% csauthors.net - beta - BibTeX bibliography of Yehuda Lindell
@inproceedings{conf/pkdd/FeldmanFKLLRSZ98,
title = {Text Mining at the Term Level.},
year = {1998},
booktitle = {PKDD},
author = {{Ronen Feldman} and {Moshe Fresko} and {Yakkov Kinar} and {Yehuda Lindell} and {Orly Liphstat} and {Martin Rajman} and {Yonatan Schler} and {Oren Zamir}},
publisher = {Springer},
booktitle = {Principles of Data Mining and Knowledge Discovery, Second European Symposium, PKDD '98, Nantes, France, September 23-26, 1998, Proceedings}
}
@inproceedings{conf/pkdd/LandauFAFLLZ98,
title = {TextVis: An Integrated Visual Environment for Text Mining.},
year = {1998},
booktitle = {PKDD},
author = {{David Landau} and {Ronen Feldman} and {Yonatan Aumann} and {Moshe Fresko} and {Yehuda Lindell} and {Orly Liphstat} and {Oren Zamir}},
publisher = {Springer},
booktitle = {Principles of Data Mining and Knowledge Discovery, Second European Symposium, PKDD '98, Nantes, France, September 23-26, 1998, Proceedings}
}
@article{journals/iacr/BarakGGL01,
title = {Resettably-Sound Zero-Knowledge and its Applications.},
year = {2001},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Boaz Barak} and {Oded Goldreich 001} and {Shafi Goldwasser} and {Yehuda Lindell}}
}
@inproceedings{conf/podc/LindellLR02,
title = {Sequential composition of protocols without simultaneous termination.},
year = {2002},
booktitle = {PODC},
author = {{Yehuda Lindell} and {Anna Lysyanskaya} and {Tal Rabin}},
publisher = {ACM},
booktitle = {Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, PODC 2002, Monterey, California, USA, July 21-24, 2002}
}
@article{journals/eccc/ECCC-TR02-026,
title = {Strict Polynomial-time in Simulation and Extraction},
year = {2002},
journal = {Electron. Colloquium Comput. Complex.},
author = {{Boaz Barak} and {Yehuda Lindell}}
}
@article{journals/iacr/CanettiLOS02,
title = {Universally Composable Two-Party and Multi-Party Secure Computation.},
year = {2002},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ran Canetti} and {Yehuda Lindell} and {Rafail Ostrovsky} and {Amit Sahai}}
}
@article{journals/iacr/GoldwasserL02,
title = {Secure Computation Without Agreement.},
year = {2002},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Shafi Goldwasser} and {Yehuda Lindell}}
}
@article{journals/iacr/Lindell02,
title = {A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions.},
year = {2002},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell}}
}
@article{journals/joc/LindellP02,
title = {Privacy Preserving Data Mining.},
year = {2002},
journal = {J. Cryptol.},
author = {{Yehuda Lindell} and {Benny Pinkas}}
}
@book{books/sp/Lindell03,
title = {Composition of Secure Multi-Party Protocols, A Comprehensive Study},
year = {2003},
isbn = {3-540-20105-X},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
author = {{Yehuda Lindell}}
}
@inproceedings{conf/focs/Lindell03,
title = {General Composition and Universal Composability in Secure Multi-Party Computation.},
year = {2003},
booktitle = {FOCS},
author = {{Yehuda Lindell}},
publisher = {IEEE Computer Society},
booktitle = {44th Symposium on Foundations of Computer Science (FOCS 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings}
}
@inproceedings{conf/podc/Lindell03,
title = {Brief announcement: impossibility results for concurrent secure two-party computation.},
year = {2003},
booktitle = {PODC},
author = {{Yehuda Lindell}},
publisher = {ACM},
booktitle = {Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, PODC 2003, Boston, Massachusetts, USA, July 13-16, 2003}
}
@inproceedings{conf/stoc/Lindell03,
title = {Bounded-concurrent secure two-party computation without setup assumptions.},
year = {2003},
booktitle = {STOC},
author = {{Yehuda Lindell}},
publisher = {ACM},
booktitle = {Proceedings of the 35th Annual ACM Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, USA}
}
@article{journals/iacr/GennaroL03,
title = {A Framework for Password-Based Authenticated Key Exchange.},
