×
Author ID: lindell.yehuda Recent zbMATH articles by "Lindell, Yehuda"
Published as: Lindell, Yehuda
External Links: MGP

Publications by Year

Citations contained in zbMATH Open

106 Publications have been cited 1,709 times in 937 Documents Cited by Year
Universally composable two-party and multi-party secure computation. Zbl 1192.94112
Canetti, Ran; Lindell, Yehuda; Ostrovsky, Rafail; Sahai, Amit
137
2002
A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364
Lindell, Yehuda; Pinkas, Benny
83
2009
Introduction to modern cryptography. Zbl 1143.94001
Katz, Jonathan; Lindell, Yehuda
69
2008
An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1141.94362
Lindell, Yehuda; Pinkas, Benny
56
2007
Efficient secure two-party protocols. Techniques and constructions. Zbl 1208.68005
Hazay, Carmit; Lindell, Yehuda
45
2010
A framework for password-based authenticated key exchange. Zbl 1038.94534
Gennaro, Rosario; Lindell, Yehuda
43
2003
Universally composable password-based key exchange. Zbl 1137.94367
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil
39
2005
Secure multi-party computation without agreement. Zbl 1102.68472
Goldwasser, Shafi; Lindell, Yehuda
36
2005
Privacy preserving data mining. Zbl 1010.94008
Lindell, Yehuda; Pinkas, Benny
33
2002
Introduction to modern cryptography. 2nd ed. Zbl 1323.94001
Katz, Jonathan; Lindell, Yehuda
31
2015
Fast large-scale honest-majority MPC for malicious adversaries. Zbl 1446.94118
Chida, Koji; Genkin, Daniel; Hamada, Koki; Ikarashi, Dai; Kikuchi, Ryo; Lindell, Yehuda; Nof, Ariel
31
2018
Privacy preserving data mining. Zbl 0989.68506
Lindell, Yehuda; Pinkas, Benny
30
2000
Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070
Halevi, Shai; Lindell, Yehuda; Pinkas, Benny
29
2011
Efficient constant round multi-party computation combining BMR and SPDZ. Zbl 1352.94049
Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.; Yanai, Avishay
28
2015
Parallel coin-tossing and constant-round secure two-party computation. Zbl 1027.94011
Lindell, Yehuda
27
2003
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. Zbl 1162.94367
Hazay, Carmit; Lindell, Yehuda
27
2008
Security against covert adversaries: efficient protocols for realistic adversaries. Zbl 1129.94010
Aumann, Yonatan; Lindell, Yehuda
27
2007
Lower bounds for non-black-box zero knowledge. Zbl 1094.68024
Barak, Boaz; Lindell, Yehuda; Vadhan, Salil
26
2006
Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1281.94037
Lindell, Yehuda; Pinkas, Benny
26
2011
Complete fairness in secure two-party computation. Zbl 1231.94062
Gordon, S. Dov; Carmit, Hazay; Katz, Jonathan; Lindell, Yehuda
26
2008
Fast cut-and-choose based protocols for malicious and covert adversaries. Zbl 1316.94082
Lindell, Yehuda
24
2013
Highly-efficient universally-composable commitments based on the DDH assumption. Zbl 1291.68037
Lindell, Yehuda
24
2011
A full proof of the BGW protocol for perfectly secure multiparty computation. Zbl 1370.94480
Asharov, Gilad; Lindell, Yehuda
23
2017
High-throughput secure three-party computation for malicious adversaries and an honest majority. Zbl 1415.94431
Furukawa, Jun; Lindell, Yehuda; Nof, Ariel; Weinstein, Or
23
2017
More efficient oblivious transfer extensions with security for malicious adversaries. Zbl 1370.94481
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
21
2015
A simpler variant of universally composable security for standard multiparty computation. Zbl 1351.94031
Canetti, Ran; Cohen, Asaf; Lindell, Yehuda
21
2015
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1038.94523
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
20
2003
On the black-box complexity of optimally-fair coin tossing. Zbl 1295.94044
Dachman-Soled, Dana; Lindell, Yehuda; Mahmoody, Mohammad; Malkin, Tal
20
2011
An efficient transform from sigma protocols to NIZK with a CRS and non-programmable random oracle. Zbl 1354.94038
Lindell, Yehuda
