Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana Private database access with HE-over-ORAM architecture. (English) Zbl 1459.68057 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 172-191 (2015). MSC: 68P27 68P15 68P25 94A60 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 9092, 172--191 (2015; Zbl 1459.68057) Full Text: DOI
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi Zeroizing without low-level zeroes: new MMAP attacks and their limitations. (English) Zbl 1375.94114 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 247-266 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 9215, 247--266 (2015; Zbl 1375.94114) Full Text: DOI Link
Halevi, Shai; Shoup, Victor Bootstrapping for HElib. (English) Zbl 1370.94516 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 641-670 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Halevi} and \textit{V. Shoup}, Lect. Notes Comput. Sci. 9056, 641--670 (2015; Zbl 1370.94516) Full Text: DOI
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai Graph-induced multilinear maps from lattices. (English) Zbl 1315.94076 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 498-527 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 9015, 498--527 (2015; Zbl 1315.94076) Full Text: DOI
Halevi, Shai; Shoup, Victor Algorithms in HElib. (English) Zbl 1343.94061 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 554-571 (2014). MSC: 94A60 68W99 PDFBibTeX XMLCite \textit{S. Halevi} and \textit{V. Shoup}, Lect. Notes Comput. Sci. 8616, 554--571 (2014; Zbl 1343.94061) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. (English) Zbl 1336.94048 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 518-535 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 8616, 518--535 (2014; Zbl 1336.94048) Full Text: DOI
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. (English) Zbl 1327.94035 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 533-556 (2014). MSC: 94A60 94C05 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 8441, 533--556 (2014; Zbl 1327.94035) Full Text: DOI
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel Garbled RAM revisited. (English) Zbl 1332.94067 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 405-422 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 8441, 405--422 (2014; Zbl 1332.94067) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana Two-round secure MPC from indistinguishability obfuscation. (English) Zbl 1317.94109 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 74-94 (2014). MSC: 94A60 68Q17 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 8349, 74--94 (2014; Zbl 1317.94109) Full Text: DOI
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel Optimizing ORAM and using it efficiently for secure computation. (English) Zbl 1315.94075 De Cristofaro, Emiliano (ed.) et al., Privacy enhancing technologies. 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10–12, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39076-0/pbk). Lecture Notes in Computer Science 7981, 1-18 (2013). MSC: 94A60 68P25 PDFBibTeX XML Full Text: DOI
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J. Private database queries using somewhat homomorphic encryption. (English) Zbl 1330.94037 Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 102-118 (2013). MSC: 94A60 68P15 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 7954, 102--118 (2013; Zbl 1330.94037) Full Text: DOI
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit Discrete Gaussian leftover hash lemma over infinite domains. (English) Zbl 1320.94059 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 97-116 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 8269, 97--116 (2013; Zbl 1320.94059) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent Attribute-based encryption for circuits from multilinear maps. (English) Zbl 1311.94080 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 479-499 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 8043, 479--499 (2013; Zbl 1311.94080) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Halevi, Shai Candidate multilinear maps from ideal lattices. (English) Zbl 1300.94055 Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 1-17 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 7881, 1--17 (2013; Zbl 1300.94055) Full Text: DOI
Brakerski, Zvika; Gentry, Craig; Halevi, Shai Packed ciphertexts in LWE-based homomorphic encryption. (English) Zbl 1314.94058 Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 1-13 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Brakerski} et al., Lect. Notes Comput. Sci. 7778, 1--13 (2013; Zbl 1314.94058) Full Text: DOI
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P. Ring switching in BGV-style homomorphic encryption. (English) Zbl 1310.94147 Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 19-37 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 7485, 19--37 (2012; Zbl 1310.94147) Full Text: DOI
Gentry, Craig; Halevi, Shai; Smart, Nigel P. Homomorphic evaluation of the AES circuit. (English) Zbl 1296.94117 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 850-867 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 7417, 850--867 (2012; Zbl 1296.94117) Full Text: DOI
