Edit Profile (opens in new tab) Halevi, Shai Co-Author Distance Author ID: halevi.shai Published as: Halevi, Shai; Halevi, S. Documents Indexed: 104 Publications since 1994 2 Contributions as Editor · 1 Further Contribution Co-Authors: 106 Co-Authors with 101 Joint Publications 2,489 Co-Co-Authors all top 5 Co-Authors 6 single-authored 34 Gentry, Craig 16 Canetti, Ran 11 Rabin, Tal 7 Garg, Sanjam 7 Goldreich, Oded 7 Krawczyk, Hugo 7 Sahai, Amit 6 Boneh, Dan 6 Goldwasser, Shafi 6 Ishai, Yuval 6 Katz, Jonathan N. 6 Kushilevitz, Eyal 6 Raykova, Mariana 5 Shoup, Victor 5 Vaikuntanathan, Vinod 5 Wichs, Daniel 4 Dodis, Yevgeniy 4 Gennaro, Rosario 4 Gorbunov, Sergeĭ Vladimirovich 4 Jutla, Charanjit S. 4 Smart, Nigel Paul 3 Brakerski, Zvika 3 Coppersmith, Don 3 Herzberg, Amir 3 Polychroniadou, Antigoni 3 Rogaway, Phillip 2 Bellare, Mihir 2 Ben-Dor, Amir 2 Benhamouda, Fabrice 2 Bitansky, Nir 2 Coron, Jean-Sébastien 2 Hazay, Carmit 2 Jain, Abhishek 2 Lindell, Yehuda 2 Magri, Bernardo 2 Micciancio, Daniele 2 Nielsen, Jesper Buus 2 Ostrovsky, Rafail 2 Schuster, Assaf 2 Steiner, Michael 2 Tauman Kalai, Yael 2 Vadhan, Salil P. 2 Venkitasubramaniam, Muthuramakrishnan 2 Waters, Brent 2 Yakoubov, Sophia 1 Agrawal, Shweta 1 Akavia, Adi 1 Albrecht, Martin R. 1 Avigad, Lidor 1 Barak, Boaz 1 Black, John Richard 1 Boyen, Xavier 1 Boyle, Elette 1 Catalano, Dario 1 Chase, Melissa 1 Chen, Hao 1 Chen, Yilei 1 Ding, Jintai 1 Genise, Nicholas 1 Gilboa, Niv 1 Goldman, Kenny A. 1 Grieu, François 1 Hamburg, Michael 1 Hoffstein, Jeffrey 1 Howgrave-Graham, Nick A. 1 Julta, Charanjit 1 Kaufman, Tali 1 Komargodski, Ilan 1 Krauthgamer, Robert 1 Krovetz, Ted 1 Laine, Kim 1 Lauter, Kristin Estella 1 Lepoint, Tancrède 1 Levin, Leonid A. 1 Li, Baiyu 1 Lin, Chengyu 1 Lin, Huijia 1 Lokam, Satya 1 Lu, Steve 1 Lyubashevsky, Vadim 1 MacKenzie, Phil 1 Maji, Hemanta K. 1 Makriyannis, Nikolaos 1 Micali, Silvio 1 Miles, Eric 1 Moody, Dustin 1 Morrison, Travis 1 Myers, Steven 1 Naccache, David 1 Naor, Dalit 1 Nikolaenko, Valeria 1 Nisan, Noam 1 Nissim, Kobbi 1 Nof, Ariel 1 Peikert, Chris 1 Pinkas, Benny 1 Polyakov, Yuriy 1 Rackoff, Charles W. 1 Reyzin, Leonid 1 Ron, Dana ...and 15 more Co-Authors all top 5 Serials 7 Journal of Cryptology 3 Lecture Notes in Computer Science 2 SIAM Journal on Computing 1 Algorithmica 1 Theory of Computing Systems 1 Journal of the ACM Fields 99 Information and communication theory, circuits (94-XX) 43 Computer science (68-XX) 3 General and overarching topics; collections (00-XX) 3 Number theory (11-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 103 Publications have been cited 3,170 times in 1,863 Documents Cited by ▼ Year ▼ Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent 294 2016 Candidate multilinear maps from ideal lattices. Zbl 1300.94055 Garg, Sanjam; Gentry, Craig; Halevi, Shai 166 2013 Chosen-ciphertext security from identity-based encryption. Zbl 1122.94358 Canetti, Ran; Halevi, Shai; Katz, Jonathan 147 2004 The random oracle methodology, revisited. Zbl 1204.94063 Canetti, Ran; Goldreich, Oded; Halevi, Shai 143 2004 Fully homomorphic encryption over the integers. Zbl 1279.94130 van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod 131 2010 Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035 Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran 121 2014 The random oracle methodology, revisited. Zbl 1027.68603 Canetti, Ran; Goldreich, Oded; Halevi, Shai 112 1998 A forward-secure public-key encryption scheme. Zbl 1037.68532 Canetti, Ran; Halevi, Shai; Katz, Jonathan 99 2003 Circular-secure encryption from decision Diffie-Hellman. Zbl 1183.94025 Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail 75 2008 Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010 Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan 69 2006 Homomorphic evaluation of the AES circuit. Zbl 1296.94117 Gentry, Craig; Halevi, Shai; Smart, Nigel P. 65 2012 Graph-induced multilinear maps from lattices. Zbl 1315.94076 Gentry, Craig; Gorbunov, Sergey; Halevi, Shai 61 2015 Public-key cryptosystems from lattice reduction problems. Zbl 0889.94011 Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai 60 1997 Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026 Gentry, Craig; Halevi, Shai 54 2011 Functional encryption without obfuscation. Zbl 1382.94107 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark 53 2016 Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana 52 2014 Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent 51 2013 Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114 Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi 50 2015 Secure hash-and-sign signatures without the random oracle. Zbl 1038.94533 Gennaro, Rosario; Halevi, Shai; Rabin, Tal 46 1999 Fully homomorphic encryption with polylog overhead. Zbl 1297.94071 Gentry, Craig; Halevi, Shai; Smart, Nigel P. 42 2012 Spooky encryption and its applications. Zbl 1406.94045 Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel 42 2016 A tweakable enciphering mode. Zbl 1122.94374 Halevi, Shai; Rogaway, Phillip 41 2003 UMAC: Fast and secure message authentication. Zbl 0940.94020 Black, J.; Halevi, S.; Krawczyk, H.; Krovetz, T.; Rogaway, P. 40 1999 Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033 Halevi, Shai; Kalai, Yael Tauman 40 2012 Universally composable password-based key exchange. Zbl 1137.94367 Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil 39 2005 A parallelizable enciphering mode. Zbl 1196.94055 Halevi, Shai; Rogaway, Phillip 38 2004 Garbled RAM revisited. Zbl 1332.94067 Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel 38 2014 Algorithms in HElib. Zbl 1343.94061 Halevi, Shai; Shoup, Victor 37 2014 On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel 34 2014 Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012 Boneh, Dan; Boyen, Xavier; Halevi, Shai 31 2006 \(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061 Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod 30 2010 Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070 Halevi, Shai; Lindell, Yehuda; Pinkas, Benny 29 2011 Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066 Gentry, Craig; Halevi, Shai 29 2011 Bootstrapping for HElib. Zbl 1370.94516 Halevi, Shai; Shoup, Victor 29 2015 Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077 Gentry, Craig; Halevi, Shai; Smart, Nigel P. 27 2012 Practical and provably-secure commitment schemes from collision-free hashing. Zbl 1329.94061 Halevi, Shai; Micali, Silvio 27 1996 Four round secure computation without setup. Zbl 1410.94052 Brakerski, Zvika; Halevi, Shai; Polychroniadou, Antigoni 27 2017 Strengthening digital signatures via randomized hashing. Zbl 1161.94443 Halevi, Shai; Krawczyk, Hugo 25 2006 Collision-free hashing from lattice problems. Zbl 1343.94055 Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai 25 2011 Hardness amplification of weakly verifiable puzzles. Zbl 1079.94538 Canetti, Ran; Halevi, Shai; Steiner, Michael 24 2005 EME*: Extending EME to handle arbitrary-length messages with associated data. Zbl 1113.94310 Halevi, Shai 24 2004 MMH: software message authentication in the Gbit/second rates. Zbl 1385.94039 Halevi, Shai; Krawczyk, Hugo 23 1997 Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075 Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel 23 2013 A forward-secure public-key encryption scheme. Zbl 1121.68044 Canetti, Ran; Halevi, Shai; Katz, Jonathan 22 2007 Adaptively-secure, non-interactive public-key encryption. Zbl 1079.94537 Canetti, Ran; Halevi, Shai; Katz, Jonathan 22 2005 Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102 Gentry, Craig; Halevi, Shai 20 2009 Leakage-tolerant interactive protocols. Zbl 1296.94088 Bitansky, Nir; Canetti, Ran; Halevi, Shai 20 2012 Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418 Chen, Yilei; Gentry, Craig; Halevi, Shai 20 2017 Can a public blockchain keep a secret? Zbl 1479.94293 Benhamouda, Fabrice; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Krawczyk, Hugo; Lin, Chengyu; Rabin, Tal; Reyzin, Leonid 20 2020 After-the-fact leakage in public-key encryption. Zbl 1295.94078 Halevi, Shai; Lin, Huijia 19 2011 A cryptographic solution to a game theoretic problem. Zbl 1001.91002 Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal 19 2000 Round-optimal secure multi-party computation. Zbl 1436.94070 Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan 19 2018 Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058 Brakerski, Zvika; Gentry, Craig; Halevi, Shai 18 2013 Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508 Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai 17 2000 Compressible FHE with applications to PIR. Zbl 1455.94158 Gentry, Craig; Halevi, Shai 17 2019 A simple BGN-type cryptosystem from LWE. Zbl 1280.94060 Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod 16 2010 The modular inversion hidden number problem. Zbl 1062.94545 Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick 16 2001 Invertible universal hashing and the TET encryption mode. Zbl 1215.94049 Halevi, Shai 16 2007 Private database access with HE-over-ORAM architecture. Zbl 1459.68057 Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana 15 2015 Cryptanalysis of stream ciphers with linear masking. Zbl 1026.94525 Coppersmith, Don; Halevi, Shai; Jutla, Charanjit 15 2002 YOSO: You only speak once. Secure MPC with stateless ephemeral roles. Zbl 1486.94102 Gentry, Craig; Halevi, Shai; Krawczyk, Hugo; Magri, Bernardo; Nielsen, Jesper Buus; Rabin, Tal; Yakoubov, Sophia 14 2021 Eliminating decryption errors in the Ajtai-Dwork cryptosystem. Zbl 0889.94010 Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai 13 1997 Secure multiparty computation with general interaction patterns. Zbl 1334.94081 Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal 13 2016 An improved RNS variant of the BFV homomorphic encryption scheme. Zbl 1448.94203 Halevi, Shai; Polyakov, Yuriy; Shoup, Victor 13 2019 Faster homomorphic linear transformations in HElib. Zbl 1420.94070 Halevi, Shai; Shoup, Victor 13 2018 Homomorphic encryption for finite automata. Zbl 1455.94157 Genise, Nicholas; Gentry, Craig; Halevi, Shai; Li, Baiyu; Micciancio, Daniele 12 2019 Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147 Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P. 11 2012 Many-to-one trapdoor functions and their relation to public-key cryptosystems. Zbl 0931.94015 Bellare, Mihir; Halevi, Shai; Sahai, Amit; Vadhan, Salil 10 1998 Non-interactive multiparty computation without correlated randomness. Zbl 1417.94061 Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Komargodski, Ilan; Sahai, Amit; Yogev, Eylon 9 2017 Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Zbl 1173.94004 9 2009 On the random-oracle methodology as applied to length-restricted signature schemes. Zbl 1197.94215 Canetti, Ran; Goldreich, Oded; Halevi, Shai 9 2004 Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059 Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit 8 2013 Private database queries using somewhat homomorphic encryption. Zbl 1330.94037 Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J. 8 2013 Mitigating dictionary attacks on password-protected local storage. Zbl 1161.94436 Canetti, Ran; Halevi, Shai; Steiner, Michael 7 2006 On seed-incompressible functions. Zbl 1162.94364 Halevi, Shai; Myers, Steven; Rackoff, Charles 7 2008 One-pass HMQV and asymmetric key-wrapping. Zbl 1291.94094 Halevi, Shai; Krawczyk, Hugo 7 2011 Random-index PIR and applications. Zbl 07674398 Gentry, Craig; Halevi, Shai; Magri, Bernardo; Nielsen, Jesper Buus; Yakoubov, Sophia 7 2021 Threshold RSA for dynamic and ad-hoc groups. Zbl 1149.94316 Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal 6 2008 Program obfuscation with leaky hardware. Zbl 1227.68023 Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N. 5 2011 Private approximation of NP-hard functions. Zbl 1323.68569 Halevi, Shai; Krauthgamer, Robert; Kushilevitz, Eyal; Nissim, Kobbi 5 2001 Bootstrapping for helib. Zbl 1460.94046 Halevi, Shai; Shoup, Victor 5 2021 Practical non-interactive publicly verifiable secret sharing with thousands of parties. Zbl 1496.94078 Gentry, Craig; Halevi, Shai; Lyubashevsky, Vadim 5 2022 Homomorphic encryption standard. Zbl 1502.94026 Albrecht, Martin; Chase, Melissa; Chen, Hao; Ding, Jintai; Goldwasser, Shafi; Gorbunov, Sergey; Halevi, Shai; Hoffstein, Jeffrey; Laine, Kim; Lauter, Kristin; Lokam, Satya; Micciancio, Daniele; Moody, Dustin; Morrison, Travis; Sahai, Amit; Vaikuntanathan, Vinod 