20
2015
Fast garbling of circuits under standard assumptions. Zbl 1400.94146
Gueron, Shay; Lindell, Yehuda; Nof, Ariel; Pinkas, Benny
20
2018
Fast secure two-party ECDSA signing. Zbl 1410.94091
Lindell, Yehuda
19
2017
Bounded-concurrent secure two-party computation without setup assumptions. Zbl 1192.94123
Lindell, Yehuda
19
2003
Lower bounds for concurrent self composition. Zbl 1176.94069
Lindell, Yehuda
18
2004
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1101.68549
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
17
2006
Black-box constructions of protocols for secure computation. Zbl 1236.94056
Haitner, Iftach; Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
17
2011
Secure computation without authentication. Zbl 1145.94457
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
17
2005
Black-box constructions for secure computation. Zbl 1301.94116
Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
16
2006
Fairness versus guaranteed output delivery in secure multiparty computation. Zbl 1317.94099
Cohen, Ran; Lindell, Yehuda
16
2014
Security against covert adversaries: Efficient protocols for realistic adversaries. Zbl 1181.94091
Aumann, Yonatan; Lindell, Yehuda
16
2010
Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1278.94056
Lindell, Yehuda; Pinkas, Benny
16
2012
How to simulate it – a tutorial on the simulation proof technique. Zbl 1481.94111
Lindell, Yehuda
16
2017
Information-theoretically secure protocols and security under composition. Zbl 1301.94119
Kushilevitz, Eyal; Lindell, Yehuda; Rabin, Tal
15
2006
Cut-and-choose yao-based secure computation in the online/offline and batch settings. Zbl 1335.94067
Lindell, Yehuda; Riva, Ben
14
2014
Parallel coin-tossing and constant-round secure two-party computation. Zbl 1002.94521
Lindell, Yehuda
14
2001
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. Zbl 1195.94058
Hazay, Carmit; Lindell, Yehuda
14
2010
Composition of secure multi-party protocols. A comprehensive study. Zbl 1041.68036
Lindell, Yehuda
14
2003
A simpler construction of CCA2-secure public-key encryption under general assumptions. Zbl 1037.68535
Lindell, Yehuda
14
2003
The IPS compiler: optimizations, variants and concrete efficiency. Zbl 1288.68023
Lindell, Yehuda; Oxman, Eli; Pinkas, Benny
14
2011
\(1/p\)-secure multiparty computation without honest majority and the best of both worlds. Zbl 1287.94051
Beimel, Amos; Lindell, Yehuda; Omri, Eran; Orlov, Ilan
14
2011
Session-key generation using human passwords only. Zbl 1003.94527
Goldreich, Oded; Lindell, Yehuda
13
2001
Strict polynomial-time in simulation and extraction. Zbl 1192.68343
Barak, Boaz; Lindell, Yehuda
13
2002
Information-theoretically secure protocols and security under composition. Zbl 1202.94185
Kushilevitz, Eyal; Lindell, Yehuda; Rabin, Tal
13
2010
Sequential composition of protocols without simultaneous termination. Zbl 1292.68023
Lindell, Yehuda; Lysyanskaya, Anna; Rabin, Tal
12
2002
Strict polynomial-time in simulation and extraction. Zbl 1060.94014
Barak, Boaz; Lindell, Yehuda
11
2004
Concurrently-secure blind signatures without random oracles or setup assumptions. Zbl 1129.94044
Hazay, Carmit; Katz, Jonathan; Koo, Chiu-Yuen; Lindell, Yehuda
11
2007
Complete fairness in secure two-party computation. Zbl 1281.94081
Gordon, S. Dov; Hazay, Carmit; Katz, Jonathan; Lindell, Yehuda
11
2011
Fairness versus guaranteed output delivery in secure multiparty computation. Zbl 1386.94067
Cohen, Ran; Lindell, Yehuda
11
2017
Adaptive zero-knowledge proofs and adaptively secure oblivious transfer. Zbl 1251.94034
Lindell, Yehuda; Zarosim, Hila
10
2011
Hiding the input-size in secure two-party computation. Zbl 1326.94110
Lindell, Yehuda; Nissim, Kobbi; Orlandi, Claudio
10
2013
Implementing two-party computation efficiently with security against malicious adversaries. Zbl 1180.68152
Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.
