Avishay Yanai

Orcid: 0000-0003-4060-0150

According to our database1, Avishay Yanai authored at least 32 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Multiple Millionaires' Problem: New Algorithmic Approaches and Protocols.
Proc. Priv. Enhancing Technol., 2024

The Multiple Millionaires' Problem.
IACR Cryptol. ePrint Arch., 2024

2PC-MPC: Emulating Two Party ECDSA in Large-Scale MPC.
IACR Cryptol. ePrint Arch., 2024

ScionFL: Efficient and Robust Secure Quantized Aggregation.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024

High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Tiresias: Large Scale, UC-Secure Threshold Paillier.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Tiresias: Large Scale, Maliciously Secure Threshold Paillier.
IACR Cryptol. ePrint Arch., 2023

A New Approach to Garbled Circuits.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Multiparty Private Set Intersection Cardinality and Its Applications.
IACR Cryptol. ePrint Arch., 2022

UTT: Decentralized Ecash with Accountable Privacy.
IACR Cryptol. ePrint Arch., 2022

ScionFL: Secure Quantized Aggregation for Federated Learning.
CoRR, 2022

2021
A New Framework for Garbled Circuits.
IACR Cryptol. ePrint Arch., 2021

Fear not, vote truthfully: Secure Multiparty Computation of score based rules.
Expert Syst. Appl., 2021

PC-SyncBB: A privacy preserving collusion secure DCOP algorithm.
Artif. Intell., 2021

Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics.
Proceedings of the 30th USENIX Security Symposium, 2021

Efficient Perfectly Secure Computation with Optimal Resilience.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Oblivious Key-Value Stores and Amplification for Private Set Intersection.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Simple, Fast Malicious Multiparty Private Set Intersection.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

DEMO: A Secure Voting System for Score Based Elections.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast.
IACR Cryptol. ePrint Arch., 2020

PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

PSI from PaXoS: Fast, Malicious Private Set Intersection.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Blinder - Scalable, Robust Anonymous Committed Broadcast.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A Privacy Preserving Collusion Secure DCOP Algorithm.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Efficient Circuit-Based PSI with Linear Communication.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Fast Garbling of Circuits over 3-Valued Logic.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Efficient Maliciously Secure Multiparty Computation for RAM.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2016
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

2015
Efficient Constant Round Multi-party Computation Combining BMR and SPDZ.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015


  Loading...