5 2021 Best possible information-theoretic MPC. Zbl 1430.94073 Halevi, Shai; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal 5 2018 Potential function analysis of greedy hot-potato routing. Zbl 0893.68083 Ben-Dor, A.; Halevi, S.; Schuster, A. 4 1998 Scream: A software-efficient stream cipher. Zbl 1045.94519 Halevi, Shai; Coppersmith, Don; Jutla, Charanjit 4 2002 Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Zbl 1097.94002 3 2006 On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1405.94064 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel 3 2017 Clock synchronization with faults and recoveries (extended abstract). Zbl 1314.68367 Barak, Boaz; Halevi, Shai; Herzberg, Amir; Naor, Dalit 3 2000 Homomorphic encryption. Zbl 1481.94106 Halevi, Shai 3 2017 Round-optimal secure multi-party computation. Zbl 1469.94101 Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan 3 2021 Cryptanalysis of ISO/IEC 9796-1. Zbl 1146.68366 Coppersmith, D.; Coron, J. S.; Grieu, F.; Halevi, S.; Jutla, C.; Naccache, D.; Stern, J. P. 2 2008 More on key wrapping. Zbl 1267.94061 Gennaro, Rosario; Halevi, Shai 2 2009 Computing inverses over a shared secret modulus. Zbl 1082.94538 Catalano, Dario; Gennaro, Rosario; Halevi, Shai 2 2000 Efficient commitment schemes with bounded sender and unbounded receiver. Zbl 0936.94011 Halevi, Shai 2 1999 On fully secure MPC with solitary output. Zbl 1455.94163 Halevi, Shai; Ishai, Yuval; Kushilevitz, Eyal; Makriyannis, Nikolaos; Rabin, Tal 2 2019 Degradation and amplification of computational hardness. Zbl 1162.94365 Halevi, Shai; Rabin, Tal 1 2008 Maintaining authenticated communication in the presence of break-ins. Zbl 0957.68043 Canetti, Ran; Halevi, Shai; Herzberg, Amir 1 2000 Efficient commitment schemes with bounded sender and unbounded receiver. Zbl 0876.94028 Halevi, Shai 1 1995 Potential function analysis of greedy hot-potato routing. Zbl 1373.68036 Ben-Dor, Amir; Halevi, Shai; Schuster, Assaf 1 1994 Achievable CCA2 relaxation for homomorphic encryption. Zbl 1519.94029 Akavia, Adi; Gentry, Craig; Halevi, Shai; Vald, Margarita 1 2023 Random-index oblivious RAM. Zbl 1519.94129 Halevi, Shai; Kushilevitz, Eyal 1 2023 Practical non-interactive publicly verifiable secret sharing with thousands of parties. Zbl 1496.94078 Gentry, Craig; Halevi, Shai; Lyubashevsky, Vadim 5 2022 YOSO: You only speak once. Secure MPC with stateless ephemeral roles. Zbl 1486.94102 Gentry, Craig; Halevi, Shai; Krawczyk, Hugo; Magri, Bernardo; Nielsen, Jesper Buus; Rabin, Tal; Yakoubov, Sophia 14 2021 Random-index PIR and applications. Zbl 07674398 Gentry, Craig; Halevi, Shai; Magri, Bernardo; Nielsen, Jesper Buus; Yakoubov, Sophia 7 2021 Bootstrapping for helib. Zbl 1460.94046 Halevi, Shai; Shoup, Victor 5 2021 Homomorphic encryption standard. Zbl 1502.94026 Albrecht, Martin; Chase, Melissa; Chen, Hao; Ding, Jintai; Goldwasser, Shafi; Gorbunov, Sergey; Halevi, Shai; Hoffstein, Jeffrey; Laine, Kim; Lauter, Kristin; Lokam, Satya; Micciancio, Daniele; Moody, Dustin; Morrison, Travis; Sahai, Amit; Vaikuntanathan, Vinod 5 2021 Round-optimal secure multi-party computation. Zbl 1469.94101 Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan 3 2021 Can a public blockchain keep a secret? Zbl 1479.94293 Benhamouda, Fabrice; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Krawczyk, Hugo; Lin, Chengyu; Rabin, Tal; Reyzin, Leonid 20 2020 Compressible FHE with applications to PIR. Zbl 1455.94158 Gentry, Craig; Halevi, Shai 17 2019 An improved RNS variant of the BFV homomorphic encryption scheme. Zbl 1448.94203 Halevi, Shai; Polyakov, Yuriy; Shoup, Victor 13 2019 Homomorphic encryption for finite automata. Zbl 1455.94157 Genise, Nicholas; Gentry, Craig; Halevi, Shai; Li, Baiyu; Micciancio, Daniele 12 2019 On fully secure MPC with solitary output. Zbl 1455.94163 Halevi, Shai; Ishai, Yuval; Kushilevitz, Eyal; Makriyannis, Nikolaos; Rabin, Tal 2 2019 Round-optimal secure multi-party computation. Zbl 1436.94070 Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan 19 2018 Faster homomorphic linear transformations in HElib. Zbl 1420.94070 Halevi, Shai; Shoup, Victor 13 2018 Best possible information-theoretic MPC. Zbl 1430.94073 Halevi, Shai; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal 5 2018 Four round secure computation without setup. Zbl 1410.94052 Brakerski, Zvika; Halevi, Shai; Polychroniadou, Antigoni 27 2017 Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418 Chen, Yilei; Gentry, Craig; Halevi, Shai 20 2017 Non-interactive multiparty computation without correlated randomness. Zbl 1417.94061 Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Komargodski, Ilan; Sahai, Amit; Yogev, Eylon 9 2017 On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1405.94064 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel 3 2017 Homomorphic encryption. Zbl 1481.94106 Halevi, Shai 3 2017 Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent 294 2016 Functional encryption without obfuscation. Zbl 1382.94107 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark 53 2016 Spooky encryption and its applications. Zbl 1406.94045 Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel 42 2016 Secure multiparty computation with general interaction patterns. Zbl 1334.94081 Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal 13 2016 Graph-induced multilinear maps from lattices. Zbl 1315.94076 Gentry, Craig; Gorbunov, Sergey; Halevi, Shai 61 2015 Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114 Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi 50 2015 Bootstrapping for HElib. Zbl 1370.94516 Halevi, Shai; Shoup, Victor 29 2015 Private database access with HE-over-ORAM architecture. Zbl 1459.68057 Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana 15 2015 Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035 Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran 121 2014 Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana 52 2014 Garbled RAM revisited. Zbl 1332.94067 Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel 38 2014 Algorithms in HElib. Zbl 1343.94061 Halevi, Shai; Shoup, Victor 37 2014 On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel 34 2014 Candidate multilinear maps from ideal lattices. Zbl 1300.94055 Garg, Sanjam; Gentry, Craig; Halevi, Shai 166 2013 Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080 Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent 51 2013 Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075 Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel 23 2013 Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058 Brakerski, Zvika; Gentry, Craig; Halevi, Shai 18 2013 Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059 Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit 8 2013 Private database queries using somewhat homomorphic encryption. Zbl 1330.94037 Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J. 8 2013 Homomorphic evaluation of the AES circuit. Zbl 1296.94117 Gentry, Craig; Halevi, Shai; Smart, Nigel P. 65 2012 Fully homomorphic encryption with polylog overhead. Zbl 1297.94071 Gentry, Craig; Halevi, Shai; Smart, Nigel P. 42 2012 Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033 Halevi, Shai; Kalai, Yael Tauman 40 2012 Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077 Gentry, Craig; Halevi, Shai; Smart, Nigel P. 27 2012 Leakage-tolerant interactive protocols. Zbl 1296.94088 Bitansky, Nir; Canetti, Ran; Halevi, Shai 20 2012 Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147 Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P. 11 2012 Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026 Gentry, Craig; Halevi, Shai 54 2011 Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070 Halevi, Shai; Lindell, Yehuda; Pinkas, Benny 29 2011 Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066 Gentry, Craig; Halevi, Shai 29 2011 Collision-free hashing from lattice problems. Zbl 1343.94055 Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai 25 2011 After-the-fact leakage in public-key encryption. Zbl 1295.94078 Halevi, Shai; Lin, Huijia 19 2011 One-pass HMQV and asymmetric key-wrapping. Zbl 