10
2008
More efficient constant-round multi-party computation from BMR and SHE. Zbl 1406.94071
Lindell, Yehuda; Smart, Nigel P.; Soria-Vazquez, Eduardo
10
2016
Utility dependence in correct and fair rational secret sharing. Zbl 1209.94034
Asharov, Gilad; Lindell, Yehuda
9
2011
A note on constant-round zero-knowledge proofs of knowledge. Zbl 1283.94074
Lindell, Yehuda
9
2013
Secure computation without agreement. Zbl 1029.68511
Goldwasser, Shafi; Lindell, Yehuda
9
2002
On combining privacy with guaranteed output delivery in secure multiparty computation. Zbl 1161.94444
Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
9
2006
Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Zbl 1280.94007
9
2014
Session-key generation using human passwords only. Zbl 1103.68513
Goldreich, Oded; Lindell, Yehuda
8
2006
A full characterization of functions that imply fair coin tossing and ramifications to fairness. Zbl 1315.94051
Asharov, Gilad; Lindell, Yehuda; Rabin, Tal
8
2013
Concurrent composition of secure protocols in the timing model. Zbl 1130.68049
Kalai, Yael Tauman; Lindell, Yehuda; Prabhakaran, Manoj
8
2007
On the composition of authenticated byzantine agreement. Zbl 1192.68084
Lindell, Yehuda; Lysyanskaya, Anna; Rabin, Tal
7
2002
A simpler construction of CCA2-secure public-key encryption under general assumptions. Zbl 1103.68528
Lindell, Yehuda
7
2006
On achieving the “best of both worlds” in secure multiparty computation. Zbl 1215.68035
Ishai, Yuval; Katz, Jonathan; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
7
2011
Adaptive zero-knowledge proofs and adaptively secure oblivious transfer. Zbl 1213.68249
Lindell, Yehuda; Zarosim, Hila
7
2009
Fast distributed RSA key generation for semi-honest and malicious adversaries. Zbl 1436.94061
Frederiksen, Tore Kasper; Lindell, Yehuda; Osheter, Valery; Pinkas, Benny
7
2018
More efficient oblivious transfer extensions. Zbl 1377.94030
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
6
2017
Utility dependence in correct and fair rational secret sharing. Zbl 1252.94105
Asharov, Gilad; Lindell, Yehuda
6
2009
On the composition of authenticated Byzantine agreement. Zbl 1326.68041
Lindell, Yehuda; Lysyanskaya, Anna; Rabin, Tal
6
2006
On the feasibility of extending oblivious transfer. Zbl 1315.94086
Lindell, Yehuda; Zarosim, Hila
6
2013
General composition and universal composability in secure multiparty computation. Zbl 1184.94243
Lindell, Yehuda
5
2009
Collusion-free multiparty computation in the mediated model. Zbl 1252.94042
Alwen, Joël; Katz, Jonathan; Lindell, Yehuda; Persiano, Giuseppe; Shelat, Abhi; Visconti, Ivan
5
2009
Fast cut-and-choose-based protocols for malicious and covert adversaries. Zbl 1355.94068
Lindell, Yehuda
5
2016
Concurrent general composition of secure protocols in the timing model. Zbl 1192.94121
Kalai, Yael Tauman; Lindell, Yehuda; Prabhakaran, Manoj
5
2005
Perfectly-secure multiplication for any \(t < n/3\). Zbl 1287.94045
Asharov, Gilad; Lindell, Yehuda; Rabin, Tal
5
2011
Lower bounds and impossibility results for concurrent self composition. Zbl 1143.94012
Lindell, Yehuda
5
2008
Efficient scalable constant-round MPC via garbled circuits. Zbl 1417.94042
Ben-Efraim, Aner; Lindell, Yehuda; Omri, Eran
5
2017
Efficient fully-simulatable oblivious transfer. Zbl 1286.68020
Lindell, Yehuda
4
2008
Impossibility results for universal composability in public-key models and with fixed inputs. Zbl 1258.94039
Kidron, Dafna; Lindell, Yehuda
4
2011
Tutorials on the foundations of cryptography. Dedicated to Oded Goldreich. Zbl 1411.94003
3
2017
