Benny Pinkas
Orcid: 0000-0002-9053-3024
According to our database1,
Benny Pinkas
authored at least 117 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
Electron. Colloquium Comput. Complex., 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
J. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
ACM Trans. Priv. Secur., 2018
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Adversarial Examples on Discrete Sequences for Beating Whole-Binary Malware Detection.
CoRR, 2018
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018
2017
Proc. Priv. Enhancing Technol., 2017
IACR Cryptol. ePrint Arch., 2017
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
J. Cryptol., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
Secure computation of functionalities based on Hamming distance and its application to computing document similarity.
Int. J. Appl. Cryptogr., 2013
Canon-MPC, a system for casual non-interactive secure multi-party computation using native client.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
2012
J. Cryptol., 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2010
Peer-to-Peer Netw. Appl., 2010
J. Cryptol., 2010
IEEE Secur. Priv., 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles.
Theory Comput. Syst., 2009
J. Priv. Confidentiality, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Proceedings P2P'08, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
2004
Electron. Colloquium Comput. Complex., 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, 2001
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001
2000
1999
Comput. Networks, 1999
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999
Proceedings of the First ACM Conference on Electronic Commerce (EC-99), 1999
Proceedings of the Proceedings IEEE INFOCOM '99, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
1990
Proceedings of the Advances in Cryptology, 1990