Research- Past

 

2017

 

 

Eyal Ronen, Colin O’Flynn, Adi Shamir, Achi-Or Weingarten. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IEEE Symposium on Security and Privacy, 2017.

 

Daniel Genkin, Adi Shamir, Eran Tromer: Acoustic Cryptanalysis. J. Cryptology 30(2): 392-443, 2017.

 

Iftach Haitner, Eliad Tsfadia: An Almost Optimally-Fair Three-Party Coin-Tossing Protocol. SIAM Journal of Computing, 2017.

 

Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam: Better two-round adaptive multiparty computation. PKC, 2017.

 

Ran Canetti, Amit Lichtenberg: Certifying Trapdoor Permutations, Revisited. IACR Cryptology ePrint Archive 2017.

 

Ran Canetti , Srinivasan Raghuraman, Silas Richelson , Vinod Vaikuntanathan: Chosen-Ciphertext Secure Fully Homomorphic Encryption. PKC 2017.

 

Eli Ben-Sasson, Iddo Ben-Tov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza: Computational integrity with a public random

 

string from quasi-linear PCPs . Eurocrypt 2017.

 

Ran Canetti, Yilei Chen: Constraint-hiding constrained PRFs for NC1 from LWE. EUROCRYPT, 2017.

 

Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam: Equivocating Yao: Constant-Rounds Adaptively Secure Multiparty Computation in the Plain Model. STOC, 2017.

 

Niv Buchbinder, Iftach Haitner, Nissan Levi, Eliad Tsfadia: Fair Coin Flipping: Tighter and the Many-Party Case. 2580-2600, Soda 2017.

 

Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan: Low-Complexity Cryptographic Hash Functions. Cryptology ePrint Archive, 2017.

 

Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala: Task-structured probabilistic I/O automata. J. Comput. Syst. Sci. 94: 63-97, 2017.

 

 

2016

 

 

Eyal Ronen, Adi Shamir. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. IEEE European Symposium on Security and Privacy, 2016.

 

Benny Applebaum, Andrej Bogdanov, Alon Rosen: A Dichotomy for Local Small-Bias Generators. J. Cryptology 29(3): 577-596, 2016.

 

Eyal Itkin, Avhishai Wool: A Security Analysis and Revised Security Extension for the Precision Time Protocol. ISPCS,2016.

 

Benny Applebaum, Shachar Lovett: Algebraic attacks against random local functions and their countermeasures. STOC :1087-1100, 2016.

 

Amit Kleinmann, Avishay Wool: Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis. CPS-SPC, 2016.

 

Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem: Characterization of Secure Multiparty Computation Without Broadcast. TCC-A, 2016.

 

Benny Applebaum, Dariusz R. Kowalski, Boaz Patt-Shamir, Adi Ros?n: Clique Here: On the Distributed Complexity in Fully-Connected Networks. Parallel Processing Letters 26(1), 2016.

 

Roei Schuster, Eran Tromer: DroidDisintegrator: Intra-Application Information Flow Control in Android Apps. AsiaCCS :401-412, 2016.

 

Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom: ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels, eprint 2016/230, 2016.

 

Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer: ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs. proc. RSA Conference Cryptographers’ Track (CT- RSA), LNCS 9610, 219-235,

Springer, 2016.

 

Eli Ben-Sasson, Matan Hamilis, Mark Silberstein, Eran Tromer: Fast Multiplication in Binary Fields on GPUs via Register Cache. ICS: 35:1-35:12, 2016.

 

Benny Applebaum, Pavel Raykov: Fast Pseudorandom Functions Based on Expander Graphs. Electronic Colloquium on Computational Complexity (ECCC) 23: 82, 2016.

 

Benny Applebaum, Pavel Raykov: From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back. TCC-A, 2016.

 

Ran Canetti, Justin Holmgren: Fully Succinct Garbled RAM. ITCS 2016: 169-178, 2016.

 

Iftach Haitner, Eran Omri, Hila Zarosim: Limits on the Usefulness of Random Oracles.J. Cryptology 29(2): 283-335, 2016.