Gentry, Craig; Halevi, Shai; Smart, Nigel P. Better bootstrapping in fully homomorphic encryption. (English) Zbl 1290.94077 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 1-16 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 7293, 1--16 (2012; Zbl 1290.94077) Full Text: DOI
Gentry, Craig; Halevi, Shai; Smart, Nigel P. Fully homomorphic encryption with polylog overhead. (English) Zbl 1297.94071 Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 465-482 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 7237, 465--482 (2012; Zbl 1297.94071) Full Text: DOI
Bitansky, Nir; Canetti, Ran; Halevi, Shai Leakage-tolerant interactive protocols. (English) Zbl 1296.94088 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 266-284 (2012). MSC: 94A60 68P25 94A62 PDFBibTeX XMLCite \textit{N. Bitansky} et al., Lect. Notes Comput. Sci. 7194, 266--284 (2012; Zbl 1296.94088) Full Text: DOI
Halevi, Shai; Kalai, Yael Tauman Smooth projective hashing and two-message oblivious transfer. (English) Zbl 1272.94033 J. Cryptology 25, No. 1, 158-193 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Halevi} and \textit{Y. T. Kalai}, J. Cryptology 25, No. 1, 158--193 (2012; Zbl 1272.94033) Full Text: DOI
Gentry, Craig; Halevi, Shai Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. (English) Zbl 1292.94066 Ostrovsky, Rafail (ed.), Proceedings of the 2011 IEEE 52nd annual symposium on foundations of computer science – FOCS 2011, Palm Springs, CA, USA, October 22–25. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-4571-4; 978-1-4577-1843-4/ebook). 107-116 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Gentry} and \textit{S. Halevi}, in: Proceedings of the 2011 IEEE 52nd annual symposium on foundations of computer science -- FOCS 2011, Palm Springs, CA, USA, October 22--25. Los Alamitos, CA: IEEE Computer Society. 107--116 (2011; Zbl 1292.94066) Full Text: DOI
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai Collision-free hashing from lattice problems. (English) Zbl 1343.94055 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 30-39 (2011). MSC: 94A60 11H06 PDFBibTeX XMLCite \textit{O. Goldreich} et al., Lect. Notes Comput. Sci. 6650, 30--39 (2011; Zbl 1343.94055) Full Text: DOI Link
Halevi, Shai; Lindell, Yehuda; Pinkas, Benny Secure computation on the web: computing without simultaneous interaction. (English) Zbl 1287.94070 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 132-150 (2011). MSC: 94A60 94B25 94C10 94C15 PDFBibTeX XMLCite \textit{S. Halevi} et al., Lect. Notes Comput. Sci. 6841, 132--150 (2011; Zbl 1287.94070) Full Text: DOI
Gentry, Craig; Halevi, Shai Implementing Gentry’s fully-homomorphic encryption scheme. (English) Zbl 1281.94026 Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 129-148 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Gentry} and \textit{S. Halevi}, Lect. Notes Comput. Sci. 6632, 129--148 (2011; Zbl 1281.94026) Full Text: DOI
Halevi, Shai; Lin, Huijia After-the-fact leakage in public-key encryption. (English) Zbl 1295.94078 Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 107-124 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Halevi} and \textit{H. Lin}, Lect. Notes Comput. Sci. 6597, 107--124 (2011; Zbl 1295.94078) Full Text: DOI
Halevi, Shai; Krawczyk, Hugo One-pass HMQV and asymmetric key-wrapping. (English) Zbl 1291.94094 Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 317-334 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Halevi} and \textit{H. Krawczyk}, Lect. Notes Comput. Sci. 6571, 317--334 (2011; Zbl 1291.94094) Full Text: DOI
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod \(i\)-hop homomorphic encryption and rerandomizable Yao circuits. (English) Zbl 1280.94061 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 155-172 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 6223, 155--172 (2010; Zbl 1280.94061) Full Text: DOI
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod A simple BGN-type cryptosystem from LWE. (English) Zbl 1280.94060 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 506-522 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 6110, 506--522 (2010; Zbl 1280.94060) Full Text: DOI
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod Fully homomorphic encryption over the integers. (English) Zbl 1279.94130 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 24-43 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{M. van Dijk} et al., Lect. Notes Comput. Sci. 6110, 24--43 (2010; Zbl 1279.94130) Full Text: DOI
Gennaro, Rosario; Halevi, Shai More on key wrapping. (English) Zbl 1267.94061 Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 53-70 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} and \textit{S. Halevi}, Lect. Notes Comput. Sci. 5867, 53--70 (2009; Zbl 1267.94061) Full Text: DOI