year = {2003},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Rosario Gennaro} and {Yehuda Lindell}}
}
@article{journals/iacr/Lindell03,
title = {Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model.},
year = {2003},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell}}
}
@article{journals/jiis/AumannL03,
title = {A Statistical Theory for Quantitative Association Rules.},
year = {2003},
journal = {J. Intell. Inf. Syst.},
author = {{Yonatan Aumann} and {Yehuda Lindell}}
}
@article{journals/joc/Lindell03,
title = {Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation.},
year = {2003},
journal = {J. Cryptol.},
author = {{Yehuda Lindell}}
}
@inproceedings{conf/tcc/Lindell04,
title = {Lower Bounds for Concurrent Self Composition.},
year = {2004},
booktitle = {TCC},
author = {{Yehuda Lindell}},
publisher = {Springer},
booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}
}
@article{journals/eccc/ECCC-TR04-063,
title = {A Proof of Yao's Protocol for Secure Two-Party Computation},
year = {2004},
journal = {Electron. Colloquium Comput. Complex.},
author = {{Yehuda Lindell} and {Benny Pinkas}}
}
@article{journals/iacr/BarakLR04,
title = {Protocol Initialization for the Framework of Universal Composability.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Boaz Barak} and {Yehuda Lindell} and {Tal Rabin}}
}
@inproceedings{conf/stoc/KalaiLP05,
title = {Concurrent general composition of secure protocols in the timing model.},
year = {2005},
booktitle = {STOC},
author = {{Yael Tauman Kalai} and {Yehuda Lindell} and {Manoj Prabhakaran}},
publisher = {ACM},
booktitle = {Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005}
}
@article{journals/iacr/CanettiHKLM05,
title = {Universally Composable Password-Based Key Exchange.},
year = {2005},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ran Canetti} and {Shai Halevi} and {Jonathan Katz} and {Yehuda Lindell} and {Philip D. MacKenzie}}
}
@article{journals/joc/GoldwasserL05,
title = {Secure Multi-Party Computation without Agreement.},
year = {2005},
journal = {J. Cryptol.},
author = {{Shafi Goldwasser} and {Yehuda Lindell}}
}
@inproceedings{conf/crypto/IshaiKLP06,
title = {On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.},
year = {2006},
booktitle = {CRYPTO},
author = {{Yuval Ishai} and {Eyal Kushilevitz} and {Yehuda Lindell} and {Erez Petrank}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}
}
@inproceedings{conf/stoc/IshaiKLP06,
title = {Black-box constructions for secure computation.},
year = {2006},
booktitle = {STOC},
author = {{Yuval Ishai} and {Eyal Kushilevitz} and {Yehuda Lindell} and {Erez Petrank}},
publisher = {ACM},
booktitle = {Proceedings of the 38th Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006}
}
@article{journals/cjtcs/Lindell06,
title = {Protocols for Bounded-Concurrent Secure Two-Party Computation.},
year = {2006},
journal = {Chic. J. Theor. Comput. Sci.},
author = {{Yehuda Lindell}}
}
@article{journals/jacm/LindellLR06,
title = {On the composition of authenticated Byzantine Agreement.},
year = {2006},
journal = {J. ACM},
author = {{Yehuda Lindell} and {Anna Lysyanskaya} and {Tal Rabin}}
}
@article{journals/jcss/BarakLV06,
title = {Lower bounds for non-black-box zero knowledge.},
year = {2006},
journal = {J. Comput. Syst. Sci.},
author = {{Boaz Barak} and {Yehuda Lindell} and {Salil P. Vadhan}}
}
@article{journals/joc/CanettiKL06,
title = {On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions.},
year = {2006},
journal = {J. Cryptol.},
author = {{Ran Canetti} and {Eyal Kushilevitz} and {Yehuda Lindell}}
}
@article{journals/joc/GoldreichL06,
title = {Session-Key Generation Using Human Passwords Only.},
year = {2006},
journal = {J. Cryptol.},
author = {{Oded Goldreich 001} and {Yehuda Lindell}}
}
@article{journals/joc/Lindell06,
title = {A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions.},
year = {2006},
journal = {J. Cryptol.},
author = {{Yehuda Lindell}}
}
@article{journals/tissec/GennaroL06,
