Filter
Conference contribution

Search results

  • 2024

    ScionFL: Efficient and Robust Secure Quantized Aggregation

    Ben-Itzhak, Y., Mollering, H., Pinkas, B., Schneider, T., Suresh, A., Tkachenko, O., Vargaftik, S., Weinert, C., Yalame, H. & Yanai, A., 2024, Proceedings - IEEE Conference on Safe and Trustworthy Machine Learning, SaTML 2024. Institute of Electrical and Electronics Engineers Inc., p. 490-511 22 p. (Proceedings - IEEE Conference on Safe and Trustworthy Machine Learning, SaTML 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • 2023

    How to Recover a Secret with O(n) Additions

    Applebaum, B., Nir, O. & Pinkas, B., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 236-262 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Secure Statistical Analysis on Multiple Datasets: Join and Group-By

    Asharov, G., Hamada, K., Kikuchi, R., Nof, A., Pinkas, B. & Tomida, J., 15 Nov 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 3298-3312 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2022

    Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters

    Asharov, G., Hamada, K., Ikarashi, D., Kikuchi, R., Nof, A., Pinkas, B., Takahashi, K. & Tomida, J., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 125-138 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications

    Günther, D., Heymann, M., Pinkas, B. & Schneider, T., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1759-1776 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs

    Günther, D., Holz, M., Judkewitz, B., Möllering, H., Pinkas, B., Schneider, T. & Suresh, A., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3351-3353 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2021

    Fairness in the Eyes of the Data: Certifying Machine-Learning Models

    Segal, S., Adi, Y., Pinkas, B., Baum, C., Ganesh, C. & Keshet, J., 21 Jul 2021, AIES 2021 - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society. Association for Computing Machinery, Inc, p. 926-935 10 p. (AIES 2021 - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • Hashomer--Privacy-Preserving Bluetooth Based Contact Tracing Scheme for Hamagen

    Pinkas, B. & Ronen, E., 2021, Real World Crypto and NDSS Corona-Def Workshop. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Oblivious Key-Value Stores and Amplification for Private Set Intersection

    Garimella, G., Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 395-425 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    58 Scopus citations
  • Secure Graph Analysis at Scale

    Araki, T., Furukawa, J., Ohara, K., Pinkas, B., Rosemarin, H. & Tsuchida, H., 12 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 610-629 20 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    26 Scopus citations
  • 2020

    Blinder - Scalable, Robust Anonymous Committed Broadcast

    Abraham, I., Pinkas, B. & Yanai, A., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1233-1252 20 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Scopus citations
  • Flaw Label: Exploiting IPv6 Flow Label

    Berger, J., Klein, A. & Pinkas, B., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 1259-1276 18 p. 9152759. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • PSI from PaXoS: Fast, Malicious Private Set Intersection

    Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 739-767 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    110 Scopus citations
  • Towards scalable threshold cryptosystems

    Tomescu, A., Chen, R., Zheng, Y., Abraham, I., Pinkas, B., Gueta, G. G. & Devadas, S., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 877-893 17 p. 9152696. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    50 Scopus citations
  • 2019

    DNS Cache-Based User Tracking

    Klein, A. & Pinkas, B., 2019, 26th Annual Network and Distributed System Security Symposium, NDSS 2019. The Internet Society, (26th Annual Network and Distributed System Security Symposium, NDSS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    22 Scopus citations
  • Efficient circuit-based PSI with linear communication

    Pinkas, B., Schneider, T., Tkachenko, O. & Yanai, A., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Springer Verlag, p. 122-153 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    105 Scopus citations
  • From IP ID to device ID and KASLR bypass

    Klein, A. & Pinkas, B., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1063-1080 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior

    Naor, M., Pinkas, B. & Ronen, E., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1369-1386 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • Make some room for the zeros: Data sparsity in secure distributed machine learning

    Schoppmann, P., Raykova, M., Gascón, A. & Pinkas, B., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1335-1350 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • SBFT: A Scalable and Decentralized Trust Infrastructure

    Golan Gueta, G., Abraham, I., Grossman, S., Malkhi, D., Pinkas, B., Reiter, M., Seredinschi, D. A., Tamir, O. & Tomescu, A., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. Institute of Electrical and Electronics Engineers Inc., p. 568-580 13 p. 8809541. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    258 Scopus citations
  • SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension

    Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 401-431 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    122 Scopus citations
  • 2018

    Committed MPC: Maliciously Secure Multiparty Computation from Homomorphic Commitments

    Frederiksen, T. K., Pinkas, B. & Yanai, A., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 587-619 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • Distributed SSH key management with proactive RSA threshold signatures

    Harchol, Y., Abraham, I. & Pinkas, B., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Preneel, B. & Vercauteren, F. (eds.). Springer Verlag, p. 22-43 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Efficient circuit-based psi via cuckoo hashing

    Pinkas, B., Schneider, T., Weinert, C. & Wieder, U., 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Nielsen, J. B. & Rijmen, V. (eds.). Springer Verlag, p. 125-157 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10822 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    109 Scopus citations
  • Efficient scalable multiparty private set-intersection via garbled bloom filters

    Inbar, R., Omri, E. & Pinkas, B., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Springer Verlag, p. 235-252 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11035 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    51 Scopus citations
  • Fast distributed rsa key generation for semi-honest and malicious adversaries

