What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shai Halevi
Google Scholar
105
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Achievable CCA2 Relaxation for Homomorphic Encryption.
Adi Akavia
Craig Gentry
Shai Halevi
Margarita Vald
2025
conf/sp
Gold OPRF: Post-Quantum Oblivious Power-Residue PRF.
Yibin Yang
Fabrice Benhamouda
Shai Halevi
Hugo Krawczyk
Tal Rabin
2024
conf/eurocrypt
SPRINT: High-Throughput Robust Distributed Schnorr Signatures.
Fabrice Benhamouda
Shai Halevi
Hugo Krawczyk
Yiping Ma
Tal Rabin
2023
conf/crypto
Additive Randomized Encodings and Their Applications.
Shai Halevi
Yuval Ishai
Eyal Kushilevitz
Tal Rabin
2023
conf/tcc
Security with Functional Re-encryption from CPA.
Yevgeniy Dodis
Shai Halevi
Daniel Wichs
2022
conf/ccs
OpenFHE: Open-Source Fully Homomorphic Encryption Library.
Ahmad Al Badawi
Jack Bates
Flávio Bergamaschi
David Bruce Cousins
Saroja Erabelli
Nicholas Genise
Shai Halevi
Hamish Hunt
Andrey Kim
Yongwoo Lee
Zeyu Liu
Daniele Micciancio
Ian Quah
Yuriy Polyakov
R. V. Saraswathy
Kurt Rohloff
Jonathan Saylor
Dmitriy Suponitsky
Matthew Triplett
Vinod Vaikuntanathan
Vincent Zucca
2022
conf/ccs
Threshold Cryptography as a Service (in the Multiserver and YOSO Models).
Fabrice Benhamouda
Shai Halevi
Hugo Krawczyk
Alex Miao
Tal Rabin
2022
conf/eurocrypt
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.
Craig Gentry
Shai Halevi
Vadim Lyubashevsky
2022
conf/tcc
Random-Index Oblivious RAM.
Shai Halevi
Eyal Kushilevitz
2022
conf/tcc
Achievable CCA2 Relaxation for Homomorphic Encryption.
Adi Akavia
Craig Gentry
Shai Halevi
Margarita Vald
2021
journals/joc
Round-Optimal Secure Multi-party Computation.
Shai Halevi
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
2021
journals/joc
Bootstrapping for HElib.
Shai Halevi
Victor Shoup
2021
conf/crypto
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles.
Craig Gentry
Shai Halevi
Hugo Krawczyk
Bernardo Magri
Jesper Buus Nielsen
Tal Rabin
Sophia Yakoubov
2021
conf/tcc
Random-Index PIR and Applications.
Craig Gentry
Shai Halevi
Bernardo Magri
Jesper Buus Nielsen
Sophia Yakoubov
2021
conf/tcc
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
Fabrice Benhamouda
Elette Boyle
Niv Gilboa
Shai Halevi
Yuval Ishai
Ariel Nof
2020
conf/tcc
Can a Public Blockchain Keep a Secret?
Fabrice Benhamouda
Craig Gentry
Sergey Gorbunov
Shai Halevi
Hugo Krawczyk
Chengyu Lin
Tal Rabin
Leonid Reyzin
2019
journals/popets
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free.
Adi Akavia
Craig Gentry
Shai Halevi
Max Leibovich
2019
conf/acns
Homomorphic Training of 30, 000 Logistic Regression Models.
Flávio Bergamaschi
Shai Halevi
Tzipora T. Halevi
Hamish Hunt
2019
conf/ctrsa
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme.
Shai Halevi
Yuriy Polyakov
Victor Shoup
2019
conf/asiacrypt
Homomorphic Encryption for Finite Automata.
Nicholas Genise
Craig Gentry
Shai Halevi
Baiyu Li
Daniele Micciancio
2019
conf/tcc
On Fully Secure MPC with Solitary Output.
Shai Halevi
Yuval Ishai
Eyal Kushilevitz
Nikolaos Makriyannis
Tal Rabin
2019
conf/tcc
Compressible FHE with Applications to PIR.
Craig Gentry
Shai Halevi
2018
journals/popets
Privacy-Preserving Search of Similar Patients in Genomic Data.
