chris Peikert}, title = {Oblivious Key-Value Stores and Amplification for Private Set Intersection}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {395--425}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_14}, doi = {10.1007/978-3-030-84245-1\_14}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarimellaPRTY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cscml/2021, editor = {Shlomi Dolev and Oded Margalit and Benny Pinkas and Alexander A. Schwarzmann}, title = {Cyber Security Cryptography and Machine Learning - 5th International Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12716}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78086-9}, doi = {10.1007/978-3-030-78086-9}, isbn = {978-3-030-78085-2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscml/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuntherHPS21, author = {Daniel G{\"{u}}nther and Maurice Heymann and Benny Pinkas and Thomas Schneider}, title = {GPU-accelerated {PIR} with Client-Independent Preprocessing for Large-Scale Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {823}, year = {2021}, url = {https://eprint.iacr.org/2021/823}, timestamp = {Thu, 08 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuntherHPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarimellaPRTY21, author = {Gayathri Garimella and Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, title = {Oblivious Key-Value Stores and Amplification for Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {883}, year = {2021}, url = {https://eprint.iacr.org/2021/883}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarimellaPRTY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbrahamPY20, author = {Ittai Abraham and Benny Pinkas and Avishay Yanai}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Blinder - Scalable, Robust Anonymous Committed Broadcast}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1233--1252}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417261}, doi = {10.1145/3372297.3417261}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AbrahamPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PinkasRTY20, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, editor = {Anne Canteaut and Yuval Ishai}, title = {{PSI} from PaXoS: Fast, Malicious Private Set Intersection}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {739--767}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_25}, doi = {10.1007/978-3-030-45724-2\_25}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PinkasRTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TomescuCZAPGD20, author = {Alin Tomescu and Robert Chen and Yiming Zheng and Ittai Abraham and Benny Pinkas and Guy Golan{-}Gueta and Srinivas Devadas}, title = {Towards Scalable Threshold Cryptosystems}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {877--893}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00059}, doi = {10.1109/SP40000.2020.00059}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/TomescuCZAPGD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BergerKP20, author = {Jonathan Berger and Amit Klein and Benny Pinkas}, title = {Flaw Label: Exploiting IPv6 Flow Label}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1259--1276}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00075}, doi = {10.1109/SP40000.2020.00075}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BergerKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-01534, author = {Shahar Segal and Yossi Adi and Benny Pinkas and Carsten Baum and Chaya Ganesh and Joseph Keshet}, title = {Fairness in the Eyes of the Data: Certifying Machine-Learning Models}, journal = {CoRR}, volume = {abs/2009.01534}, year = {2020}, url = {https://arxiv.org/abs/2009.01534}, eprinttype = {arXiv}, eprint = {2009.01534}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-01534.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinkasRTY20, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, title = {{PSI} from PaXoS: Fast, Malicious Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2020}, url = {https://eprint.iacr.org/2020/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinkasRTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbrahamPY20, author = {Ittai Abraham and Benny Pinkas and Avishay Yanai}, title = {Blinder: {MPC} Based Scalable and Robust Anonymous Committed Broadcast}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2020}, url = {https://eprint.iacr.org/2020/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbrahamPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HolzJMPS20, author = {Marco Holz and Benjamin Judkewitz and Helen M{\"{o}}llering and Benny Pinkas and Thomas Schneider}, title = {{PEM:} Privacy-preserving Epidemiological Modeling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1546}, year = {2020}, url = {https://eprint.iacr.org/2020/1546}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HolzJMPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LindellPSY19, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai}, title = {Efficient Constant-Round Multi-party Computation Combining {BMR} and {SPDZ}}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {1026--1069}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09322-2}, doi = {10.1007/S00145-019-09322-2}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/LindellPSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchoppmannG0P19, author = {Phillipp Schoppmann and Adri{\`{a}} Gasc{\'{o}}n and Mariana Raykova and Benny Pinkas}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Make Some {ROOM} for the Zeros: Data Sparsity in Secure Distributed Machine Learning}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1335--1350}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3339816}, doi = {10.1145/3319535.3339816}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchoppmannG0P19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaorPR19, author = {Moni Naor and Benny Pinkas and Eyal Ronen}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1369--1386}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363204}, doi = {10.1145/3319535.3363204}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaorPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PinkasRTY19, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {SpOT-Light: Lightweight Private Set Intersection from Sparse {OT} Extension}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {401--431}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_13}, doi = {10.1007/978-3-030-26954-8\_13}, timestamp = {Fri, 09 Aug 2019 14:27:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PinkasRTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/Golan-GuetaAGMP19, author = {Guy Golan{-}Gueta and Ittai Abraham and Shelly Grossman and Dahlia Malkhi and Benny Pinkas and Michael K. Reiter and Dragos{-}Adrian Seredinschi and Orr Tamir and Alin Tomescu}, title = {{SBFT:} {A} Scalable and Decentralized Trust Infrastructure}, booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019}, pages = {568--580}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSN.2019.00063}, doi = {10.1109/DSN.2019.00063}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/dsn/Golan-GuetaAGMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pinkas0TY19, author = {Benny Pinkas and Thomas Schneider and Oleksandr Tkachenko and Avishay Yanai}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Efficient Circuit-Based {PSI} with Linear