Yehuda Lindell
Orcid: 0000-0002-8176-690XAffiliations:
- Bar-Ilan University, Ramat Gan, Israel
According to our database1,
Yehuda Lindell
authored at least 143 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
IACR Commun. Cryptol., 2024
IACR Commun. Cryptol., 2024
IACR Commun. Cryptol., 2024
2023
J. Cryptol., July, 2023
2021
2020
1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds.
J. Cryptol., 2020
2019
SimpleENC and SimpleENCsmall - an Authenticated Encryption Mode for the Lightweight Setting.
IACR Cryptol. ePrint Arch., 2019
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Electron. Colloquium Comput. Complex., 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
Proceedings of the Tutorials on the Foundations of Cryptography., 2017
2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-programmable Random Oracle.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
CRC Press, ISBN: 9781466570269, 2014
2013
Proceedings of the Secure Multi-Party Computation, 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
SIAM J. Comput., 2011
IACR Cryptol. ePrint Arch., 2011
Electron. Colloquium Comput. Complex., 2011
Electron. Colloquium Comput. Complex., 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
1/<i>p</i>-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
Information Security and Cryptography, Springer, ISBN: 978-3-642-14302-1, 2010
IACR Cryptol. ePrint Arch., 2010
A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
2009
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009
J. Priv. Confidentiality, 2009
IACR Cryptol. ePrint Arch., 2009
Chic. J. Theor. Comput. Sci., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Topics in Cryptology, 2009
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1.
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
Proceedings of the Advances in Cryptology, 2007
Chapman and Hall/CRC Press, ISBN: 978-1-58488-551-1, 2007
2006
ACM Trans. Inf. Syst. Secur., 2006
A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions.
J. Cryptol., 2006
Chic. J. Theor. Comput. Sci., 2006
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.
Proceedings of the Advances in Cryptology, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Electron. Colloquium Comput. Complex., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
Brief announcement: impossibility results for concurrent secure two-party computation.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
Proceedings of the 44th Symposium on Foundations of Computer Science, 2003
Proceedings of the 44th Symposium on Foundations of Computer Science, 2003
A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions.
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions.
Proceedings of the Advances in Cryptology, 2003
Lecture Notes in Computer Science 2815, Springer, ISBN: 3-540-20105-X, 2003
2002
Proceedings of the Distributed Computing, 16th International Conference, 2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002
2001
Proceedings of the 42nd Annual Symposium on Foundations of Computer Science, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
1999
Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999
1998
Proceedings of the Principles of Data Mining and Knowledge Discovery, 1998
Proceedings of the Principles of Data Mining and Knowledge Discovery, 1998