×

zbMATH — the first resource for mathematics

Halevi, Shai

Compute Distance To:
Author ID: halevi.shai Recent zbMATH articles by "Halevi, Shai"
Published as: Halevi, S.; Halevi, Shai
Documents Indexed: 95 Publications since 1994, including 2 Books
all top 5

Co-Authors

5 single-authored
29 Gentry, Craig
16 Canetti, Ran
8 Rabin, Tal
7 Garg, Sanjam
6 Boneh, Dan
6 Goldreich, Oded
6 Katz, Jonathan N.
6 Raykova, Mariana
6 Sahai, Amit
5 Krawczyk, Hugo
5 Shoup, Victor
5 Wichs, Daniel
4 Dodis, Yevgeniy
4 Gennaro, Rosario
4 Goldwasser, Shafi
4 Ishai, Yuval
4 Jutla, Charanjit S.
4 Kushilevitz, Eyal
4 Smart, Nigel P.
4 Vaikuntanathan, Vinod
3 Coppersmith, Don
3 Herzberg, Amir
3 Rogaway, Phillip
2 Ben-Dor, Amir
2 Bitansky, Nir
2 Brakerski, Zvika
2 Coron, Jean-Sébastien
2 Gorbunov, Sergeĭ Vladimirovich
2 Jain, Abhishek
2 Lindell, Yehuda
2 Ostrovsky, Rafail
2 Polychroniadou, Antigoni
2 Schuster, Assaf
2 Steiner, Michael
2 Tauman Kalai, Yael
2 Waters, Brent
1 Agrawal, Shweta
1 Barak, Boaz
1 Bellare, Mihir
1 Black, John Richard
1 Boyen, Xavier
1 Catalano, Dario
1 Chen, Yilei
1 Genise, Nicholas
1 Goldman, Kenny A.
1 Grieu, François
1 Hamburg, Michael
1 Hazay, Carmit
1 Howgrave-Graham, Nick A.
1 Julta, Charanjit
1 Komargodski, Ilan
1 Krauthgamer, Robert
1 Krovetz, Ted
1 Lepoint, Tancrède
1 Li, Baiyu
1 Lin, Huijia
1 Lu, Steve
1 MacKenzie, Phil
1 Maji, Hemanta K.
1 Makriyannis, Nikolaos
1 Micali, Silvio
1 Micciancio, Daniele
1 Miles, Eric
1 Myers, Steven
1 Naccache, David
1 Naor, Dalit
1 Nikolaenko, Valeria
1 Nissim, Kobbi
1 Peikert, Chris
1 Pinkas, Benny
1 Polyakov, Yuriy
1 Rackoff, Charles W.
1 Rothblum, Guy N.
1 Rothblum, Ron D.
1 Segev, Gil
1 Stern, Julien P.
1 Tibouchi, Mehdi
1 Vadhan, Salil P.
1 van Dijk, Marten
1 Venkitasubramaniam, Muthuramakrishnan
1 Vinayagamurthy, Dhinakaran
1 Wang, Frank J. S.
1 Wu, David J.
1 Yogev, Eylon
1 Zhandry, Mark