 

Mustafa Faisal, Alvaro A. Cardenas,  Avishai Wool: Modeling Modbus TCP for Intrusion Detection. CPS-Sec, 2016.

 

Ran Canetti, Yilei Chen, Leonid Reyzin: On the Correlation Intractability of Obfuscated Pseudorandom Functions. TCC-A, 2016.

 

Benny Applebaum, Pavel Raykov: On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings. IACR Cryptology ePrint Archive,519, 2016.

 

Ran Canetti, Oxana Poburinnaya, Mariana Raykova: Optimal-Rate Non-Committing Encryption in a CRS Model. IACR Cryptology ePrint Archive2016: 511, 2016.

 

Tsvika Dagan, Avishai Wool: Parrot, a software-only anti-spoofing defense system for the CAN bus. ESCAR, 2016.

 

Assa Naveh, Eran Tromer: PhotoProof: Cryptographic Image Authentication for any Permissible Transformation set. . IEEE Symposium on Security & Privacy (Oakland), 2016.

 

Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer: Physical key extraction attacks on PCs. Commun. ACM 59(6): 70-79, 2016.

 

Siyao Guo, Pavel Hub?cek, Alon Rosen, Margarita Vald: Rational Sumchecks. TCC-A, 2016.

 

Uri Kanonov, Avishai Wool: Secure Containers in Android: the Samsung KNOX Case Study. SPSM, 2016.

 

Ran Canetti, Justin Holmgren: Succinct Garbled RAM. ITCS, 2016.

 

Ran Canetti, Daniel Shahaf, Margarita Vald: Universally Composable Authentication and Key-Exchange with Global PKI. PKC, 2016.

 

Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam Smith: Reusable Fuzzy Extractors for Low-Entropy Distributions. EUROCRYPT, 2016.

 

 

2015

 

 

Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya: Adaptively Secure Two-party Computation From Indistinguishability Obfuscation. TCC, 2015.

 

Benny Applebaum, Jonathan Avron, Christina Brzuska: Arithmetic Cryptography. ITCS, 2015.

 

Alessandro Chiesa, Eran Tromer, Madars Virza: Cluster Computing in Zero Knowledge. Eurocrypt, 2015.

 

Itay Berman, Iftach Haitner, Aris Tentes: Coin Flipping of Any Constant Bias Implies One-Way Functions. JACM, 2015.

 

Benny Applebaum, Liron David, Guy Even: Deterministic Rateless Codes for the Binary Symmetric Channel. ITCS, 2015.

 

Ran Canetti, Justin Holmgren: Fully Succinct Garbled RAM.  IACR Cryptology ePrint Archive 2015: 388, 2015.

 

Benny Applebaum, Sergei Artemenko, Ronen Shaltiel, Guang Yang:  Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterminsitic Reductions. CCC, 2015.

 

Ran Cohen, Iftach Haitner, Eran Omri:  Lower Bounds for Secure Multiparty Computation Without Broadcast, 2015.

 

Benny Applebaum, Yuval Ishai, Eyal Kushilevitz:  Minimizing Locality of One-Way Functions via Semi-Private Randomized Encodings. Submitted to Journal of Cryptology, 2015.

 

Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan: Obfuscation of Probabilistic Circuits and Applications. TCC, 2015.

 

Nir Bitansky, Omer Paneth:  On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation., 2015.

 

Ran Canetti, Yilei Chen, Leonid Reyzin: On the Correlation Intractability of Obfuscated Pseudorandom Functions.  IACR Cryptology ePrint  Archive 2015: 334, 2015.

 

Ran Canetti, Yael Tauman Kalai, Omer Paneth:  On Obfuscation with Random Oracles. TCC, 2015.

 

Iftach Haitner, Yuval Ishai, Eran Omri, Ronen Shaltiel:  Parallel Hashing via List Recoverability. Crypto, 2015.

 

Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, Madars Virza: Secure sampling of public parameters for succinct zero knowledge proofs. proc. IEEE Symposium on Security &  Privacy, 2015.

 

Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer: Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation. Workshop on Cryptographic Hardware and Embedded Systems

(CHES), 2015.

