Research- Past
2017
Eyal Ronen, Colin O’Flynn, Adi Shamir, Achi-Or Weingarten. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IEEE Symposium on Security and Privacy, 2017.
Daniel Genkin, Adi Shamir, Eran Tromer: Acoustic Cryptanalysis. J. Cryptology 30(2): 392-443, 2017.
Iftach Haitner, Eliad Tsfadia: An Almost Optimally-Fair Three-Party Coin-Tossing Protocol. SIAM Journal of Computing, 2017.
Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam: Better two-round adaptive multiparty computation. PKC, 2017.
Ran Canetti, Amit Lichtenberg: Certifying Trapdoor Permutations, Revisited. IACR Cryptology ePrint Archive 2017.
Ran Canetti , Srinivasan Raghuraman, Silas Richelson , Vinod Vaikuntanathan: Chosen-Ciphertext Secure Fully Homomorphic Encryption. PKC 2017.
Eli Ben-Sasson, Iddo Ben-Tov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza: Computational integrity with a public random
string from quasi-linear PCPs . Eurocrypt 2017.
Ran Canetti, Yilei Chen: Constraint-hiding constrained PRFs for NC1 from LWE. EUROCRYPT, 2017.
Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam: Equivocating Yao: Constant-Rounds Adaptively Secure Multiparty Computation in the Plain Model. STOC, 2017.
Niv Buchbinder, Iftach Haitner, Nissan Levi, Eliad Tsfadia: Fair Coin Flipping: Tighter and the Many-Party Case. 2580-2600, Soda 2017.
Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan: Low-Complexity Cryptographic Hash Functions. Cryptology ePrint Archive, 2017.
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala: Task-structured probabilistic I/O automata. J. Comput. Syst. Sci. 94: 63-97, 2017.
2016
Eyal Ronen, Adi Shamir. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. IEEE European Symposium on Security and Privacy, 2016.
Benny Applebaum, Andrej Bogdanov, Alon Rosen: A Dichotomy for Local Small-Bias Generators. J. Cryptology 29(3): 577-596, 2016.
Eyal Itkin, Avhishai Wool: A Security Analysis and Revised Security Extension for the Precision Time Protocol. ISPCS,2016.
Benny Applebaum, Shachar Lovett: Algebraic attacks against random local functions and their countermeasures. STOC :1087-1100, 2016.
Amit Kleinmann, Avishay Wool: Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis. CPS-SPC, 2016.
Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem: Characterization of Secure Multiparty Computation Without Broadcast. TCC-A, 2016.
Benny Applebaum, Dariusz R. Kowalski, Boaz Patt-Shamir, Adi Ros?n: Clique Here: On the Distributed Complexity in Fully-Connected Networks. Parallel Processing Letters 26(1), 2016.
Roei Schuster, Eran Tromer: DroidDisintegrator: Intra-Application Information Flow Control in Android Apps. AsiaCCS :401-412, 2016.
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom: ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels, eprint 2016/230, 2016.
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer: ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs. proc. RSA Conference Cryptographers’ Track (CT- RSA), LNCS 9610, 219-235,
Springer, 2016.
Eli Ben-Sasson, Matan Hamilis, Mark Silberstein, Eran Tromer: Fast Multiplication in Binary Fields on GPUs via Register Cache. ICS: 35:1-35:12, 2016.
Benny Applebaum, Pavel Raykov: Fast Pseudorandom Functions Based on Expander Graphs. Electronic Colloquium on Computational Complexity (ECCC) 23: 82, 2016.
Benny Applebaum, Pavel Raykov: From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back. TCC-A, 2016.
Ran Canetti, Justin Holmgren: Fully Succinct Garbled RAM. ITCS 2016: 169-178, 2016.
Iftach Haitner, Eran Omri, Hila Zarosim: Limits on the Usefulness of Random Oracles.J. Cryptology 29(2): 283-335, 2016.
Mustafa Faisal, Alvaro A. Cardenas, Avishai Wool: Modeling Modbus TCP for Intrusion Detection. CPS-Sec, 2016.
Ran Canetti, Yilei Chen, Leonid Reyzin: On the Correlation Intractability of Obfuscated Pseudorandom Functions. TCC-A, 2016.
Benny Applebaum, Pavel Raykov: On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings. IACR Cryptology ePrint Archive,519, 2016.
Ran Canetti, Oxana Poburinnaya, Mariana Raykova: Optimal-Rate Non-Committing Encryption in a CRS Model. IACR Cryptology ePrint Archive2016: 511, 2016.