title = {A framework for password-based authenticated key exchange1.},
year = {2006},
journal = {ACM Trans. Inf. Syst. Secur.},
author = {{Rosario Gennaro} and {Yehuda Lindell}}
}
@book{books/crc/KatzLindell2007,
title = {Introduction to Modern Cryptography},
year = {2007},
isbn = {978-1-58488-551-1},
publisher = {Chapman and Hall/CRC Press},
author = {{Jonathan Katz} and {Yehuda Lindell}}
}
@inproceedings{conf/tcc/HazayKKL07,
title = {Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions.},
year = {2007},
booktitle = {TCC},
author = {{Carmit Hazay} and {Jonathan Katz} and {Chiu-Yuen Koo} and {Yehuda Lindell}},
publisher = {Springer},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}
}
@article{journals/joc/KalaiLP07,
title = {Concurrent Composition of Secure Protocols in the Timing Model.},
year = {2007},
journal = {J. Cryptol.},
author = {{Yael Tauman Kalai} and {Yehuda Lindell} and {Manoj Prabhakaran}}
}
@inproceedings{conf/ctrsa/KatzL08,
title = {Aggregate Message Authentication Codes.},
year = {2008},
booktitle = {CT-RSA},
author = {{Jonathan Katz} and {Andrew Y. Lindell}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}
}
@inproceedings{conf/ctrsa/Lindell08a,
title = {Legally-Enforceable Fairness in Secure Two-Party Computation.},
year = {2008},
booktitle = {CT-RSA},
author = {{Andrew Y. Lindell}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}
}
@inproceedings{conf/scn/LindellPS08,
title = {Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries.},
year = {2008},
booktitle = {SCN},
author = {{Yehuda Lindell} and {Benny Pinkas} and {Nigel P. Smart}},
publisher = {Springer},
booktitle = {Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}
}
@article{journals/cjtcs/Lindell08,
title = {Efficient Fully-Simulatable Oblivious Transfer.},
year = {2008},
journal = {Chic. J. Theor. Comput. Sci.},
author = {{Yehuda Lindell}}
}
@article{journals/iacr/KatzL08,
title = {Collusion-Free Multiparty Computation in the Mediated Model.},
year = {2008},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jonathan Katz} and {Yehuda Lindell}}
}
@article{journals/joc/KatzL08,
title = {Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs.},
year = {2008},
journal = {J. Cryptol.},
author = {{Jonathan Katz} and {Yehuda Lindell}}
}
@article{journals/joc/Lindell08,
title = {Lower Bounds and Impossibility Results for Concurrent Self Composition.},
year = {2008},
journal = {J. Cryptol.},
author = {{Yehuda Lindell}}
}
@inproceedings{conf/crypto/AlwenKLPSV09,
title = {Collusion-Free Multiparty Computation in the Mediated Model.},
year = {2009},
booktitle = {CRYPTO},
author = {{Joël Alwen} and {Jonathan Katz} and {Yehuda Lindell} and {Giuseppe Persiano} and {Abhi Shelat} and {Ivan Visconti}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}
}
@inproceedings{conf/ctrsa/Lindell09b,
title = {Local Sequentiality Does Not Help for Concurrent Composition.},
year = {2009},
booktitle = {CT-RSA},
author = {{Andrew Y. Lindell}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}
}
@article{journals/cjtcs/Lindell09,
title = {Legally Enforceable Fairness in Secure Two-Party Communication.},
year = {2009},
journal = {Chic. J. Theor. Comput. Sci.},
author = {{Yehuda Lindell}}
}
@article{journals/iacr/HazayL09,
title = {Constructions of Truly Practical Secure Protocols using Standard Smartcards.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Carmit Hazay} and {Yehuda Lindell}}
}
@article{journals/iacr/HazayL09b,
title = {Efficient Oblivious Polynomial Evaluation with Simulation-Based Security.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Carmit Hazay} and {Yehuda Lindell}}
}
@article{journals/iacr/KushilevitzLR09,
title = {Information-Theoretically Secure Protocols and Security Under Composition.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Eyal Kushilevitz} and {Yehuda Lindell} and {Tal Rabin}}
}
@article{journals/iacr/Lindell09,
title = {Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell}}
