Anat Paskin-Cherniavsky
Anat Paskin-Cherniavsky
Verified email at
Cited by
Cited by
Evaluating branching programs on encrypted data
Y Ishai, A Paskin
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
On the Power of Correlated Randomness in Secure Computation.
Y Ishai, E Kushilevitz, S Meldgaard, C Orlandi, A Paskin-Cherniavsky
TCC 7785, 600-620, 2013
Non-interactive secure multiparty computation
A Beimel, A Gabizon, Y Ishai, E Kushilevitz, S Meldgaard, ...
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
Maliciously Circuit-private FHE
R Ostrovsky, A Paskin-Cherniavsky, B Paskin-Cherniavsky
IACR Cryptology ePrint Archive 2013 (307), 2013
Secure multiparty computation with minimal interaction
Y Ishai, E Kushilevitz, A Paskin
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
Secure computation with minimal interaction, revisited
Y Ishai, R Kumaresan, E Kushilevitz, A Paskin-Cherniavsky
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
Evolving secret sharing: dynamic thresholds and robustness
I Komargodski, A Paskin-Cherniavsky
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
Psimple: Practical multiparty maliciously-secure private set intersection
AB Efraim, O Nissenbaum, E Omri, A Paskin-Cherniavsky
Cryptology ePrint Archive, 2021
MPC with friends and foes
B Alon, E Omri, A Paskin-Cherniavsky
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
Constructing locally leakage-resilient linear secret-sharing schemes
HK Maji, A Paskin-Cherniavsky, T Suad, M Wang
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
Statistical randomized encodings: A complexity theoretic view
S Agrawal, Y Ishai, D Khurana, A Paskin-Cherniavsky
Automata, Languages, and Programming: 42nd International Colloquium, ICALP …, 2015
Secure computation with minimal interaction
A Paskin-Cherniavsky, Y Ishai, E Kushilevitz
Computer Science Department, Technion, 2012
Locally Decodable Codes for edit distance
R Ostrovsky, A Paskin-Cherniavsky
IACR Cryptology ePrint Archive 2014 (260), 2014
Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
How to infinitely share a secret more efficiently
A Paskin-Cherniavsky
Cryptology ePrint Archive, 2016
On perfectly secure 2PC in the OT-hybrid model
B Alon, A Paskin-Cherniavsky
Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019
On share conversions for private information retrieval
A Paskin-Cherniavsky, L Schmerler
Entropy 21 (9), 826, 2019
From randomizing polynomials to parallel algorithms
Y Ishai, E Kushilevitz, A Paskin-Cherniavsky
Proceedings of the 3rd Innovations in Theoretical Computer Science …, 2012
On linear secret sharing for connectivity in directed graphs
A Beimel, A Paskin
Security and Cryptography for Networks: 6th International Conference, SCN …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20