 

Nir Bitansky, Omer Paneth: ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation. TCC, 2015. 

 

 

2014

 

 

Ran Canetti, Asaf Cohen, Yehuda Lindell: A Simpler Variant of Universally Composable Security for Standard Multiparty Computation. IACR Cryptology ePrint Archive, 2014.

 

Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald: An Algebraic Approach to Non-Malleability. IACR Cryptology ePrint Archive, 2014.

 

Iftach Haitner, Eliad Tsfadia: An Almost Optimally-Fair Three-Party Coin-Tossing Protocol. STOC, 2014.

 

Benny Applebaum:  Bootstrapping Obfuscators via Fast Pseudorandom Functions. ASIACRYPT, 2014.

 

Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer: Circuits resilient to additive attacks with applications to secure computation, STOC, 2014.

 

Ran Canetti; Abhishek Jain, Omer Paneth: Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity. CRYPTO, 2014.

 

Itay Berman, Iftach Haitner, Aris Tentes: Coin Flipping of Any Constant Bias Implies One-Way Functions. STOC, 2014.

 

Iftach Haitner, Eran Omri: Coin Flipping with Constant Bias Implies One-Way Functions. SIAM J. Comput. 43(2): 389-409, 2014.

 

Stephen Chong, Eran Tromer, Jeffrey A. Vaughan: Enforcing language semantics using proof-carrying Data, 2014.

 

Daniel Genkin, Itamar Pipman, Eran Tromer: Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. CHES, 2014.

 

Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: How to Garble Arithmetic Circuits. SIAM Journal of Computation 43(2): 905-929, 2014.

 

Christina Brzuska; Pooya Farshim; Arno Mittelbach: Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources. CRYPTO, 2014.

 

Benny Applebaum: Key-Dependent Message Security: Generic Amplificationand Completeness. Journal of Cryptology 27(3), 2014.

 

Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin: Key Derivation From Noisy Sources With More Errors Than Entropy. IACR Cryptology ePrint Archive, 2014.

 

Nir Bitansky, Dana Dachman-Soled, Huijia Lin: Leakage-Tolerant Computation with Input-Independent Preprocessing. CRYPTO, 2014.

 

Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva: Non-Interactive Secure Computation Based on Cut-and-Choose. EUROCRYPT, 2014.

 

Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai: Obfuscation for Evasive Functions. TCC, 2014.

 

Nir Bitansky, Ran Canetti: On Strong Simulation and Composable Point Obfuscation. Journal of Cryptology, 2014.

 

Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen: On the existence of extractable one-way functions. STOC, 2014.

 

Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth: On Virtual Grey Box Obfuscation for General Circuits.CRYPTO, 2014.

 

Ran Canetti, Abhishek Jain, Alessandra Scafuro: Practical UC security with a Global Random Oracle. ACM Conference on Computer and Communications Security, 2014.

 

Daniel Genkin, Adi Shamir, Eran Tromer: RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, 2014.

 

Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza: Scalable succinct non-interactive arguments via cycles of elliptic curves. CRYPTO, 2014.

 

Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza: Scalable Zero Knowledge via Cycles of Elliptic Curves. CRYPTO, 2014.

 

Yossi Gilad, Amir Herzberg, Ari Trachtenberg: Securing Smartphones: A Micro-TCB Approach. In IEEE Pervasive Computing, 2014.

 

Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza: Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. USENIX Security, 2014.

 

Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer: The Hunting of the SNARK. IACR Cryptology ePrint Archive, 2014.

 

Nir Bitansky, Ran Canetti, Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai, Omer Paneth, Alon Rosen: The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.CRYPTO, 2014.

 

Ran Canetti, Daniel Shahaf, Margarita Vald: Universally Composable Authentication and Key exchange with Global PKI. IACR Cryptology ePrint Archive, 2014.

 

Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos: Verifiable Set Operations over Outsourced Database. Public Key Cryptography, 2014.

 

Nir Bitansky, Omer Paneth: ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation. IACR Cryptology ePrint Archive, 2014.

 

Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza: Zerocash: practical decentralized anonymous e-cash from Bitcoin. IEEE Security & Privacy, 2014.