Communication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {122--153}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_5}, doi = {10.1007/978-3-030-17659-4\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pinkas0TY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KleinP19, author = {Amit Klein and Benny Pinkas}, title = {{DNS} Cache-Based User Tracking}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/dns-cache-based-user-tracking/}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KleinP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KleinP19, author = {Amit Klein and Benny Pinkas}, editor = {Nadia Heninger and Patrick Traynor}, title = {From {IP} {ID} to Device {ID} and {KASLR} Bypass}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1063--1080}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/klein}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KleinP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10478, author = {Amit Klein and Benny Pinkas}, title = {From {IP} {ID} to Device {ID} and {KASLR} Bypass (Extended Version)}, journal = {CoRR}, volume = {abs/1906.10478}, year = {2019}, url = {http://arxiv.org/abs/1906.10478}, eprinttype = {arXiv}, eprint = {1906.10478}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10478.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinkasSTY19, author = {Benny Pinkas and Thomas Schneider and Oleksandr Tkachenko and Avishay Yanai}, title = {Efficient Circuit-based {PSI} with Linear Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2019}, url = {https://eprint.iacr.org/2019/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinkasSTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchoppmannGRP19, author = {Phillipp Schoppmann and Adri{\`{a}} Gasc{\'{o}}n and Mariana Raykova and Benny Pinkas}, title = {Make Some {ROOM} for the Zeros: Data Sparsity in Secure Distributed Machine Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2019}, url = {https://eprint.iacr.org/2019/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchoppmannGRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinkasRTY19, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, title = {SpOT-Light: Lightweight Private Set Intersection from Sparse {OT} Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2019}, url = {https://eprint.iacr.org/2019/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinkasRTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChidaHIKKP19, author = {Koji Chida and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Naoto Kiribuchi and Benny Pinkas}, title = {An Efficient Secure Three-Party Sorting Protocol with an Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2019}, url = {https://eprint.iacr.org/2019/695}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChidaHIKKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GueronLNP18, author = {Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas}, title = {Fast Garbling of Circuits Under Standard Assumptions}, journal = {J. Cryptol.}, volume = {31}, number = {3}, pages = {798--844}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9271-y}, doi = {10.1007/S00145-017-9271-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GueronLNP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PinkasSZ18, author = {Benny Pinkas and Thomas Schneider and Michael Zohner}, title = {Scalable Private Set Intersection Based on {OT} Extension}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {7:1--7:35}, year = {2018}, url = {https://doi.org/10.1145/3154794}, doi = {10.1145/3154794}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PinkasSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HarcholAP18, author = {Yotam Harchol and Ittai Abraham and Benny Pinkas}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Distributed {SSH} Key Management with Proactive {RSA} Threshold Signatures}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {22--43}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_2}, doi = {10.1007/978-3-319-93387-0\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/HarcholAP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChidaHIKP18, author = {Koji Chida and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Benny Pinkas}, editor = {Michael Brenner and Kurt Rohloff}, title = {High-Throughput Secure {AES} Computation}, booktitle = {Proceedings of the 6th Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, WAHC@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {13--24}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3267973.3267977}, doi = {10.1145/3267973.3267977}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChidaHIKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FrederiksenLOP18, author = {Tore Kasper Frederiksen and Yehuda Lindell and Valery Osheter and Benny Pinkas}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Fast Distributed {RSA} Key Generation for Semi-honest and Malicious Adversaries}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {331--361}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_12}, doi = {10.1007/978-3-319-96881-0\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FrederiksenLOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pinkas0WW18, author = {Benny Pinkas and Thomas Schneider and Christian Weinert and Udi Wieder}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Efficient Circuit-Based {PSI} via Cuckoo Hashing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {125--157}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_5}, doi = {10.1007/978-3-319-78372-7\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pinkas0WW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FrederiksenPY18, author = {Tore Kasper Frederiksen and Benny Pinkas and Avishay Yanai}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Committed {MPC} - Maliciously Secure Multiparty Computation from Homomorphic Commitments}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {587--619}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_20}, doi = {10.1007/978-3-319-76578-5\_20}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FrederiksenPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/InbarOP18, author = {Roi Inbar and Eran Omri and Benny Pinkas}, editor = {Dario Catalano and Roberto De Prisco}, title = {Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {235--252}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_13}, doi = {10.1007/978-3-319-98113-0\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/InbarOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AdiBCPK18, author = {Yossi Adi and Carsten Baum and Moustapha Ciss{\'{e}} and Benny Pinkas and Joseph Keshet}, editor = {William Enck and Adrienne Porter Felt}, title = {Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1615--1631}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/adi}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/AdiBCPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-04528, author = {Felix Kreuk and Assi Barak and Shir Aviv{-}Reuven and Moran Baruch and Benny Pinkas and Joseph Keshet}, title = {Adversarial Examples on Discrete Sequences for Beating Whole-Binary Malware Detection}, journal = {CoRR}, volume = {abs/1802.04528}, year = {2018}, url = {http://arxiv.org/abs/1802.04528}, eprinttype = {arXiv}, eprint = {1802.04528}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-04528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-04633, author = {Yossi Adi and Carsten Baum and Moustapha Ciss{\'{e}} and Benny Pinkas and Joseph Keshet}, title = {Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring}, journal = {CoRR}, volume = {abs/1802.04633}, year = {2018}, url = {http://arxiv.org/abs/1802.04633}, eprinttype = {arXiv}, eprint = {1802.04633}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-04633.