Publications by Year

Citations contained in zbMATH Open

85 Publications have been cited 1,606 times in 941 Documents Cited by Year
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
142
2016
Candidate multilinear maps from ideal lattices. Zbl 1300.94055
Garg, Sanjam; Gentry, Craig; Halevi, Shai
100
2013
Chosen-ciphertext security from identity-based encryption. Zbl 1122.94358
Canetti, Ran; Halevi, Shai; Katz, Jonathan
89
2004
The random oracle methodology, revisited. Zbl 1204.94063
Canetti, Ran; Goldreich, Oded; Halevi, Shai
80
2004
Fully homomorphic encryption over the integers. Zbl 1279.94130
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
74
2010
The random oracle methodology, revisited. Zbl 1027.68603
Canetti, Ran; Goldreich, Oded; Halevi, Shai
66
1998
A forward-secure public-key encryption scheme. Zbl 1037.68532
Canetti, Ran; Halevi, Shai; Katz, Jonathan
59
2003
Circular-secure encryption from decision Diffie-Hellman. Zbl 1183.94025
Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail
44
2008
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
42
2014
Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan
41
2006
Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026
Gentry, Craig; Halevi, Shai
38
2011
Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi
36
2015
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
36
2013
Public-key cryptosystems from lattice reduction problems. Zbl 0889.94011
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
36
1997
Secure hash-and-sign signatures without the random oracle. Zbl 1038.94533
Gennaro, Rosario; Halevi, Shai; Rabin, Tal
32
1999
Functional encryption without obfuscation. Zbl 1382.94107
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark
31
2016
Graph-induced multilinear maps from lattices. Zbl 1315.94076
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai
29
2015
A tweakable enciphering mode. Zbl 1122.94374
Halevi, Shai; Rogaway, Phillip
27
2003
Homomorphic evaluation of the AES circuit. Zbl 1296.94117
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
25
2012
A parallelizable enciphering mode. Zbl 1196.94055
Halevi, Shai; Rogaway, Phillip
25
2004
UMAC: Fast and secure message authentication. Zbl 0940.94020
Black, J.; Halevi, S.; Krawczyk, H.; Krovetz, T.; Rogaway, P.
25
1999
Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana
21
2014
Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012
Boneh, Dan; Boyen, Xavier; Halevi, Shai
21
2006
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
20
2014
Fully homomorphic encryption with polylog overhead. Zbl 1297.94071
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
19
2012
Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102
Gentry, Craig; Halevi, Shai
18
2009
Universally composable password-based key exchange. Zbl 1137.94367
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil
18
2005
After-the-fact leakage in public-key encryption. Zbl 1295.94078
Halevi, Shai; Lin, Huijia
17
2011
Garbled RAM revisited. Zbl 1332.94067
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel
16
2014
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
16
2010
Practical and provably-secure commitment schemes from collision-free hashing. Zbl 1329.94061
Halevi, Shai; Micali, Silvio
16
1996
Strengthening digital signatures via randomized hashing. Zbl 1161.94443
Halevi, Shai; Krawczyk, Hugo
15
2006
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066
Gentry, Craig; Halevi, Shai
14
2011
Collision-free hashing from lattice problems. Zbl 1343.94055
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
14
2011
EME*: Extending EME to handle arbitrary-length messages with associated data. Zbl 1113.94310
Halevi, Shai
14
2004
Hardness amplification of weakly verifiable puzzles. Zbl 1079.94538
Canetti, Ran; Halevi, Shai; Steiner, Michael
13
2005
A cryptographic solution to a game theoretic problem. Zbl 1001.91002
Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal
13
2000
MMH: software message authentication in the Gbit/second rates. Zbl 1385.94039
Halevi, Shai; Krawczyk, Hugo
13
1997
Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033
Halevi, Shai; Kalai, Yael Tauman
12
2012
Adaptively-secure, non-interactive public-key encryption. Zbl 1079.94537
Canetti, Ran; Halevi, Shai; Katz, Jonathan
12
2005
Cryptanalysis of stream ciphers with linear masking. Zbl 1026.94525
Coppersmith, Don; Halevi, Shai; Jutla, Charanjit
12
2002
Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
11
2012
Leakage-tolerant interactive protocols. Zbl 1296.94088
Bitansky, Nir; Canetti, Ran; Halevi, Shai