 

 

2013

 

 

Niv Goldenberg, Avishai Wool: Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. International Journal of Critical Infrastructure Protection, 2013.

 

Christina Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson: An Analysis of the EMV Channel Establishment Protocol. IACR Cryptology ePrint Archive, 2013.

 

Ory Samorodnitzky, Eran Tromer, Avishai Wool: Analyzing unique-bid auction sites for fun and profit. NDSS, 2013.

 

Benny Applebaum: Cryptographic Hardness of Random Local Functions (Survey). TCC, 2013.

 

Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters: Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits.CRYPTO, 2013.

 

Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer: Fast reductions from RAMs to delegatable succinct constraint satisfaction problems. ITCS, 2013.

 

Nir Bitansky, Omer Paneth: From the Impossibility of Obfuscation to a New Non Black-Box Simulation Technique.FOCS. (Best Student Paper Award), 2013.

 

Benny Applebaum: Garbling XOR Gates “For Free” in the Standard Model. TCC, 2013.

 

Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor: Hardness Preserving Reductions via Cuckoo Hashing. TCC, 2013.

 

Nir Bitansky, Ran Canetti, Omer Paneth: How to Construct Extractable One-Way Functions against Uniform Adversaries. Eprint, 2013.

 

Andrej Bogdanov, Alon Rosen: Input Locality and Hardness Amplification. J. Cryptology 26(1), 2013.

 

Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams: Less is more: relaxed yet composable security notions for key exchange. Int. Inf. Sec.12(4), 2013.

 

Iftach Haitner, Eran Omri, Hila Zarosim: Limits on the Usefulness of Random Oracles. TCC, 2013.

 

Benny Applebaum, Yoni Moses: Localy Computable UOWHF with Linear Shrinkage. EUROCRYPT, 2013.

 

David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev: More Constructions of Lossy and Correlation-Secure Trapdoor Functions, 2013.

 

Paul Baecher, Christina Brzuska, Marc Fischlin: Notions of Black-Box Reductions, Revisited.IACR Cryptology ePrint Archive, 2013.

 

Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer: On the concrete-efficiency threshold of probabilistically checkable proofs.STOC & ACM, 2013.

 

Nir Bitansky, Omer Paneth: On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography. STOC, 2013.

 

Ran Canetti, Huijia Lin, Omer Paneth: Public-Coin Concurrent Zero-Knowledge in the Global Hash Model.TCC, 2013.

 

Rafael Pass, Alon Rosen, Wei-Lung Dustin Tseng: Public-Coin Parallel Zero-Knowledge for NP. J. Cryptology 26(1), 2013.

 

Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer: Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data. STOC & ACM, 2013.

 

Ran Canetti, Ben Riva, Guy N. Rothblum: Refereed delegation of computation. Inf. Comput. 226:16-36, 2013.

 

Ronen Gradwohl, Noam Livne, Alon Rosen: Sequential rationality in cryptographic protocols. ACM Trans. Economics and Comput. 1(1), 2013.

 

Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza: SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. CRYPTO, 2013.

 

Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth: Succinct Non-Interactive Arguments via Linear Interactive Proofs. TCC, 2013.

 

Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana Lopez-Alt, Daniel WichsWhy: “Fiat-Shamir for Proofs” Lacks a Proof. TCC, 2013.

 

Stephen Chong, Eran Tromer, Jeffrey A. Vaughan: Enforcing Language Semantics Using Proof Carrying Data. IACR Cryptology ePrint Archive, 2013.

 

Ran Canetti, Huijia Lin, Rafael Pass: From Unprovability to Environmentally Friendly Protocols. FOCS, 2013.

 

Payman Mohassel, Ben Riva: Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation. CRYPTO, 2013.

 

Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen: Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall. IACR Cryptology ePrint Archive, 2013.

 

Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen: More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input. IACR Cryptology ePrint Archive, 2013.

 

Ran Canetti, Vinod Vaikuntanathan: Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups. IACR Cryptology ePrint Archive, 2013.

 

Daniel Genkin, Adi Shamir, Eran Tromer: RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. IACR Cryptology ePrint Archive, 2013.