Gilad Asharov
Shai Halevi
Yehuda Lindell
Tal Rabin
2018
conf/ccs
Doing Real Work with FHE: The Case of Logistic Regression.
Jack L. H. Crawford
Craig Gentry
Shai Halevi
Daniel Platt
Victor Shoup
2018
conf/ccs
Advanced Cryptography: Promise and Challenges.
Shai Halevi
2018
conf/crypto
Faster Homomorphic Linear Transformations in HElib.
Shai Halevi
Victor Shoup
2018
conf/crypto
Round-Optimal Secure Multi-Party Computation.
Shai Halevi
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
2018
conf/tcc
Best Possible Information-Theoretic MPC.
Shai Halevi
Yuval Ishai
Eyal Kushilevitz
Tal Rabin
2017
conf/ccs
Implementing BP-Obfuscation Using Graph-Induced Encoding.
Shai Halevi
Tzipora Halevi
Victor Shoup
Noah Stephens-Davidowitz
2017
conf/eurocrypt
Cryptanalyses of Candidate Branching Program Obfuscators.
Yilei Chen
Craig Gentry
Shai Halevi
2017
conf/asiacrypt
Non-Interactive Multiparty Computation Without Correlated Randomness.
Shai Halevi
Yuval Ishai
Abhishek Jain
Ilan Komargodski
Amit Sahai
Eylon Yogev
2017
conf/tcc
Four Round Secure Computation Without Setup.
Zvika Brakerski
Shai Halevi
Antigoni Polychroniadou
2016
conf/crypto
Spooky Encryption and Its Applications.
Yevgeniy Dodis
Shai Halevi
Ron D. Rothblum
Daniel Wichs
2016
conf/tcc
Functional Encryption Without Obfuscation.
Sanjam Garg
Craig Gentry
Shai Halevi
Mark Zhandry
2015
conf/crypto
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Jean-Sébastien Coron
Craig Gentry
Shai Halevi
Tancrède Lepoint
Hemanta K. Maji
Eric Miles
Mariana Raykova
Amit Sahai
Mehdi Tibouchi
2015
conf/acns
Private Database Access with HE-over-ORAM Architecture.
Craig Gentry
Shai Halevi
Charanjit S. Jutla
Mariana Raykova
2015
conf/eurocrypt
Bootstrapping for HElib.
Shai Halevi
Victor Shoup
2015
conf/tcc
Graph-Induced Multilinear Maps from Lattices.
Craig Gentry
Sergey Gorbunov
Shai Halevi
2014
conf/crypto
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input.
Sanjam Garg
Craig Gentry
Shai Halevi
Daniel Wichs
2014
conf/crypto
Algorithms in HElib.
Shai Halevi
Victor Shoup
2014
conf/eurocrypt
Garbled RAM Revisited.
Craig Gentry
Shai Halevi
Steve Lu
Rafail Ostrovsky
Mariana Raykova
Daniel Wichs
2014
conf/eurocrypt
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
Dan Boneh
Craig Gentry
Sergey Gorbunov
Shai Halevi
Valeria Nikolaenko
Gil Segev
Vinod Vaikuntanathan
Dhinakaran Vinayagamurthy
2014
conf/tcc
Two-Round Secure MPC from Indistinguishability Obfuscation.
Sanjam Garg
Craig Gentry
Shai Halevi
Mariana Raykova
2013
conf/crypto
Attribute-Based Encryption for Circuits from Multilinear Maps.
Sanjam Garg
Craig Gentry
Shai Halevi
Amit Sahai
Brent Waters
2013
conf/acns
Private Database Queries Using Somewhat Homomorphic Encryption.
Dan Boneh
Craig Gentry
Shai Halevi
Frank Wang
David J. Wu
2013
conf/pkc
Packed Ciphertexts in LWE-Based Homomorphic Encryption.
Zvika Brakerski
Craig Gentry
Shai Halevi
2013
conf/eurocrypt
Candidate Multilinear Maps from Ideal Lattices.
Sanjam Garg
Craig Gentry
Shai Halevi
2013
conf/asiacrypt
Discrete Gaussian Leftover Hash Lemma over Infinite Domains.