}
@article{journals/iacr/Lindell09a,
title = {Adaptively Secure Two-Party Computation with Erasures.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell}}
}
@article{journals/joc/Lindell09,
title = {General Composition and Universal Composability in Secure Multiparty Computation.},
year = {2009},
journal = {J. Cryptol.},
author = {{Yehuda Lindell}}
}
@article{journals/joc/LindellP09,
title = {A Proof of Security of Yao's Protocol for Two-Party Computation.},
year = {2009},
journal = {J. Cryptol.},
author = {{Yehuda Lindell} and {Benny Pinkas}}
}
@article{journals/jpc/LindellP09,
title = {Secure Multiparty Computation for Privacy-Preserving Data Mining.},
year = {2009},
journal = {J. Priv. Confidentiality},
author = {{Yehuda Lindell} and {Benny Pinkas}}
}
@incollection{reference/dataware/Lindell09,
title = {Secure Computation for Privacy Preserving Data Mining.},
year = {2009},
booktitle = {Encyclopedia of Data Warehousing and Mining},
author = {{Yehuda Lindell}},
publisher = {IGI Global},
booktitle = {Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes)}
}
@inproceedings{conf/pet/LindellW10,
title = {Private Web Search with Malicious Adversaries.},
year = {2010},
booktitle = {Privacy Enhancing Technologies},
author = {{Yehuda Lindell} and {Erez Waisbard}},
publisher = {Springer},
booktitle = {Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings}
}
@article{journals/iacr/HaitnerIKLP10,
title = {Black-Box Constructions of Protocols for Secure Computation.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Iftach Haitner} and {Yuval Ishai} and {Eyal Kushilevitz} and {Yehuda Lindell} and {Erez Petrank}}
}
@article{journals/iacr/HazayL10,
title = {A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Carmit Hazay} and {Yehuda Lindell}}
}
@article{journals/iacr/HazayL10a,
title = {A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Carmit Hazay} and {Yehuda Lindell}}
}
@article{journals/iacr/IshaiKKLP10,
title = {On Achieving the "Best of Both Worlds" in Secure Multiparty Computation.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yuval Ishai} and {Jonathan Katz} and {Eyal Kushilevitz} and {Yehuda Lindell} and {Erez Petrank}}
}
@article{journals/joc/AumannL10,
title = {Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.},
year = {2010},
journal = {J. Cryptol.},
author = {{Yonatan Aumann} and {Yehuda Lindell}}
}
@article{journals/joc/HazayL10,
title = {Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.},
year = {2010},
journal = {J. Cryptol.},
author = {{Carmit Hazay} and {Yehuda Lindell}}
}
@book{series/isc/HazayL10,
title = {Efficient Secure Two-Party Protocols - Techniques and Constructions},
year = {2010},
isbn = {978-3-642-14302-1},
publisher = {Springer},
series = {Information Security and Cryptography},
author = {{Carmit Hazay} and {Yehuda Lindell}}
}
@inproceedings{conf/crypto/AsharovLR11,
title = {Perfectly-Secure Multiplication for Any t < n/3.},
year = {2011},
booktitle = {CRYPTO},
author = {{Gilad Asharov} and {Yehuda Lindell} and {Tal Rabin}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}
}
@inproceedings{conf/crypto/BeimelLOO11,
title = {1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds.},
year = {2011},
booktitle = {CRYPTO},
author = {{Amos Beimel} and {Yehuda Lindell} and {Eran Omri} and {Ilan Orlov}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}
}
@inproceedings{conf/tcc/Dachman-SoledLMM11,
title = {On the Black-Box Complexity of Optimally-Fair Coin Tossing.},
year = {2011},
booktitle = {TCC},
author = {{Dana Dachman-Soled} and {Yehuda Lindell} and {Mohammad Mahmoody} and {Tal Malkin}},
publisher = {Springer},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}
}
@article{journals/eccc/Lindell11,
title = {Constant-Round Zero-Knowledge Proofs of Knowledge.},
year = {2011},
journal = {Electron. Colloquium Comput. Complex.},
author = {{Yehuda Lindell}}
}
@article{journals/iacr/HaleviLP11,
title = {Secure Computation on the Web: Computing without Simultaneous Interaction.},
