×
Author ID: halevi.shai Recent zbMATH articles by "Halevi, Shai"
Published as: Halevi, Shai; Halevi, S.
all top 5

Co-Authors

6 single-authored
34 Gentry, Craig
16 Canetti, Ran
11 Rabin, Tal
7 Garg, Sanjam
7 Goldreich, Oded
7 Krawczyk, Hugo
7 Sahai, Amit
6 Boneh, Dan
6 Goldwasser, Shafi
6 Ishai, Yuval
6 Katz, Jonathan N.
6 Kushilevitz, Eyal
6 Raykova, Mariana
5 Shoup, Victor
5 Vaikuntanathan, Vinod
5 Wichs, Daniel
4 Dodis, Yevgeniy
4 Gennaro, Rosario
4 Gorbunov, Sergeĭ Vladimirovich
4 Jutla, Charanjit S.
4 Smart, Nigel Paul
3 Brakerski, Zvika
3 Coppersmith, Don
3 Herzberg, Amir
3 Polychroniadou, Antigoni
3 Rogaway, Phillip
2 Bellare, Mihir
2 Ben-Dor, Amir
2 Benhamouda, Fabrice
2 Bitansky, Nir
2 Coron, Jean-Sébastien
2 Hazay, Carmit
2 Jain, Abhishek
2 Lindell, Yehuda
2 Magri, Bernardo
2 Micciancio, Daniele
2 Nielsen, Jesper Buus
2 Ostrovsky, Rafail
2 Schuster, Assaf
2 Steiner, Michael
2 Tauman Kalai, Yael
2 Vadhan, Salil P.
2 Venkitasubramaniam, Muthuramakrishnan
2 Waters, Brent
2 Yakoubov, Sophia
1 Agrawal, Shweta
1 Akavia, Adi
1 Albrecht, Martin R.
1 Avigad, Lidor
1 Barak, Boaz
1 Black, John Richard
1 Boyen, Xavier
1 Boyle, Elette
1 Catalano, Dario
1 Chase, Melissa
1 Chen, Hao
1 Chen, Yilei
1 Ding, Jintai
1 Genise, Nicholas
1 Gilboa, Niv
1 Goldman, Kenny A.
1 Grieu, François
1 Hamburg, Michael
1 Hoffstein, Jeffrey
1 Howgrave-Graham, Nick A.
1 Julta, Charanjit
1 Kaufman, Tali
1 Komargodski, Ilan
1 Krauthgamer, Robert
1 Krovetz, Ted
1 Laine, Kim
1 Lauter, Kristin Estella
1 Lepoint, Tancrède
1 Levin, Leonid A.
1 Li, Baiyu
1 Lin, Chengyu
1 Lin, Huijia
1 Lokam, Satya
1 Lu, Steve
1 Lyubashevsky, Vadim
1 MacKenzie, Phil
1 Maji, Hemanta K.
1 Makriyannis, Nikolaos
1 Micali, Silvio
1 Miles, Eric
1 Moody, Dustin
1 Morrison, Travis
1 Myers, Steven
1 Naccache, David
1 Naor, Dalit
1 Nikolaenko, Valeria
1 Nisan, Noam
1 Nissim, Kobbi
1 Nof, Ariel
1 Peikert, Chris
1 Pinkas, Benny
1 Polyakov, Yuriy
1 Rackoff, Charles W.
1 Reyzin, Leonid
1 Ron, Dana
...and 15 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

103 Publications have been cited 3,170 times in 1,863 Documents Cited by Year
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
294
2016
Candidate multilinear maps from ideal lattices. Zbl 1300.94055
Garg, Sanjam; Gentry, Craig; Halevi, Shai
166
2013
Chosen-ciphertext security from identity-based encryption. Zbl 1122.94358
Canetti, Ran; Halevi, Shai; Katz, Jonathan
147
2004
The random oracle methodology, revisited. Zbl 1204.94063
Canetti, Ran; Goldreich, Oded; Halevi, Shai
143
2004
Fully homomorphic encryption over the integers. Zbl 1279.94130
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
131
2010
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
121
2014
The random oracle methodology, revisited. Zbl 1027.68603
Canetti, Ran; Goldreich, Oded; Halevi, Shai
112
1998
A forward-secure public-key encryption scheme. Zbl 1037.68532
Canetti, Ran; Halevi, Shai; Katz, Jonathan
99
2003
Circular-secure encryption from decision Diffie-Hellman. Zbl 1183.94025
Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail
75
2008
Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan
69
2006
Homomorphic evaluation of the AES circuit. Zbl 1296.94117
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
65
2012
Graph-induced multilinear maps from lattices. Zbl 1315.94076
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai
61
2015
Public-key cryptosystems from lattice reduction problems. Zbl 0889.94011
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
60
1997
Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026
Gentry, Craig; Halevi, Shai
54
2011
Functional encryption without obfuscation. Zbl 1382.94107
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark
53
2016
Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana
52
2014
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
51
2013
Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi
50
2015
Secure hash-and-sign signatures without the random oracle. Zbl 1038.94533
Gennaro, Rosario; Halevi, Shai; Rabin, Tal
46
1999
Fully homomorphic encryption with polylog overhead. Zbl 1297.94071
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
42
2012
Spooky encryption and its applications. Zbl 1406.94045
Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel
42
2016
A tweakable enciphering mode. Zbl 1122.94374
Halevi, Shai; Rogaway, Phillip
41
2003
UMAC: Fast and secure message authentication. Zbl 0940.94020
Black, J.; Halevi, S.; Krawczyk, H.; Krovetz, T.; Rogaway, P.
40
1999
Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033
Halevi, Shai; Kalai, Yael Tauman
40
2012
Universally composable password-based key exchange. Zbl 1137.94367
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil
39
2005
A parallelizable enciphering mode. Zbl 1196.94055
Halevi, Shai; Rogaway, Phillip
38
2004
Garbled RAM revisited. Zbl 1332.94067
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel
38
2014
Algorithms in HElib. Zbl 1343.94061
Halevi, Shai; Shoup, Victor
37
2014
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
34
2014
Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012
Boneh, Dan; Boyen, Xavier; Halevi, Shai
31
2006
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
30
2010
Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070
Halevi, Shai; Lindell, Yehuda; Pinkas, Benny
29
2011
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066
Gentry, Craig; Halevi, Shai
29
2011
Bootstrapping for HElib. Zbl 1370.94516
Halevi, Shai; Shoup, Victor
29
2015
Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
27
2012
Practical and provably-secure commitment schemes from collision-free hashing. Zbl 1329.94061
Halevi, Shai; Micali, Silvio
27
1996
Four round secure computation without setup. Zbl 1410.94052
Brakerski, Zvika; Halevi, Shai; Polychroniadou, Antigoni
27
2017
Strengthening digital signatures via randomized hashing. Zbl 1161.94443
Halevi, Shai; Krawczyk, Hugo
25
2006
Collision-free hashing from lattice problems. Zbl 1343.94055
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
25
2011
Hardness amplification of weakly verifiable puzzles. Zbl 1079.94538
Canetti, Ran; Halevi, Shai; Steiner, Michael
24
2005
EME*: Extending EME to handle arbitrary-length messages with associated data. Zbl 1113.94310
Halevi, Shai
24
2004
MMH: software message authentication in the Gbit/second rates. Zbl 1385.94039
Halevi, Shai; Krawczyk, Hugo
23
1997
Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel
23
2013
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan
22
2007
Adaptively-secure, non-interactive public-key encryption. Zbl 1079.94537
Canetti, Ran; Halevi, Shai; Katz, Jonathan
22
2005
Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102
Gentry, Craig; Halevi, Shai
20
2009
Leakage-tolerant interactive protocols. Zbl 1296.94088
Bitansky, Nir; Canetti, Ran; Halevi, Shai
20
2012
Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418
Chen, Yilei; Gentry, Craig; Halevi, Shai
20
2017
Can a public blockchain keep a secret? Zbl 1479.94293
Benhamouda, Fabrice; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Krawczyk, Hugo; Lin, Chengyu; Rabin, Tal; Reyzin, Leonid
20
2020
After-the-fact leakage in public-key encryption. Zbl 1295.94078
Halevi, Shai; Lin, Huijia
19
2011
A cryptographic solution to a game theoretic problem. Zbl 1001.91002
Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal
19
2000
Round-optimal secure multi-party computation. Zbl 1436.94070
Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan
19
2018
Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058
Brakerski, Zvika; Gentry, Craig; Halevi, Shai
18
2013
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
17
2000
Compressible FHE with applications to PIR. Zbl 1455.94158
Gentry, Craig; Halevi, Shai