 

 

2012

 

 

Yossef Oren, Dvir Schirman, Avhishai Wool: RFID Jamming and Attacks on Israeli e-Voting. SMART SYSTECH, 2012.

 

Ran Canetti, Ben Riva, Guy N. Rothblum: Two Protocols for Delegation of Computation. ICITS, 2012.

 

Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. ITCS, 2012.

 

Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, Hoeteck Wee: Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography, 2012.

 

Ran Canetti, Margarita Vald: Universally Composable Security with Local Adversaries. SCN, 2012.

 

Nir Bitansky, Ran Canetti, Shai Halevi: Leakage-Tolerant Interactive Protocols. TCC, 2012.

 

Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs: Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. EUROCRYPT, 2012.

 

Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. STOC, 2012.

 

Nir Bitansky, Alessandro Chiesa: Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits. CRYPTO, 2012.

 

Nir Bitansky, Omer Paneth: Point Obfuscation and 3-Round Zero-Knowledge. TCC, 2012.

 

Seny Kamara, Payman Mohassel, Ben Riva: Salus: a system for server-aided secure function evaluation. ACM Conference on Computer and Communications Security, 2012.

 

Jonathan Ben-Nun, Niko Fahri, Morgan Llewellyn, Ben Riva, Alon Rosen, Amnon Ta-Shma, Douglas Wikström: A New Implementation of a Dual (Paper and Cryptographic) Voting System. Electronic Voting, 2012.

 

Benny Applebaum, Andrej Bogdanov, Alon Rosen: A Dichotomy for Local Small-Bias Generators. TCC, 2012.

 
 
 
Itay Berman, Iftach Haitner: From Non-adaptive to Adaptive Pseudorandom Functions. TCC, 2012.
 
 
Yevgeniy Dodis, Iftach Haitner, Aris Tentes: On the Instantiability of Hash-and-Sign RSA Signatures. TCC, 2012.
 
 
Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer: Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data. IACR Cryptology ePrint Archive, 2012.

 

 

2011

 

 

Ran Canetti, Jonathan Herzog: Universally Composable Symbolic Security Analysis. J. Cryptology 24, 2011.

 

Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin: Secure Computation Without Authentication. J. Cryptology 24, 2011.

 

Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema: Composable Security Analysis of OS Services. ACNS, 2011.

 

Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum: Program Obfuscation with Leaky Hardware. ASIACRYPT, 2011.

 

Ran Canetti, Ben Riva, Guy N. Rothblum: Practical delegation of computation using multiple servers. ACM Conference on Computer and Communications Security, 2011.

 

Gilad Asharov, Ran Canetti, Carmit Hazay: Towards a Game Theoretic View of Secure Computation. EUROCRYPT, 2011.

 

Iftach Haitner and Eran Omry: Coin Flipping with Constant Bias Implies One-Way Functions. FOCS, 2011.

 

Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank: Black-Box Constructions of Protocols for Secure Computation. SIAM J. Comput. 40, 2011.

 

Iftach Haitner, Danny Harnik, Omer Reingold: On the Power of the Randomized Iterate. SIAM J. Comput. 40, 2011.

 

Benny Applebaum, Yuval Ishai and Eyal Kushilevitz: How to Garble Arithmetic Circuits. FOCS, 2011.

 

Benny Applebaum: Key-Dependent Message Security: Generic Amplification and Completeness. Eurocrypt, 2011.

 

Benny Applebaum, Danny Harnik and Yuval Ishai: Semantic Security Under Related-Key Attacks. ICS, 2011.

 

Benny Applebaum: Randomly Encoding Functions: A New Cryptographic Paradigm – (Invited Talk). ICITS, 2011.

 

Nir Bitansky, Ran Canetti: On Strong Simulation and Composable Point Obfuscation. CRYPTO, 2011.

 

Ran Canetti, Huijia Lin, Rafael Pass: Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions. FOCS, 2011.

 

Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs: On Symmetric Encryption and Point Obfuscation. TCC, 2011.

 

Ran Canetti, Guy N. Rothblum, Mayank Varia: Obfuscation of Hyperplane Membership. TCC, 2011.