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-01626, author = {Guy Golan{-}Gueta and Ittai Abraham and Shelly Grossman and Dahlia Malkhi and Benny Pinkas and Michael K. Reiter and Dragos{-}Adrian Seredinschi and Orr Tamir and Alin Tomescu}, title = {{SBFT:} a Scalable Decentralized Trust Infrastructure for Blockchains}, journal = {CoRR}, volume = {abs/1804.01626}, year = {2018}, url = {http://arxiv.org/abs/1804.01626}, eprinttype = {arXiv}, eprint = {1804.01626}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-01626.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorPR18, author = {Moni Naor and Benny Pinkas and Eyal Ronen}, title = {How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2018}, url = {http://eprint.iacr.org/2018/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pinkas0WW18, author = {Benny Pinkas and Thomas Schneider and Christian Weinert and Udi Wieder}, title = {Efficient Circuit-based {PSI} via Cuckoo Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2018}, url = {http://eprint.iacr.org/2018/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pinkas0WW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HarcholAP18, author = {Yotam Harchol and Ittai Abraham and Benny Pinkas}, title = {Distributed {SSH} Key Management with Proactive {RSA} Threshold Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2018}, url = {https://eprint.iacr.org/2018/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HarcholAP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrederiksenLOP18, author = {Tore Kasper Frederiksen and Yehuda Lindell and Valery Osheter and Benny Pinkas}, title = {Fast Distributed {RSA} Key Generation for Semi-Honest and Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2018}, url = {https://eprint.iacr.org/2018/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrederiksenLOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DruckerGP17, author = {Nir Drucker and Shay Gueron and Benny Pinkas}, title = {Faster Secure Cloud Computations with a Trusted Proxy}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {6}, pages = {61--67}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.4251121}, doi = {10.1109/MSP.2017.4251121}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/DruckerGP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KissL0AP17, author = {{\'{A}}gnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas}, title = {Private Set Intersection for Unequal Set Sizes with Mobile Applications}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {4}, pages = {177--197}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0044}, doi = {10.1515/POPETS-2017-0044}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KissL0AP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/KolmanP17, author = {Eyal Kolman and Benny Pinkas}, title = {Securely Computing a Ground Speed Model}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {8}, number = {4}, pages = {54:1--54:13}, year = {2017}, url = {https://doi.org/10.1145/2998550}, doi = {10.1145/2998550}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tist/KolmanP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TamrakarLPEPA17, author = {Sandeep Tamrakar and Jian Liu and Andrew Paverd and Jan{-}Erik Ekberg and Benny Pinkas and N. Asokan}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {The Circle Game: Scalable Private Membership Test Using Trusted Hardware}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {31--44}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053006}, doi = {10.1145/3052973.3053006}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TamrakarLPEPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KolesnikovMPRT17, author = {Vladimir Kolesnikov and Naor Matania and Benny Pinkas and Mike Rosulek and Ni Trieu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Practical Multi-party Private Set Intersection from Symmetric-Key Techniques}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1257--1272}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134065}, doi = {10.1145/3133956.3134065}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KolesnikovMPRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbrahamFNP017, author = {Ittai Abraham and Christopher W. Fletcher and Kartik Nayak and Benny Pinkas and Ling Ren}, editor = {Serge Fehr}, title = {Asymptotically Tight Bounds for Composing {ORAM} with {PIR}}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {91--120}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_5}, doi = {10.1007/978-3-662-54365-8\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbrahamFNP017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrederiksenPY17, author = {Tore Kasper Frederiksen and Benny Pinkas and Avishay Yanai}, title = {Committed {MPC} - Maliciously Secure Multiparty Computation from Homomorphic Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {550}, year = {2017}, url = {http://eprint.iacr.org/2017/550}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrederiksenPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KissLSAP17, author = {{\'{A}}gnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas}, title = {Private Set Intersection for Unequal Set Sizes with Mobile Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2017}, url = {http://eprint.iacr.org/2017/670}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KissLSAP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovMPRT17, author = {Vladimir Kolesnikov and Naor Matania and Benny Pinkas and Mike Rosulek and Ni Trieu}, title = {Practical Multi-party Private Set Intersection from Symmetric-Key Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {799}, year = {2017}, url = {http://eprint.iacr.org/2017/799}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovMPRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ArcherBPP16, author = {David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen}, title = {Maturity and Performance of Programmable Secure Computation}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {5}, pages = {48--56}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.97}, doi = {10.1109/MSP.2016.97}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ArcherBPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FreedmanHNP16, author = {Michael J. Freedman and Carmit Hazay and Kobbi Nissim and Benny Pinkas}, title = {Efficient Set Intersection with Simulation-Based Security}, journal = {J. Cryptol.}, volume = {29}, number = {1}, pages = {115--155}, year = {2016}, url = {https://doi.org/10.1007/s00145-014-9190-0}, doi = {10.1007/S00145-014-9190-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FreedmanHNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TamrakarLPEPA16, author = {Sandeep Tamrakar and Jian Liu and Andrew Paverd and Jan{-}Erik Ekberg and Benny Pinkas and N. Asokan}, title = {The Circle Game: Scalable Private Membership Test Using Trusted Hardware}, journal = {CoRR}, volume = {abs/1606.01655}, year = {2016}, url = {http://arxiv.org/abs/1606.01655}, eprinttype = {arXiv}, eprint = {1606.01655}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TamrakarLPEPA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NayakRAP16, author = {Kartik Nayak and Ling Ren and Ittai Abraham and Benny Pinkas}, title = {An Oblivious {RAM} with Sub-logarithmic Bandwidth Blowup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {849}, year = {2016}, url = {http://eprint.iacr.org/2016/849}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NayakRAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pinkas0Z16, author = {Benny Pinkas and Thomas Schneider and Michael Zohner}, title = {Scalable Private Set Intersection Based on {OT} Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {930}, year = {2016}, url = {http://eprint.iacr.org/2016/930}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pinkas0Z16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LindellP15, author = {Yehuda Lindell and Benny Pinkas}, title = {An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries}, journal = {J. Cryptol.