High-throughput secure three-party computation with an honest majority. Zbl 07707563
Furukawa, Jun; Lindell, Yehuda; Nof, Ariel; Weinstein, Or
3
2023
Handling expected polynomial-time strategies in simulation-based security proofs. Zbl 1161.94410
Katz, Jonathan; Lindell, Yehuda
3
2008
Handling expected polynomial-time strategies in simulation-based security proofs. Zbl 1079.94555
Katz, Jonathan; Lindell, Yehuda
3
2005
Adaptively secure computation with partial erasures. Zbl 1333.94038
Hazay, Carmit; Lindell, Yehuda; Patra, Arpita
3
2015
An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1314.94086
Lindell, Yehuda; Pinkas, Benny
3
2015
Introduction to modern cryptography. 3rd edition. Zbl 1479.94002
Katz, Jonathan; Lindell, Yehuda
3
2021
Secure two-party computation with fairness – a necessary design principle. Zbl 1410.94092
Lindell, Yehuda; Rabin, Tal
3
2017
Secure computation without authentication. Zbl 1243.94024
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
2
2011
Completeness for symmetric two-party functionalities – revisited. Zbl 1292.94102
Lindell, Yehuda; Omri, Eran; Zarosim, Hila
2
2012
Adding distributed decryption and key generation to a ring-LWE based CCA encryption scheme. Zbl 1457.94154
Kraitsberg, Michael; Lindell, Yehuda; Osheter, Valery; Smart, Nigel P.; Talibi Alaoui, Younes
2
2019
Efficient constant-round multi-party computation combining BMR and SPDZ. Zbl 1466.94033
Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.; Yanai, Avishay
1
2019
Fast secure two-party ECDSA signing. Zbl 1479.94332
Lindell, Yehuda
1
2021
High-throughput secure three-party computation with an honest majority. Zbl 07707563
Furukawa, Jun; Lindell, Yehuda; Nof, Ariel; Weinstein, Or
3
2023
Introduction to modern cryptography. 3rd edition. Zbl 1479.94002
Katz, Jonathan; Lindell, Yehuda
3
2021
Fast secure two-party ECDSA signing. Zbl 1479.94332
Lindell, Yehuda
1
2021
\(1/p\)-secure multiparty computation without an honest majority and the best of both worlds. Zbl 1453.94131
Beimel, Amos; Lindell, Yehuda; Omri, Eran; Orlov, Ilan
1
2020
Adding distributed decryption and key generation to a ring-LWE based CCA encryption scheme. Zbl 1457.94154
Kraitsberg, Michael; Lindell, Yehuda; Osheter, Valery; Smart, Nigel P.; Talibi Alaoui, Younes
2
2019
Efficient constant-round multi-party computation combining BMR and SPDZ. Zbl 1466.94033
Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.; Yanai, Avishay
1
2019
Fast large-scale honest-majority MPC for malicious adversaries. Zbl 1446.94118
Chida, Koji; Genkin, Daniel; Hamada, Koki; Ikarashi, Dai; Kikuchi, Ryo; Lindell, Yehuda; Nof, Ariel
31
2018
Fast garbling of circuits under standard assumptions. Zbl 1400.94146
Gueron, Shay; Lindell, Yehuda; Nof, Ariel; Pinkas, Benny
20
2018
Fast distributed RSA key generation for semi-honest and malicious adversaries. Zbl 1436.94061
Frederiksen, Tore Kasper; Lindell, Yehuda; Osheter, Valery; Pinkas, Benny
7
2018
Fast garbling of circuits over 3-valued logic. Zbl 1441.94085
Lindell, Yehuda; Yanai, Avishay
1
2018
Completeness for symmetric two-party functionalities: revisited. Zbl 1400.94163
Lindell, Yehuda; Omri, Eran; Zarosim, Hila
1
2018
On the feasibility of extending oblivious transfer. Zbl 1400.94164
Lindell, Yehuda; Zarosim, Hila
1
2018
A full proof of the BGW protocol for perfectly secure multiparty computation. Zbl 1370.94480
Asharov, Gilad; Lindell, Yehuda
23
2017
High-throughput secure three-party computation for malicious adversaries and an honest majority. Zbl 1415.94431
Furukawa, Jun; Lindell, Yehuda; Nof, Ariel; Weinstein, Or
23
2017
Fast secure two-party ECDSA signing. Zbl 1410.94091