 

Iftach Haitner, Mohammad Mahmoody, David Xiao: A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP. IEEE Conference on Computational Complexity, 2011.

 

Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai: Bounded Key-Dependent Message Security. EUROCRYPT, 2011.

 

Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil P. Vadhan, Hoeteck Wee: Universal One-Way Hash Functions via Inaccessible Entropy. EUROCRYPT, 2011.

 

Iftach Haitner, Omer Reingold, Salil P. Vadhan: Efficiency improvements in constructing pseudorandom generators from one-way functions. STOC, 2011.

 

Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: From Secrecy to Soundness: Efficient Verification via Secure Computation. ICALP, 2011.

 

Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? ICS, 2011.

 

Benny Applebaum, Haakon Ringberg, Michael J. Freedman, Matthew Caesar, Jennifer Rexford: Collaborative, Privacy-Preserving Data Aggregation at Scale. Privacy Enhancing Technologies, 2011.

 

Benny Applebaum, Boaz Barak, Avi Wigderson: Public-key cryptography from different assumptions. STOC, 2011.

 

Eran Tromer, Dag Arne Osvik, Adi Shamir: Efficient Cache Attacks on AES, and Countermeasures. J. Cryptology 23, 2011.

 

Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. EUROCRYPT, 2011.

 

Alessandro Chiesa, Eran Tromer: Proof-Carrying Data and Hearsay Arguments from Signature Cards. ICS, 2011.

 

Ran Canetti, Sebastian Gajek: Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange. IACR Cryptology ePrint Archive, 2011.

 

 

2010

 

 

Nir Bitansky, Ran Canetti: On Strong Simulation and Composable Point Obfuscation. CRYPTO, 2010.

 

Ran Canetti, Huijia Lin, Rafael Pass: Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions. FOCS, 2010.

 

Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs: On Symmetric Encryption and Point Obfuscation. TCC, 2010.

 

Ran Canetti, Guy N. Rothblum, Mayank Varia: Obfuscation of Hyperplane Membership. TCC, 2010.

 

Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai: Bounded Key-Dependent Message Security. EUROCRYPT, 2010.

 

Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil P. Vadhan, Hoeteck Wee: Universal One-Way Hash Functions via Inaccessible Entropy. EUROCRYPT, 2010.

 

Iftach Haitner, Omer Reingold, Salil P. Vadhan: Efficiency improvements in constructing pseudorandom generators from one-way functions. STOC, 2010.

 

Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: From Secrecy to Soundness: Efficient Verification via Secure Computation. ICALP, 2010.

 

Benny Applebaum, Yuval Ishai, Eyal Kushilevitz: Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? ICS, 2010.

 

Benny Applebaum, Haakon Ringberg, Michael J. Freedman, Matthew Caesar, Jennifer Rexford: Collaborative, Privacy-Preserving Data Aggregation at Scale. Privacy Enhancing Technologies, 2010.

 

Benny Applebaum, Boaz Barak, Avi Wigderson: Public-key cryptography from different assumptions. STOC, 2010.

 

Eran Tromer, Dag Arne Osvik, Adi Shamir: Efficient Cache Attacks on AES, and Countermeasures. J. Cryptology 23, 2010.

 

Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. EUROCRYPT, 2010.

 

Alessandro Chiesa, Eran Tromer: Proof-Carrying Data and Hearsay Arguments from Signature Cards. ICS, 2010.

 

Ran Canetti, Sebastian Gajek: Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange. IACR Cryptology ePrint Archive, 2010.

 

 

2009

 

 

Ran Canetti, Mayank Varia: Non-malleable Obfuscation. TCC, 2009.

 

Ran Canetti, Ronny Ramzi Dakdouk: Towards a Theory of Extractable Functions. TCC, 2009.

 

Tel Aviv University makes every effort to respect copyright. If you own copyright to the content contained here and / or the use of such content is in your opinion infringing, Contact us as soon as possible >>
Tel Aviv University, P.O. Box 39040, Tel Aviv 6997801, Israel
UI/UX Basch_Interactive