Search results

  • 2025

    Distributing Keys and Random Secrets with Constant Complexity

    Applebaum, B. & Pinkas, B., 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 485-516 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15367 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2024

    Distributed Randomness using Weighted VRFs.

    Das, S., Pinkas, B., Tomescu, A. & Xiang, Z., 2024, 198 p.

    Research output: Working paper / PreprintPreprint

    Open Access
  • Distributing Keys and Random Secrets with Constant Complexity.

    Applebaum, B. & Pinkas, B., 2024, Cryptology ePrint Archive, 876 p.

    Research output: Working paper / PreprintPreprint

    Open Access
  • ScionFL: Efficient and Robust Secure Quantized Aggregation

    Ben-Itzhak, Y., Mollering, H., Pinkas, B., Schneider, T., Suresh, A., Tkachenko, O., Vargaftik, S., Weinert, C., Yalame, H. & Yanai, A., 2024, Proceedings - IEEE Conference on Safe and Trustworthy Machine Learning, SaTML 2024. Institute of Electrical and Electronics Engineers Inc., p. 490-511 22 p. (Proceedings - IEEE Conference on Safe and Trustworthy Machine Learning, SaTML 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • 2023

    How to Recover a Secret with O(n) Additions

    Applebaum, B., Nir, O. & Pinkas, B., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 236-262 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • How to Recover a Secret with O(n) Additions.

    Applebaum, B., Nir, O. & Pinkas, B., 2023, Computational Complexity Foundation (CCF), 838 p.

    Research output: Working paper / PreprintPreprint

    Open Access
  • Secure Statistical Analysis on Multiple Datasets: Join and Group-By

    Asharov, G., Hamada, K., Kikuchi, R., Nof, A., Pinkas, B. & Tomida, J., 15 Nov 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 3298-3312 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2022

    Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters

    Asharov, G., Hamada, K., Ikarashi, D., Kikuchi, R., Nof, A., Pinkas, B., Takahashi, K. & Tomida, J., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 125-138 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications

    Günther, D., Heymann, M., Pinkas, B. & Schneider, T., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1759-1776 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs

    Günther, D., Holz, M., Judkewitz, B., Möllering, H., Pinkas, B., Schneider, T. & Suresh, A., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3351-3353 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • UTT: Decentralized Ecash with Accountable Privacy

    Tomescu, A., Bhat, A., Applebaum, B., Abraham, I., Gueta, G., Pinkas, B. & Yanai, A., 2022, In: IACR Cryptology ePrint Archive,. p. 1-65 65 p.

    Research output: Contribution to journalArticlepeer-review

  • 2021

    Fairness in the Eyes of the Data: Certifying Machine-Learning Models

    Segal, S., Adi, Y., Pinkas, B., Baum, C., Ganesh, C. & Keshet, J., 21 Jul 2021, AIES 2021 - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society. Association for Computing Machinery, Inc, p. 926-935 10 p. (AIES 2021 - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications

    Günther, D., Heymann, M., Pinkas, B. & Schneider, T., 2021, In: IACR Cryptology ePrint Archive,. p. 1-19 19 p.

    Research output: Contribution to journalArticlepeer-review

  • Hashomer--Privacy-Preserving Bluetooth Based Contact Tracing Scheme for Hamagen

    Pinkas, B. & Ronen, E., 2021, Real World Crypto and NDSS Corona-Def Workshop. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Oblivious Key-Value Stores and Amplification for Private Set Intersection

    Garimella, G., Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 395-425 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    64 Scopus citations
  • Preface

    Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A., 2021, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12716 LNCS, p. v-vi

    Research output: Contribution to journalEditorial

  • Secure Graph Analysis at Scale

    Araki, T., Furukawa, J., Ohara, K., Pinkas, B., Rosemarin, H. & Tsuchida, H., 12 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 610-629 20 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • 2020

    Blinder - Scalable, Robust Anonymous Committed Broadcast

    Abraham, I., Pinkas, B. & Yanai, A., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1233-1252 20 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Scopus citations
  • Flaw Label: Exploiting IPv6 Flow Label

    Berger, J., Klein, A. & Pinkas, B., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 1259-1276 18 p. 9152759. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • PSI from PaXoS: Fast, Malicious Private Set Intersection

    Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 739-767 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    113 Scopus citations
  • Towards scalable threshold cryptosystems

    Tomescu, A., Chen, R., Zheng, Y., Abraham, I., Pinkas, B., Gueta, G. G. & Devadas, S., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 877-893 17 p. 9152696. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    50 Scopus citations
  • 2019

    DNS Cache-Based User Tracking

    Klein, A. & Pinkas, B., 2019, 26th Annual Network and Distributed System Security Symposium, NDSS 2019. The Internet Society, (26th Annual Network and Distributed System Security Symposium, NDSS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    23 Scopus citations
  • Efficient circuit-based PSI with linear communication

    Pinkas, B., Schneider, T., Tkachenko, O. & Yanai, A., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Springer Verlag, p. 122-153 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    108 Scopus citations
  • Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ

    Lindell, Y., Pinkas, B., Smart, N. P. & Yanai, A., 15 Jul 2019, In: Journal of Cryptology. 32, 3, p. 1026-1069 44 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    14 Scopus citations
  • From IP ID to device ID and KASLR bypass

    Klein, A. & Pinkas, B., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1063-1080 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior

    Naor, M., Pinkas, B. & Ronen, E., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1369-1386 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Make some room for the zeros: Data sparsity in secure distributed machine learning

    Schoppmann, P., Raykova, M., Gascón, A. & Pinkas, B., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1335-1350 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • SBFT: A Scalable and Decentralized Trust Infrastructure

    Golan Gueta, G., Abraham, I., Grossman, S., Malkhi, D., Pinkas, B., Reiter, M., Seredinschi, D. A., Tamir, O. & Tomescu, A., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. Institute of Electrical and Electronics Engineers Inc., p. 568-580 13 p. 8809541. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    265 Scopus citations
  • SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension

    Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 401-431 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    125 Scopus citations
  • 2018

    Adversarial examples on discrete sequences for beating whole-binary malware detection

    Kreuk, F., Barak, A., Aviv-Reuven, S., Baruch, M., Pinkas, B. & Keshet, J., 13 Feb 2018, p. 1-12, 12 p. (arXiv preprint arXiv:1802.,).