Tsvika Dagan, Avishai Wool: Parrot, a software-only anti-spoofing defense system for the CAN bus. ESCAR, 2016.
Assa Naveh, Eran Tromer: PhotoProof: Cryptographic Image Authentication for any Permissible Transformation set. . IEEE Symposium on Security & Privacy (Oakland), 2016.
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer: Physical key extraction attacks on PCs. Commun. ACM 59(6): 70-79, 2016.
Siyao Guo, Pavel Hub?cek, Alon Rosen, Margarita Vald: Rational Sumchecks. TCC-A, 2016.
Uri Kanonov, Avishai Wool: Secure Containers in Android: the Samsung KNOX Case Study. SPSM, 2016.
Ran Canetti, Justin Holmgren: Succinct Garbled RAM. ITCS, 2016.
Ran Canetti, Daniel Shahaf, Margarita Vald: Universally Composable Authentication and Key-Exchange with Global PKI. PKC, 2016.
Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam Smith: Reusable Fuzzy Extractors for Low-Entropy Distributions. EUROCRYPT, 2016.
2015
Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya: Adaptively Secure Two-party Computation From Indistinguishability Obfuscation. TCC, 2015.
Benny Applebaum, Jonathan Avron, Christina Brzuska: Arithmetic Cryptography. ITCS, 2015.
Alessandro Chiesa, Eran Tromer, Madars Virza: Cluster Computing in Zero Knowledge. Eurocrypt, 2015.
Itay Berman, Iftach Haitner, Aris Tentes: Coin Flipping of Any Constant Bias Implies One-Way Functions. JACM, 2015.
Benny Applebaum, Liron David, Guy Even: Deterministic Rateless Codes for the Binary Symmetric Channel. ITCS, 2015.
Ran Canetti, Justin Holmgren: Fully Succinct Garbled RAM. IACR Cryptology ePrint Archive 2015: 388, 2015.
Benny Applebaum, Sergei Artemenko, Ronen Shaltiel, Guang Yang: Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterminsitic Reductions. CCC, 2015.
Ran Cohen, Iftach Haitner, Eran Omri: Lower Bounds for Secure Multiparty Computation Without Broadcast, 2015.
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: Minimizing Locality of One-Way Functions via Semi-Private Randomized Encodings. Submitted to Journal of Cryptology, 2015.
Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan: Obfuscation of Probabilistic Circuits and Applications. TCC, 2015.
Nir Bitansky, Omer Paneth: On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation., 2015.
Ran Canetti, Yilei Chen, Leonid Reyzin: On the Correlation Intractability of Obfuscated Pseudorandom Functions. IACR Cryptology ePrint Archive 2015: 334, 2015.
Ran Canetti, Yael Tauman Kalai, Omer Paneth: On Obfuscation with Random Oracles. TCC, 2015.
Iftach Haitner, Yuval Ishai, Eran Omri, Ronen Shaltiel: Parallel Hashing via List Recoverability. Crypto, 2015.
Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, Madars Virza: Secure sampling of public parameters for succinct zero knowledge proofs. proc. IEEE Symposium on Security & Privacy, 2015.
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer: Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation. Workshop on Cryptographic Hardware and Embedded Systems
(CHES), 2015.
Nir Bitansky, Omer Paneth: ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation. TCC, 2015.
2014
Ran Canetti, Asaf Cohen, Yehuda Lindell: A Simpler Variant of Universally Composable Security for Standard Multiparty Computation. IACR Cryptology ePrint Archive, 2014.
Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald: An Algebraic Approach to Non-Malleability. IACR Cryptology ePrint Archive, 2014.
Iftach Haitner, Eliad Tsfadia: An Almost Optimally-Fair Three-Party Coin-Tossing Protocol. STOC, 2014.
Benny Applebaum: Bootstrapping Obfuscators via Fast Pseudorandom Functions. ASIACRYPT, 2014.
Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer: Circuits resilient to additive attacks with applications to secure computation, STOC, 2014.
Ran Canetti; Abhishek Jain, Omer Paneth: Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity. CRYPTO, 2014.
Itay Berman, Iftach Haitner, Aris Tentes: Coin Flipping of Any Constant Bias Implies One-Way Functions. STOC, 2014.
Iftach Haitner, Eran Omri: Coin Flipping with Constant Bias Implies One-Way Functions. SIAM J. Comput. 43(2): 389-409, 2014.
Stephen Chong, Eran Tromer, Jeffrey A. Vaughan: Enforcing language semantics using proof-carrying Data, 2014.