11
2012
Invertible universal hashing and the TET encryption mode. Zbl 1215.94049
Halevi, Shai
11
2007
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan
11
2007
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
11
2000
Bootstrapping for HElib. Zbl 1370.94516
Halevi, Shai; Shoup, Victor
10
2015
Algorithms in HElib. Zbl 1343.94061
Halevi, Shai; Shoup, Victor
10
2014
The modular inversion hidden number problem. Zbl 1062.94545
Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick
10
2001
Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel
9
2013
A simple BGN-type cryptosystem from LWE. Zbl 1280.94060
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
9
2010
Eliminating decryption errors in the Ajtai-Dwork cryptosystem. Zbl 0889.94010
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
8
1997
Spooky encryption and its applications. Zbl 1406.94045
Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel
7
2016
Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058
Brakerski, Zvika; Gentry, Craig; Halevi, Shai
7
2013
Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418
Chen, Yilei; Gentry, Craig; Halevi, Shai
6
2017
Private database access with HE-over-ORAM architecture. Zbl 1459.68057
Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana
6
2015
Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070
Halevi, Shai; Lindell, Yehuda; Pinkas, Benny
6
2011
Mitigating dictionary attacks on password-protected local storage. Zbl 1161.94436
Canetti, Ran; Halevi, Shai; Steiner, Michael
6
2006
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
5
2013
Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P.
5
2012
On the random-oracle methodology as applied to length-restricted signature schemes. Zbl 1197.94215
Canetti, Ran; Goldreich, Oded; Halevi, Shai
5
2004
Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit
4
2013
Many-to-one trapdoor functions and their relation to public-key cryptosystems. Zbl 0931.94015
Bellare, Mihir; Halevi, Shai; Sahai, Amit; Vadhan, Salil
4
1998
Faster homomorphic linear transformations in HElib. Zbl 1420.94070
Halevi, Shai; Shoup, Victor
3
2018
Four round secure computation without setup. Zbl 1410.94052
Brakerski, Zvika; Halevi, Shai; Polychroniadou, Antigoni
3
2017
Program obfuscation with leaky hardware. Zbl 1227.68023
Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N.
3
2011
Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Zbl 1173.94004
Halevi, Shai (ed.)
3
2009
Potential function analysis of greedy hot-potato routing. Zbl 0893.68083
Ben-Dor, A.; Halevi, S.; Schuster, A.
3
1998
Secure multiparty computation with general interaction patterns. Zbl 1334.94081
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal
2
2016
One-pass HMQV and asymmetric key-wrapping. Zbl 1291.94094
Halevi, Shai; Krawczyk, Hugo
2
2011
More on key wrapping. Zbl 1267.94061
Gennaro, Rosario; Halevi, Shai
2
2009
Cryptanalysis of ISO/IEC 9796-1. Zbl 1146.68366
Coppersmith, D.; Coron, J. S.; Grieu, F.; Halevi, S.; Jutla, C.; Naccache, D.; Stern, J. P.
2
2008
Threshold RSA for dynamic and ad-hoc groups. Zbl 1149.94316
Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal
2
2008
On seed-incompressible functions. Zbl 1162.94364
Halevi, Shai; Myers, Steven; Rackoff, Charles
2
2008
Scream: A software-efficient stream cipher. Zbl 1045.94519
Halevi, Shai; Coppersmith, Don; Jutla, Charanjit
2
2002
Private approximation of NP-hard functions. Zbl 1323.68569
Halevi, Shai; Krauthgamer, Robert; Kushilevitz, Eyal; Nissim, Kobbi
2
2001
Clock synchronization with faults and recoveries (extended abstract). Zbl 1314.68367
Barak, Boaz; Halevi, Shai; Herzberg, Amir; Naor, Dalit
2
2000
Maintaining authenticated communication in the presence of break-ins. Zbl 0957.68043
Canetti, Ran; Halevi, Shai; Herzberg, Amir
2
2000
Efficient commitment schemes with bounded sender and unbounded receiver. Zbl 0936.94011
Halevi, Shai
2
1999
Round-optimal secure multi-party computation. Zbl 1436.94070
Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan
1
2018
Degradation and amplification of computational hardness. Zbl 1162.94365
Halevi, Shai; Rabin, Tal
1
2008
Computing inverses over a shared secret modulus. Zbl 1082.94538
Catalano, Dario; Gennaro, Rosario; Halevi, Shai
1
2000
Maintaining authenticated communication in the presence of break-ins. Zbl 1377.94040
Canetti, Ran; Halevi, Shai; Herzberg, Amir
1
1997
Efficient commitment schemes with bounded sender and unbounded receiver. Zbl 0876.94028
Halevi, Shai
1
1995
Potential function analysis of greedy hot-potato routing. Zbl 1373.68036