17
2019
A simple BGN-type cryptosystem from LWE. Zbl 1280.94060
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
16
2010
The modular inversion hidden number problem. Zbl 1062.94545
Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick
16
2001
Invertible universal hashing and the TET encryption mode. Zbl 1215.94049
Halevi, Shai
16
2007
Private database access with HE-over-ORAM architecture. Zbl 1459.68057
Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana
15
2015
Cryptanalysis of stream ciphers with linear masking. Zbl 1026.94525
Coppersmith, Don; Halevi, Shai; Jutla, Charanjit
15
2002
YOSO: You only speak once. Secure MPC with stateless ephemeral roles. Zbl 1486.94102
Gentry, Craig; Halevi, Shai; Krawczyk, Hugo; Magri, Bernardo; Nielsen, Jesper Buus; Rabin, Tal; Yakoubov, Sophia
14
2021
Eliminating decryption errors in the Ajtai-Dwork cryptosystem. Zbl 0889.94010
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
13
1997
Secure multiparty computation with general interaction patterns. Zbl 1334.94081
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal
13
2016
An improved RNS variant of the BFV homomorphic encryption scheme. Zbl 1448.94203
Halevi, Shai; Polyakov, Yuriy; Shoup, Victor
13
2019
Faster homomorphic linear transformations in HElib. Zbl 1420.94070
Halevi, Shai; Shoup, Victor
13
2018
Homomorphic encryption for finite automata. Zbl 1455.94157
Genise, Nicholas; Gentry, Craig; Halevi, Shai; Li, Baiyu; Micciancio, Daniele
12
2019
Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P.
11
2012
Many-to-one trapdoor functions and their relation to public-key cryptosystems. Zbl 0931.94015
Bellare, Mihir; Halevi, Shai; Sahai, Amit; Vadhan, Salil
10
1998
Non-interactive multiparty computation without correlated randomness. Zbl 1417.94061
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Komargodski, Ilan; Sahai, Amit; Yogev, Eylon
9
2017
Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Zbl 1173.94004
9
2009
On the random-oracle methodology as applied to length-restricted signature schemes. Zbl 1197.94215
Canetti, Ran; Goldreich, Oded; Halevi, Shai
9
2004
Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit
8
2013
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
8
2013
Mitigating dictionary attacks on password-protected local storage. Zbl 1161.94436
Canetti, Ran; Halevi, Shai; Steiner, Michael
7
2006
On seed-incompressible functions. Zbl 1162.94364
Halevi, Shai; Myers, Steven; Rackoff, Charles
7
2008
One-pass HMQV and asymmetric key-wrapping. Zbl 1291.94094
Halevi, Shai; Krawczyk, Hugo
7
2011
Random-index PIR and applications. Zbl 07674398
Gentry, Craig; Halevi, Shai; Magri, Bernardo; Nielsen, Jesper Buus; Yakoubov, Sophia
7
2021
Threshold RSA for dynamic and ad-hoc groups. Zbl 1149.94316
Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal
6
2008
Program obfuscation with leaky hardware. Zbl 1227.68023
Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N.
5
2011
Private approximation of NP-hard functions. Zbl 1323.68569
Halevi, Shai; Krauthgamer, Robert; Kushilevitz, Eyal; Nissim, Kobbi
5
2001
Bootstrapping for helib. Zbl 1460.94046
Halevi, Shai; Shoup, Victor
5
2021
Practical non-interactive publicly verifiable secret sharing with thousands of parties. Zbl 1496.94078
Gentry, Craig; Halevi, Shai; Lyubashevsky, Vadim
5
2022
Homomorphic encryption standard. Zbl 1502.94026
Albrecht, Martin; Chase, Melissa; Chen, Hao; Ding, Jintai; Goldwasser, Shafi; Gorbunov, Sergey; Halevi, Shai; Hoffstein, Jeffrey; Laine, Kim; Lauter, Kristin; Lokam, Satya; Micciancio, Daniele; Moody, Dustin; Morrison, Travis; Sahai, Amit; Vaikuntanathan, Vinod
5
2021
Best possible information-theoretic MPC. Zbl 1430.94073
Halevi, Shai; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal
5
2018
Potential function analysis of greedy hot-potato routing. Zbl 0893.68083
Ben-Dor, A.; Halevi, S.; Schuster, A.
