Computationally private information retrieval B Chor, N Gilboa Proceedings of the twenty-ninth annual ACM symposium on Theory of computing …, 1997 | 386 | 1997 |
Private information retrieval by keywords B Chor, N Gilboa, M Naor Technion-IIT, Department of Computer Science, 1997 | 270 | 1997 |
Two party RSA key generation N Gilboa Annual International Cryptology Conference, 116-129, 1999 | 221 | 1999 |
Function secret sharing E Boyle, N Gilboa, Y Ishai Annual international conference on the theory and applications of …, 2015 | 197 | 2015 |
Function secret sharing: Improvements and extensions E Boyle, N Gilboa, Y Ishai Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 132 | 2016 |
Virtual private network mechanism incorporating security association processor Y Shapira, D Shohat, M Zezak, N Gilboa US Patent 7,107,464, 2006 | 125 | 2006 |
Distributed point functions and their applications N Gilboa, Y Ishai Annual International Conference on the Theory and Applications of …, 2014 | 122 | 2014 |
Breaking the circuit size barrier for secure computation under DDH E Boyle, N Gilboa, Y Ishai Annual International Cryptology Conference, 509-539, 2016 | 120 | 2016 |
Efficient pseudorandom correlation generators: Silent OT extension and more E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl Annual International Cryptology Conference, 489-518, 2019 | 96 | 2019 |
Efficient two-round OT extension and silent non-interactive secure computation E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Rindal, P Scholl Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 85 | 2019 |
Compressing vector OLE E Boyle, G Couteau, N Gilboa, Y Ishai Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 68 | 2018 |
Group-based secure computation: optimizing rounds, communication, and computation E Boyle, N Gilboa, Y Ishai Annual International Conference on the Theory and Applications of …, 2017 | 66 | 2017 |
Zero-knowledge proofs on secret-shared data via fully linear PCPs D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai Annual International Cryptology Conference, 67-97, 2019 | 59 | 2019 |
Foundations of homomorphic secret sharing E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro Cryptology ePrint Archive, 2017 | 58 | 2017 |
Homomorphic secret sharing: optimizations and applications E Boyle, G Couteau, N Gilboa, Y Ishai, M Orrų Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 53 | 2017 |
Method and system for secure communication between a public network and a local network A Bragagnini, D Buffa, P Pellegrino, L Scevola, D Shohat, Z Sadan, ... US Patent 8,274,979, 2012 | 45 | 2012 |
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation S Dolev, N Gilboa, X Li Proceedings of the 3rd International Workshop on Security in Cloud Computing …, 2015 | 40* | 2015 |
Efficient pseudorandom correlation generators from ring-LPN E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl Annual International Cryptology Conference, 387-416, 2020 | 36 | 2020 |
Secure computation with preprocessing via function secret sharing E Boyle, N Gilboa, Y Ishai Theory of Cryptography Conference, 341-371, 2019 | 32 | 2019 |
Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs E Boyle, N Gilboa, Y Ishai, A Nof Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 31 | 2019 |