Niv Gilboa
Orcid: 0000-0001-7209-3494
According to our database1,
Niv Gilboa
authored at least 72 papers
between 1997 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Comput. Secur., April, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022
2021
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation.
Theor. Comput. Sci., 2019
Theor. Comput. Sci., 2019
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 9th Innovations in Theoretical Computer Science Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
Proceedings of the Algorithmic Aspects of Cloud Computing - First International Workshop, 2015
2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Brief Announcement: Efficient Private Distributed Computation on Unbounded Input Streams.
Proceedings of the Distributed Computing - 26th International Symposium, 2012
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
2011
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011
Proceedings of the Innovations in Computer Science, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Computing multi-party trust privately: in <i>O</i>(<i>n</i>) time units sending one (possibly large) message at a time.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the 47th Annual Allerton Conference on Communication, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008
2001
1999
1998
1997
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997