Yehuda Lindell
Orcid: 0000-0002-8176-690XAffiliations:
- Bar-Ilan University, Ramat Gan, Israel
According to our database1,
Yehuda Lindell
authored at least 141 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Commun. Cryptol., 2024
IACR Commun. Cryptol., 2024
IACR Commun. Cryptol., 2024
2023
J. Cryptol., July, 2023
J. Cryptol., July, 2023
2021
2020
1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds.
J. Cryptol., 2020
2019
J. Cryptol., 2019
SimpleENC and SimpleENCsmall - an Authenticated Encryption Mode for the Lightweight Setting.
IACR Cryptol. ePrint Arch., 2019
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest.
IACR Cryptol. ePrint Arch., 2019
2018
Proc. Priv. Enhancing Technol., 2018
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody.
IACR Cryptol. ePrint Arch., 2018
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants.
IACR Cryptol. ePrint Arch., 2018
Comput. J., 2018
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
J. Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Electron. Colloquium Comput. Complex., 2017
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Tutorials on the Foundations of Cryptography., 2017
2016
J. Cryptol., 2016
IACR Cryptol. ePrint Arch., 2016
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
J. Cryptol., 2015
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte.
IACR Cryptol. ePrint Arch., 2015
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle.
IACR Cryptol. ePrint Arch., 2014
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014
Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
CRC Press, ISBN: 9781466570269, 2014
2013
Proceedings of the Secure Multi-Party Computation, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
2012
J. Cryptol., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
SIAM J. Comput., 2011
J. Cryptol., 2011
Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs.
J. Cryptol., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Electron. Colloquium Comput. Complex., 2011
Electron. Colloquium Comput. Complex., 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
1/<i>p</i>-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
Information Security and Cryptography, Springer, ISBN: 978-3-642-14302-1, 2010
SIAM J. Comput., 2010
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
J. Cryptol., 2010
J. Cryptol., 2010
IACR Cryptol. ePrint Arch., 2010
A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
2009
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009
J. Priv. Confidentiality, 2009
J. Cryptol., 2009
IACR Cryptol. ePrint Arch., 2009
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Chic. J. Theor. Comput. Sci., 2009
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
J. Cryptol., 2008
J. Cryptol., 2008
IACR Cryptol. ePrint Arch., 2008
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Topics in Cryptology, 2008
2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Chapman and Hall/CRC Press, ISBN: 978-1-58488-551-1, 2007
2006
ACM Trans. Inf. Syst. Secur., 2006
A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions.
J. Cryptol., 2006
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions.
J. Cryptol., 2006
Chic. J. Theor. Comput. Sci., 2006
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Electron. Colloquium Comput. Complex., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
2003
J. Cryptol., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
Brief announcement: impossibility results for concurrent secure two-party computation.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
Proceedings of the 44th Symposium on Foundations of Computer Science (FOCS 2003), 2003
Lecture Notes in Computer Science 2815, Springer, ISBN: 3-540-20105-X, 2003
2002
A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions.
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002
2001
IACR Cryptol. ePrint Arch., 2001
1998
Proceedings of the Principles of Data Mining and Knowledge Discovery, 1998
Proceedings of the Principles of Data Mining and Knowledge Discovery, 1998