}, volume = {28}, number = {2}, pages = {312--350}, year = {2015}, url = {https://doi.org/10.1007/s00145-014-9177-x}, doi = {10.1007/S00145-014-9177-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LindellP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GueronLNP15, author = {Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Fast Garbling of Circuits Under Standard Assumptions}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {567--578}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813619}, doi = {10.1145/2810103.2813619}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GueronLNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuAP15, author = {Jian Liu and N. Asokan and Benny Pinkas}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Secure Deduplication of Encrypted Data without Additional Independent Servers}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {874--885}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813623}, doi = {10.1145/2810103.2813623}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LindellPSY15, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Efficient Constant Round Multi-party Computation Combining {BMR} and {SPDZ}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {319--338}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_16}, doi = {10.1007/978-3-662-48000-7\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LindellPSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Pinkas0SZ15, author = {Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Phasing: Private Set Intersection Using Permutation-based Hashing}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {515--530}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/pinkas}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/Pinkas0SZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AfsharMPR15, author = {Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva}, title = {Non-Interactive Secure Computation Based on Cut-and-Choose}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2015}, url = {http://eprint.iacr.org/2015/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AfsharMPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuAP15, author = {Jian Liu and N. Asokan and Benny Pinkas}, title = {Secure Deduplication of Encrypted Data without Additional Independent Servers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2015}, url = {http://eprint.iacr.org/2015/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellPSY15, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai}, title = {Efficient Constant Round Multi-Party Computation Combining {BMR} and {SPDZ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2015}, url = {http://eprint.iacr.org/2015/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellPSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pinkas0SZ15, author = {Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner}, title = {Phasing: Private Set Intersection using Permutation-based Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2015}, url = {http://eprint.iacr.org/2015/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pinkas0SZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronLNP15, author = {Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas}, title = {Fast Garbling of Circuits Under Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2015}, url = {http://eprint.iacr.org/2015/751}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronLNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArcherBPP15, author = {David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen}, title = {Maturity and Performance of Programmable Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1039}, year = {2015}, url = {http://eprint.iacr.org/2015/1039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArcherBPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AfsharMPR14, author = {Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Non-Interactive Secure Computation Based on Cut-and-Choose}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {387--404}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_22}, doi = {10.1007/978-3-642-55220-5\_22}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AfsharMPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Pinkas0Z14, author = {Benny Pinkas and Thomas Schneider and Michael Zohner}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Faster Private Set Intersection Based on {OT} Extension}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {797--812}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/pinkas}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/Pinkas0Z14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinkasR14, author = {Benny Pinkas and Tzachy Reinman}, title = {A Simple Recursive Tree Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2014}, url = {http://eprint.iacr.org/2014/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinkasR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pinkas0Z14, author = {Benny Pinkas and Thomas Schneider and Michael Zohner}, title = {Faster Private Set Intersection based on {OT} Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2014}, url = {http://eprint.iacr.org/2014/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pinkas0Z14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/JarrousP13, author = {Ayman Jarrous and Benny Pinkas}, title = {Secure computation of functionalities based on Hamming distance and its application to computing document similarity}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {1}, pages = {21--46}, year = {2013}, url = {https://doi.org/10.1504/IJACT.2013.053433}, doi = {10.1504/IJACT.2013.053433}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/JarrousP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/JarrousP13, author = {Ayman Jarrous and Benny Pinkas}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {Canon-MPC, a system for casual non-interactive secure multi-party computation using native client}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {155--166}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517845}, doi = {10.1145/2517840.2517845}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/JarrousP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LindellP12, author = {Yehuda Lindell and Benny Pinkas}, title = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer}, journal = {J. Cryptol.