Bar-Ilan University

General Info

Rank: #67 Worldwide
#8 outside of US and Europe
Papers: 45
Number of Researchers: 25
APA
(average papers per authors):
1.8
Country: ISRAEL

Activity Map

Contributors

  • Benny Pinkas (17 papers)
  • Yehuda Lindell (15 papers)
  • Carmit Hazay (7 papers)
  • Ariel Nof (6 papers)
  • Amit Klein (5 papers)
  • Amir Herzberg (4 papers)
  • Assi Barak (3 papers)
  • Gilad Asharov (2 papers)
  • Haya Shulman (1 papers)
  • Michael Sudkovitch (1 papers)
  • Michael Goberman (1 papers)
  • Or Weinstein (1 papers)
  • Jonathan Berger (1 papers)
  • Alexandra Shulman-Peleg (1 papers)
  • Ben Riva (1 papers)
  • Nethanel Gelernter (1 papers)
  • Naor Matania (1 papers)
  • Lior Koskas (1 papers)
  • Avishay Yanai (1 papers)
  • Rishabh Bhadauria (1 papers)
  • Hanan Rosemarin (1 papers)
  • Yossi Adi (1 papers)
  • Carsten Baum (1 papers)
  • Joseph Keshet (1 papers)
  • Hemi Leibowitz (1 papers)

Papers

"Constructions of Truly Practical Secure Protocols using Standard Smartcards"

Carmit Hazay, Yehuda Lindell, ... -- CCS 2008

"Stealth DoS Attacks on Secure Channels"

Amir Herzberg, Haya Shulman, ... -- NDSS 2010

"Proofs of Ownerhip in Remote Storage Systems"

Benny Pinkas, Alexandra Shulman-Peleg, ... -- CCS 2011

"More Efficient Oblivious Transfer and Extensions for Faster Secure Computation"

Gilad Asharov, Yehuda Lindell, ... -- CCS 2013

"Faster Private Set Intersection based on OT Extension"

Benny Pinkas, ... -- Usenix 2014

"GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte"

Yehuda Lindell, ... -- CCS 2015

"Fast Garbling of Circuits Under Standard Assumptions"

Yehuda Lindell, Ariel Nof, Benny Pinkas, ... -- CCS 2015

"Secure Deduplication of Encrypted Data without Additional Independent Servers"

Benny Pinkas, ... -- CCS 2015

"Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries"

Yehuda Lindell, Ben Riva, ... -- CCS 2015

"Cross-Site Search Attacks"

Nethanel Gelernter, Amir Herzberg, ... -- CCS 2015

"Phasing: Private Set Intersection using Permutation-based Hashing"

Benny Pinkas, ... -- Usenix 2015

"CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds"

Amir Herzberg, Michael Sudkovitch, Michael Goberman, ... -- NDSS 2016

"High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority"

Yehuda Lindell, Ariel Nof, ... -- CCS 2016

"Optimizing Semi-Honest Secure Multiparty Computation for the Internet"

Yehuda Lindell, ... -- CCS 2016

"Attribute-based Key Exchange with General Policies"

Yehuda Lindell, ... -- CCS 2016

"Are We There Yet? On RPKI's Deployment and Security"

Amir Herzberg, ... -- NDSS 2017

"Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier"

Assi Barak, Yehuda Lindell, Ariel Nof, Or Weinstein, ... -- Oakland 2017

"A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority"

Yehuda Lindell, Ariel Nof, ... -- CCS 2017

"Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation"

Yehuda Lindell, ... -- CCS 2017

"Ligero: Lightweight Sublinear Arguments Without a Trusted Setup"

Carmit Hazay, ... -- CCS 2017

"Practical Multi-party Private Set Intersection from Symmetric-Key Techniques"

Naor Matania, Benny Pinkas, ... -- CCS 2017

"Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody"

Yehuda Lindell, Ariel Nof, ... -- CCS 2018

"An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants"

Assi Barak, Lior Koskas, Yehuda Lindell, ... -- CCS 2018

"Generalizing the SPDZ Compiler For Other Protocols"

Assi Barak, Yehuda Lindell, ... -- CCS 2018

"Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring"

Yossi Adi, Carsten Baum, Benny Pinkas, Joseph Keshet, ... -- Usenix 2018

"DNS Cache-Based User Tracking"

Amit Klein, Benny Pinkas, ... -- NDSS 2019

"Fast Actively Secure Five-Party Computation with Security Beyond Abort"

Carmit Hazay, ... -- CCS 2019

"How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior"

Benny Pinkas, ... -- CCS 2019

"LevioSA: Lightweight Secure Arithmetic Computation"

Carmit Hazay, ... -- CCS 2019

"Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning"

Benny Pinkas, ... -- CCS 2019

"Practical Fully Secure Three-Party Computation via Sublinear Distributed ZK Proofs"

Ariel Nof, ... -- CCS 2019

"Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest"

Yehuda Lindell, ... -- CCS 2019

"From IP ID to Device ID and KASLR Bypass"

Amit Klein, Benny Pinkas, ... -- Usenix 2019

"No Right to Remain Silent: Isolating Malicious Mixes"

Hemi Leibowitz, ... -- Usenix 2019

"Flaw Label: Exploiting IPv6 Flow Label"

Jonathan Berger, Amit Klein, Benny Pinkas, ... -- Oakland 2020

"Towards Scalable Threshold Cryptosystems"

Benny Pinkas, ... -- Oakland 2020

"Blinder -- Scalable, Robust Anonymous Committed Broadcast"

Avishay Yanai, Benny Pinkas, ... -- CCS 2020

"Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC"

Carmit Hazay, ... -- CCS 2020

"Ligero++: A New Optimized Sublinear IOP"

Rishabh Bhadauria, Carmit Hazay, ... -- CCS 2020

"Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)"

Amit Klein, ... -- Oakland 2021

"Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority"

Carmit Hazay, ... -- Oakland 2021

"Secure Graph Analysis at Scale"

Benny Pinkas, Hanan Rosemarin, ... -- CCS 2021

"Subverting Stateful Firewalls with Protocol States"

Amit Klein, ... -- NDSS 2022

"Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters"

Gilad Asharov, Benny Pinkas, ... -- CCS 2022

"GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications"

Benny Pinkas, ... -- Usenix 2022