1291.94094 Halevi, Shai; Krawczyk, Hugo 7 2011 Program obfuscation with leaky hardware. Zbl 1227.68023 Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N. 5 2011 Fully homomorphic encryption over the integers. Zbl 1279.94130 van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod 131 2010 \(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061 Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod 30 2010 A simple BGN-type cryptosystem from LWE. Zbl 1280.94060 Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod 16 2010 Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102 Gentry, Craig; Halevi, Shai 20 2009 Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Zbl 1173.94004 9 2009 More on key wrapping. Zbl 1267.94061 Gennaro, Rosario; Halevi, Shai 2 2009 Circular-secure encryption from decision Diffie-Hellman. Zbl 1183.94025 Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail 75 2008 On seed-incompressible functions. Zbl 1162.94364 Halevi, Shai; Myers, Steven; Rackoff, Charles 7 2008 Threshold RSA for dynamic and ad-hoc groups. Zbl 1149.94316 Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal 6 2008 Cryptanalysis of ISO/IEC 9796-1. Zbl 1146.68366 Coppersmith, D.; Coron, J. S.; Grieu, F.; Halevi, S.; Jutla, C.; Naccache, D.; Stern, J. P. 2 2008 Degradation and amplification of computational hardness. Zbl 1162.94365 Halevi, Shai; Rabin, Tal 1 2008 A forward-secure public-key encryption scheme. Zbl 1121.68044 Canetti, Ran; Halevi, Shai; Katz, Jonathan 22 2007 Invertible universal hashing and the TET encryption mode. Zbl 1215.94049 Halevi, Shai 16 2007 Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010 Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan 69 2006 Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012 Boneh, Dan; Boyen, Xavier; Halevi, Shai 31 2006 Strengthening digital signatures via randomized hashing. Zbl 1161.94443 Halevi, Shai; Krawczyk, Hugo 25 2006 Mitigating dictionary attacks on password-protected local storage. Zbl 1161.94436 Canetti, Ran; Halevi, Shai; Steiner, Michael 7 2006 Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Zbl 1097.94002 3 2006 Universally composable password-based key exchange. Zbl 1137.94367 Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil 39 2005 Hardness amplification of weakly verifiable puzzles. Zbl 1079.94538 Canetti, Ran; Halevi, Shai; Steiner, Michael 24 2005 Adaptively-secure, non-interactive public-key encryption. Zbl 1079.94537 Canetti, Ran; Halevi, Shai; Katz, Jonathan 22 2005 Chosen-ciphertext security from identity-based encryption. Zbl 1122.94358 Canetti, Ran; Halevi, Shai; Katz, Jonathan 147 2004 The random oracle methodology, revisited. Zbl 1204.94063 Canetti, Ran; Goldreich, Oded; Halevi, Shai 143 2004 A parallelizable enciphering mode. Zbl 1196.94055 Halevi, Shai; Rogaway, Phillip 38 2004 EME*: Extending EME to handle arbitrary-length messages with associated data. Zbl 1113.94310 Halevi, Shai 24 2004 On the random-oracle methodology as applied to length-restricted signature schemes. Zbl 1197.94215 Canetti, Ran; Goldreich, Oded; Halevi, Shai 9 2004 A forward-secure public-key encryption scheme. Zbl 1037.68532 Canetti, Ran; Halevi, Shai; Katz, Jonathan 99 2003 A tweakable enciphering mode. Zbl 1122.94374 Halevi, Shai; Rogaway, Phillip 41 2003 Cryptanalysis of stream ciphers with linear masking. Zbl 1026.94525 Coppersmith, Don; Halevi, Shai; Jutla, Charanjit 15 2002 Scream: A software-efficient stream cipher. Zbl 1045.94519 Halevi, Shai; Coppersmith, Don; Jutla, Charanjit 4 2002 The modular inversion hidden number problem. Zbl 1062.94545 Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick 16 2001 Private approximation of NP-hard functions. Zbl 1323.68569 Halevi, Shai; Krauthgamer, Robert; Kushilevitz, Eyal; Nissim, Kobbi 5 2001 A cryptographic solution to a game theoretic problem. Zbl 1001.91002 Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal 19 2000 Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508 Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai 17 2000 Clock synchronization with faults and recoveries (extended abstract). Zbl 1314.68367 