What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yehuda Lindell
Google Scholar
ORCID:
0000-0002-8176-690X
100
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Exponent-VRFs and Their Applications.
Dan Boneh
Iftach Haitner
Yehuda Lindell
Gil Segev
2024
journals/cic
Feldman's Verifiable Secret Sharing for a Dishonest Majority.
Yi-Hsiu Chen
Yehuda Lindell
2024
journals/cic
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability.
Yehuda Lindell
2024
journals/cic
Optimizing and Implementing Fischlin's Transform for UC-Secure Zero Knowledge.
Yi-Hsiu Chen
Yehuda Lindell
2023
journals/joc
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.
Koji Chida
Koki Hamada
Dai Ikarashi
Ryo Kikuchi
Daniel Genkin
Yehuda Lindell
Ariel Nof
2023
journals/joc
High-Throughput Secure Three-Party Computation with an Honest Majority.
Jun Furukawa
Yehuda Lindell
Ariel Nof
Or Weinstein
2021
journals/joc
Fast Secure Two-Party ECDSA Signing.
Yehuda Lindell
2020
journals/joc
1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds.
Amos Beimel
Yehuda Lindell
Eran Omri
Ilan Orlov
2019
journals/joc
Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ.
Yehuda Lindell
Benny Pinkas
Nigel P. Smart
Avishay Yanai
2019
conf/ccs
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest.
Jun Furukawa
Yehuda Lindell
2019
conf/acisp
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme.
Michael Kraitsberg
Yehuda Lindell
Valery Osheter
Nigel P. Smart
Younes Talibi Alaoui
2018
journals/popets
Privacy-Preserving Search of Similar Patients in Genomic Data.
Gilad Asharov
Shai Halevi
Yehuda Lindell
Tal Rabin
2018
journals/joc
Fast Garbling of Circuits Under Standard Assumptions.
Shay Gueron
Yehuda Lindell
Ariel Nof
Benny Pinkas
2018
journals/joc
Completeness for Symmetric Two-Party Functionalities: Revisited.
Yehuda Lindell
Eran Omri
Hila Zarosim
2018
journals/joc
On the Feasibility of Extending Oblivious Transfer.
Yehuda Lindell
Hila Zarosim
2018
conf/ccs
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants.
Assi Barak
Martin Hirt
Lior Koskas
Yehuda Lindell
2018
conf/ccs
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody.
Yehuda Lindell
Ariel Nof
2018
conf/ccs
Generalizing the SPDZ Compiler For Other Protocols.
Toshinori Araki
Assi Barak
Jun Furukawa
Marcel Keller
Yehuda Lindell
Kazuma Ohara
Hikaru Tsuchida
2018
conf/crypto
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.
Koji Chida
Daniel Genkin
Koki Hamada
Dai Ikarashi
Ryo Kikuchi
Yehuda Lindell
Ariel Nof
2018
conf/crypto
Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries.
Tore Kasper Frederiksen
Yehuda Lindell
Valery Osheter
Benny Pinkas
2018
conf/pkc
Fast Garbling of Circuits over 3-Valued Logic.
Yehuda Lindell
Avishay Yanai
2017
journals/joc
Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation.
Ran Cohen
Yehuda Lindell
2017
journals/joc
More Efficient Oblivious Transfer Extensions.
Gilad Asharov
Yehuda Lindell
Thomas Schneider
Michael Zohner
2017
journals/joc
A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation.
Gilad Asharov
Yehuda Lindell
2017
conf/ccs
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation.
Shay Gueron
Yehuda Lindell
2017
conf/ccs
A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority.
Yehuda Lindell
Ariel Nof
2017
conf/crypto
Fast Secure Two-Party ECDSA Signing.
Yehuda Lindell
2017
conf/sp
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier.
Toshinori Araki
Assi Barak
Jun Furukawa
Tamar Lichter
Yehuda Lindell
Ariel Nof
Kazuma Ohara
Adi Watzman
Or Weinstein
2017
conf/eurocrypt
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority.
Jun Furukawa
Yehuda Lindell
Ariel Nof
Or Weinstein
2017
conf/asiacrypt
Efficient Scalable Constant-Round MPC via Garbled Circuits.
Aner Ben-Efraim
Yehuda Lindell
Eran Omri
2017
conf/tcc
Secure Two-Party Computation with Fairness - A Necessary Design Principle.
Yehuda Lindell
Tal Rabin
2016
journals/joc
Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries.
Yehuda Lindell
2016
conf/ccs
Attribute-based Key Exchange with General Policies.
Vladimir Kolesnikov
Hugo Krawczyk
Yehuda Lindell
Alex J. Malozemoff
Tal Rabin
2016
conf/ccs
DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation.
Toshinori Araki
Assaf Barak
Jun Furukawa
Yehuda Lindell
Ariel Nof
Kazuma Ohara
2016
conf/ccs
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority.
Toshinori Araki
Jun Furukawa
Yehuda Lindell
Ariel Nof
Kazuma Ohara
2016
conf/ccs
Optimizing Semi-Honest Secure Multiparty Computation for the Internet.
