Benny Applebaum
Orcid: 0000-0003-4792-369X
According to our database1,
Benny Applebaum
authored at least 86 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Approximation, 2025
2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the 2024 ACM-SIAM Symposium on Discrete Algorithms, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024
2023
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
Advisor-Verifier-Prover Games and the Hardness of Information Theoretic Cryptography.
Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, 2023
Actively Secure Arithmetic Computation and VOLE with Constant Computational Overhead.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority.
IACR Cryptol. ePrint Arch., 2022
Round-Optimal Honest-Majority MPC in Minicrypt and with Everlasting Security - (Extended Abstract).
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022
Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Electron. Colloquium Comput. Complex., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
On the Power of Amortization in Secret Sharing: <i>d</i>-Uniform Secret Sharing and CDS with Constant Information Rate.
ACM Trans. Comput. Theory, 2020
IACR Cryptol. ePrint Arch., 2020
The Resiliency of MPC with Low Interaction: The Benefit of Making Errors (Extended Abstract).
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020
2019
Sampling Graphs without Forbidden Subgraphs and Almost-Explicit Unbalanced Expanders.
Electron. Colloquium Comput. Complex., 2019
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019
Sampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible Error.
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
2018
Theory Comput., 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
On the Power of Amortization in Secret Sharing: d-Uniform Secret Sharing and CDS with Constant Information Rate.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
Conditional Disclosure of Secrets and d-Uniform Secret Sharing with Constant Information Rate.
Electron. Colloquium Comput. Complex., 2017
Electron. Colloquium Comput. Complex., 2017
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Tutorials on the Foundations of Cryptography., 2017
2016
Parallel Process. Lett., 2016
Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterministic Reductions.
Comput. Complex., 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016
On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys.
SIAM J. Comput., 2015
Electron. Colloquium Comput. Complex., 2015
Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterminsitic Reductions.
Electron. Colloquium Comput. Complex., 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterministic Reductions (Extended Abstract).
Proceedings of the 30th Conference on Computational Complexity, 2015
2014
Information Security and Cryptography, Springer, ISBN: 978-3-642-17367-7, 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Advances in Cryptology, 2013
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Pseudorandom generators with long stretch and low locality from random local one-way functions.
Proceedings of the 44th Symposium on Theory of Computing Conference, 2012
2011
Proceedings of the Innovations in Computer Science, 2011
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
2010
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Innovations in Computer Science, 2010
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010
2009
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems.
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008
2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the Approximation, 2006
2005
Proceedings of the 20th Annual IEEE Conference on Computational Complexity (CCC 2005), 2005
2004
Proceedings of the 45th Symposium on Foundations of Computer Science, 2004