Shai Halevi
Shai Halevi
Research Fellow, Algorand Foundation
alum.mit.edu üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
The random oracle methodology, revisited
R Canetti, O Goldreich, S Halevi
Journal of the ACM (JACM) 51 (4), 557-594, 2004
19792004
Fully homomorphic encryption over the integers
M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan
Annual International Conference on the Theory and Applications of …, 2010
18702010
Candidate indistinguishability obfuscation and functional encryption for all circuits
S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters
SIAM Journal on Computing 45 (3), 882-929, 2016
11122016
Implementing gentry’s fully-homomorphic encryption scheme
C Gentry, S Halevi
Annual international conference on the theory and applications of …, 2011
10392011
Chosen-ciphertext security from identity-based encryption
R Canetti, S Halevi, J Katz
International Conference on the Theory and Applications of Cryptographic …, 2004
9512004
A forward-secure public-key encryption scheme
R Canetti, S Halevi, J Katz
International Conference on the Theory and Applications of Cryptographic …, 2003
8692003
Candidate multilinear maps from ideal lattices
S Garg, C Gentry, S Halevi
Annual International Conference on the Theory and Applications of …, 2013
7352013
Public-key cryptosystems from lattice reduction problems
O Goldreich, S Goldwasser, S Halevi
Annual International Cryptology Conference, 112-131, 1997
7051997
Homomorphic evaluation of the AES circuit
C Gentry, S Halevi, NP Smart
Annual Cryptology Conference, 850-867, 2012
6992012
Proofs of ownership in remote storage systems
S Halevi, D Harnik, B Pinkas, A Shulman-Peleg
Proceedings of the 18th ACM conference on Computer and communications …, 2011
6592011
UMAC: Fast and secure message authentication
J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway
Annual International Cryptology Conference, 216-233, 1999
5551999
Public-key cryptography and password protocols
S Halevi, H Krawczyk
ACM Transactions on Information and System Security (TISSEC) 2 (3), 230-268, 1999
5351999
Fully homomorphic encryption with polylog overhead
C Gentry, S Halevi, NP Smart
Annual International Conference on the Theory and Applications of …, 2012
4952012
Algorithms in HElib
S Halevi, V Shoup
International Cryptology Conference, 554-571, 2014
4092014
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
4041999
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
I Damgård, M Fitzi, E Kiltz, JB Nielsen, T Toft
Theory of Cryptography Conference, 285-304, 2006
3982006
Chosen-ciphertext security from identity-based encryption
D Boneh, R Canetti, S Halevi, J Katz
SIAM Journal on Computing 36 (5), 1301-1328, 2007
3502007
A tweakable enciphering mode
S Halevi, P Rogaway
Annual International Cryptology Conference, 482-499, 2003
3002003
Circular-secure encryption from decision diffie-hellman
D Boneh, S Halevi, M Hamburg, R Ostrovsky
Annual International Cryptology Conference, 108-125, 2008
2862008
Attribute-based encryption for circuits from multilinear maps
S Garg, C Gentry, S Halevi, A Sahai, B Waters
Annual Cryptology Conference, 479-499, 2013
2822013
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20