Shweta Agrawal
Craig Gentry
Shai Halevi
Amit Sahai
2012
journals/joc
Smooth Projective Hashing and Two-Message Oblivious Transfer.
Shai Halevi
Yael Tauman Kalai
2012
conf/crypto
Homomorphic Evaluation of the AES Circuit.
Craig Gentry
Shai Halevi
Nigel P. Smart
2012
conf/pkc
Better Bootstrapping in Fully Homomorphic Encryption.
Craig Gentry
Shai Halevi
Nigel P. Smart
2012
conf/eurocrypt
Fully Homomorphic Encryption with Polylog Overhead.
Craig Gentry
Shai Halevi
Nigel P. Smart
2012
conf/tcc
Leakage-Tolerant Interactive Protocols.
Nir Bitansky
Ran Canetti
Shai Halevi
2011
conf/ccs
Proofs of ownership in remote storage systems.
Shai Halevi
Danny Harnik
Benny Pinkas
Alexandra Shulman-Peleg
2011
conf/crypto
Secure Computation on the Web: Computing without Simultaneous Interaction.
Shai Halevi
Yehuda Lindell
Benny Pinkas
2011
conf/acns
Composable Security Analysis of OS Services.
Ran Canetti
Suresh Chari
Shai Halevi
Birgit Pfitzmann
Arnab Roy
Michael Steiner
Wietse Z. Venema
2011
conf/pkc
One-Pass HMQV and Asymmetric Key-Wrapping.
Shai Halevi
Hugo Krawczyk
2011
conf/eurocrypt
Implementing Gentry's Fully-Homomorphic Encryption Scheme.
Craig Gentry
Shai Halevi
2011
conf/asiacrypt
Program Obfuscation with Leaky Hardware.
Nir Bitansky
Ran Canetti
Shafi Goldwasser
Shai Halevi
Yael Tauman Kalai
Guy N. Rothblum
2011
conf/tcc
After-the-Fact Leakage in Public-Key Encryption.
Shai Halevi
Huijia Lin
2010
conf/crypto
-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.
Craig Gentry
Shai Halevi
Vinod Vaikuntanathan
2010
conf/ndss
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation.
Suresh Chari
Shai Halevi
Wietse Z. Venema
2010
conf/eurocrypt
Fully Homomorphic Encryption over the Integers.
Marten van Dijk
Craig Gentry
Shai Halevi
Vinod Vaikuntanathan
2010
conf/eurocrypt
A Simple BGN-Type Cryptosystem from LWE.
Craig Gentry
Shai Halevi
Vinod Vaikuntanathan
2009
conf/ccs
Attacking cryptographic schemes based on "perturbation polynomials".
Martin R. Albrecht
Craig Gentry
Shai Halevi
Jonathan Katz
2009
conf/sacrypt
More on Key Wrapping.
Rosario Gennaro
Shai Halevi
2009
conf/tcc
Hierarchical Identity Based Encryption with Polynomially Many Levels.
Craig Gentry
Shai Halevi
2008
journals/joc
Cryptanalysis of ISO/IEC 9796-1.
Don Coppersmith
Jean-Sébastien Coron
François Grieu
Shai Halevi
Charanjit S. Jutla
David Naccache
Julien P. Stern
2008
conf/crypto
Circular-Secure Encryption from Decision Diffie-Hellman.
Dan Boneh
Shai Halevi
Michael Hamburg
Rafail Ostrovsky
2008
conf/esorics
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
Rosario Gennaro
Shai Halevi
Hugo Krawczyk
Tal Rabin
Steffen Reidt
Stephen D. Wolthusen
2008
conf/eurocrypt
Threshold RSA for Dynamic and Ad-Hoc Groups.
Rosario Gennaro
Shai Halevi
Hugo Krawczyk
Tal Rabin
2008
conf/tcc
Degradation and Amplification of Computational Hardness.
Shai Halevi
Tal Rabin
2008
conf/tcc
On Seed-Incompressible Functions.
Shai Halevi
Steven A. Myers
Charles Rackoff
2007
journals/joc
A Forward-Secure Public-Key Encryption Scheme.
Ran Canetti
Shai Halevi
Jonathan Katz
2007
conf/ccs
Security under key-dependent inputs.
Shai Halevi
Hugo Krawczyk
2007
conf/crypto
Invertible Universal Hashing and the TET Encryption Mode.