Aner Ben-Efraim
Yehuda Lindell
Eran Omri
2016
conf/tcc
More Efficient Constant-Round Multi-party Computation from BMR and SHE.
Yehuda Lindell
Nigel P. Smart
Eduardo Soria-Vazquez
2015
journals/joc
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
Yehuda Lindell
Benny Pinkas
2015
conf/ccs
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte.
Shay Gueron
Yehuda Lindell
2015
conf/ccs
Fast Garbling of Circuits Under Standard Assumptions.
Shay Gueron
Yehuda Lindell
Ariel Nof
Benny Pinkas
2015
conf/ccs
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries.
Yehuda Lindell
Ben Riva
2015
conf/crypto
Efficient Constant Round Multi-party Computation Combining BMR and SPDZ.
Yehuda Lindell
Benny Pinkas
Nigel P. Smart
Avishay Yanai
2015
conf/crypto
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.
Ran Canetti
Asaf Cohen
Yehuda Lindell
2015
conf/eurocrypt
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
Gilad Asharov
Yehuda Lindell
Thomas Schneider
Michael Zohner
2015
conf/tcc
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-programmable Random Oracle.
Yehuda Lindell
2014
conf/crypto
Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings.
Yehuda Lindell
Ben Riva
2014
conf/asiacrypt
Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation.
Ran Cohen
Yehuda Lindell
2013
journals/joc
A Note on Constant-Round Zero-Knowledge Proofs of Knowledge.
Yehuda Lindell
2013
conf/ccs
More efficient oblivious transfer and extensions for faster secure computation.
Gilad Asharov
Yehuda Lindell
Thomas Schneider
Michael Zohner
2013
conf/crypto
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries.
Yehuda Lindell
2013
conf/pkc
Techniques for Efficient Secure Computation Based on Yao's Protocol.
Yehuda Lindell
2013
conf/asiacrypt
Hiding the Input-Size in Secure Two-Party Computation.
Yehuda Lindell
Kobbi Nissim
Claudio Orlandi
2013
conf/asiacrypt
Fair and Efficient Secure Multiparty Computation with Reputation Systems.
Gilad Asharov
Yehuda Lindell
Hila Zarosim
2013
conf/tcc
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness.
Gilad Asharov
Yehuda Lindell
Tal Rabin
2013
conf/tcc
On the Feasibility of Extending Oblivious Transfer.
Yehuda Lindell
Hila Zarosim
2012
journals/joc
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer.
Yehuda Lindell
Benny Pinkas
2012
conf/asiacrypt
Completeness for Symmetric Two-Party Functionalities - Revisited.
Yehuda Lindell
Eran Omri
Hila Zarosim
2011
journals/joc
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer.
Yehuda Lindell
Hila Zarosim
2011
journals/joc
Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs.
Dafna Kidron
Yehuda Lindell
2011
journals/joc
Secure Computation Without Authentication.
Boaz Barak
Ran Canetti
Yehuda Lindell
Rafael Pass
Tal Rabin
2011
journals/joc
Utility Dependence in Correct and Fair Rational Secret Sharing.
Gilad Asharov
Yehuda Lindell
2011
conf/crypto
-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds.
Amos Beimel
Yehuda Lindell
Eran Omri
Ilan Orlov
2011
conf/crypto
Secure Computation on the Web: Computing without Simultaneous Interaction.
Shai Halevi
Yehuda Lindell
Benny Pinkas
2011
conf/crypto
The IPS Compiler: Optimizations, Variants and Concrete Efficiency.
Yehuda Lindell
Eli Oxman
Benny Pinkas
2011
conf/crypto
/3.
Gilad Asharov
Yehuda Lindell
Tal Rabin
2011
conf/eurocrypt
Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption.
Yehuda Lindell
2011
conf/tcc
On the Black-Box Complexity of Optimally-Fair Coin Tossing.
Dana Dachman-Soled
Yehuda Lindell
Mohammad Mahmoody
Tal Malkin
2011
conf/tcc
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer.
Yehuda Lindell
Benny Pinkas
2010
journals/joc
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.
Yonatan Aumann
Yehuda Lindell
2010
journals/joc
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
Carmit Hazay
Yehuda Lindell
2009
journals/joc
General Composition and Universal Composability in Secure Multiparty Computation.
Yehuda Lindell
2009
journals/joc
A Proof of Security of Yao's Protocol for Two-Party Computation.
Yehuda Lindell
Benny Pinkas
2009
conf/crypto
Collusion-Free Multiparty Computation in the Mediated Model.
Joël Alwen
Jonathan Katz
Yehuda Lindell
Giuseppe Persiano
Abhi Shelat
Ivan Visconti
2009
conf/crypto
Utility Dependence in Correct and Fair Rational Secret Sharing.
Gilad Asharov
Yehuda Lindell
2009
conf/tcc
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer.
Yehuda Lindell
Hila Zarosim
2008
journals/joc
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs.
Jonathan Katz
Yehuda Lindell
2008
journals/joc
Lower Bounds and Impossibility Results for Concurrent Self Composition.