    Research output: Working paper / PreprintPreprint

  • Committed MPC: Maliciously Secure Multiparty Computation from Homomorphic Commitments

    Frederiksen, T. K., Pinkas, B. & Yanai, A., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 587-619 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • Deceiving end-to-end deep learning malware detectors using adversarial examples,

    Kreuk, F., Barak, A., Aviv-Reuven, S., Baruch, M., Pinkas, B. & Keshet, J., 2018, In: arXiv preprint arXiv:1802.,. 4528

    Research output: Contribution to journalArticlepeer-review

  • Distributed SSH key management with proactive RSA threshold signatures

    Harchol, Y., Abraham, I. & Pinkas, B., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Preneel, B. & Vercauteren, F. (eds.). Springer Verlag, p. 22-43 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Efficient circuit-based psi via cuckoo hashing

    Pinkas, B., Schneider, T., Weinert, C. & Wieder, U., 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Nielsen, J. B. & Rijmen, V. (eds.). Springer Verlag, p. 125-157 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10822 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    111 Scopus citations
  • Efficient scalable multiparty private set-intersection via garbled bloom filters

    Inbar, R., Omri, E. & Pinkas, B., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Springer Verlag, p. 235-252 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11035 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    52 Scopus citations
  • Fast distributed rsa key generation for semi-honest and malicious adversaries

    Frederiksen, T. K., Lindell, Y., Osheter, V. & Pinkas, B., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 331-361 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • Fast Garbling of Circuits Under Standard Assumptions

    Gueron, S., Lindell, Y., Nof, A. & Pinkas, B., 1 Jul 2018, In: Journal of Cryptology. 31, 3, p. 798-844 47 p.

    Research output: Contribution to journalArticlepeer-review

    18 Scopus citations
  • High-throughput secure AES computation

    Chida, K., Hamada, K., Ikarashi, D., Kikuchi, R. & Pinkas, B., 15 Oct 2018, WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018. Association for Computing Machinery, p. 13-24 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Scalable private set intersection based on ot extension

    Pinkas, B., Schneider, T. & Zohner, M., Jan 2018, In: ACM Transactions on Privacy and Security. 21, 2, 7.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    204 Scopus citations
  • Turning your weakness into a strength: Watermarking deep neural networks by backdooring

    Adi, Y., Baum, C., Cisse, M., Pinkas, B. & Keshet, J., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1615-1631 17 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    498 Scopus citations
  • 2017

    Asymptotically tight bounds for composing ORAM with PIR

    Abraham, I., Fletcher, C. W., Nayak, K., Pinkas, B. & Ren, L., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer Verlag, p. 91-120 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • Faster Secure Cloud Computations with a Trusted Proxy

    Drucker, N., Gueron, S. & Pinkas, B., 1 Nov 2017, In: IEEE Security and Privacy. 15, 6, p. 61-67 7 p., 8123460.

    Research output: Contribution to journalArticlepeer-review

    5 Scopus citations
  • Practical multi-party private set intersection from symmetric-key techniques

    Kolesnikov, V., Matania, N., Pinkas, B., Rosulek, M. & Trieu, N., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1257-1272 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    152 Scopus citations
  • Private set intersection for unequal set sizes with mobile applications

    Kiss, Á., Liu, J., Schneider, T., Asokan, N. & Pinkas, B., 1 Oct 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 4, p. 177-197 21 p., 4.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Securely computing a ground speed model

    Kolman, E. & Pinkas, B., Jun 2017, In: ACM Transactions on Intelligent Systems and Technology. 8, 4, 54.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • The circle game: Scalable private membership test using trusted hardware

    Tamrakar, S., Liu, J., Paverd, A., Ekberg, J. E., Pinkas, B. & Asokan, N., 2 Apr 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 31-44 14 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    33 Scopus citations
  • 2016

    An Oblivious RAM with Sub-logarithmic Bandwidth Blowup

    Nayak, K., Ren, L., Abraham, I. & Pinkas, B., 2016, In: IACR Cryptology ePrint Archive,. 2016, p. 849

    Research output: Contribution to journalArticlepeer-review

  • Efficient Set Intersection with Simulation-Based Security

    Freedman, M. J., Hazay, C., Nissim, K. & Pinkas, B., 1 Jan 2016, In: Journal of Cryptology. 29, 1, p. 115-155 41 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    100 Scopus citations
  • Maturity and Performance of Programmable Secure Computation

    Archer, D. W., Bogdanov, D., Pinkas, B. & Pullonen, P., 1 Sep 2016, In: IEEE Security and Privacy. 14, 5, p. 48-56 9 p., 7676176.

    Research output: Contribution to journalArticlepeer-review

    21 Scopus citations
  • 2015

    An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

    Lindell, Y. & Pinkas, B., Apr 2015, In: Journal of Cryptology. 28, 2, p. 312-350 39 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    32 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.