}, volume = {25}, number = {4}, pages = {680--722}, year = {2012}, url = {https://doi.org/10.1007/s00145-011-9107-0}, doi = {10.1007/S00145-011-9107-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LindellP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BerkmanPY12, author = {Omer Berkman and Benny Pinkas and Moti Yung}, editor = {Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Mark Manulis}, title = {Firm Grip Handshakes: {A} Tool for Bidirectional Vouching}, booktitle = {Cryptology and Network Security, 11th International Conference, {CANS} 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings}, volume = {7712}, pages = {142--157}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35404-5\_12}, doi = {10.1007/978-3-642-35404-5\_12}, timestamp = {Sun, 02 Jun 2019 21:12:31 +0200}, biburl = {https://dblp.org/rec/conf/cans/BerkmanPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaleviHPS11, author = {Shai Halevi and Danny Harnik and Benny Pinkas and Alexandra Shulman{-}Peleg}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Proofs of ownership in remote storage systems}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {491--500}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046765}, doi = {10.1145/2046707.2046765}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaleviHPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaleviLP11, author = {Shai Halevi and Yehuda Lindell and Benny Pinkas}, editor = {Phillip Rogaway}, title = {Secure Computation on the Web: Computing without Simultaneous Interaction}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {132--150}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_8}, doi = {10.1007/978-3-642-22792-9\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaleviLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LindellOP11, author = {Yehuda Lindell and Eli Oxman and Benny Pinkas}, editor = {Phillip Rogaway}, title = {The {IPS} Compiler: Optimizations, Variants and Concrete Efficiency}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {259--276}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_15}, doi = {10.1007/978-3-642-22792-9\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LindellOP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FischlinPSSV11, author = {Marc Fischlin and Benny Pinkas and Ahmad{-}Reza Sadeghi and Thomas Schneider and Ivan Visconti}, editor = {Aggelos Kiayias}, title = {Secure Set Intersection with Untrusted Hardware Tokens}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {1--16}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_1}, doi = {10.1007/978-3-642-19074-2\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FischlinPSSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LindellP11, author = {Yehuda Lindell and Benny Pinkas}, editor = {Yuval Ishai}, title = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {329--346}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_20}, doi = {10.1007/978-3-642-19571-6\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LindellP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Pinkas11, author = {Benny Pinkas}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Traitor Tracing}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1313--1316}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_158}, doi = {10.1007/978-1-4419-5906-5\_158}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Pinkas11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/PinkasSS11, author = {Benny Pinkas and Ahmad{-}Reza Sadeghi and Nigel P. Smart}, title = {Secure Computing in the Cloud (Dagstuhl Seminar 11491)}, journal = {Dagstuhl Reports}, volume = {1}, number = {12}, pages = {1--10}, year = {2011}, url = {https://doi.org/10.4230/DagRep.1.12.1}, doi = {10.4230/DAGREP.1.12.1}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/PinkasSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviLP11, author = {Shai Halevi and Yehuda Lindell and Benny Pinkas}, title = {Secure Computation on the Web: Computing without Simultaneous Interaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2011}, url = {http://eprint.iacr.org/2011/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviHPS11, author = {Shai Halevi and Danny Harnik and Benny Pinkas and Alexandra Shulman{-}Peleg}, title = {Proofs of Ownership in Remote Storage Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2011}, url = {http://eprint.iacr.org/2011/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviHPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellPO11, author = {Yehuda Lindell and Benny Pinkas and Eli Oxman}, title = {The {IPS} Compiler: Optimizations, Variants and Concrete Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2011}, url = {http://eprint.iacr.org/2011/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellPO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HarnikPS10, author = {Danny Harnik and Benny Pinkas and Alexandra Shulman{-}Peleg}, title = {Side Channels in Cloud Services: Deduplication in Cloud Storage}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {6}, pages = {40--47}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.187}, doi = {10.1109/MSP.2010.187}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HarnikPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/NaorP10, author = {Moni Naor and Benny Pinkas}, title = {Efficient trace and revoke schemes}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {6}, pages = {411--424}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0121-2}, doi = {10.1007/S10207-010-0121-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/NaorP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AggarwalMP10, author = {Gagan Aggarwal and Nina Mishra and Benny Pinkas}, title = {Secure Computation of the Median (and Other Elements of Specified Ranks)}, journal = {J. Cryptol.}, volume = {23}, number = {3}, pages = {373--401}, year = {2010}, url = {https://doi.org/10.1007/s00145-010-9059-9}, doi = {10.1007/S00145-010-9059-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AggarwalMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/BicksonRDP10, author = {Danny Bickson and Tzachy Reinman and Danny Dolev and Benny Pinkas}, title = {Peer-to-peer secure multi-party numerical computation facing malicious adversaries}, journal = {Peer-to-Peer Netw. Appl.}, volume = {3}, number = {2}, pages = {129--144}, year = {2010}, url = {https://doi.org/10.1007/s12083-009-0051-9}, doi = {10.1007/S12083-009-0051-9}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/BicksonRDP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ManulisPP10, author = {Mark Manulis and Benny Pinkas and Bertram Poettering}, editor = {Jianying Zhou and Moti Yung}, title = {Privacy-Preserving Group Discovery with Linear Complexity}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {420--437}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_25}, doi = {10.1007/978-3-642-13708-2\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ManulisPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PinkasR10, author = {Benny Pinkas and Tzachy Reinman}, editor = {Tal Rabin}, title = {Oblivious {RAM} Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {502--519}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_27}, doi = {10.1007/978-3-642-14623-7\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PinkasR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/OsadchyPJM10, author = {Margarita Osadchy and Benny Pinkas and Ayman Jarrous and Boaz Moskovich}, title = {SCiFI - {A} System for Secure Face Identification}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {239--254}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.39}, doi = {10.1109/SP.2010.39}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/OsadchyPJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellP10, author = {Yehuda Lindell and Benny Pinkas}, title = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2010}, url = {http://eprint.iacr.org/2010/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinkasR10, author = {Benny Pinkas and Tzachy Reinman}, title = {Oblivious {RAM} Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2010}, url = {http://eprint.iacr.org/2010/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinkasR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LindellP09, author = {Yehuda Lindell and Benny Pinkas}, title = {A Proof of Security of Yao's Protocol for Two-Party Computation}, journal = {J. Cryptol.