Halevi, Shai (ed.) Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. (English) Zbl 1173.94004 Lecture Notes in Computer Science 5677. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). xiv, 692 p. (2009). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{S. Halevi} (ed.), Advances in cryptology -- CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings. Berlin: Springer (2009; Zbl 1173.94004) Full Text: DOI
Gentry, Craig; Halevi, Shai Hierarchical identity based encryption with polynomially many levels. (English) Zbl 1213.94102 Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 437-456 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Gentry} and \textit{S. Halevi}, Lect. Notes Comput. Sci. 5444, 437--456 (2009; Zbl 1213.94102) Full Text: DOI
Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail Circular-secure encryption from decision Diffie-Hellman. (English) Zbl 1183.94025 Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 108-125 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 5157, 108--125 (2008; Zbl 1183.94025) Full Text: DOI
Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal Threshold RSA for dynamic and ad-hoc groups. (English) Zbl 1149.94316 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 88-107 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 4965, 88--107 (2008; Zbl 1149.94316) Full Text: DOI
Halevi, Shai; Rabin, Tal Degradation and amplification of computational hardness. (English) Zbl 1162.94365 Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 626-643 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Halevi} and \textit{T. Rabin}, Lect. Notes Comput. Sci. 4948, 626--643 (2008; Zbl 1162.94365) Full Text: DOI
Halevi, Shai; Myers, Steven; Rackoff, Charles On seed-incompressible functions. (English) Zbl 1162.94364 Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 19-36 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Halevi} et al., Lect. Notes Comput. Sci. 4948, 19--36 (2008; Zbl 1162.94364) Full Text: DOI
Halevi, Shai Invertible universal hashing and the TET encryption mode. (English) Zbl 1215.94049 Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 412-429 (2007). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Halevi}, Lect. Notes Comput. Sci. 4622, 412--429 (2007; Zbl 1215.94049) Full Text: DOI
Canetti, Ran; Halevi, Shai; Katz, Jonathan A forward-secure public-key encryption scheme. (English) Zbl 1121.68044 J. Cryptology 20, No. 3, 265-294 (2007). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., J. Cryptology 20, No. 3, 265--294 (2007; Zbl 1121.68044) Full Text: DOI
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan Chosen-ciphertext security from identity-based encryption. (English) Zbl 1138.94010 SIAM J. Comput. 36, No. 5, 1301-1328 (2006). Reviewer: Nicolae Constantinescu (Craiova) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Boneh} et al., SIAM J. Comput. 36, No. 5, 1301--1328 (2006; Zbl 1138.94010) Full Text: DOI
Canetti, Ran; Halevi, Shai; Steiner, Michael Mitigating dictionary attacks on password-protected local storage. (English) Zbl 1161.94436 Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 160-179 (2006). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 4117, 160--179 (2006; Zbl 1161.94436) Full Text: DOI
Halevi, Shai; Krawczyk, Hugo Strengthening digital signatures via randomized hashing. (English) Zbl 1161.94443 Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 41-59 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{S. Halevi} and \textit{H. Krawczyk}, Lect. Notes Comput. Sci. 4117, 41--59 (2006; Zbl 1161.94443) Full Text: DOI
Boneh, Dan; Boyen, Xavier; Halevi, Shai Chosen ciphertext secure public key threshold encryption without random oracles. (English) Zbl 1125.94012 Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 226-243 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 3860, 226--243 (2006; Zbl 1125.94012) Full Text: DOI
Halevi, Shai (ed.); Rabin, Tal (ed.) Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. (English) Zbl 1097.94002 Lecture Notes in Computer Science 3876. Berlin: Springer (ISBN 3-540-32731-2/pbk). xi, 617 p. (2006). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{S. Halevi} (ed.) and \textit{T. Rabin} (ed.), Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4--7, 2006. Proceedings. Berlin: Springer (2006; Zbl 1097.94002) Full Text: DOI
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil Universally composable password-based key exchange. (English) Zbl 1137.94367 Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 404-421 (2005). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 3494, 404--421 (2005; Zbl 1137.94367) Full Text: DOI
Canetti, Ran; Halevi, Shai; Katz, Jonathan Adaptively-secure, non-interactive public-key encryption. (English) Zbl 1079.94537 Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 150-168 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 3378, 150--168 (2005; Zbl 1079.94537) Full Text: DOI
Canetti, Ran; Halevi, Shai; Steiner, Michael Hardness amplification of weakly verifiable puzzles. (English) Zbl 1079.94538 Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 17-33 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 3378, 17--33 (2005; Zbl 1079.94538) Full Text: DOI