year = {2011},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Shai Halevi} and {Yehuda Lindell} and {Benny Pinkas}}
}
@article{journals/iacr/Lindell11,
title = {Highly-Efficient Universally-Composable Commitments based on the DDH Assumption.},
year = {2011},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell}}
}
@article{journals/iacr/LindellO11,
title = {A Practical Application of Differential Privacy to Personalized Online Advertising.},
year = {2011},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell} and {Eran Omri}}
}
@article{journals/iacr/LindellPO11,
title = {The IPS Compiler: Optimizations, Variants and Concrete Efficiency.},
year = {2011},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell} and {Benny Pinkas} and {Eli Oxman}}
}
@article{journals/jacm/GordonHKL11,
title = {Complete Fairness in Secure Two-Party Computation.},
year = {2011},
journal = {J. ACM},
author = {{S. Dov Gordon} and {Carmit Hazay} and {Jonathan Katz} and {Yehuda Lindell}}
}
@article{journals/joc/AsharovL11,
title = {Utility Dependence in Correct and Fair Rational Secret Sharing.},
year = {2011},
journal = {J. Cryptol.},
author = {{Gilad Asharov} and {Yehuda Lindell}}
}
@article{journals/joc/BarakCLPR11,
title = {Secure Computation Without Authentication.},
year = {2011},
journal = {J. Cryptol.},
author = {{Boaz Barak} and {Ran Canetti} and {Yehuda Lindell} and {Rafael Pass} and {Tal Rabin}}
}
@article{journals/joc/KidronL11,
title = {Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs.},
year = {2011},
journal = {J. Cryptol.},
author = {{Dafna Kidron} and {Yehuda Lindell}}
}
@article{journals/joc/LindellZ11,
title = {Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer.},
year = {2011},
journal = {J. Cryptol.},
author = {{Yehuda Lindell} and {Hila Zarosim}}
}
@article{journals/jpc/Lindell11,
title = {Anonymous Authentication.},
year = {2011},
journal = {J. Priv. Confidentiality},
author = {{Yehuda Lindell}}
}
@article{journals/iacr/EjgenbergFLL12,
title = {SCAPI: The Secure Computation Application Programming Interface.},
year = {2012},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yael Ejgenberg} and {Moriya Farbstein} and {Meital Levy} and {Yehuda Lindell}}
}
@article{journals/iacr/LindellNO12,
title = {Hiding the Input-Size in Secure Two-Party Computation.},
year = {2012},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell} and {Kobbi Nissim} and {Claudio Orlandi}}
}
@article{journals/joc/LindellP12,
title = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer.},
year = {2012},
journal = {J. Cryptol.},
author = {{Yehuda Lindell} and {Benny Pinkas}}
}
@inproceedings{conf/pkc/Lindell13,
title = {Techniques for Efficient Secure Computation Based on Yao's Protocol.},
year = {2013},
booktitle = {Public Key Cryptography},
author = {{Yehuda Lindell}},
publisher = {Springer},
booktitle = {Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}
}
@article{journals/iacr/AsharovLR13,
title = {Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Gilad Asharov} and {Yehuda Lindell} and {Tal Rabin}}
}
@article{journals/iacr/AsharovLSZ13,
title = {More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Gilad Asharov} and {Yehuda Lindell} and {Thomas Schneider 003} and {Michael Zohner}}
}
@article{journals/iacr/AsharovLZ13,
title = {Fair and Efficient Secure Multiparty Computation with Reputation Systems.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Gilad Asharov} and {Yehuda Lindell} and {Hila Zarosim}}
}
@article{journals/joc/Lindell13,
title = {A Note on Constant-Round Zero-Knowledge Proofs of Knowledge.},
year = {2013},
journal = {J. Cryptol.},
author = {{Yehuda Lindell}}
}
@incollection{series/ciss/AsharovL13,
title = {The BGW Protocol for Perfectly-Secure Multiparty Computation.},
year = {2013},
booktitle = {Secure Multi-Party Computation},
author = {{Gilad Asharov} and {Yehuda Lindell}},
publisher = {IOS Press},
booktitle = {Secure Multi-Party Computation}