4
1998
Scream: A software-efficient stream cipher. Zbl 1045.94519
Halevi, Shai; Coppersmith, Don; Jutla, Charanjit
4
2002
Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Zbl 1097.94002
3
2006
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1405.94064
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
3
2017
Clock synchronization with faults and recoveries (extended abstract). Zbl 1314.68367
Barak, Boaz; Halevi, Shai; Herzberg, Amir; Naor, Dalit
3
2000
Homomorphic encryption. Zbl 1481.94106
Halevi, Shai
3
2017
Round-optimal secure multi-party computation. Zbl 1469.94101
Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan
3
2021
Cryptanalysis of ISO/IEC 9796-1. Zbl 1146.68366
Coppersmith, D.; Coron, J. S.; Grieu, F.; Halevi, S.; Jutla, C.; Naccache, D.; Stern, J. P.
2
2008
More on key wrapping. Zbl 1267.94061
Gennaro, Rosario; Halevi, Shai
2
2009
Computing inverses over a shared secret modulus. Zbl 1082.94538
Catalano, Dario; Gennaro, Rosario; Halevi, Shai
2
2000
Efficient commitment schemes with bounded sender and unbounded receiver. Zbl 0936.94011
Halevi, Shai
2
1999
On fully secure MPC with solitary output. Zbl 1455.94163
Halevi, Shai; Ishai, Yuval; Kushilevitz, Eyal; Makriyannis, Nikolaos; Rabin, Tal
2
2019
Degradation and amplification of computational hardness. Zbl 1162.94365
Halevi, Shai; Rabin, Tal
1
2008
Maintaining authenticated communication in the presence of break-ins. Zbl 0957.68043
Canetti, Ran; Halevi, Shai; Herzberg, Amir
1
2000
Efficient commitment schemes with bounded sender and unbounded receiver. Zbl 0876.94028
Halevi, Shai
1
1995
Potential function analysis of greedy hot-potato routing. Zbl 1373.68036
Ben-Dor, Amir; Halevi, Shai; Schuster, Assaf
1
1994
Achievable CCA2 relaxation for homomorphic encryption. Zbl 1519.94029
Akavia, Adi; Gentry, Craig; Halevi, Shai; Vald, Margarita
1
2023
Random-index oblivious RAM. Zbl 1519.94129
Halevi, Shai; Kushilevitz, Eyal
1
2023
Practical non-interactive publicly verifiable secret sharing with thousands of parties. Zbl 1496.94078
Gentry, Craig; Halevi, Shai; Lyubashevsky, Vadim
5
2022
YOSO: You only speak once. Secure MPC with stateless ephemeral roles. Zbl 1486.94102
Gentry, Craig; Halevi, Shai; Krawczyk, Hugo; Magri, Bernardo; Nielsen, Jesper Buus; Rabin, Tal; Yakoubov, Sophia
14
2021
Random-index PIR and applications. Zbl 07674398
Gentry, Craig; Halevi, Shai; Magri, Bernardo; Nielsen, Jesper Buus; Yakoubov, Sophia
7
2021
Bootstrapping for helib. Zbl 1460.94046
Halevi, Shai; Shoup, Victor
5
2021
Homomorphic encryption standard. Zbl 1502.94026
Albrecht, Martin; Chase, Melissa; Chen, Hao; Ding, Jintai; Goldwasser, Shafi; Gorbunov, Sergey; Halevi, Shai; Hoffstein, Jeffrey; Laine, Kim; Lauter, Kristin; Lokam, Satya; Micciancio, Daniele; Moody, Dustin; Morrison, Travis; Sahai, Amit; Vaikuntanathan, Vinod
5
2021
Round-optimal secure multi-party computation. Zbl 1469.94101
Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan
3
2021
Can a public blockchain keep a secret? Zbl 1479.94293
Benhamouda, Fabrice; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Krawczyk, Hugo; Lin, Chengyu; Rabin, Tal; Reyzin, Leonid
20
2020
Compressible FHE with applications to PIR. Zbl 1455.94158
Gentry, Craig; Halevi, Shai
17
2019
An improved RNS variant of the BFV homomorphic encryption scheme. Zbl 1448.94203
Halevi, Shai; Polyakov, Yuriy; Shoup, Victor
13
2019
Homomorphic encryption for finite automata. Zbl 1455.94157
Genise, Nicholas; Gentry, Craig; Halevi, Shai; Li, Baiyu; Micciancio, Daniele
12
2019
On fully secure MPC with solitary output. Zbl 1455.94163
Halevi, Shai; Ishai, Yuval; Kushilevitz, Eyal; Makriyannis, Nikolaos; Rabin, Tal
2
2019
Round-optimal secure multi-party computation. Zbl 1436.94070
Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan
19
2018