Ben-Dor, Amir; Halevi, Shai; Schuster, Assaf
1
1994
Faster homomorphic linear transformations in HElib. Zbl 1420.94070
Halevi, Shai; Shoup, Victor
3
2018
Round-optimal secure multi-party computation. Zbl 1436.94070
Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan
1
2018
Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418
Chen, Yilei; Gentry, Craig; Halevi, Shai
6
2017
Four round secure computation without setup. Zbl 1410.94052
Brakerski, Zvika; Halevi, Shai; Polychroniadou, Antigoni
3
2017
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
142
2016
Functional encryption without obfuscation. Zbl 1382.94107
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark
31
2016
Spooky encryption and its applications. Zbl 1406.94045
Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel
7
2016
Secure multiparty computation with general interaction patterns. Zbl 1334.94081
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal
2
2016
Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi
36
2015
Graph-induced multilinear maps from lattices. Zbl 1315.94076
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai
29
2015
Bootstrapping for HElib. Zbl 1370.94516
Halevi, Shai; Shoup, Victor
10
2015
Private database access with HE-over-ORAM architecture. Zbl 1459.68057
Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana
6
2015
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
42
2014
Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana
21
2014
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
20
2014
Garbled RAM revisited. Zbl 1332.94067
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel
16
2014
Algorithms in HElib. Zbl 1343.94061
Halevi, Shai; Shoup, Victor
10
2014
Candidate multilinear maps from ideal lattices. Zbl 1300.94055
Garg, Sanjam; Gentry, Craig; Halevi, Shai
100
2013
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
36
2013
Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel
9
2013
Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058
Brakerski, Zvika; Gentry, Craig; Halevi, Shai
7
2013
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
5
2013
Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit
4
2013
Homomorphic evaluation of the AES circuit. Zbl 1296.94117
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
25
2012
Fully homomorphic encryption with polylog overhead. Zbl 1297.94071
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
19
2012
Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033
Halevi, Shai; Kalai, Yael Tauman
12
2012
Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
11
2012
Leakage-tolerant interactive protocols. Zbl 1296.94088
Bitansky, Nir; Canetti, Ran; Halevi, Shai
11
2012
Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P.
5
2012
Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026
Gentry, Craig; Halevi, Shai
38
2011
After-the-fact leakage in public-key encryption. Zbl 1295.94078
Halevi, Shai; Lin, Huijia
17
2011
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066
Gentry, Craig; Halevi, Shai
14
2011
Collision-free hashing from lattice problems. Zbl 1343.94055
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
14
2011
Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070
Halevi, Shai; Lindell, Yehuda; Pinkas, Benny
6
2011
Program obfuscation with leaky hardware. Zbl 1227.68023
Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N.
3
2011
One-pass HMQV and asymmetric key-wrapping. Zbl 1291.94094
Halevi, Shai; Krawczyk, Hugo
2
2011
Fully homomorphic encryption over the integers. Zbl 1279.94130
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
74
2010
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
16
2010
A simple BGN-type cryptosystem from LWE. Zbl 1280.94060
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
9
2010
Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102
Gentry, Craig; Halevi, Shai
18
2009
Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Zbl 1173.94004
Halevi, Shai (ed.)
3
2009
More on key wrapping. Zbl 1267.94061
Gennaro, Rosario; Halevi, Shai
2
2009
Circular-secure encryption from decision Diffie-Hellman. Zbl 1183.94025
Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail
44
2008
Cryptanalysis of ISO/IEC 9796-1. Zbl 1146.68366
Coppersmith, D.; Coron, J. S.; Grieu, F.; Halevi, S.; Jutla, C.; Naccache, D.; Stern, J. P.
2
2008
Threshold RSA for dynamic and ad-hoc groups. Zbl 1149.94316
Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal
2
2008
On seed-incompressible functions. Zbl 1162.94364
Halevi, Shai; Myers, Steven; Rackoff, Charles
2
2008