Shai Halevi
2006
conf/crypto
Mitigating Dictionary Attacks on Password-Protected Local Storage.
Ran Canetti
Shai Halevi
Michael Steiner
2006
conf/crypto
Strengthening Digital Signatures Via Randomized Hashing.
Shai Halevi
Hugo Krawczyk
2006
conf/ctrsa
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.
Dan Boneh
Xavier Boyen
Shai Halevi
2005
conf/ccs
A model and architecture for pseudo-random generation with applications to /dev/random.
Boaz Barak
Shai Halevi
2005
conf/eurocrypt
Universally Composable Password-Based Key Exchange.
Ran Canetti
Shai Halevi
Jonathan Katz
Yehuda Lindell
Philip D. MacKenzie
2005
conf/tcc
Adaptively-Secure, Non-interactive Public-Key Encryption.
Ran Canetti
Shai Halevi
Jonathan Katz
2005
conf/tcc
Hardness Amplification of Weakly Verifiable Puzzles.
Ran Canetti
Shai Halevi
Michael Steiner
2004
conf/ctrsa
A Parallelizable Enciphering Mode.
Shai Halevi
Phillip Rogaway
2004
conf/eurocrypt
Chosen-Ciphertext Security from Identity-Based Encryption.
Ran Canetti
Shai Halevi
Jonathan Katz
2004
conf/tcc
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes.
Ran Canetti
Oded Goldreich
Shai Halevi
2003
conf/crypto
A Tweakable Enciphering Mode.
Shai Halevi
Phillip Rogaway
2003
conf/eurocrypt
A Forward-Secure Public-Key Encryption Scheme.
Ran Canetti
Shai Halevi
Jonathan Katz
2002
conf/fse
Scream: A Software-Efficient Stream Cipher.
Shai Halevi
Don Coppersmith
Charanjit S. Jutla
2002
conf/crypto
Cryptanalysis of Stream Ciphers with Linear Masking.
Don Coppersmith
Shai Halevi
Charanjit S. Jutla
2001
conf/asiacrypt
The Modular Inversion Hidden Number Problem.
Dan Boneh
Shai Halevi
Nick Howgrave-Graham
2000
journals/joc
Maintaining Authenticated Communication in the Presence of Break-Ins.
Ran Canetti
Shai Halevi
Amir Herzberg
2000
conf/crypto
A Cryptographic Solution to a Game Theoretic Problem.
Yevgeniy Dodis
Shai Halevi
Tal Rabin
2000
conf/eurocrypt
Computing Inverses over a Shared Secret Modulus.
Dario Catalano
Rosario Gennaro
Shai Halevi
2000
conf/eurocrypt
Exposure-Resilient Functions and All-or-Nothing Transforms.
Ran Canetti
Yevgeniy Dodis
Shai Halevi
Eyal Kushilevitz
Amit Sahai
1999
journals/joc
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver.
Shai Halevi
1999
conf/crypto
UMAC: Fast and Secure Message Authentication.
John Black
Shai Halevi
Hugo Krawczyk
Ted Krovetz
Phillip Rogaway
1999
conf/eurocrypt
Secure Hash-and-Sign Signatures Without the Random Oracle.
Rosario Gennaro
Shai Halevi
Tal Rabin
1998
conf/ccs
Public-Key Cryptography and Password Protocols.
Shai Halevi
Hugo Krawczyk
1998
conf/crypto
Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems.
Mihir Bellare
Shai Halevi
Amit Sahai
Salil P. Vadhan
1997
conf/fse
MMH: Software Message Authentication in the Gbit/Second Rates.
Shai Halevi
Hugo Krawczyk
1997
conf/crypto
Public-Key Cryptosystems from Lattice Reduction Problems.
Oded Goldreich
Shafi Goldwasser
Shai Halevi
1997
conf/crypto
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem.
Oded Goldreich
Shafi Goldwasser
Shai Halevi
1996
conf/crypto
Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing.
Shai Halevi
Silvio Micali
1995
conf/crypto
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver.