Canetti, Ran; Goldreich, Oded; Halevi, Shai The random oracle methodology, revisited. (English) Zbl 1204.94063 J. ACM 51, No. 4, 557-594 (2004). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. Canetti} et al., J. ACM 51, No. 4, 557--594 (2004; Zbl 1204.94063) Full Text: DOI Link
Canetti, Ran; Goldreich, Oded; Halevi, Shai On the random-oracle methodology as applied to length-restricted signature schemes. (English) Zbl 1197.94215 Naor, Moni (ed.), Theory of cryptography. First theory of cryptography conference, TCC 2004, Cambridge, MA, USA, February 19–21, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21000-8/pbk). Lecture Notes in Computer Science 2951, 40-57 (2004). MSC: 94A62 68P25 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 2951, 40--57 (2004; Zbl 1197.94215) Full Text: DOI
Halevi, Shai; Rogaway, Phillip A parallelizable enciphering mode. (English) Zbl 1196.94055 Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 292-304 (2004). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Halevi} and \textit{P. Rogaway}, Lect. Notes Comput. Sci. 2964, 292--304 (2004; Zbl 1196.94055) Full Text: DOI
Canetti, Ran; Halevi, Shai; Katz, Jonathan Chosen-ciphertext security from identity-based encryption. (English) Zbl 1122.94358 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 207-222 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 3027, 207--222 (2004; Zbl 1122.94358) Full Text: DOI
Halevi, Shai EME*: Extending EME to handle arbitrary-length messages with associated data. (English) Zbl 1113.94310 Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 315-327 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Halevi}, Lect. Notes Comput. Sci. 3348, 315--327 (2004; Zbl 1113.94310) Full Text: DOI
Halevi, Shai; Rogaway, Phillip A tweakable enciphering mode. (English) Zbl 1122.94374 Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 482-499 (2003). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Halevi} and \textit{P. Rogaway}, Lect. Notes Comput. Sci. 2729, 482--499 (2003; Zbl 1122.94374) Full Text: DOI
Canetti, Ran; Halevi, Shai; Katz, Jonathan A forward-secure public-key encryption scheme. (English) Zbl 1037.68532 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 255-271 (2003). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 2656, 255--271 (2003; Zbl 1037.68532) Full Text: Link
Halevi, Shai; Coppersmith, Don; Jutla, Charanjit Scream: A software-efficient stream cipher. (English) Zbl 1045.94519 Daemen, Joan (ed.) et al., Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers. Berlin: Springer (ISBN 3-540-44009-7). Lect. Notes Comput. Sci. 2365, 195-209 (2002). MSC: 94A60 68N99 68P25 PDFBibTeX XMLCite \textit{S. Halevi} et al., Lect. Notes Comput. Sci. 2365, 195--209 (2002; Zbl 1045.94519) Full Text: Link
Coppersmith, Don; Halevi, Shai; Jutla, Charanjit Cryptanalysis of stream ciphers with linear masking. (English) Zbl 1026.94525 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 515-532 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Coppersmith} et al., Lect. Notes Comput. Sci. 2442, 515--532 (2002; Zbl 1026.94525) Full Text: Link
Halevi, Shai; Krauthgamer, Robert; Kushilevitz, Eyal; Nissim, Kobbi Private approximation of NP-hard functions. (English) Zbl 1323.68569 Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6–8, 2001. New York, NY: ACM Press (ISBN 1-581-13349-9). 550-559 (2001). MSC: 68W25 68Q17 68Q25 94A60 PDFBibTeX XMLCite \textit{S. Halevi} et al., in: Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6--8, 2001. New York, NY: ACM Press. 550--559 (2001; Zbl 1323.68569) Full Text: DOI
Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick The modular inversion hidden number problem. (English) Zbl 1062.94545 Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 36-51 (2001). MSC: 94A60 11T71 68Q25 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 2248, 36--51 (2001; Zbl 1062.94545) Full Text: Link
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai Exposure-resilient functions and all-or-nothing transforms. (English) Zbl 1082.94508 Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 453-469 (2000). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 1807, 453--469 (2000; Zbl 1082.94508)
Catalano, Dario; Gennaro, Rosario; Halevi, Shai Computing inverses over a shared secret modulus. (English) Zbl 1082.94538 Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 190-206 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Catalano} et al., Lect. Notes Comput. Sci. 1807, 190--206 (2000; Zbl 1082.94538)
Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal A cryptographic solution to a game theoretic problem. (English) Zbl 1001.91002 Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 112-130 (2000). MSC: 91A10 94A60 91A05 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 1880, 112--130 (2000; Zbl 1001.91002)
Canetti, Ran; Halevi, Shai; Herzberg, Amir Maintaining authenticated communication in the presence of break-ins. (English) Zbl 0957.68043 J. Cryptology 13, No. 1, 61-105 (2000). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{R. Canetti} et al., J. Cryptology 13, No. 1, 61--105 (2000; Zbl 0957.68043) Full Text: DOI