Follow
Avishay Yanai
Avishay Yanai
VMware Research
Verified email at biu.ac.il - Homepage
Title
Cited by
Cited by
Year
SpOT-light: lightweight private set intersection from sparse OT extension
B Pinkas, M Rosulek, N Trieu, A Yanai
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
1812019
Efficient circuit-based PSI with linear communication
B Pinkas, T Schneider, O Tkachenko, A Yanai
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
1632019
PSI from PaXoS: fast, malicious private set intersection
B Pinkas, M Rosulek, N Trieu, A Yanai
Annual International Conference on the Theory and Applications of …, 2020
1572020
Efficient constant-round multi-party computation combining BMR and SPDZ
Y Lindell, B Pinkas, NP Smart, A Yanai
Journal of Cryptology 32, 1026-1069, 2019
1502019
Oblivious key-value stores and amplification for private set intersection
G Garimella, B Pinkas, M Rosulek, N Trieu, A Yanai
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
672021
Blinder--Scalable, Robust Anonymous Committed Broadcast
I Abraham, B Pinkas, A Yanai
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
662020
Senate: a {Maliciously-Secure}{MPC} platform for collaborative analytics
R Poddar, S Kalra, A Yanai, R Deng, RA Popa, JM Hellerstein
30th USENIX Security Symposium (USENIX Security 21), 2129-2146, 2021
552021
Efficient maliciously secure multiparty computation for RAM
M Keller, A Yanai
Annual International Conference on the Theory and Applications of …, 2018
402018
Simple, fast malicious multiparty private set intersection
O Nevo, N Trieu, A Yanai
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
392021
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020
332020
Committed MPC: Maliciously Secure Multiparty Computation from Homomorphic Commitments
TK Frederiksen, B Pinkas, A Yanai
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
242018
Utt: Decentralized ecash with accountable privacy
A Tomescu, A Bhat, B Applebaum, I Abraham, G Gueta, B Pinkas, A Yanai
Cryptology ePrint Archive, 2022
222022
Constant-round maliciously secure two-party computation in the RAM model
C Hazay, A Yanai
Journal of Cryptology 32 (4), 1144-1199, 2019
212019
A privacy preserving collusion secure DCOP algorithm
T Tassa, T Grinshpoun, A Yanai
arXiv preprint arXiv:1905.09013, 2019
152019
PC-SyncBB: A privacy preserving collusion secure DCOP algorithm
T Tassa, T Grinshpoun, A Yanai
Artificial Intelligence 297, 103501, 2021
132021
Fear not, vote truthfully: Secure Multiparty Computation of score based rules
L Dery, T Tassa, A Yanai
Expert Systems with Applications 168, 114434, 2021
122021
Multiparty private set intersection cardinality and its applications
J Gao, N Trieu, A Yanai
Cryptology ePrint Archive, 2022
102022
Scionfl: Secure quantized aggregation for federated learning
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
arXiv preprint arXiv:2210.07376, 2022
72022
Efficient perfectly secure computation with optimal resilience
I Abraham, G Asharov, A Yanai
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
72021
A secure voting system for score based elections
L Dery, T Tassa, A Yanai, A Zamarin
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20