    Frederiksen, T. K., Lindell, Y., Osheter, V. & Pinkas, B., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 331-361 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • High-throughput secure AES computation

    Chida, K., Hamada, K., Ikarashi, D., Kikuchi, R. & Pinkas, B., 15 Oct 2018, WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018. Association for Computing Machinery, p. 13-24 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Turning your weakness into a strength: Watermarking deep neural networks by backdooring

    Adi, Y., Baum, C., Cisse, M., Pinkas, B. & Keshet, J., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1615-1631 17 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    483 Scopus citations
  • 2017

    Asymptotically tight bounds for composing ORAM with PIR

    Abraham, I., Fletcher, C. W., Nayak, K., Pinkas, B. & Ren, L., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer Verlag, p. 91-120 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • Practical multi-party private set intersection from symmetric-key techniques

    Kolesnikov, V., Matania, N., Pinkas, B., Rosulek, M. & Trieu, N., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1257-1272 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    147 Scopus citations
  • The circle game: Scalable private membership test using trusted hardware

    Tamrakar, S., Liu, J., Paverd, A., Ekberg, J. E., Pinkas, B. & Asokan, N., 2 Apr 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 31-44 14 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    32 Scopus citations
  • 2015

    Efficient constant round multi-party computation combining BMR and SPDZ

    Lindell, Y., Pinkas, B., Smart, N. P. & Yanai, A., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 319-338 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    70 Scopus citations
  • Fast garbling of circuits under standard assumptions

    Gueron, S., Lindell, Y., Nof, A. & Pinkasy, B., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 567-578 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    43 Scopus citations
  • Phasing: Private Set Intersection using Permutation-based Hashing

    Pinkas, B., Schneider, T., Segev, G. & Zohner, M., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 515-530 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    214 Scopus citations
  • Secure deduplication of encrypted data without additional independent servers

    Liu, J., Asokan, N. & Pinkas, B., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 874-885 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    214 Scopus citations
  • 2014

    Faster private set intersection based on OT extension

    Pinkas, B., Schneider, T. & Zohner, M., 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 797-812 16 p. (Proceedings of the 23rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    264 Scopus citations
  • Non-interactive secure computation based on cut-and-choose

    Afshar, A., Mohassel, P., Pinkas, B. & Riva, B., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 387-404 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    54 Scopus citations
  • 2013

    Canon-MPC, a system for casual non-interactive secure multi-party computation using native client

    Jarrous, A. & Pinkas, B., 2013, WPES 2013 - Proceedings of the 2013 ACM Workshop on Privacy in the Electronic Society, Co-located with CCS 2013. p. 155-166 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2012

    Firm grip handshakes: A tool for bidirectional vouching

    Berkman, O., Pinkas, B. & Yung, M., 2012, Cryptology and Network Security - 11th International Conference, CANS 2012, Proceedings. p. 142-157 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7712 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    Proofs of ownership in remote storage systems

    Halevi, S., Harnik, D., Pinkas, B. & Shulman-Peleg, A., 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 491-500 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    437 Scopus citations
  • Secure computation on the web: Computing without simultaneous interaction

    Halevi, S., Lindell, Y. & Pinkas, B., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 132-150 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    91 Scopus citations
  • Secure set intersection with untrusted hardware tokens

    Fischlin, M., Pinkas, B., Sadeghi, A. R., Schneider, T. & Visconti, I., 2011, Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, Proceedings. p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6558 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    26 Scopus citations
  • Secure two-party computation via cut-and-choose oblivious transfer

    Lindell, Y. & Pinkas, B., 2011, Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Proceedings. Springer Verlag, p. 329-346 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6597 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    114 Scopus citations
  • The IPS compiler: Optimizations, variants and concrete efficiency

    Lindell, Y., Oxman, E. & Pinkas, B., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 259-276 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    35 Scopus citations
  • 2010

    Oblivious RAM revisited

    Pinkas, B. & Reinman, T., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 502-519 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    171 Scopus citations
  • Privacy-preserving group discovery with linear complexity

    Manulis, M., Pinkas, B. & Poettering, B., 2010, Applied Cryptography and Network Security - 8th International Conference, ACNS 2010, Proceedings. p. 420-437 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6123 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • SCiFI - A system for secure face identification

    Osadchy, M., Pinkas, B., Jarrous, A. & Moskovich, B., 2010, 2010 IEEE Symposium on Security and Privacy, SP 2010 - Proceedings. p. 239-254 16 p. 5504789. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    198 Scopus citations
  • Scifi-a system for secure face identification

    Osadchy, M., Pinkas, B., Jarrous, A. & Moskovich, B., 2010, 2010 IEEE Symposium on Security and Privacy.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2009

    Secure hamming distance based computation and its applications

    Jarrous, A. & Pinkas, B., 2009, Applied Cryptography and Network Security - 7th International Conference, ACNS 2009, Proceedings. p. 107-124 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5536 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    41 Scopus citations
  • Secure two-party computation is practical

    Pinkas, B., Schneider, T., Smart, N. P. & Williams, S. C., 2009, Advances in Cryptology - ASIACRYPT 2009 - 15th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 250-267 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5912 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    318 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.