Niv Gilboa

Orcid: 0000-0001-7209-3494

According to our database1, Niv Gilboa authored at least 66 papers between 1997 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Characterization and Detection of Cross-Router Covert Channels.
Comput. Secur., April, 2023

Information-Theoretic Distributed Point Functions.
IACR Cryptol. ePrint Arch., 2023

Oblivious Transfer with Constant Computational Overhead.
IACR Cryptol. ePrint Arch., 2023

Arithmetic Sketching.
IACR Cryptol. ePrint Arch., 2023

2022
Sublinear GMW-Style Compiler for MPC with Preprocessing.
IACR Cryptol. ePrint Arch., 2022

Programmable Distributed Point Functions.
IACR Cryptol. ePrint Arch., 2022

Locality-Preserving Hashing for Shifts with Connections to Cryptography.
IACR Cryptol. ePrint Arch., 2022

Efficient Pseudorandom Correlation Generators from Ring-LPN.
IACR Cryptol. ePrint Arch., 2022

Correlated Pseudorandomness from Expand-Accumulate Codes.
IACR Cryptol. ePrint Arch., 2022

Secure Multiparty Computation with Sublinear Preprocessing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Lightweight Techniques for Private Heavy Hitters.
IACR Cryptol. ePrint Arch., 2021

Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
IACR Cryptol. ePrint Arch., 2021

Low-Complexity Weak Pseudorandom Functions in $\mathtt {AC}0[\mathtt {MOD}2]$.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2020

Correlated Pseudorandom Functions from Variable-Density LPN.
IACR Cryptol. ePrint Arch., 2020

Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.
IACR Cryptol. ePrint Arch., 2020

2019
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation.
Theor. Comput. Sci., 2019

Perennial secure multi-party computation of universal Turing machine.
Theor. Comput. Sci., 2019

Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2019

Secure Computation with Preprocessing via Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2019

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More.
IACR Cryptol. ePrint Arch., 2019

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.
IACR Cryptol. ePrint Arch., 2019

Compressing Vector OLE.
IACR Cryptol. ePrint Arch., 2019

How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.
IACR Cryptol. ePrint Arch., 2019

Cross-Router Covert Channels.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Spectre without shared memory.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Function Secret Sharing: Improvements and Extensions.
IACR Cryptol. ePrint Arch., 2018

Homomorphic Secret Sharing: Optimizations and Applications.
IACR Cryptol. ePrint Arch., 2018

2017
Functional encryption for cascade automata.
Inf. Comput., 2017

Foundations of Homomorphic Secret Sharing.
IACR Cryptol. ePrint Arch., 2017

Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation.
IACR Cryptol. ePrint Arch., 2017

Broadcast Encryption with Both Temporary and Permanent Revocation.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

MIKELANGELO: MIcro KErneL virtualizAtioN for hiGh pErfOrmance cLOud and HPC Systems.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2017

2016
Breaking the Circuit Size Barrier for Secure Computation Under DDH.
IACR Cryptol. ePrint Arch., 2016

2015
Rendezvous tunnel for anonymous publishing.
Peer-to-Peer Netw. Appl., 2015

Functional Encryption for Cascade Automata (Extended Abstract).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2015

Function Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

SSSDB: Database with Private Information Search.
Proceedings of the Algorithmic Aspects of Cloud Computing - First International Workshop, 2015

2014
Information security for sensors by overwhelming random sequences and permutations.
Ad Hoc Networks, 2014

Distributed Point Functions and Their Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Towards Efficient Private Distributed Computation on Unbounded Input Streams.
IACR Cryptol. ePrint Arch., 2013

Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Efficient Private Distributed Computation on Unbounded Input Streams
CoRR, 2012

Brief Announcement: Efficient Private Distributed Computation on Unbounded Input Streams.
Proceedings of the Distributed Computing - 26th International Symposium, 2012

Brief Announcement: Arbitrators in the Security Infrastructure.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Permanent Revocation in Attribute Based Broadcast Encryption.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Innovative approaches for security of small artefacts.
Comput. Sci. Rev., 2011

Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Secret Sharing Krohn-Rhodes: Private and Perennial Distributed Computation.
Proceedings of the Innovations in Computer Science, 2011

Poster: attribute based broadcast encryption with permanent revocation.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: arbitrators in the security infrastructure, supporting positive anonymity.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Distributed flow detection over multi-path sessions.
Comput. Commun., 2010

Computing multi-party trust privately: in <i>O</i>(<i>n</i>) time units sending one (possibly large) message at a time.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Brief announcement: swarming secrets.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Schemes for Privately Computing Trust and Reputation.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Rendezvous tunnel for anonymous publishing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Swarming secrets.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
Deniability - an alibi for users in P2P networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Anonymity Scheme for Interactive P2P Services.
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

2001
Topics in private information retrieval.
PhD thesis, 2001

1999
Compressing Cryptographic Resources.
Proceedings of the Advances in Cryptology, 1999

Two Party RSA Key Generation.
Proceedings of the Advances in Cryptology, 1999

1998
Private Information Retrieval by Keywords.
IACR Cryptol. ePrint Arch., 1998

1997
Computationally Private Information Retrieval (Extended Abstract).
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997


  Loading...