Degradation and amplification of computational hardness. Zbl 1162.94365
Halevi, Shai; Rabin, Tal
1
2008
Invertible universal hashing and the TET encryption mode. Zbl 1215.94049
Halevi, Shai
11
2007
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan
11
2007
Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan
41
2006
Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012
Boneh, Dan; Boyen, Xavier; Halevi, Shai
21
2006
Strengthening digital signatures via randomized hashing. Zbl 1161.94443
Halevi, Shai; Krawczyk, Hugo
15
2006
Mitigating dictionary attacks on password-protected local storage. Zbl 1161.94436
Canetti, Ran; Halevi, Shai; Steiner, Michael
6
2006
Universally composable password-based key exchange. Zbl 1137.94367
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil
18
2005
Hardness amplification of weakly verifiable puzzles. Zbl 1079.94538
Canetti, Ran; Halevi, Shai; Steiner, Michael
13
2005
Adaptively-secure, non-interactive public-key encryption. Zbl 1079.94537
Canetti, Ran; Halevi, Shai; Katz, Jonathan
12
2005
Chosen-ciphertext security from identity-based encryption. Zbl 1122.94358
Canetti, Ran; Halevi, Shai; Katz, Jonathan
89
2004
The random oracle methodology, revisited. Zbl 1204.94063
Canetti, Ran; Goldreich, Oded; Halevi, Shai
80
2004
A parallelizable enciphering mode. Zbl 1196.94055
Halevi, Shai; Rogaway, Phillip
25
2004
EME*: Extending EME to handle arbitrary-length messages with associated data. Zbl 1113.94310
Halevi, Shai
14
2004
On the random-oracle methodology as applied to length-restricted signature schemes. Zbl 1197.94215
Canetti, Ran; Goldreich, Oded; Halevi, Shai
5
2004
A forward-secure public-key encryption scheme. Zbl 1037.68532
Canetti, Ran; Halevi, Shai; Katz, Jonathan
59
2003
A tweakable enciphering mode. Zbl 1122.94374
Halevi, Shai; Rogaway, Phillip
27
2003
Cryptanalysis of stream ciphers with linear masking. Zbl 1026.94525
Coppersmith, Don; Halevi, Shai; Jutla, Charanjit
12
2002
Scream: A software-efficient stream cipher. Zbl 1045.94519
Halevi, Shai; Coppersmith, Don; Jutla, Charanjit
2
2002
The modular inversion hidden number problem. Zbl 1062.94545
Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick
10
2001
Private approximation of NP-hard functions. Zbl 1323.68569
Halevi, Shai; Krauthgamer, Robert; Kushilevitz, Eyal; Nissim, Kobbi
2
2001
A cryptographic solution to a game theoretic problem. Zbl 1001.91002
Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal
13
2000
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
11
2000
Clock synchronization with faults and recoveries (extended abstract). Zbl 1314.68367
Barak, Boaz; Halevi, Shai; Herzberg, Amir; Naor, Dalit
2
2000
Maintaining authenticated communication in the presence of break-ins. Zbl 0957.68043
Canetti, Ran; Halevi, Shai; Herzberg, Amir
2
2000
Computing inverses over a shared secret modulus. Zbl 1082.94538
Catalano, Dario; Gennaro, Rosario; Halevi, Shai
1
2000
Secure hash-and-sign signatures without the random oracle. Zbl 1038.94533
Gennaro, Rosario; Halevi, Shai; Rabin, Tal
32
1999
UMAC: Fast and secure message authentication. Zbl 0940.94020
Black, J.; Halevi, S.; Krawczyk, H.; Krovetz, T.; Rogaway, P.
25
1999
Efficient commitment schemes with bounded sender and unbounded receiver. Zbl 0936.94011
Halevi, Shai
2
1999
The random oracle methodology, revisited. Zbl 1027.68603
Canetti, Ran; Goldreich, Oded; Halevi, Shai
66
1998
Many-to-one trapdoor functions and their relation to public-key cryptosystems. Zbl 0931.94015
Bellare, Mihir; Halevi, Shai; Sahai, Amit; Vadhan, Salil
4
1998
Potential function analysis of greedy hot-potato routing. Zbl 0893.68083
Ben-Dor, A.; Halevi, S.; Schuster, A.
3
1998
Public-key cryptosystems from lattice reduction problems. Zbl 0889.94011
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
36
1997
MMH: software message authentication in the Gbit/second rates. Zbl 1385.94039
Halevi, Shai; Krawczyk, Hugo
13
1997
Eliminating decryption errors in the Ajtai-Dwork cryptosystem. Zbl 0889.94010
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
8
1997
Maintaining authenticated communication in the presence of break-ins. Zbl 1377.94040
Canetti, Ran; Halevi, Shai; Herzberg, Amir
1
1997
Practical and provably-secure commitment schemes from collision-free hashing. Zbl 1329.94061
Halevi, Shai; Micali, Silvio
16
1996
Efficient commitment schemes with bounded sender and unbounded receiver. Zbl 0876.94028
Halevi, Shai
1
1995
Potential function analysis of greedy hot-potato routing. Zbl 1373.68036
Ben-Dor, Amir; Halevi, Shai; Schuster, Assaf
1
1994
all top 5