Lindell, Yehuda
19
2017
How to simulate it – a tutorial on the simulation proof technique. Zbl 1481.94111
Lindell, Yehuda
16
2017
Fairness versus guaranteed output delivery in secure multiparty computation. Zbl 1386.94067
Cohen, Ran; Lindell, Yehuda
11
2017
More efficient oblivious transfer extensions. Zbl 1377.94030
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
6
2017
Efficient scalable constant-round MPC via garbled circuits. Zbl 1417.94042
Ben-Efraim, Aner; Lindell, Yehuda; Omri, Eran
5
2017
Tutorials on the foundations of cryptography. Dedicated to Oded Goldreich. Zbl 1411.94003
3
2017
Secure two-party computation with fairness – a necessary design principle. Zbl 1410.94092
Lindell, Yehuda; Rabin, Tal
3
2017
More efficient constant-round multi-party computation from BMR and SHE. Zbl 1406.94071
Lindell, Yehuda; Smart, Nigel P.; Soria-Vazquez, Eduardo
10
2016
Fast cut-and-choose-based protocols for malicious and covert adversaries. Zbl 1355.94068
Lindell, Yehuda
5
2016
Introduction to modern cryptography. 2nd ed. Zbl 1323.94001
Katz, Jonathan; Lindell, Yehuda
31
2015
Efficient constant round multi-party computation combining BMR and SPDZ. Zbl 1352.94049
Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.; Yanai, Avishay
28
2015
More efficient oblivious transfer extensions with security for malicious adversaries. Zbl 1370.94481
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
21
2015
A simpler variant of universally composable security for standard multiparty computation. Zbl 1351.94031
Canetti, Ran; Cohen, Asaf; Lindell, Yehuda
21
2015
An efficient transform from sigma protocols to NIZK with a CRS and non-programmable random oracle. Zbl 1354.94038
Lindell, Yehuda
20
2015
Adaptively secure computation with partial erasures. Zbl 1333.94038
Hazay, Carmit; Lindell, Yehuda; Patra, Arpita
3
2015
An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1314.94086
Lindell, Yehuda; Pinkas, Benny
3
2015
Fairness versus guaranteed output delivery in secure multiparty computation. Zbl 1317.94099
Cohen, Ran; Lindell, Yehuda
16
2014
Cut-and-choose yao-based secure computation in the online/offline and batch settings. Zbl 1335.94067
Lindell, Yehuda; Riva, Ben
14
2014
Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Zbl 1280.94007
9
2014
Fast cut-and-choose based protocols for malicious and covert adversaries. Zbl 1316.94082
Lindell, Yehuda
24
2013
Hiding the input-size in secure two-party computation. Zbl 1326.94110
Lindell, Yehuda; Nissim, Kobbi; Orlandi, Claudio
10
2013
A note on constant-round zero-knowledge proofs of knowledge. Zbl 1283.94074
Lindell, Yehuda
9
2013
A full characterization of functions that imply fair coin tossing and ramifications to fairness. Zbl 1315.94051
Asharov, Gilad; Lindell, Yehuda; Rabin, Tal
8
2013
On the feasibility of extending oblivious transfer. Zbl 1315.94086
Lindell, Yehuda; Zarosim, Hila
6
2013
Fair and efficient secure multiparty computation with reputation systems. Zbl 1314.94052
Asharov, Gilad; Lindell, Yehuda; Zarosim, Hila
1
2013
Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1278.94056
Lindell, Yehuda; Pinkas, Benny
16
2012
Completeness for symmetric two-party functionalities – revisited. Zbl 1292.94102
Lindell, Yehuda; Omri, Eran; Zarosim, Hila
2
2012
Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070
Halevi, Shai; Lindell, Yehuda; Pinkas, Benny
29
2011
Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1281.94037
Lindell, Yehuda; Pinkas, Benny
26
2011
Highly-efficient universally-composable commitments based on the DDH assumption. Zbl 1291.68037
Lindell, Yehuda