Shai Halevi
Coauthors
Abhishek Jain
(1)
Adi Akavia
(3)
Ahmad Al Badawi
(1)
Alex Miao
(1)
Alexandra Shulman-Peleg
(1)
Amir Herzberg
(1)
Amit Sahai
(6)
Andrey Kim
(1)
Antigoni Polychroniadou
(3)
Ariel Nof
(1)
Arnab Roy
(1)
Baiyu Li
(1)
Benny Pinkas
(2)
Bernardo Magri
(2)
Birgit Pfitzmann
(1)
Boaz Barak
(1)
Brent Waters
(1)
Carmit Hazay
(2)
Charanjit S. Jutla
(4)
Charles Rackoff
(1)
Chengyu Lin
(1)
Craig Gentry
(33)
Dan Boneh
(5)
Daniel Platt
(1)
Daniel Wichs
(4)
Daniele Micciancio
(2)
Danny Harnik
(1)
Dario Catalano
(1)
David Bruce Cousins
(1)
David J. Wu
(1)
David Naccache
(1)
Dhinakaran Vinayagamurthy
(1)
Dmitriy Suponitsky
(1)
Don Coppersmith
(3)
Elette Boyle
(1)
Eric Miles
(1)
Eyal Kushilevitz
(5)
Eylon Yogev
(1)
Fabrice Benhamouda
(5)
Flávio Bergamaschi
(2)
François Grieu
(1)
Frank Wang
(1)
Gil Segev
(1)
Gilad Asharov
(1)
Guy N. Rothblum
(1)
Hamish Hunt
(2)
Hemanta K. Maji
(1)
Hugo Krawczyk
(13)
Huijia Lin
(1)
Ian Quah
(1)
Ilan Komargodski
(1)
Jack Bates
(1)
Jack L. H. Crawford
(1)
Jean-Sébastien Coron
(2)
Jesper Buus Nielsen
(2)
John Black
(1)
Jonathan Katz
(6)
Jonathan Saylor
(1)
Julien P. Stern
(1)
Kurt Rohloff
(1)
Leonid Reyzin
(1)
Margarita Vald
(2)
Mariana Raykova
(4)
Mark Zhandry
(1)
Marten van Dijk
(1)
Martin R. Albrecht
(1)
Matthew Triplett
(1)
Max Leibovich
(1)
Mehdi Tibouchi
(1)
Michael Hamburg
(1)
Michael Steiner
(3)
Mihir Bellare
(1)
Muthuramakrishnan Venkitasubramaniam
(2)
Nicholas Genise
(2)
Nick Howgrave-Graham
(1)
Nigel P. Smart
(3)
Nikolaos Makriyannis
(1)
Nir Bitansky
(2)
Niv Gilboa
(1)
Noah Stephens-Davidowitz
(1)
Oded Goldreich
(3)
Philip D. MacKenzie
(1)
Phillip Rogaway
(3)
R. V. Saraswathy
(1)
Rafail Ostrovsky
(2)
Ran Canetti
(13)
Ron D. Rothblum
(1)
Rosario Gennaro
(5)
Salil P. Vadhan
(1)
Sanjam Garg
(5)
Saroja Erabelli
(1)
Sergey Gorbunov
(3)
Shafi Goldwasser
(3)
Shai Halevi
(105)
Shweta Agrawal
(1)
Silvio Micali
(1)
Sophia Yakoubov
(2)
Steffen Reidt
(1)
Stephen D. Wolthusen
(1)
Steve Lu
(1)
Steven A. Myers
(1)
Suresh Chari
(2)
Tal Rabin
(14)
Tancrède Lepoint
(1)
Ted Krovetz
(1)
Tzipora Halevi
(1)
Tzipora T. Halevi
(1)
Vadim Lyubashevsky
(1)
Valeria Nikolaenko
(1)
Victor Shoup
(7)
Vincent Zucca
(1)
Vinod Vaikuntanathan
(5)
Wietse Z. Venema
(2)
Xavier Boyen
(1)
Yael Tauman Kalai
(2)
Yehuda Lindell
(3)
Yevgeniy Dodis
(4)
Yibin Yang
(1)
Yilei Chen
(1)
Yiping Ma
(1)
Yongwoo Lee
(1)
Yuriy Polyakov
(2)
Yuval Ishai
(5)
Zeyu Liu
(1)
Zvika Brakerski
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to