Cited by 1,468 Authors

19 Sahai, Amit
19 Susilo, Willy
17 Hofheinz, Dennis
16 Mu, Yi
16 Waters, Brent
15 Bellare, Mihir
15 Kiltz, Eike
15 Pass, Rafael
15 Vaikuntanathan, Vinod
15 Zhandry, Mark
14 Brakerski, Zvika
14 Canetti, Ran
14 Hanaoka, Goichiro
14 Libert, Benoît
13 Bitansky, Nir
13 Segev, Gil
13 Venturi, Daniele
13 Wichs, Daniel
12 Wee, Hoeteck
11 Abdalla, Michel
11 Boneh, Dan
11 Hazay, Carmit
11 Ishai, Yuval
10 Cao, Zhenfu
10 Garg, Sanjam
10 Guo, Fuchun
10 Katz, Jonathan N.
10 Wang, Huaxiong
10 Yung, Moti
9 Camenisch, Jan L.
9 Halevi, Shai
9 Herranz, Javier
9 Komargodski, Ilan
9 Lepoint, Tancrède
9 Ling, San
9 Sarkar, Palash
9 Seo, Jae Hong
9 Zhang, Mingwu
8 Ananth, Prabhanjan Vijendra
8 Coron, Jean-Sébastien
8 Gentry, Craig
8 Goldwasser, Shafi
8 Gu, Dawu
8 Lin, Huijia
8 Ostrovsky, Rafail
8 Tibouchi, Mehdi
8 Wong, Duncan S.
8 Yang, Guomin
8 Zhang, Zhenfeng
7 Albrecht, Martin R.
7 Boyle, Elette
7 Catalano, Dario
7 Chen, Jie
7 Emura, Keita
7 Fouque, Pierre-Alain
7 Hu, Yupu
7 Jager, Tibor
7 Lee, Donghoon
7 Lee, Kwangsu
7 Nielsen, Jesper Buus
7 Park, Jonghwan
7 Peikert, Chris
7 Pietrzak, Krzysztof
7 Smart, Nigel P.
7 Stehlé, Damien
7 Takagi, Tsuyoshi
7 Tauman Kalai, Yael
7 Venkitasubramaniam, Muthuramakrishnan
7 Warinschi, Bogdan
7 Weng, Jian
7 Yamada, Shota
6 Chen, Kefei
6 Chen, Rongmao
6 Chen, Yu
6 Chung, Kai-Min
6 Dodis, Yevgeniy
6 Faonio, Antonio
6 Farshim, Pooya
6 Fischlin, Marc
6 Goldreich, Oded
6 Kapron, Bruce M.
6 Koppula, Venkata
6 Kunihiro, Noboru
6 Lee, Moon Sung
6 Liu, Shengli
6 Matsuda, Takahiro
6 Nandi, Mridul
6 Naor, Moni
6 Neven, Gregory
6 Pointcheval, David
6 Rogaway, Phillip
6 Tessaro, Stefano
5 Abe, Masayuki
5 Applebaum, Benny
5 Attrapadung, Nuttapong
5 Au, Man Ho
5 Cheon, Jung Hee
5 Dutta, Ratna
5 Gilboa, Niv
5 Han, Shuai
...and 1,368 more Authors
all top 5