Daniel Genkin, Itamar Pipman, Eran Tromer: Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. CHES, 2014.
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: How to Garble Arithmetic Circuits. SIAM Journal of Computation 43(2): 905-929, 2014.
Christina Brzuska; Pooya Farshim; Arno Mittelbach: Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources. CRYPTO, 2014.
Benny Applebaum: Key-Dependent Message Security: Generic Amplificationand Completeness. Journal of Cryptology 27(3), 2014.
Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin: Key Derivation From Noisy Sources With More Errors Than Entropy. IACR Cryptology ePrint Archive, 2014.
Nir Bitansky, Dana Dachman-Soled, Huijia Lin: Leakage-Tolerant Computation with Input-Independent Preprocessing. CRYPTO, 2014.
Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva: Non-Interactive Secure Computation Based on Cut-and-Choose. EUROCRYPT, 2014.
Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai: Obfuscation for Evasive Functions. TCC, 2014.
Nir Bitansky, Ran Canetti: On Strong Simulation and Composable Point Obfuscation. Journal of Cryptology, 2014.
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen: On the existence of extractable one-way functions. STOC, 2014.
Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth: On Virtual Grey Box Obfuscation for General Circuits.CRYPTO, 2014.
Ran Canetti, Abhishek Jain, Alessandra Scafuro: Practical UC security with a Global Random Oracle. ACM Conference on Computer and Communications Security, 2014.
Daniel Genkin, Adi Shamir, Eran Tromer: RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, 2014.
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza: Scalable succinct non-interactive arguments via cycles of elliptic curves. CRYPTO, 2014.
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza: Scalable Zero Knowledge via Cycles of Elliptic Curves. CRYPTO, 2014.
Yossi Gilad, Amir Herzberg, Ari Trachtenberg: Securing Smartphones: A Micro-TCB Approach. In IEEE Pervasive Computing, 2014.
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza: Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. USENIX Security, 2014.
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer: The Hunting of the SNARK. IACR Cryptology ePrint Archive, 2014.
Nir Bitansky, Ran Canetti, Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai, Omer Paneth, Alon Rosen: The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.CRYPTO, 2014.
Ran Canetti, Daniel Shahaf, Margarita Vald: Universally Composable Authentication and Key exchange with Global PKI. IACR Cryptology ePrint Archive, 2014.
Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos: Verifiable Set Operations over Outsourced Database. Public Key Cryptography, 2014.
Nir Bitansky, Omer Paneth: ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation. IACR Cryptology ePrint Archive, 2014.
Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza: Zerocash: practical decentralized anonymous e-cash from Bitcoin. IEEE Security & Privacy, 2014.
2013
Niv Goldenberg, Avishai Wool: Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. International Journal of Critical Infrastructure Protection, 2013.
Christina Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson: An Analysis of the EMV Channel Establishment Protocol. IACR Cryptology ePrint Archive, 2013.
Ory Samorodnitzky, Eran Tromer, Avishai Wool: Analyzing unique-bid auction sites for fun and profit. NDSS, 2013.
Benny Applebaum: Cryptographic Hardness of Random Local Functions (Survey). TCC, 2013.
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters: Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits.CRYPTO, 2013.
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer: Fast reductions from RAMs to delegatable succinct constraint satisfaction problems. ITCS, 2013.
Nir Bitansky, Omer Paneth: From the Impossibility of Obfuscation to a New Non Black-Box Simulation Technique.FOCS. (Best Student Paper Award), 2013.
Benny Applebaum: Garbling XOR Gates “For Free” in the Standard Model. TCC, 2013.
Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor: Hardness Preserving Reductions via Cuckoo Hashing. TCC, 2013.
Nir Bitansky, Ran Canetti, Omer Paneth: How to Construct Extractable One-Way Functions against Uniform Adversaries. Eprint, 2013.
Andrej Bogdanov, Alon Rosen: Input Locality and Hardness Amplification. J. Cryptology 26(1), 2013.
Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams: Less is more: relaxed yet composable security notions for key exchange. Int. Inf. Sec.12(4), 2013.
Iftach Haitner, Eran Omri, Hila Zarosim: Limits on the Usefulness of Random Oracles. TCC, 2013.
Benny Applebaum, Yoni Moses: Localy Computable UOWHF with Linear Shrinkage. EUROCRYPT, 2013.
David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev: More Constructions of Lossy and Correlation-Secure Trapdoor Functions, 2013.
Paul Baecher, Christina Brzuska, Marc Fischlin: Notions of Black-Box Reductions, Revisited.IACR Cryptology ePrint Archive, 2013.