Faster homomorphic linear transformations in HElib. Zbl 1420.94070
Halevi, Shai; Shoup, Victor
13
2018
Best possible information-theoretic MPC. Zbl 1430.94073
Halevi, Shai; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal
5
2018
Four round secure computation without setup. Zbl 1410.94052
Brakerski, Zvika; Halevi, Shai; Polychroniadou, Antigoni
27
2017
Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418
Chen, Yilei; Gentry, Craig; Halevi, Shai
20
2017
Non-interactive multiparty computation without correlated randomness. Zbl 1417.94061
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Komargodski, Ilan; Sahai, Amit; Yogev, Eylon
9
2017
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1405.94064
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
3
2017
Homomorphic encryption. Zbl 1481.94106
Halevi, Shai
3
2017
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
294
2016
Functional encryption without obfuscation. Zbl 1382.94107
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark
53
2016
Spooky encryption and its applications. Zbl 1406.94045
Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel
42
2016
Secure multiparty computation with general interaction patterns. Zbl 1334.94081
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal
13
2016
Graph-induced multilinear maps from lattices. Zbl 1315.94076
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai
61
2015
Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi
50
2015
Bootstrapping for HElib. Zbl 1370.94516
Halevi, Shai; Shoup, Victor
29
2015
Private database access with HE-over-ORAM architecture. Zbl 1459.68057
Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana
15
2015
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
121
2014
Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana
52
2014
Garbled RAM revisited. Zbl 1332.94067
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel
38
2014
Algorithms in HElib. Zbl 1343.94061
Halevi, Shai; Shoup, Victor
37
2014
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
34
2014
Candidate multilinear maps from ideal lattices. Zbl 1300.94055
Garg, Sanjam; Gentry, Craig; Halevi, Shai
166
2013
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
51
2013
Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel
23
2013
Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058
Brakerski, Zvika; Gentry, Craig; Halevi, Shai
18
2013
Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit
8
2013
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
8
2013
Homomorphic evaluation of the AES circuit. Zbl 1296.94117
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
65
2012
Fully homomorphic encryption with polylog overhead. Zbl 1297.94071
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
42
2012
Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033
Halevi, Shai; Kalai, Yael Tauman
40
2012
Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
27
2012
Leakage-tolerant interactive protocols. Zbl 1296.94088
Bitansky, Nir; Canetti, Ran; Halevi, Shai
20
2012
Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P.
11
2012
Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026
Gentry, Craig; Halevi, Shai
54
2011
Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070
Halevi, Shai; Lindell, Yehuda; Pinkas, Benny
29
2011
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066
Gentry, Craig; Halevi, Shai
29
2011
Collision-free hashing from lattice problems. Zbl 1343.94055
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
25
2011
After-the-fact leakage in public-key encryption. Zbl 1295.94078
Halevi, Shai; Lin, Huijia
19
2011
One-pass HMQV and asymmetric key-wrapping. Zbl 1291.94094
Halevi, Shai; Krawczyk, Hugo
7
2011
Program obfuscation with leaky hardware. Zbl 1227.68023
Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N.