Cited in 77 Serials

114 Journal of Cryptology
73 Designs, Codes and Cryptography
63 Theoretical Computer Science
51 Information Sciences
18 Information Processing Letters
17 Journal of Mathematical Cryptology
16 SIAM Journal on Computing
13 Journal of Computer and System Sciences
12 International Journal of Foundations of Computer Science
11 Cryptography and Communications
9 Algorithmica
9 Soft Computing
6 Information and Computation
6 Distributed Computing
6 Frontiers of Computer Science
5 Mathematical and Computer Modelling
5 Applicable Algebra in Engineering, Communication and Computing
4 Journal of Symbolic Computation
4 Theory of Computing Systems
4 Journal of Shanghai Jiaotong University (Science)
3 Computers & Mathematics with Applications
3 Discrete Applied Mathematics
3 Computing
3 International Journal of Computer Mathematics
3 Journal of Mathematical Sciences (New York)
3 Mathematical Problems in Engineering
3 Wuhan University Journal of Natural Sciences (WUJNS)
3 Journal of Discrete Mathematical Sciences & Cryptography
3 Journal of Systems Science and Complexity
3 Science in China. Series F
3 Advances in Mathematics of Communications
3 Science China. Information Sciences
2 Mathematics of Computation
2 Moscow University Computational Mathematics and Cybernetics
2 Journal of Automated Reasoning
2 Formal Aspects of Computing
2 Japan Journal of Industrial and Applied Mathematics
2 Games and Economic Behavior
2 Computational Complexity
2 LMS Journal of Computation and Mathematics
2 International Journal of Quantum Information
2 Journal of Zhejiang University. Science A
2 Symmetry
2 Computer Science Review
1 Discrete Mathematics
1 International Journal of Theoretical Physics
1 Journal of the Franklin Institute
1 Automatica
1 Journal of Economic Theory
1 Journal of Number Theory
1 Programming and Computer Software
1 Theory and Decision
1 Cryptologia
1 Annals of Pure and Applied Logic
1 SIAM Journal on Discrete Mathematics
1 Annals of Operations Research
1 Real-Time Systems
1 Journal of Statistical Computation and Simulation
1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
1 Cybernetics and Systems Analysis
1 Tatra Mountains Mathematical Publications
1 Formal Methods in System Design
1 Complexity
1 Electronic Commerce Research
1 Journal of Applied Mathematics
1 Sādhanā
1 JP Journal of Algebra, Number Theory and Applications
1 Quantum Information Processing
1 Mathematics in Computer Science
1 Groups, Complexity, Cryptology
1 Arabian Journal for Science and Engineering
1 ACM Transactions on Computation Theory
1 Pacific Journal of Mathematics for Industry
1 International Journal of Applied and Computational Mathematics
1 Open Mathematics
1 SIAM Journal on Applied Algebra and Geometry
1 Vestnik Samarskogo Universiteta. Estestvennonauchnaya Seriya

Citations by Year