}, volume = {22}, number = {2}, pages = {161--188}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9036-8}, doi = {10.1007/S00145-008-9036-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LindellP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LindellP09, author = {Yehuda Lindell and Benny Pinkas}, title = {Secure Multiparty Computation for Privacy-Preserving Data Mining}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.566}, doi = {10.29012/JPC.V1I1.566}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/LindellP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/GradwohlNPR09, author = {Ronen Gradwohl and Moni Naor and Benny Pinkas and Guy N. Rothblum}, title = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles}, journal = {Theory Comput. Syst.}, volume = {44}, number = {2}, pages = {245--268}, year = {2009}, url = {https://doi.org/10.1007/s00224-008-9119-9}, doi = {10.1007/S00224-008-9119-9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mst/GradwohlNPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DorrendorfGP09, author = {Leo Dorrendorf and Zvi Gutterman and Benny Pinkas}, title = {Cryptanalysis of the random number generator of the Windows operating system}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {10:1--10:32}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609966}, doi = {10.1145/1609956.1609966}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DorrendorfGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/JarrousP09, author = {Ayman Jarrous and Benny Pinkas}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Secure Hamming Distance Based Computation and Its Applications}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {107--124}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_7}, doi = {10.1007/978-3-642-01957-9\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/JarrousP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PinkasSSW09, author = {Benny Pinkas and Thomas Schneider and Nigel P. Smart and Stephen C. Williams}, editor = {Mitsuru Matsui}, title = {Secure Two-Party Computation Is Practical}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {250--267}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_15}, doi = {10.1007/978-3-642-10366-7\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PinkasSSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0901-2689, author = {Danny Bickson and Tzachy Reinman and Danny Dolev and Benny Pinkas}, title = {Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries}, journal = {CoRR}, volume = {abs/0901.2689}, year = {2009}, url = {http://arxiv.org/abs/0901.2689}, eprinttype = {arXiv}, eprint = {0901.2689}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0901-2689.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pinkas0SW09, author = {Benny Pinkas and Thomas Schneider and Nigel P. Smart and Stephen C. Williams}, title = {Secure Two-Party Computation is Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2009}, url = {http://eprint.iacr.org/2009/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pinkas0SW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Ben-DavidNP08, author = {Assaf Ben{-}David and Noam Nisan and Benny Pinkas}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {FairplayMP: a system for secure multi-party computation}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {257--266}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455804}, doi = {10.1145/1455770.1455804}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Ben-DavidNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/BicksonDBP08, author = {Danny Bickson and Danny Dolev and Genia Bezman and Benny Pinkas}, editor = {Klaus Wehrle and Wolfgang Kellerer and Sandeep K. Singhal and Ralf Steinmetz}, title = {Peer-to-Peer Secure Multi-party Numerical Computation}, booktitle = {Proceedings P2P'08, Eighth International Conference on Peer-to-Peer Computing, 8-11 September 2008, Aachen, Germany}, pages = {257--266}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/P2P.2008.22}, doi = {10.1109/P2P.2008.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/p2p/BicksonDBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LindellPS08, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {2--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_2}, doi = {10.1007/978-3-540-85855-3\_2}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/LindellPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0810-1624, author = {Danny Bickson and Genia Bezman and Danny Dolev and Benny Pinkas}, title = {Peer-to-Peer Secure Multi-Party Numerical Computation}, journal = {CoRR}, volume = {abs/0810.1624}, year = {2008}, url = {http://arxiv.org/abs/0810.1624}, eprinttype = {arXiv}, eprint = {0810.1624}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0810-1624.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellP08, author = {Yehuda Lindell and Benny Pinkas}, title = {An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2008}, url = {http://eprint.iacr.org/2008/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellP08a, author = {Yehuda Lindell and Benny Pinkas}, title = {Secure Multiparty Computation for Privacy-Preserving Data Mining}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2008}, url = {http://eprint.iacr.org/2008/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellP08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DorrendorfGP07, author = {Leo Dorrendorf and Zvi Gutterman and Benny Pinkas}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Cryptanalysis of the windows random number generator}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {476--485}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315304}, doi = {10.1145/1315245.1315304}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DorrendorfGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LindellP07, author = {Yehuda Lindell and Benny Pinkas}, editor = {Moni Naor}, title = {An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {52--78}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_4}, doi = {10.1007/978-3-540-72540-4\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LindellP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/GradwohlNPR07, author = {Ronen Gradwohl and Moni Naor and Benny Pinkas and Guy N. Rothblum}, editor = {Pierluigi Crescenzi and Giuseppe Prencipe and Geppino Pucci}, title = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles}, booktitle = {Fun with Algorithms, 4th International Conference, {FUN} 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4475}, pages = {166--182}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72914-3\_16}, doi = {10.1007/978-3-540-72914-3\_16}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/fun/GradwohlNPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DorrendorfGP07, author = {Leo Dorrendorf and Zvi Gutterman and Benny Pinkas}, title = {Cryptanalysis of the Random Number Generator of the Windows Operating System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2007}, url = {http://eprint.iacr.org/2007/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DorrendorfGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/NaorP06, author = {Moni Naor and Benny Pinkas}, title = {Oblivious Polynomial Evaluation}, journal = {{SIAM} J. Comput.