Shai Halevi
Orcid: 0000-0003-3432-7899Affiliations:
- IBM Research, Yorktown Heights, NY, USA
According to our database1,
Shai Halevi
authored at least 155 papers
between 1993 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on isni.org
On csauthors.net:
Bibliography
2025
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
2019
Proc. Priv. Enhancing Technol., 2019
IBM J. Res. Dev., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019
Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation.
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
Proc. Priv. Enhancing Technol., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input.
Algorithmica, 2017
Proceedings of the Tutorials on the Foundations of Cryptography., 2017
2016
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits.
SIAM J. Comput., 2016
IACR Cryptol. ePrint Arch., 2016
Commun. ACM, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
2011
J. Comput. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Advances in Cryptology, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
CoRR, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Advances in Cryptology, 2008
2007
IACR Cryptol. ePrint Arch., 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
A model and architecture for pseudo-random generation with applications to /dev/random.
IACR Cryptol. ePrint Arch., 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
EME<sup>*</sup>: Extending EME to Handle Arbitrary-Length Messages with Associated Data.
Proceedings of the Progress in Cryptology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the First International IEEE Security in Storage Workshop, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001
Proceedings of the Advances in Cryptology, 2001
2000
J. Cryptol., 2000
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
IBM Comments.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1999
J. Cryptol., 1999
IACR Cryptol. ePrint Arch., 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the 14th Annual IEEE Conference on Computational Complexity, 1999
1998
IACR Cryptol. ePrint Arch., 1998
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Electron. Colloquium Comput. Complex., 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
1996
Electron. Colloquium Comput. Complex., 1996
Electron. Colloquium Comput. Complex., 1996
Proceedings of the Advances in Cryptology, 1996
1993
Proceedings of the Second Israel Symposium on Theory of Computing Systems, 1993