SpOT-light: lightweight private set intersection from sparse OT extension B Pinkas, M Rosulek, N Trieu, A Yanai Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 223 | 2019 |
Efficient circuit-based PSI with linear communication B Pinkas, T Schneider, O Tkachenko, A Yanai Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 203 | 2019 |
PSI from PaXoS: fast, malicious private set intersection B Pinkas, M Rosulek, N Trieu, A Yanai Annual International Conference on the Theory and Applications of …, 2020 | 198 | 2020 |
Efficient constant-round multi-party computation combining BMR and SPDZ Y Lindell, B Pinkas, NP Smart, A Yanai Journal of Cryptology 32, 1026-1069, 2019 | 159 | 2019 |
Oblivious key-value stores and amplification for private set intersection G Garimella, B Pinkas, M Rosulek, N Trieu, A Yanai Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 106 | 2021 |
Senate: a {Maliciously-Secure}{MPC} platform for collaborative analytics R Poddar, S Kalra, A Yanai, R Deng, RA Popa, JM Hellerstein 30th USENIX Security Symposium (USENIX Security 21), 2129-2146, 2021 | 80 | 2021 |
Blinder--Scalable, Robust Anonymous Committed Broadcast I Abraham, B Pinkas, A Yanai Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 74 | 2020 |
Simple, fast malicious multiparty private set intersection O Nevo, N Trieu, A Yanai Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 62 | 2021 |
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020 | 49 | 2020 |
Efficient maliciously secure multiparty computation for RAM M Keller, A Yanai Annual International Conference on the Theory and Applications of …, 2018 | 44 | 2018 |
Utt: Decentralized ecash with accountable privacy A Tomescu, A Bhat, B Applebaum, I Abraham, G Gueta, B Pinkas, A Yanai Cryptology ePrint Archive, 2022 | 31 | 2022 |
Committed MPC: Maliciously secure multiparty computation from homomorphic commitments TK Frederiksen, B Pinkas, A Yanai Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 25 | 2018 |
Constant-round maliciously secure two-party computation in the RAM model C Hazay, A Yanai Journal of Cryptology 32 (4), 1144-1199, 2019 | 20 | 2019 |
Multiparty Private Set Intersection Cardinality and Its Applications. N Trieu, A Yanai, J Gao IACR Cryptol. ePrint Arch. 2022, 735, 2022 | 16* | 2022 |
A privacy preserving collusion secure DCOP algorithm T Tassa, T Grinshpoun, A Yanai arXiv preprint arXiv:1905.09013, 2019 | 16 | 2019 |
PC-SyncBB: A privacy preserving collusion secure DCOP algorithm T Tassa, T Grinshpoun, A Yanai Artificial Intelligence 297, 103501, 2021 | 15 | 2021 |
Fear not, vote truthfully: Secure Multiparty Computation of score based rules L Dery, T Tassa, A Yanai Expert Systems with Applications 168, 114434, 2021 | 12 | 2021 |
Scionfl: Efficient and robust secure quantized aggregation Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ... 2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 490-511, 2024 | 9 | 2024 |
Efficient perfectly secure computation with optimal resilience I Abraham, G Asharov, A Yanai Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021 | 9 | 2021 |
Scionfl: Secure quantized aggregation for federated learning Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ... CoRR, vol. abs/2210.07376, 2022 | 8 | 2022 |