Benny Pinkas
Orcid: 0000-0002-9053-3024
According to our database1,
Benny Pinkas
authored at least 119 papers
between 1990 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IEEE Trans. Inf. Forensics Secur., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications.
Proceedings of the 31st USENIX Security Symposium, 2022
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
ACM Trans. Priv. Secur., 2018
Adversarial Examples on Discrete Sequences for Beating Whole-Binary Malware Detection.
CoRR, 2018
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
2013
Secure computation of functionalities based on Hamming distance and its application to computing document similarity.
Int. J. Appl. Cryptogr., 2013
Canon-MPC, a system for casual non-interactive secure multi-party computation using native client.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Peer-to-Peer Netw. Appl., 2010
J. Cryptol., 2010
IEEE Secur. Priv., 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
J. Priv. Confidentiality, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Proceedings P2P'08, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles.
Proceedings of the Fun with Algorithms, 4th International Conference, 2007
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
Proceedings of the Advances in Cryptology, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
2004
Electron. Colloquium Comput. Complex., 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, 2001
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001
2000
1999
Comput. Networks, 1999
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999
Proceedings of the First ACM Conference on Electronic Commerce (EC-99), 1999
Proceedings of the Proceedings IEEE INFOCOM '99, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
Proceedings of the Advances in Cryptology, 1997
1990
Proceedings of the Advances in Cryptology, 1990