5
2011
Fully homomorphic encryption over the integers. Zbl 1279.94130
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
131
2010
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
30
2010
A simple BGN-type cryptosystem from LWE. Zbl 1280.94060
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
16
2010
Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102
Gentry, Craig; Halevi, Shai
20
2009
Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Zbl 1173.94004
9
2009
More on key wrapping. Zbl 1267.94061
Gennaro, Rosario; Halevi, Shai
2
2009
Circular-secure encryption from decision Diffie-Hellman. Zbl 1183.94025
Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail
75
2008
On seed-incompressible functions. Zbl 1162.94364
Halevi, Shai; Myers, Steven; Rackoff, Charles
7
2008
Threshold RSA for dynamic and ad-hoc groups. Zbl 1149.94316
Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal
6
2008
Cryptanalysis of ISO/IEC 9796-1. Zbl 1146.68366
Coppersmith, D.; Coron, J. S.; Grieu, F.; Halevi, S.; Jutla, C.; Naccache, D.; Stern, J. P.
2
2008
Degradation and amplification of computational hardness. Zbl 1162.94365
Halevi, Shai; Rabin, Tal
1
2008
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan
22
2007
Invertible universal hashing and the TET encryption mode. Zbl 1215.94049
Halevi, Shai
16
2007
Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan
69
2006
Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012
Boneh, Dan; Boyen, Xavier; Halevi, Shai
31
2006
Strengthening digital signatures via randomized hashing. Zbl 1161.94443
Halevi, Shai; Krawczyk, Hugo
25
2006
Mitigating dictionary attacks on password-protected local storage. Zbl 1161.94436
Canetti, Ran; Halevi, Shai; Steiner, Michael
7
2006
Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Zbl 1097.94002
3
2006
Universally composable password-based key exchange. Zbl 1137.94367
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil
39
2005
Hardness amplification of weakly verifiable puzzles. Zbl 1079.94538
Canetti, Ran; Halevi, Shai; Steiner, Michael
24
2005
Adaptively-secure, non-interactive public-key encryption. Zbl 1079.94537
Canetti, Ran; Halevi, Shai; Katz, Jonathan
22
2005
Chosen-ciphertext security from identity-based encryption. Zbl 1122.94358
Canetti, Ran; Halevi, Shai; Katz, Jonathan
147
2004
The random oracle methodology, revisited. Zbl 1204.94063
Canetti, Ran; Goldreich, Oded; Halevi, Shai
143
2004
A parallelizable enciphering mode. Zbl 1196.94055
Halevi, Shai; Rogaway, Phillip
38
2004
EME*: Extending EME to handle arbitrary-length messages with associated data. Zbl 1113.94310
Halevi, Shai
24
2004
On the random-oracle methodology as applied to length-restricted signature schemes. Zbl 1197.94215
Canetti, Ran; Goldreich, Oded; Halevi, Shai
9
2004
A forward-secure public-key encryption scheme. Zbl 1037.68532
Canetti, Ran; Halevi, Shai; Katz, Jonathan
99
2003
A tweakable enciphering mode. Zbl 1122.94374
Halevi, Shai; Rogaway, Phillip
41
2003
Cryptanalysis of stream ciphers with linear masking. Zbl 1026.94525
Coppersmith, Don; Halevi, Shai; Jutla, Charanjit
15
2002
Scream: A software-efficient stream cipher. Zbl 1045.94519
Halevi, Shai; Coppersmith, Don; Jutla, Charanjit
4
2002
The modular inversion hidden number problem. Zbl 1062.94545
Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick
16
2001
Private approximation of NP-hard functions. Zbl 1323.68569
Halevi, Shai; Krauthgamer, Robert; Kushilevitz, Eyal; Nissim, Kobbi
5
2001
A cryptographic solution to a game theoretic problem. Zbl 1001.91002
Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal
19
2000
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
17
2000
Clock synchronization with faults and recoveries (extended abstract). Zbl 1314.68367
Barak, Boaz; Halevi, Shai; Herzberg, Amir; Naor, Dalit
3
2000
Computing inverses over a shared secret modulus. Zbl 1082.94538
Catalano, Dario; Gennaro, Rosario; Halevi, Shai
2
2000
Maintaining authenticated communication in the presence of break-ins. Zbl 0957.68043
Canetti, Ran; Halevi, Shai; Herzberg, Amir
1
2000
Secure hash-and-sign signatures without the random oracle. Zbl 1038.94533
Gennaro, Rosario; Halevi, Shai; Rabin, Tal
46
1999
UMAC: Fast and secure message authentication. Zbl 0940.94020
Black, J.; Halevi, S.; Krawczyk, H.; Krovetz, T.; Rogaway, P.