}
@book{books/crc/KatzLindell2014,
title = {Introduction to Modern Cryptography, Second Edition},
year = {2014},
isbn = {9781466570269},
publisher = {CRC Press},
author = {{Jonathan Katz} and {Yehuda Lindell}}
}
@inproceedings{conf/crypto/LindellR14,
title = {Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings.},
year = {2014},
booktitle = {CRYPTO (2)},
author = {{Yehuda Lindell} and {Ben Riva}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II}
}
@article{journals/iacr/CanettiCL14,
title = {A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.},
year = {2014},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ran Canetti} and {Asaf Cohen 002} and {Yehuda Lindell}}
}
@article{journals/iacr/Lindell14a,
title = {An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle.},
year = {2014},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell}}
}
@article{journals/iacr/LindellR14a,
title = {Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings.},
year = {2014},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell} and {Ben Riva}}
}
@article{journals/iacr/AsharovL0Z15,
title = {More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Gilad Asharov} and {Yehuda Lindell} and {Thomas Schneider 003} and {Michael Zohner}}
}
@article{journals/iacr/GueronL15,
title = {GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Shay Gueron} and {Yehuda Lindell}}
}
@article{journals/iacr/HazayLP15,
title = {Adaptively Secure Computation with Partial Erasures.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Carmit Hazay} and {Yehuda Lindell} and {Arpita Patra}}
}
@article{journals/iacr/LindellR15,
title = {Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell} and {Ben Riva}}
}
@article{journals/joc/LindellP15,
title = {An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.},
year = {2015},
journal = {J. Cryptol.},
author = {{Yehuda Lindell} and {Benny Pinkas}}
}
@inproceedings{conf/ccs/ArakiBFLNO16,
title = {DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation.},
year = {2016},
booktitle = {CCS},
author = {{Toshinori Araki} and {Assaf Barak} and {Jun Furukawa 001} and {Yehuda Lindell} and {Ariel Nof} and {Kazuma Ohara}},
publisher = {ACM},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}
}
@article{journals/iacr/ArakiFLNO16,
title = {High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority.},
year = {2016},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Toshinori Araki} and {Jun Furukawa 001} and {Yehuda Lindell} and {Ariel Nof} and {Kazuma Ohara}}
}
@article{journals/iacr/Ben-EfraimLO16,
title = {Optimizing Semi-Honest Secure Multiparty Computation for the Internet.},
year = {2016},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Aner Ben-Efraim} and {Yehuda Lindell} and {Eran Omri}}
}
@article{journals/iacr/FurukawaLNW16,
title = {High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority.},
year = {2016},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jun Furukawa 001} and {Yehuda Lindell} and {Ariel Nof} and {Or Weinstein}}
}
@article{journals/iacr/KolesnikovKLMR16,
title = {Attribute-based Key Exchange with General Policies.},
year = {2016},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Vladimir Kolesnikov} and {Hugo Krawczyk} and {Yehuda Lindell} and {Alex J. Malozemoff} and {Tal Rabin}}
}
@article{journals/iacr/LindellSS16,
title = {More Efficient Constant-Round Multi-Party Computation from BMR and SHE.},
year = {2016},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell} and {Nigel P. Smart} and {Eduardo Soria-Vazquez}}
}
@article{journals/joc/Lindell16,
title = {Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries.},
year = {2016},
journal = {J. Cryptol.},
author = {{Yehuda Lindell}}
}
@incollection{books/sp/17/Lindell17,
title = {How to Simulate It - A Tutorial on the Simulation Proof Technique.},
year = {2017},
booktitle = {Tutorials on the Foundations of Cryptography},
author = {{Yehuda Lindell}},
publisher = {Springer International Publishing},
