Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Benny Pinkas
Search web for home page
Program Committees
1
2011
Crypto
pc
2
2010
PKC
pc
3
2009
Crypto
pc
4
2009
PKC
pc
5
2006
PKC
pc
6
2005
Eurocrypt
pc
7
2003
Crypto
pc
Publications
year
title
booktitle
pages
1
2011
Secure Computation on the Web: Computing without Simultaneous Interaction
crypto
128
2
2011
The IPS Compiler: Optimizations, Variants and Concrete Efficiency
crypto
255
3
2011
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
tcc
329
4
2010
Oblivious RAM Revisited
crypto
502-519
5
2010
Secure Computation of the Median (and Other Elements of Specified Ranks)
jofc
373-401
6
2010
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
eprint
online
7
2010
Oblivious RAM Revisited
eprint
online
8
2009
Secure Two-Party Computation Is Practical
asiacrypt
250-267
9
2009
A Proof of Security of Yao's Protocol for Two-Party Computation
jofc
161-188
10
2008
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
eprint
online
11
2008
Secure Multiparty Computation for Privacy-Preserving Data Mining
eprint
online
12
2007
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
eurocrypt
52-78
13
2007
Cryptanalysis of the Random Number Generator of the Windows Operating System
eprint
online
14
2006
Analysis of the Linux Random Number Generator
eprint
online
15
2005
Keyword Search and Oblivious Pseudorandom Functions
tcc
online
16
2005
Computationally Secure Oblivious Transfer
jofc
1-35
17
2004
A Proof of Yao's Protocol for Secure Two-Party Computation
eprint
online
18
2004
Secure Computation of the k th-Ranked Element
eurocrypt
online
19
2004
Efficient Private Matching and Set Intersection
eurocrypt
online
20
2003
Fair Secure Two-Party Computation
eurocrypt
online
21
2002
Privacy Preserving Data Mining
jofc
177-206
22
2000
Privacy Preserving Data Mining
crypto
36-54
23
2000
Distributed Oblivious Transfer
asiacrypt
205-219
24
1999
Distributed Pseudo-random Functions and KDCs
eurocrypt
327-346
25
1999
Oblivious Transfer with Adaptive Queries
crypto
573-590
26
1998
Secure and Efficient Metering
eurocrypt
576-590
27
1998
Threshold Traitor Tracing
crypto
502-517
28
1997
Visual Authentication and Identification
eprint
online
29
1997
Visual Authentication and Identification
crypto
322-336
30
1990
On the Impossibility of Private Key Cryptography with Weakly Random Keys
crypto
421-435
Coauthors of Benny Pinkas
Gagan Aggarwal
Leo Dorrendorf
Michael J. Freedman
Zvi Gutterman
Shai Halevi
Yuval Ishai
Yehuda Lindell
James L. McInnes
Nina Mishra
Moni Naor
Kobbi Nissim
Eli Oxman
Omer Reingold
Tzachy Reinman
Thomas Schneider
Nigel P. Smart
Stephen C. Williams