Follow
Avishay Yanai
Avishay Yanai
VMware Research
Verified email at biu.ac.il - Homepage
Title
Cited by
Cited by
Year
SpOT-light: lightweight private set intersection from sparse OT extension
B Pinkas, M Rosulek, N Trieu, A Yanai
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
2232019
Efficient circuit-based PSI with linear communication
B Pinkas, T Schneider, O Tkachenko, A Yanai
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
2032019
PSI from PaXoS: fast, malicious private set intersection
B Pinkas, M Rosulek, N Trieu, A Yanai
Annual International Conference on the Theory and Applications of …, 2020
1982020
Efficient constant-round multi-party computation combining BMR and SPDZ
Y Lindell, B Pinkas, NP Smart, A Yanai
Journal of Cryptology 32, 1026-1069, 2019
1592019
Oblivious key-value stores and amplification for private set intersection
G Garimella, B Pinkas, M Rosulek, N Trieu, A Yanai
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
1062021
Senate: a {Maliciously-Secure}{MPC} platform for collaborative analytics
R Poddar, S Kalra, A Yanai, R Deng, RA Popa, JM Hellerstein
30th USENIX Security Symposium (USENIX Security 21), 2129-2146, 2021
802021
Blinder--Scalable, Robust Anonymous Committed Broadcast
I Abraham, B Pinkas, A Yanai
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
742020
Simple, fast malicious multiparty private set intersection
O Nevo, N Trieu, A Yanai
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
622021
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020
492020
Efficient maliciously secure multiparty computation for RAM
M Keller, A Yanai
Annual International Conference on the Theory and Applications of …, 2018
442018
Utt: Decentralized ecash with accountable privacy
A Tomescu, A Bhat, B Applebaum, I Abraham, G Gueta, B Pinkas, A Yanai
Cryptology ePrint Archive, 2022
312022
Committed MPC: Maliciously secure multiparty computation from homomorphic commitments
TK Frederiksen, B Pinkas, A Yanai
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
252018
Constant-round maliciously secure two-party computation in the RAM model
C Hazay, A Yanai
Journal of Cryptology 32 (4), 1144-1199, 2019
202019
Multiparty Private Set Intersection Cardinality and Its Applications.
N Trieu, A Yanai, J Gao
IACR Cryptol. ePrint Arch. 2022, 735, 2022
16*2022
A privacy preserving collusion secure DCOP algorithm
T Tassa, T Grinshpoun, A Yanai
arXiv preprint arXiv:1905.09013, 2019
162019
PC-SyncBB: A privacy preserving collusion secure DCOP algorithm
T Tassa, T Grinshpoun, A Yanai
Artificial Intelligence 297, 103501, 2021
152021
Fear not, vote truthfully: Secure Multiparty Computation of score based rules
L Dery, T Tassa, A Yanai
Expert Systems with Applications 168, 114434, 2021
122021
Scionfl: Efficient and robust secure quantized aggregation
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 490-511, 2024
92024
Efficient perfectly secure computation with optimal resilience
I Abraham, G Asharov, A Yanai
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
92021
Scionfl: Secure quantized aggregation for federated learning
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
CoRR, vol. abs/2210.07376, 2022
82022
The system can't perform the operation now. Try again later.
Articles 1–20