Barak, Boaz; Halevi, Shai; Herzberg, Amir; Naor, Dalit 3 2000 Computing inverses over a shared secret modulus. Zbl 1082.94538 Catalano, Dario; Gennaro, Rosario; Halevi, Shai 2 2000 Maintaining authenticated communication in the presence of break-ins. Zbl 0957.68043 Canetti, Ran; Halevi, Shai; Herzberg, Amir 1 2000 Secure hash-and-sign signatures without the random oracle. Zbl 1038.94533 Gennaro, Rosario; Halevi, Shai; Rabin, Tal 46 1999 UMAC: Fast and secure message authentication. Zbl 0940.94020 Black, J.; Halevi, S.; Krawczyk, H.; Krovetz, T.; Rogaway, P. 40 1999 Efficient commitment schemes with bounded sender and unbounded receiver. Zbl 0936.94011 Halevi, Shai 2 1999 The random oracle methodology, revisited. Zbl 1027.68603 Canetti, Ran; Goldreich, Oded; Halevi, Shai 112 1998 Many-to-one trapdoor functions and their relation to public-key cryptosystems. Zbl 0931.94015 Bellare, Mihir; Halevi, Shai; Sahai, Amit; Vadhan, Salil 10 1998 Potential function analysis of greedy hot-potato routing. Zbl 0893.68083 Ben-Dor, A.; Halevi, S.; Schuster, A. 4 1998 Public-key cryptosystems from lattice reduction problems. Zbl 0889.94011 Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai 60 1997 MMH: software message authentication in the Gbit/second rates. Zbl 1385.94039 Halevi, Shai; Krawczyk, Hugo 23 1997 Eliminating decryption errors in the Ajtai-Dwork cryptosystem. Zbl 0889.94010 Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai 13 1997 Maintaining authenticated communication in the presence of break-ins. Zbl 1377.94040 Canetti, Ran; Halevi, Shai; Herzberg, Amir 1 1997 ...and 3 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 2,408 Authors 37 Sahai, Amit 37 Waters, Brent 34 Susilo, Willy 33 Ishai, Yuval 33 Zhandry, Mark 30 Wichs, Daniel 27 Vaikuntanathan, Vinod 26 Brakerski, Zvika 25 Libert, Benoît 24 Garg, Sanjam 24 Halevi, Shai 24 Wee, Hoeteck 22 Hofheinz, Dennis 22 Komargodski, Ilan 22 Lin, Huijia 22 Nishimaki, Ryo 22 Yamada, Shota 21 Hanaoka, Goichiro 20 Jain, Aayush 20 Mu, Yi 20 Srinivasan, Akshayaram 19 Canetti, Ran 19 Malavolta, Giulio 19 Pass, Rafael 19 Venturi, Daniele 18 Bitansky, Nir 18 Khurana, Dakshita 18 Kiltz, Eike 17 Abdalla, Michel 17 Agrawal, Shweta 17 Emura, Keita 17 Ostrovsky, Rafail 16 Bellare, Mihir 16 Gentry, Craig 16 Gu, Dawu 16 Hazay, Carmit 16 Katz, Jonathan N. 16 Segev, Gil 16 Weng, Jian 15 Ananth, Prabhanjan Vijendra 15 Boyle, Elette 15 Döttling, Nico 15 Guo, Fuchun 14 Matsuda, Takahiro 14 Smart, Nigel Paul 14 Wang, Huaxiong 14 Wu, David J. 13 Fouque, Pierre-Alain 13 Goyal, Rishab 13 Jain, Abhishek 13 Micciancio, Daniele 13 Nielsen, Jesper Buus 13 Seo, Jae Hong 13 Shi, Elaine 13 Venkitasubramaniam, Muthuramakrishnan 13 Yamakawa, Takashi 13 Yung, Moti 12 Boneh, Dan 12 Liu, Shengli 12 Sarkar, Palash 12 Tibouchi, Mehdi 12 Zhang, Mingwu 11 Chen, Yilei 11 Chung, Kai-Min 11 Dodis, Yevgeniy 11 Goyal, Vipul 11 Kitagawa, Fuyuki 11 Koppula, Venkata 11 Lai, Junzuo 11 Liu, Feng-Hao 11 Naor, Moni 11 Tanaka, Keisuke 11 Tauman Kalai, Yael 10 Asharov, Gilad 10 Attrapadung, Nuttapong 10 Camenisch, Jan L. 10 Cao, Zhenfu 10 Catalano, Dario 10 Chen, Yu 10 Cheon, Jung Hee 10 Chow, Sherman S. M. 10 Coron, Jean-Sébastien 10 Datta, Pratish 10 Farshim, Pooya 10 Herranz, Javier 10 Jager, Tibor 10 Kushilevitz, Eyal 10 Lee, Kwangsu 10 Ling, San 10 Nandi, Mridul 10 Paneth, Omer 10 Peikert, Chris 10 Stehlé, Damien 10 Tomida, Junichi 10 Zhang, Jiang 9 Applebaum, Benny 9 Chen, Jie 9 Couteau, Geoffroy 9 Dutta, Ratna 9 Faonio, Antonio ...and 2,308 more Authors all top 5 Cited in 96 Serials 160 Journal of Cryptology 96 Designs, Codes and Cryptography 83 Theoretical Computer Science 60 Information Sciences 21 Journal of Mathematical Cryptology 19 SIAM Journal on Computing 18 Information Processing Letters 14 Journal of Computer and System Sciences 12 International Journal of Foundations of Computer Science 12 Cryptography and Communications 10 Algorithmica 9 Soft Computing 9 Advances in Mathematics of Communications 8 Information and Computation 7 Distributed Computing 7 Quantum Information Processing 6 Journal of Discrete Mathematical Sciences & Cryptography 6 Frontiers of Computer