Carmit Hazay
Orcid: 0000-0002-8951-5099Affiliations:
- Bar-Ilan University, Ramat-Gan, Israel
According to our database1,
Carmit Hazay
authored at least 104 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Brief Announcement: Towards Optimal Communication Byzantine Reliable Broadcast Under a Message Adversary.
Proceedings of the 38th International Symposium on Distributed Computing, 2024
Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the 28th International Conference on Principles of Distributed Systems, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Towards Optimal Communication Byzantine Reliable Broadcast under a Message Adversary.
CoRR, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and More.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022
2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions?
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
J. Cryptol., 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
CoRR, 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
2013
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013
Proceedings of the Advances in Cryptology, 2013
2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
2010
Information Security and Cryptography, Springer, ISBN: 978-3-642-14302-1, 2010
IACR Cryptol. ePrint Arch., 2010
A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009
2008
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
2005
Proceedings of the Combinatorial Pattern Matching, 16th Annual Symposium, 2005
2004