booktitle = {Tutorials on the Foundations of Cryptography.}
}
@inproceedings{conf/sp/ArakiBFLLNOWW17,
title = {Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier.},
year = {2017},
booktitle = {IEEE Symposium on Security and Privacy},
author = {{Toshinori Araki} and {Assi Barak} and {Jun Furukawa 001} and {Tamar Lichter} and {Yehuda Lindell} and {Ariel Nof} and {Kazuma Ohara} and {Adi Watzman} and {Or Weinstein}},
publisher = {IEEE Computer Society},
booktitle = {2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017}
}
@article{journals/eccc/Lindell17,
title = {How To Simulate It - A Tutorial on the Simulation Proof Technique.},
year = {2017},
journal = {Electron. Colloquium Comput. Complex.},
author = {{Yehuda Lindell}}
}
@article{journals/iacr/Ben-EfraimLO17,
title = {Efficient Scalable Constant-Round MPC via Garbled Circuits.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Aner Ben-Efraim} and {Yehuda Lindell} and {Eran Omri}}
}
@article{journals/iacr/GueronL17,
title = {Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Shay Gueron} and {Yehuda Lindell}}
}
@article{journals/iacr/GueronLL17,
title = {AES-GCM-SIV: Specification and Analysis.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Shay Gueron} and {Adam Langley} and {Yehuda Lindell}}
}
@article{journals/iacr/LindellN17,
title = {A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell} and {Ariel Nof}}
}
@article{journals/iacr/LindellR17,
title = {Secure Two-Party Computation with Fairness - A Necessary Design Principle.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell} and {Tal Rabin}}
}
@article{journals/iacr/LindellY17,
title = {Fast Garbling of Circuits over 3-Valued Logic.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell} and {Avishay Yanai}}
}
@article{journals/joc/AsharovL17,
title = {A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation.},
year = {2017},
journal = {J. Cryptol.},
author = {{Gilad Asharov} and {Yehuda Lindell}}
}
@article{journals/joc/AsharovLSZ17,
title = {More Efficient Oblivious Transfer Extensions.},
year = {2017},
journal = {J. Cryptol.},
author = {{Gilad Asharov} and {Yehuda Lindell} and {Thomas Schneider 003} and {Michael Zohner}}
}
@article{journals/joc/CohenL17,
title = {Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation.},
year = {2017},
journal = {J. Cryptol.},
author = {{Ran Cohen} and {Yehuda Lindell}}
}
@inproceedings{conf/ccs/LindellN18,
title = {Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody.},
year = {2018},
booktitle = {CCS},
author = {{Yehuda Lindell} and {Ariel Nof}},
publisher = {ACM},
booktitle = {Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018}
}
@article{journals/corr/abs-1810-02066,
title = {Turning Lemons into Peaches using Secure Computation.},
year = {2018},
journal = {CoRR},
author = {{Stav Buchsbaum} and {Ran Gilad-Bachrach} and {Yehuda Lindell}}
}
@article{journals/iacr/ArakiBFKLOT18,
title = {Generalizing the SPDZ Compiler For Other Protocols.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Toshinori Araki} and {Assi Barak} and {Jun Furukawa 001} and {Marcel Keller} and {Yehuda Lindell} and {Kazuma Ohara} and {Hikaru Tsuchida}}
}
@article{journals/iacr/ArcherBLKNPSW18,
title = {From Keys to Databases - Real-World Applications of Secure Multi-Party Computation.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{David W. Archer} and {Dan Bogdanov} and {Yehuda Lindell} and {Liina Kamm} and {Kurt Nielsen} and {Jakob Illeborg Pagter} and {Nigel P. Smart} and {Rebecca N. Wright}}
}
@article{journals/iacr/BarakHKL18,
title = {An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Assi Barak} and {Martin Hirt} and {Lior Koskas} and {Yehuda Lindell}}
}
@article{journals/iacr/FrederiksenLOP18,
title = {Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Tore Kasper Frederiksen} and {Yehuda Lindell} and {Valery Osheter} and {Benny Pinkas}}
}
@article{journals/iacr/KraitsbergLOSA18,