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer: On the concrete-efficiency threshold of probabilistically checkable proofs.STOC & ACM, 2013.
Nir Bitansky, Omer Paneth: On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography. STOC, 2013.
Ran Canetti, Huijia Lin, Omer Paneth: Public-Coin Concurrent Zero-Knowledge in the Global Hash Model.TCC, 2013.
Rafael Pass, Alon Rosen, Wei-Lung Dustin Tseng: Public-Coin Parallel Zero-Knowledge for NP. J. Cryptology 26(1), 2013.
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer: Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data. STOC & ACM, 2013.
Ran Canetti, Ben Riva, Guy N. Rothblum: Refereed delegation of computation. Inf. Comput. 226:16-36, 2013.
Ronen Gradwohl, Noam Livne, Alon Rosen: Sequential rationality in cryptographic protocols. ACM Trans. Economics and Comput. 1(1), 2013.
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza: SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. CRYPTO, 2013.
Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth: Succinct Non-Interactive Arguments via Linear Interactive Proofs. TCC, 2013.
Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana Lopez-Alt, Daniel WichsWhy: “Fiat-Shamir for Proofs” Lacks a Proof. TCC, 2013.
Stephen Chong, Eran Tromer, Jeffrey A. Vaughan: Enforcing Language Semantics Using Proof Carrying Data. IACR Cryptology ePrint Archive, 2013.
Ran Canetti, Huijia Lin, Rafael Pass: From Unprovability to Environmentally Friendly Protocols. FOCS, 2013.
Payman Mohassel, Ben Riva: Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation. CRYPTO, 2013.
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen: Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall. IACR Cryptology ePrint Archive, 2013.
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen: More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input. IACR Cryptology ePrint Archive, 2013.
Ran Canetti, Vinod Vaikuntanathan: Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups. IACR Cryptology ePrint Archive, 2013.
Daniel Genkin, Adi Shamir, Eran Tromer: RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. IACR Cryptology ePrint Archive, 2013.
2012
Yossef Oren, Dvir Schirman, Avhishai Wool: RFID Jamming and Attacks on Israeli e-Voting. SMART SYSTECH, 2012.
Ran Canetti, Ben Riva, Guy N. Rothblum: Two Protocols for Delegation of Computation. ICITS, 2012.
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. ITCS, 2012.
Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, Hoeteck Wee: Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography, 2012.
Ran Canetti, Margarita Vald: Universally Composable Security with Local Adversaries. SCN, 2012.
Nir Bitansky, Ran Canetti, Shai Halevi: Leakage-Tolerant Interactive Protocols. TCC, 2012.
Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs: Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. EUROCRYPT, 2012.
Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. STOC, 2012.
Nir Bitansky, Alessandro Chiesa: Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits. CRYPTO, 2012.
Nir Bitansky, Omer Paneth: Point Obfuscation and 3-Round Zero-Knowledge. TCC, 2012.
Seny Kamara, Payman Mohassel, Ben Riva: Salus: a system for server-aided secure function evaluation. ACM Conference on Computer and Communications Security, 2012.
Jonathan Ben-Nun, Niko Fahri, Morgan Llewellyn, Ben Riva, Alon Rosen, Amnon Ta-Shma, Douglas Wikström: A New Implementation of a Dual (Paper and Cryptographic) Voting System. Electronic Voting, 2012.
Benny Applebaum, Andrej Bogdanov, Alon Rosen: A Dichotomy for Local Small-Bias Generators. TCC, 2012.
2011
Ran Canetti, Jonathan Herzog: Universally Composable Symbolic Security Analysis. J. Cryptology 24, 2011.
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin: Secure Computation Without Authentication. J. Cryptology 24, 2011.
Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema: Composable Security Analysis of OS Services. ACNS, 2011.
Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum: Program Obfuscation with Leaky Hardware. ASIACRYPT, 2011.
Ran Canetti, Ben Riva, Guy N. Rothblum: Practical delegation of computation using multiple servers. ACM Conference on Computer and Communications Security, 2011.
Gilad Asharov, Ran Canetti, Carmit Hazay: Towards a Game Theoretic View of Secure Computation. EUROCRYPT, 2011.
Iftach Haitner and Eran Omry: Coin Flipping with Constant Bias Implies One-Way Functions. FOCS, 2011.
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank: Black-Box Constructions of Protocols for Secure Computation. SIAM J. Comput. 40, 2011.