}, volume = {35}, number = {5}, pages = {1254--1281}, year = {2006}, url = {https://doi.org/10.1137/S0097539704383633}, doi = {10.1137/S0097539704383633}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/NaorP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GuttermanPR06, author = {Zvi Gutterman and Benny Pinkas and Tzachy Reinman}, title = {Analysis of the Linux Random Number Generator}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {371--385}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.5}, doi = {10.1109/SP.2006.5}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/GuttermanPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuttermanPR06, author = {Zvi Gutterman and Benny Pinkas and Tzachy Reinman}, title = {Analysis of the Linux Random Number Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2006}, url = {http://eprint.iacr.org/2006/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuttermanPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NaorP05, author = {Moni Naor and Benny Pinkas}, title = {Computationally Secure Oblivious Transfer}, journal = {J. Cryptol.}, volume = {18}, number = {1}, pages = {1--35}, year = {2005}, url = {https://doi.org/10.1007/s00145-004-0102-6}, doi = {10.1007/S00145-004-0102-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NaorP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FreedmanIPR05, author = {Michael J. Freedman and Yuval Ishai and Benny Pinkas and Omer Reingold}, editor = {Joe Kilian}, title = {Keyword Search and Oblivious Pseudorandom Functions}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {303--324}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_17}, doi = {10.1007/978-3-540-30576-7\_17}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FreedmanIPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Pinkas05, author = {Benny Pinkas}, editor = {Henk C. A. van Tilborg}, title = {Traitor Tracing}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_434}, doi = {10.1007/0-387-23483-7\_434}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Pinkas05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/Pinkas04, author = {Benny Pinkas}, title = {Efficient State Updates for Key Management}, journal = {Proc. {IEEE}}, volume = {92}, number = {6}, pages = {910--917}, year = {2004}, url = {https://doi.org/10.1109/JPROC.2004.827355}, doi = {10.1109/JPROC.2004.827355}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/Pinkas04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FreedmanNP04, author = {Michael J. Freedman and Kobbi Nissim and Benny Pinkas}, editor = {Christian Cachin and Jan Camenisch}, title = {Efficient Private Matching and Set Intersection}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {1--19}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_1}, doi = {10.1007/978-3-540-24676-3\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FreedmanNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AggarwalMP04, author = {Gagan Aggarwal and Nina Mishra and Benny Pinkas}, editor = {Christian Cachin and Jan Camenisch}, title = {Secure Computation of the k th-Ranked Element}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {40--55}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_3}, doi = {10.1007/978-3-540-24676-3\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AggarwalMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MalkhiNPS04, author = {Dahlia Malkhi and Noam Nisan and Benny Pinkas and Yaron Sella}, editor = {Matt Blaze}, title = {Fairplay - Secure Two-Party Computation System}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {287--302}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/malkhi.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MalkhiNPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR04-063, author = {Yehuda Lindell and Benny Pinkas}, title = {A Proof of Yao's Protocol for Secure Two-Party Computation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR04-063}}, year = {2004}, url = {https://eccc.weizmann.ac.il/eccc-reports/2004/TR04-063/index.html}, eprinttype = {ECCC}, eprint = {TR04-063}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR04-063.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellP04, author = {Yehuda Lindell and Benny Pinkas}, title = {A Proof of Yao's Protocol for Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2004}, url = {http://eprint.iacr.org/2004/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pinkas03, author = {Benny Pinkas}, editor = {Eli Biham}, title = {Fair Secure Two-Party Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {87--105}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_6}, doi = {10.1007/3-540-39200-9\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pinkas03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GohBPG03, author = {Eu{-}Jin Goh and Dan Boneh and Benny Pinkas and Philippe Golle}, editor = {Colin Boyd and Wenbo Mao}, title = {The Design and Implementation of Protocol-Based Hidden Key Recovery}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {165--179}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_13}, doi = {10.1007/10958513\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/GohBPG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LindellP02, author = {Yehuda Lindell and Benny Pinkas}, title = {Privacy Preserving Data Mining}, journal = {J. Cryptol.}, volume = {15}, number = {3}, pages = {177--206}, year = {2002}, url = {https://doi.org/10.1007/s00145-001-0019-2}, doi = {10.1007/S00145-001-0019-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LindellP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigkdd/Pinkas02, author = {Benny Pinkas}, title = {Cryptographic Techniques for Privacy-Preserving Data Mining}, journal = {{SIGKDD} Explor.}, volume = {4}, number = {2}, pages = {12--19}, year = {2002}, url = {https://doi.org/10.1145/772862.772865}, doi = {10.1145/772862.772865}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigkdd/Pinkas02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PinkasS02, author = {Benny Pinkas and Tomas Sander}, editor = {Vijayalakshmi Atluri}, title = {Securing passwords against dictionary attacks}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {161--170}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586133}, doi = {10.1145/586110.586133}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PinkasS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Pinkas01, author = {Benny Pinkas}, editor = {Tomas Sander}, title = {Efficient State Updates for Key Management}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {40--56}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_4}, doi = {10.1007/3-540-47870-1\_4}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Pinkas01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaberP01, author = {Stuart Haber and Benny Pinkas}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Securely combining public-key cryptosystems}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {215--224}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502013}, doi = {10.1145/501983.502013}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaberP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/HornePS01, author = {Bill G. Horne and Benny Pinkas and Tomas Sander}, editor = {Michael P. Wellman and Yoav Shoham}, title = {Escrow services and incentives in peer-to-peer networks}, booktitle = {Proceedings 3rd {ACM} Conference on Electronic Commerce (EC-2001), Tampa, Florida, USA, October 14-17, 2001}, pages = {85--94}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501158.501168}, doi = {10.1145/501158.501168}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/HornePS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/NaorP01, author = {Moni Naor and Benny Pinkas}, editor = {S. Rao Kosaraju}, title = {Efficient oblivious transfer protocols}, booktitle = {Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, January 7-9, 2001, Washington, DC, {USA}}, pages = {448--457}, publisher = {{ACM/SIAM}}, year = {2001}, url = {http://dl.acm.org/citation.cfm?id=365411.365502}, timestamp = {Fri, 07 Dec 2012 17:02:08 +0100}, biburl = {https://dblp.org/rec/conf/soda/NaorP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ChorFNP00, author = {Benny Chor and Amos Fiat and Moni Naor and Benny Pinkas}, title = {Tracing traitors}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {3}, pages = {893--910}, year = {2000}, url = {https://doi.org/10.1109/18.841169}, doi = {10.1109/18.841169}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ChorFNP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NaorP00, author = {Moni Naor and Benny Pinkas}, editor = {Tatsuaki Okamoto}, title = {Distributed Oblivious Transfer}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {205--219}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_16}, doi = {10.1007/3-540-44448-3\_16}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/NaorP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LindellP00, author = {Yehuda Lindell and Benny Pinkas}, editor = {Mihir Bellare}, title = {Privacy Preserving Data Mining}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {36--54}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_3}, doi = {10.1007/3-540-44598-6\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LindellP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NaorP00, author = {Moni Naor and Benny Pinkas}, editor = {Yair Frankel}, title = {Efficient Trace and Revoke Schemes}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {1--20}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_1}, doi = {10.1007/3-540-45472-1\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/NaorP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AnupamMNPR99, author = {Vinod Anupam and Alain J. Mayer and Kobbi Nissim and Benny Pinkas and Michael K. Reiter}, title = {On the Security of Pay-per-Click and Other Web Advertising Schemes}, journal = {Comput. Networks}, volume = {31}, number = {11-16}, pages = {1091--1100}, year = {1999}, url = {https://doi.org/10.1016/S1389-1286(99)00023-7}, doi = {10.1016/S1389-1286(99)00023-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AnupamMNPR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorP99, author = {Moni Naor and Benny Pinkas}, editor = {Michael J. Wiener}, title = {Oblivious Transfer with Adaptive Queries}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {573--590}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_36}, doi = {10.1007/3-540-48405-1\_36}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaorPR99, author = {Moni Naor and Benny Pinkas and Omer Reingold}, editor = {Jacques Stern}, title = {Distributed Pseudo-random Functions and KDCs}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {327--346}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_23}, doi = {10.1007/3-540-48910-X\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaorPR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CanettiGIMNP99, author = {Ran Canetti and Juan A. Garay and Gene Itkis and Daniele Micciancio and Moni Naor and Benny Pinkas}, title = {Multicast Security: {A} Taxonomy and Some Efficient Constructions}, booktitle = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications, Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999}, pages = {708--716}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/INFCOM.1999.751457}, doi = {10.1109/INFCOM.1999.751457}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/CanettiGIMNP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/NaorPS99, author = {Moni Naor and Benny Pinkas and Reuban Sumner}, editor = {Stuart I. Feldman and Michael P. Wellman}, title = {Privacy preserving auctions and mechanism design}, booktitle = {Proceedings of the First {ACM} Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3-5, 1999}, pages = {129--139}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/336992.337028}, doi = {10.1145/336992.337028}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/NaorPS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorP99, author = {Moni Naor and Benny Pinkas}, editor = {Jeffrey Scott Vitter and Lawrence L. Larmore and Frank Thomson Leighton}, title = {Oblivious Transfer and Polynomial Evaluation}, booktitle = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of Computing, May 1-4, 1999, Atlanta, Georgia, {USA}}, pages = {245--254}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/301250.301312}, doi = {10.1145/301250.301312}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NaorP98, author = {Moni Naor and Benny Pinkas}, title = {Secure Accounting and Auditing on the Web}, journal = {Comput. Networks}, volume = {30}, number = {1-7}, pages = {541--550}, year = {1998}, url = {https://doi.org/10.1016/S0169-7552(98)00116-0}, doi = {10.1016/S0169-7552(98)00116-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NaorP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorP98, author = {Moni Naor and Benny Pinkas}, editor = {Hugo Krawczyk}, title = {Threshold Traitor Tracing}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {502--517}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055750}, doi = {10.1007/BFB0055750}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaorP98, author = {Moni Naor and Benny Pinkas}, editor = {Kaisa Nyberg}, title = {Secure and Efficient Metering}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {576--590}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054155}, doi = {10.1007/BFB0054155}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaorP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorP97, author = {Moni Naor and Benny Pinkas}, editor = {Burton S. Kaliski Jr.}, title = {Visual Authentication and Identification}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {322--336}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052245}, doi = {10.1007/BFB0052245}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorP97, author = {Moni Naor and Benny Pinkas}, title = {Visual Authentication and Identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {1997}, url = {http://eprint.iacr.org/1997/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/McInnesP90, author = {James L. McInnes and Benny Pinkas}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {On the Impossibility of Private Key Cryptography with Weakly Random Keys}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {421--435}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_31}, doi = {10.1007/3-540-38424-3\_31}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/McInnesP90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.