title = {Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Michael Kraitsberg} and {Yehuda Lindell} and {Valery Osheter} and {Nigel P. Smart} and {Younes Talibi Alaoui}}
}
@article{journals/iacr/LindellNR18,
title = {Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell} and {Ariel Nof} and {Samuel Ranellucci}}
}
@article{journals/joc/GueronLNP18,
title = {Fast Garbling of Circuits Under Standard Assumptions.},
year = {2018},
journal = {J. Cryptol.},
author = {{Shay Gueron} and {Yehuda Lindell} and {Ariel Nof} and {Benny Pinkas}}
}
@article{journals/joc/LindellOZ18,
title = {Completeness for Symmetric Two-Party Functionalities: Revisited.},
year = {2018},
journal = {J. Cryptol.},
author = {{Yehuda Lindell} and {Eran Omri} and {Hila Zarosim}}
}
@article{journals/joc/LindellZ18,
title = {On the Feasibility of Extending Oblivious Transfer.},
year = {2018},
journal = {J. Cryptol.},
author = {{Yehuda Lindell} and {Hila Zarosim}}
}
@article{journals/popets/AsharovHLR18,
title = {Privacy-Preserving Search of Similar Patients in Genomic Data.},
year = {2018},
journal = {Proc. Priv. Enhancing Technol.},
author = {{Gilad Asharov} and {Shai Halevi} and {Yehuda Lindell} and {Tal Rabin}}
}
@article{journals/iacr/0001L19,
title = {Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jun Furukawa 001} and {Yehuda Lindell}}
}
@article{journals/iacr/GueronL19,
title = {SimpleENC and SimpleENCsmall - an Authenticated Encryption Mode for the Lightweight Setting.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Shay Gueron} and {Yehuda Lindell}}
}
@article{journals/joc/LindellPSY19,
title = {Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ.},
year = {2019},
journal = {J. Cryptol.},
author = {{Yehuda Lindell} and {Benny Pinkas} and {Nigel P. Smart} and {Avishay Yanai}}
}
@article{journals/rfc/rfc8452,
title = {AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption.},
year = {2019},
month = {April},
journal = {RFC},
author = {{Shay Gueron} and {Adam Langley} and {Yehuda Lindell}}
}
@article{journals/iacr/DahariL20,
title = {Deterministic-Prover Zero-Knowledge Proofs.},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Hila Dahari} and {Yehuda Lindell}}
}
@article{journals/iacr/Lindell20,
title = {Secure Multiparty Computation (MPC).},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell}}
}
@article{journals/joc/BeimelLOO20,
title = {1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds.},
year = {2020},
journal = {J. Cryptol.},
author = {{Amos Beimel} and {Yehuda Lindell} and {Eran Omri} and {Ilan Orlov}}
}
@article{journals/cacm/Lindell21,
title = {Secure multiparty computation.},
year = {2021},
journal = {Commun. ACM},
author = {{Yehuda Lindell}}
}
@article{journals/joc/Lindell21,
title = {Fast Secure Two-Party ECDSA Signing.},
year = {2021},
journal = {J. Cryptol.},
author = {{Yehuda Lindell}}
}
@article{journals/iacr/Lindell22,
title = {Simple Three-Round Multiparty Schnorr Signing with Full Simulatability.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yehuda Lindell}}
}
@article{journals/joc/ChidaHIKGLN23,
title = {Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.},
year = {2023},
month = {July},
journal = {J. Cryptol.},
author = {{Koji Chida} and {Koki Hamada} and {Dai Ikarashi} and {Ryo Kikuchi} and {Daniel Genkin} and {Yehuda Lindell} and {Ariel Nof}}
}
@article{journals/joc/FurukawaLNW23,
title = {High-Throughput Secure Three-Party Computation with an Honest Majority.},
year = {2023},
month = {July},
journal = {J. Cryptol.},
author = {{Jun Furukawa 001} and {Yehuda Lindell} and {Ariel Nof} and {Or Weinstein}}
}
@article{journals/iacr/BonehHL24,
title = {Exponent-VRFs and Their Applications.},
year = {2024},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Dan Boneh} and {Iftach Haitner} and {Yehuda Lindell}}
}
@article{journals/iacr/ChenL24,
title = {Feldman's Verifiable Secret Sharing for a Dishonest Majority.},
year = {2024},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yi-Hsiu Chen} and {Yehuda Lindell}}
}