Yehuda Lindell
2008
conf/ccs
Constructions of truly practical secure protocols using standard smartcards.
Carmit Hazay
Yehuda Lindell
2008
conf/tcc
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
Carmit Hazay
Yehuda Lindell
2007
journals/joc
Concurrent Composition of Secure Protocols in the Timing Model.
Yael Tauman Kalai
Yehuda Lindell
Manoj Prabhakaran
2007
conf/eurocrypt
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
Yehuda Lindell
Benny Pinkas
2007
conf/tcc
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.
Yonatan Aumann
Yehuda Lindell
2007
conf/tcc
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions.
Carmit Hazay
Jonathan Katz
Chiu-Yuen Koo
Yehuda Lindell
2006
journals/joc
Session-Key Generation Using Human Passwords Only.
Oded Goldreich
Yehuda Lindell
2006
journals/joc
A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions.
Yehuda Lindell
2006
journals/joc
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions.
Ran Canetti
Eyal Kushilevitz
Yehuda Lindell
2006
conf/crypto
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.
Yuval Ishai
Eyal Kushilevitz
Yehuda Lindell
Erez Petrank
2005
journals/joc
Secure Multi-Party Computation without Agreement.
Shafi Goldwasser
Yehuda Lindell
2005
conf/crypto
Secure Computation Without Authentication.
Boaz Barak
Ran Canetti
Yehuda Lindell
Rafael Pass
Tal Rabin
2005
conf/eurocrypt
Universally Composable Password-Based Key Exchange.
Ran Canetti
Shai Halevi
Jonathan Katz
Yehuda Lindell
Philip D. MacKenzie
2005
conf/tcc
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs.
Jonathan Katz
Yehuda Lindell
2004
conf/tcc
Lower Bounds for Concurrent Self Composition.
Yehuda Lindell
2003
journals/joc
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation.
Yehuda Lindell
2003
conf/eurocrypt
A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions.
Yehuda Lindell
2003
conf/eurocrypt
A Framework for Password-Based Authenticated Key Exchange.
Rosario Gennaro
Yehuda Lindell
2003
conf/eurocrypt
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions.
Ran Canetti
Eyal Kushilevitz
Yehuda Lindell
2002
journals/joc
Privacy Preserving Data Mining.
Yehuda Lindell
Benny Pinkas
2001
conf/crypto
Session-Key Generation Using Human Passwords Only.
Oded Goldreich
Yehuda Lindell
2001
conf/crypto
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation.
Yehuda Lindell
2000
conf/crypto
Privacy Preserving Data Mining.
Yehuda Lindell
Benny Pinkas
Coauthors
Abhi Shelat
(1)
Adi Watzman
(1)
Alex J. Malozemoff
(1)
Amos Beimel
(2)
Aner Ben-Efraim
(2)
Ariel Nof
(11)
Asaf Cohen
(1)
Assaf Barak
(1)
Assi Barak
(3)
Avishay Yanai
(3)
Ben Riva
(2)
Benny Pinkas
(14)
Boaz Barak
(2)
Carmit Hazay
(4)
Chiu-Yuen Koo
(1)
Claudio Orlandi
(1)
Dafna Kidron
(1)
Dai Ikarashi
(2)
Dan Boneh
(1)
Dana Dachman-Soled
(1)
Daniel Genkin
(2)
Eduardo Soria-Vazquez
(1)
Eli Oxman
(1)
Eran Omri
(6)
Erez Petrank
(1)
Eyal Kushilevitz
(3)
Gil Segev
(1)
Gilad Asharov
(10)
Giuseppe Persiano
(1)
Hikaru Tsuchida
(1)
Hila Zarosim
(7)
Hugo Krawczyk
(1)
Iftach Haitner
(1)
Ilan Orlov
(2)
Ivan Visconti
(1)
Joël Alwen
(1)
Jonathan Katz
(5)
Jun Furukawa
(7)
Kazuma Ohara
(4)
Kobbi Nissim
(1)
Koji Chida
(2)
Koki Hamada
(2)
Lior Koskas
(1)
Manoj Prabhakaran
(1)
Marcel Keller
(1)
Martin Hirt
(1)
Michael Kraitsberg
(1)
Michael Zohner
(3)
Mohammad Mahmoody
(1)
Nigel P. Smart
(4)
Oded Goldreich
(2)
Or Weinstein
(3)
Philip D. MacKenzie
(1)
Rafael Pass
(2)
Ran Canetti
(6)
Ran Cohen
(2)
Rosario Gennaro
(1)
Ryo Kikuchi
(2)
Shafi Goldwasser
(1)
Shai Halevi
(3)
Shay Gueron
(4)
Tal Malkin
(1)
Tal Rabin
(7)
Tamar Lichter
(1)
Thomas Schneider
(3)
Tore Kasper Frederiksen
(1)
Toshinori Araki
(4)
Valery Osheter
(2)
Vladimir Kolesnikov
(1)
Yael Tauman Kalai
(1)
Yehuda Lindell
(100)
Yi-Hsiu Chen
(2)
Yonatan Aumann
(2)
Younes Talibi Alaoui
(1)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to