24
2011
On the black-box complexity of optimally-fair coin tossing. Zbl 1295.94044
Dachman-Soled, Dana; Lindell, Yehuda; Mahmoody, Mohammad; Malkin, Tal
20
2011
Black-box constructions of protocols for secure computation. Zbl 1236.94056
Haitner, Iftach; Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
17
2011
The IPS compiler: optimizations, variants and concrete efficiency. Zbl 1288.68023
Lindell, Yehuda; Oxman, Eli; Pinkas, Benny
14
2011
\(1/p\)-secure multiparty computation without honest majority and the best of both worlds. Zbl 1287.94051
Beimel, Amos; Lindell, Yehuda; Omri, Eran; Orlov, Ilan
14
2011
Complete fairness in secure two-party computation. Zbl 1281.94081
Gordon, S. Dov; Hazay, Carmit; Katz, Jonathan; Lindell, Yehuda
11
2011
Adaptive zero-knowledge proofs and adaptively secure oblivious transfer. Zbl 1251.94034
Lindell, Yehuda; Zarosim, Hila
10
2011
Utility dependence in correct and fair rational secret sharing. Zbl 1209.94034
Asharov, Gilad; Lindell, Yehuda
9
2011
On achieving the “best of both worlds” in secure multiparty computation. Zbl 1215.68035
Ishai, Yuval; Katz, Jonathan; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
7
2011
Perfectly-secure multiplication for any \(t < n/3\). Zbl 1287.94045
Asharov, Gilad; Lindell, Yehuda; Rabin, Tal
5
2011
Impossibility results for universal composability in public-key models and with fixed inputs. Zbl 1258.94039
Kidron, Dafna; Lindell, Yehuda
4
2011
Secure computation without authentication. Zbl 1243.94024
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
2
2011
Efficient secure two-party protocols. Techniques and constructions. Zbl 1208.68005
Hazay, Carmit; Lindell, Yehuda
45
2010
Security against covert adversaries: Efficient protocols for realistic adversaries. Zbl 1181.94091
Aumann, Yonatan; Lindell, Yehuda
16
2010
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. Zbl 1195.94058
Hazay, Carmit; Lindell, Yehuda
14
2010
Information-theoretically secure protocols and security under composition. Zbl 1202.94185
Kushilevitz, Eyal; Lindell, Yehuda; Rabin, Tal
13
2010
A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364
Lindell, Yehuda; Pinkas, Benny
83
2009
Adaptive zero-knowledge proofs and adaptively secure oblivious transfer. Zbl 1213.68249
Lindell, Yehuda; Zarosim, Hila
7
2009
Utility dependence in correct and fair rational secret sharing. Zbl 1252.94105
Asharov, Gilad; Lindell, Yehuda
6
2009
General composition and universal composability in secure multiparty computation. Zbl 1184.94243
Lindell, Yehuda
5
2009
Collusion-free multiparty computation in the mediated model. Zbl 1252.94042
Alwen, Joël; Katz, Jonathan; Lindell, Yehuda; Persiano, Giuseppe; Shelat, Abhi; Visconti, Ivan
5
2009
Introduction to modern cryptography. Zbl 1143.94001
Katz, Jonathan; Lindell, Yehuda
69
2008
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. Zbl 1162.94367
Hazay, Carmit; Lindell, Yehuda
27
2008
Complete fairness in secure two-party computation. Zbl 1231.94062
Gordon, S. Dov; Carmit, Hazay; Katz, Jonathan; Lindell, Yehuda
26
2008
Implementing two-party computation efficiently with security against malicious adversaries. Zbl 1180.68152
Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.
10
2008
Lower bounds and impossibility results for concurrent self composition. Zbl 1143.94012
Lindell, Yehuda
5
2008
Efficient fully-simulatable oblivious transfer. Zbl 1286.68020
Lindell, Yehuda
4
2008
Handling expected polynomial-time strategies in simulation-based security proofs. Zbl 1161.94410
Katz, Jonathan; Lindell, Yehuda
3
2008
An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1141.94362