40
1999
Efficient commitment schemes with bounded sender and unbounded receiver. Zbl 0936.94011
Halevi, Shai
2
1999
The random oracle methodology, revisited. Zbl 1027.68603
Canetti, Ran; Goldreich, Oded; Halevi, Shai
112
1998
Many-to-one trapdoor functions and their relation to public-key cryptosystems. Zbl 0931.94015
Bellare, Mihir; Halevi, Shai; Sahai, Amit; Vadhan, Salil
10
1998
Potential function analysis of greedy hot-potato routing. Zbl 0893.68083
Ben-Dor, A.; Halevi, S.; Schuster, A.
4
1998
Public-key cryptosystems from lattice reduction problems. Zbl 0889.94011
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
60
1997
MMH: software message authentication in the Gbit/second rates. Zbl 1385.94039
Halevi, Shai; Krawczyk, Hugo
23
1997
Eliminating decryption errors in the Ajtai-Dwork cryptosystem. Zbl 0889.94010
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
13
1997
Maintaining authenticated communication in the presence of break-ins. Zbl 1377.94040
Canetti, Ran; Halevi, Shai; Herzberg, Amir
1
1997
...and 3 more Documents
all top 5

Cited by 2,408 Authors

37 Sahai, Amit
37 Waters, Brent
34 Susilo, Willy
33 Ishai, Yuval
33 Zhandry, Mark
30 Wichs, Daniel
27 Vaikuntanathan, Vinod
26 Brakerski, Zvika
25 Libert, Benoît
24 Garg, Sanjam
24 Halevi, Shai
24 Wee, Hoeteck
22 Hofheinz, Dennis
22 Komargodski, Ilan
22 Lin, Huijia
22 Nishimaki, Ryo
22 Yamada, Shota
21 Hanaoka, Goichiro
20 Jain, Aayush
20 Mu, Yi
20 Srinivasan, Akshayaram
19 Canetti, Ran
19 Malavolta, Giulio
19 Pass, Rafael
19 Venturi, Daniele
18 Bitansky, Nir
18 Khurana, Dakshita
18 Kiltz, Eike
17 Abdalla, Michel
17 Agrawal, Shweta
17 Emura, Keita
17 Ostrovsky, Rafail
16 Bellare, Mihir
16 Gentry, Craig
16 Gu, Dawu
16 Hazay, Carmit
16 Katz, Jonathan N.
16 Segev, Gil
16 Weng, Jian
15 Ananth, Prabhanjan Vijendra
15 Boyle, Elette
15 Döttling, Nico
15 Guo, Fuchun
14 Matsuda, Takahiro
14 Smart, Nigel Paul
14 Wang, Huaxiong
14 Wu, David J.
13 Fouque, Pierre-Alain
13 Goyal, Rishab
13 Jain, Abhishek
13 Micciancio, Daniele
13 Nielsen, Jesper Buus
13 Seo, Jae Hong
13 Shi, Elaine
13 Venkitasubramaniam, Muthuramakrishnan
13 Yamakawa, Takashi
13 Yung, Moti
12 Boneh, Dan
12 Liu, Shengli
12 Sarkar, Palash
12 Tibouchi, Mehdi
12 Zhang, Mingwu
11 Chen, Yilei
11 Chung, Kai-Min
11 Dodis, Yevgeniy
11 Goyal, Vipul
11 Kitagawa, Fuyuki
11 Koppula, Venkata
11 Lai, Junzuo
11 Liu, Feng-Hao
11 Naor, Moni
11 Tanaka, Keisuke
11 Tauman Kalai, Yael
10 Asharov, Gilad
10 Attrapadung, Nuttapong
10 Camenisch, Jan L.
10 Cao, Zhenfu
10 Catalano, Dario
10 Chen, Yu
10 Cheon, Jung Hee
10 Chow, Sherman S. M.
10 Coron, Jean-Sébastien
10 Datta, Pratish
10 Farshim, Pooya
10 Herranz, Javier
10 Jager, Tibor
10 Kushilevitz, Eyal
10 Lee, Kwangsu
10 Ling, San
10 Nandi, Mridul
10 Paneth, Omer
10 Peikert, Chris
10 Stehlé, Damien
10 Tomida, Junichi
10 Zhang, Jiang
9 Applebaum, Benny
9 Chen, Jie
9 Couteau, Geoffroy
9 Dutta, Ratna
9 Faonio, Antonio
...and 2,308 more Authors
all top 5

Cited in 96 Serials

160 Journal of Cryptology
96 Designs, Codes and Cryptography
83 Theoretical Computer Science
60 Information Sciences
21 Journal of Mathematical Cryptology
19 SIAM Journal on Computing
18 Information Processing Letters
14 Journal of Computer and System Sciences
12 International Journal of Foundations of Computer Science