Iftach Haitner, Danny Harnik, Omer Reingold: On the Power of the Randomized Iterate. SIAM J. Comput. 40, 2011.
Benny Applebaum, Yuval Ishai and Eyal Kushilevitz: How to Garble Arithmetic Circuits. FOCS, 2011.
Benny Applebaum: Key-Dependent Message Security: Generic Amplification and Completeness. Eurocrypt, 2011.
Benny Applebaum, Danny Harnik and Yuval Ishai: Semantic Security Under Related-Key Attacks. ICS, 2011.
Benny Applebaum: Randomly Encoding Functions: A New Cryptographic Paradigm – (Invited Talk). ICITS, 2011.
Nir Bitansky, Ran Canetti: On Strong Simulation and Composable Point Obfuscation. CRYPTO, 2011.
Ran Canetti, Huijia Lin, Rafael Pass: Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions. FOCS, 2011.
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs: On Symmetric Encryption and Point Obfuscation. TCC, 2011.
Ran Canetti, Guy N. Rothblum, Mayank Varia: Obfuscation of Hyperplane Membership. TCC, 2011.
Iftach Haitner, Mohammad Mahmoody, David Xiao: A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP. IEEE Conference on Computational Complexity, 2011.
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai: Bounded Key-Dependent Message Security. EUROCRYPT, 2011.
Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil P. Vadhan, Hoeteck Wee: Universal One-Way Hash Functions via Inaccessible Entropy. EUROCRYPT, 2011.
Iftach Haitner, Omer Reingold, Salil P. Vadhan: Efficiency improvements in constructing pseudorandom generators from one-way functions. STOC, 2011.
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: From Secrecy to Soundness: Efficient Verification via Secure Computation. ICALP, 2011.
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? ICS, 2011.
Benny Applebaum, Haakon Ringberg, Michael J. Freedman, Matthew Caesar, Jennifer Rexford: Collaborative, Privacy-Preserving Data Aggregation at Scale. Privacy Enhancing Technologies, 2011.
Benny Applebaum, Boaz Barak, Avi Wigderson: Public-key cryptography from different assumptions. STOC, 2011.
Eran Tromer, Dag Arne Osvik, Adi Shamir: Efficient Cache Attacks on AES, and Countermeasures. J. Cryptology 23, 2011.
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. EUROCRYPT, 2011.
Alessandro Chiesa, Eran Tromer: Proof-Carrying Data and Hearsay Arguments from Signature Cards. ICS, 2011.
Ran Canetti, Sebastian Gajek: Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange. IACR Cryptology ePrint Archive, 2011.
2010
Nir Bitansky, Ran Canetti: On Strong Simulation and Composable Point Obfuscation. CRYPTO, 2010.
Ran Canetti, Huijia Lin, Rafael Pass: Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions. FOCS, 2010.
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs: On Symmetric Encryption and Point Obfuscation. TCC, 2010.
Ran Canetti, Guy N. Rothblum, Mayank Varia: Obfuscation of Hyperplane Membership. TCC, 2010.
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai: Bounded Key-Dependent Message Security. EUROCRYPT, 2010.
Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil P. Vadhan, Hoeteck Wee: Universal One-Way Hash Functions via Inaccessible Entropy. EUROCRYPT, 2010.
Iftach Haitner, Omer Reingold, Salil P. Vadhan: Efficiency improvements in constructing pseudorandom generators from one-way functions. STOC, 2010.
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: From Secrecy to Soundness: Efficient Verification via Secure Computation. ICALP, 2010.
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? ICS, 2010.
Benny Applebaum, Haakon Ringberg, Michael J. Freedman, Matthew Caesar, Jennifer Rexford: Collaborative, Privacy-Preserving Data Aggregation at Scale. Privacy Enhancing Technologies, 2010.
Benny Applebaum, Boaz Barak, Avi Wigderson: Public-key cryptography from different assumptions. STOC, 2010.
Eran Tromer, Dag Arne Osvik, Adi Shamir: Efficient Cache Attacks on AES, and Countermeasures. J. Cryptology 23, 2010.
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. EUROCRYPT, 2010.
Alessandro Chiesa, Eran Tromer: Proof-Carrying Data and Hearsay Arguments from Signature Cards. ICS, 2010.
Ran Canetti, Sebastian Gajek: Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange. IACR Cryptology ePrint Archive, 2010.
2009
Ran Canetti, Mayank Varia: Non-malleable Obfuscation. TCC, 2009.
Ran Canetti, Ronny Ramzi Dakdouk: Towards a Theory of Extractable Functions. TCC, 2009.