Lindell, Yehuda; Pinkas, Benny
56
2007
Security against covert adversaries: efficient protocols for realistic adversaries. Zbl 1129.94010
Aumann, Yonatan; Lindell, Yehuda
27
2007
Concurrently-secure blind signatures without random oracles or setup assumptions. Zbl 1129.94044
Hazay, Carmit; Katz, Jonathan; Koo, Chiu-Yuen; Lindell, Yehuda
11
2007
Concurrent composition of secure protocols in the timing model. Zbl 1130.68049
Kalai, Yael Tauman; Lindell, Yehuda; Prabhakaran, Manoj
8
2007
Lower bounds for non-black-box zero knowledge. Zbl 1094.68024
Barak, Boaz; Lindell, Yehuda; Vadhan, Salil
26
2006
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1101.68549
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
17
2006
Black-box constructions for secure computation. Zbl 1301.94116
Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
16
2006
Information-theoretically secure protocols and security under composition. Zbl 1301.94119
Kushilevitz, Eyal; Lindell, Yehuda; Rabin, Tal
15
2006
On combining privacy with guaranteed output delivery in secure multiparty computation. Zbl 1161.94444
Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
9
2006
Session-key generation using human passwords only. Zbl 1103.68513
Goldreich, Oded; Lindell, Yehuda
8
2006
A simpler construction of CCA2-secure public-key encryption under general assumptions. Zbl 1103.68528
Lindell, Yehuda
7
2006
On the composition of authenticated Byzantine agreement. Zbl 1326.68041
Lindell, Yehuda; Lysyanskaya, Anna; Rabin, Tal
6
2006
Protocols for bounded-concurrent secure two-party computation in the plain model. Zbl 1176.94068
Lindell, Yehuda
1
2006
Universally composable password-based key exchange. Zbl 1137.94367
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil
39
2005
Secure multi-party computation without agreement. Zbl 1102.68472
Goldwasser, Shafi; Lindell, Yehuda
36
2005
Secure computation without authentication. Zbl 1145.94457
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
17
2005
Concurrent general composition of secure protocols in the timing model. Zbl 1192.94121
Kalai, Yael Tauman; Lindell, Yehuda; Prabhakaran, Manoj
5
2005
Handling expected polynomial-time strategies in simulation-based security proofs. Zbl 1079.94555
Katz, Jonathan; Lindell, Yehuda
3
2005
Lower bounds for concurrent self composition. Zbl 1176.94069
Lindell, Yehuda
18
2004
Strict polynomial-time in simulation and extraction. Zbl 1060.94014
Barak, Boaz; Lindell, Yehuda
11
2004
A framework for password-based authenticated key exchange. Zbl 1038.94534
Gennaro, Rosario; Lindell, Yehuda
43
2003
Parallel coin-tossing and constant-round secure two-party computation. Zbl 1027.94011
Lindell, Yehuda
27
2003
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1038.94523
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
20
2003
Bounded-concurrent secure two-party computation without setup assumptions. Zbl 1192.94123
Lindell, Yehuda
19
2003
Composition of secure multi-party protocols. A comprehensive study. Zbl 1041.68036
Lindell, Yehuda
14
2003
A simpler construction of CCA2-secure public-key encryption under general assumptions. Zbl 1037.68535
Lindell, Yehuda
14
2003
Universally composable two-party and multi-party secure computation. Zbl 1192.94112
Canetti, Ran; Lindell, Yehuda; Ostrovsky, Rafail; Sahai, Amit
137
2002
Privacy preserving data mining. Zbl 1010.94008
Lindell, Yehuda; Pinkas, Benny
33
2002
Strict polynomial-time in simulation and extraction. Zbl 1192.68343
Barak, Boaz; Lindell, Yehuda
13
2002
...and 6 more Documents
all top 5

Cited by 1,469 Authors