12 Cryptography and Communications
10 Algorithmica
9 Soft Computing
9 Advances in Mathematics of Communications
8 Information and Computation
7 Distributed Computing
7 Quantum Information Processing
6 Journal of Discrete Mathematical Sciences & Cryptography
6 Frontiers of Computer Science
5 Journal of Symbolic Computation
5 Mathematical and Computer Modelling
5 Applicable Algebra in Engineering, Communication and Computing
5 Matematicheskie Voprosy Kriptografii
4 Mathematical Problems in Engineering
4 Theory of Computing Systems
4 Journal of Shanghai Jiaotong University (Science)
4 Computer Science Review
3 Computers & Mathematics with Applications
3 Discrete Applied Mathematics
3 Computing
3 International Journal of Computer Mathematics
3 Journal of Mathematical Sciences (New York)
3 Wuhan University Journal of Natural Sciences (WUJNS)
3 Informatica (Vilnius)
3 Journal of Systems Science and Complexity
3 Science China. Information Sciences
2 International Journal of Theoretical Physics
2 Mathematics of Computation
2 Moscow University Computational Mathematics and Cybernetics
2 Journal of Automated Reasoning
2 SIAM Journal on Discrete Mathematics
2 Formal Aspects of Computing
2 Japan Journal of Industrial and Applied Mathematics
2 Games and Economic Behavior
2 Computational Complexity
2 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
2 LMS Journal of Computation and Mathematics
2 International Journal of Quantum Information
2 Science in China. Series F
2 Journal of Zhejiang University. Science A
2 Symmetry
1 Acta Informatica
1 Discrete Mathematics
1 IEEE Transactions on Information Theory
1 Journal of the Franklin Institute
1 Automatica
1 Journal of Economic Theory
1 Journal of Functional Analysis
1 Journal of Number Theory
1 Programming and Computer Software
1 Theory and Decision
1 Cryptologia
1 Chinese Annals of Mathematics. Series B
1 Annals of Pure and Applied Logic
1 Annals of Operations Research
1 Real-Time Systems
1 Journal of Statistical Computation and Simulation
1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
1 Cybernetics and Systems Analysis
1 Tatra Mountains Mathematical Publications
1 Formal Methods in System Design
1 Turkish Journal of Mathematics
1 The Electronic Journal of Combinatorics
1 Complexity
1 European Journal of Control
1 Electronic Commerce Research
1 Journal of Applied Mathematics
1 Sādhanā
1 JP Journal of Algebra, Number Theory and Applications
1 Journal of Applied Mathematics and Computing
1 Journal of Algebra and its Applications
1 Acta Numerica
1 Mathematical Biosciences and Engineering
1 Mathematics in Computer Science
1 Discrete Mathematics, Algorithms and Applications
1 Groups, Complexity, Cryptology
1 Arabian Journal for Science and Engineering
1 ACM Transactions on Computation Theory
1 Pacific Journal of Mathematics for Industry
1 International Journal of Applied and Computational Mathematics
1 Open Mathematics
1 International Journal of Systems Science. Principles and Applications of Systems and Integration
1 Research in Number Theory
1 SIAM Journal on Applied Algebra and Geometry
1 Vestnik Samarskogo Universiteta. Estestvennonauchnaya Seriya
1 Mathematical Foundations of Computing
1 Prikladnaya Diskretnaya Matematika

Citations by Year