Science 5 Journal of Symbolic Computation 5 Mathematical and Computer Modelling 5 Applicable Algebra in Engineering, Communication and Computing 5 Matematicheskie Voprosy Kriptografii 4 Mathematical Problems in Engineering 4 Theory of Computing Systems 4 Journal of Shanghai Jiaotong University (Science) 4 Computer Science Review 3 Computers & Mathematics with Applications 3 Discrete Applied Mathematics 3 Computing 3 International Journal of Computer Mathematics 3 Journal of Mathematical Sciences (New York) 3 Wuhan University Journal of Natural Sciences (WUJNS) 3 Informatica (Vilnius) 3 Journal of Systems Science and Complexity 3 Science China. Information Sciences 2 International Journal of Theoretical Physics 2 Mathematics of Computation 2 Moscow University Computational Mathematics and Cybernetics 2 Journal of Automated Reasoning 2 SIAM Journal on Discrete Mathematics 2 Formal Aspects of Computing 2 Japan Journal of Industrial and Applied Mathematics 2 Games and Economic Behavior 2 Computational Complexity 2 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti 2 LMS Journal of Computation and Mathematics 2 International Journal of Quantum Information 2 Science in China. Series F 2 Journal of Zhejiang University. Science A 2 Symmetry 1 Acta Informatica 1 Discrete Mathematics 1 IEEE Transactions on Information Theory 1 Journal of the Franklin Institute 1 Automatica 1 Journal of Economic Theory 1 Journal of Functional Analysis 1 Journal of Number Theory 1 Programming and Computer Software 1 Theory and Decision 1 Cryptologia 1 Chinese Annals of Mathematics. Series B 1 Annals of Pure and Applied Logic 1 Annals of Operations Research 1 Real-Time Systems 1 Journal of Statistical Computation and Simulation 1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering 1 Cybernetics and Systems Analysis 1 Tatra Mountains Mathematical Publications 1 Formal Methods in System Design 1 Turkish Journal of Mathematics 1 The Electronic Journal of Combinatorics 1 Complexity 1 European Journal of Control 1 Electronic Commerce Research 1 Journal of Applied Mathematics 1 Sādhanā 1 JP Journal of Algebra, Number Theory and Applications 1 Journal of Applied Mathematics and Computing 1 Journal of Algebra and its Applications 1 Acta Numerica 1 Mathematical Biosciences and Engineering 1 Mathematics in Computer Science 1 Discrete Mathematics, Algorithms and Applications 1 Groups, Complexity, Cryptology 1 Arabian Journal for Science and Engineering 1 ACM Transactions on Computation Theory 1 Pacific Journal of Mathematics for Industry 1 International Journal of Applied and Computational Mathematics 1 Open Mathematics 1 International Journal of Systems Science. Principles and Applications of Systems and Integration 1 Research in Number Theory 1 SIAM Journal on Applied Algebra and Geometry 1 Vestnik Samarskogo Universiteta. Estestvennonauchnaya Seriya 1 Mathematical Foundations of Computing 1 Prikladnaya Diskretnaya Matematika all top 5 Cited in 29 Fields 1,743 Information and communication theory, circuits (94-XX) 574 Computer science (68-XX) 79 Number theory (11-XX) 74 Quantum theory (81-XX) 25 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 18 Combinatorics (05-XX) 17 Algebraic geometry (14-XX) 10 Numerical analysis (65-XX) 7 Group theory and generalizations (20-XX) 7 Operations research, mathematical programming (90-XX) 6 Mathematical logic and foundations (03-XX) 6 Probability theory and stochastic processes (60-XX) 5 Statistics (62-XX) 4 Commutative algebra (13-XX) 3 Linear and multilinear algebra; matrix theory (15-XX) 3 Biology and other natural sciences (92-XX) 2 Field theory and polynomials (12-XX) 2 Systems theory; control (93-XX) 1 History and biography (01-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 General algebraic systems (08-XX) 1 Ordinary differential equations (34-XX) 1 Dynamical systems and ergodic theory (37-XX) 1 Difference and functional equations (39-XX) 1 Harmonic analysis on Euclidean spaces (42-XX) 1 Abstract harmonic analysis (43-XX) 1 Functional analysis (46-XX) 1 Convex and discrete geometry (52-XX) 1 Mechanics of particles and systems (70-XX) Citations by Year