36 Hazay, Carmit
30 Lindell, Yehuda
28 Ostrovsky, Rafail
25 Ishai, Yuval
22 Katz, Jonathan N.
21 Goyal, Vipul
21 Venkitasubramaniam, Muthuramakrishnan
20 Cohen, Ran
18 Damgård, Ivan Bjerre
16 Omri, Eran
14 Canetti, Ran
14 Haitner, Iftach
14 Kolesnikov, Vladimir
14 Nielsen, Jesper Buus
13 Orlandi, Claudio
13 Patra, Arpita
13 Scholl, Peter
12 Asharov, Gilad
12 Garg, Sanjam
12 Srinivasan, Akshayaram
11 Chevalier, Céline
11 David, Bernardo Machado
11 Pinkas, Benny
11 Polychroniadou, Antigoni
11 Sahai, Amit
11 Smart, Nigel Paul
11 Venturi, Daniele
10 Garay, Juan A.
10 Jain, Abhishek
10 Khurana, Dakshita
10 Orsini, Emmanuela
10 Pass, Rafael
10 Zhou, Hong-Sheng
10 Zikas, Vassilis
9 Applebaum, Benny
9 Baum, Carsten
9 Blazy, Olivier
9 Couteau, Geoffroy
9 Hofheinz, Dennis
9 Moran, Tal
9 Müller-Quade, Jörn
9 Pointcheval, David
9 Rosulek, Mike
9 Wang, Xiao
8 Abdalla, Michel
8 Attema, Thomas
8 Boyle, Elette
8 Goel, Aarushi
8 Gu, Dawu
8 Kushilevitz, Eyal
8 Liu-Zhang, Chen-Da
8 Loss, Julian
8 Malavolta, Giulio
8 Mohassel, Payman
8 Patranabis, Sikhar
8 Ravi, Divya
8 Tanaka, Keisuke
8 Visconti, Ivan
8 Wichs, Daniel
8 Yanai, Avishay
7 Bitansky, Nir
7 Ciampi, Michele
7 Guo, Fuchun
7 Halevi, Shai
7 Kondi, Yashvanth
7 Maurer, Ueli M.
7 Mu, Yi
7 Schneider, Thomas
7 Segev, Gil
7 Shelat, Abhi
7 Song, Yifan
7 Vaikuntanathan, Vinod
6 Abe, Masayuki
6 Alon, Bar
6 Catalano, Dario
6 Chung, Kai-Min
6 Coretti, Sandro
6 Cramer, Ronald John Fitzgerald
6 Döttling, Nico
6 Dowsley, Rafael
6 Escudero, Daniel E.
6 Faust, Sebastian
6 Fehr, Serge
6 Fuchsbauer, Georg
6 Heath, David G.
6 Kiayias, Aggelos
6 Klooß, Michael
6 Naor, Moni
6 Nof, Ariel
6 Pandey, Omkant
6 Rosen, Alon
6 Sarkar, Pratik
6 Schröder, Dominique
6 Soria-Vazquez, Eduardo
6 Susilo, Willy
6 Unruh, Dominique
6 Vergnaud, Damien
5 Benhamouda, Fabrice
5 Chen, Rongmao
5 D’Arco, Paolo
...and 1,369 more Authors
all top 5

Cited in 74 Serials

122 Journal of Cryptology
33 Theoretical Computer Science
26 Information Sciences
20 Designs, Codes and Cryptography
17 SIAM Journal on Computing
13 Quantum Information Processing
6 Distributed Computing
6 Advances in Mathematics of Communications
5 Journal of Computer and System Sciences
5 Information and Computation
4 Theory of Computing Systems
4 Science in China. Series F
4 Science China. Information Sciences
3 Information Processing Letters
3 Computing
3 Algorithmica
3 International Journal of Foundations of Computer Science
3 Soft Computing
3 Mathematical Biosciences and Engineering
3 Journal of Mathematical Cryptology
3 Prikladnaya Diskretnaya Matematika
2 Artificial Intelligence
2 Automatica
2 Applicable Algebra in Engineering, Communication and Computing
2 Formal Methods in System Design
2 Data Mining and Knowledge Discovery
2 Journal of Discrete Mathematical Sciences & Cryptography
2 International Journal of Applied Mathematics and Computer Science
2 Sādhanā
2 Mediterranean Journal of Mathematics
2 Mathematics in Computer Science
2 Matematicheskie Voprosy Kriptografii
1 Discrete Applied Mathematics
1 International Journal of Theoretical Physics
1 Systems & Control Letters
1 Combinatorica
1 Journal of Automated Reasoning
1 Mathematical and Computer Modelling
1 SIAM Journal on Discrete Mathematics
1 Machine Learning
1 MSCS. Mathematical Structures in Computer Science
1 Discrete Event Dynamic Systems
1 European Journal of Operational Research
1 International Journal of Computer Mathematics
1 Computational Statistics and Data Analysis
1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
1 Cybernetics and Systems Analysis
1 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
1 The Journal of Artificial Intelligence Research (JAIR)
1 Monte Carlo Methods and Applications
1 Annals of Mathematics and Artificial Intelligence
1 Mathematical Problems in Engineering
1 Nonlinear Dynamics
1 Wuhan University Journal of Natural Sciences (WUJNS)
1 The Journal of Logic and Algebraic Programming
1 International Journal of Wavelets, Multiresolution and Information Processing
1 International Journal of Quantum Information
1 Online Journal of Analytic Combinatorics
1 Optimization Letters
1 Computational & Mathematical Methods in Medicine
1 Journal of Physics A: Mathematical and Theoretical
1 Logical Methods in Computer Science
1 Statistical Analysis and Data Mining
1 The Annals of Applied Statistics
1 Foundations and Trends in Networking
1 Cryptography and Communications
1 Statistics Surveys
1 Symmetry
1 Arabian Journal for Science and Engineering
1 Statistics and Computing
1 International Journal of Group Theory
1 Mathematical Foundations of Computing
1 Japanese Journal of Statistics and Data Science
1 INFOR: Information Systems and Operational Research

Citations by Year