If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2008

    Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries

    Lindell, Y., Pinkas, B. & Smart, N., 2008, 6th Conference on Security and Cryptography for Networks. Springer Berlin Heidelberg

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Peer-to-peer secure multi-party numerical computation

    Bickson, D., Dolev, D., Bezman, G. & Pinkas, B., 2008, Proceedings - P2P'08, 8th International Conference on Peer-to-Peer Computing. p. 257-266 10 p. 4627288. (Proceedings - P2P'08, 8th International Conference on Peer-to-Peer Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • 2007

    An efficient protocol for secure two-party computation in the presence of malicious adversaries

    Lindeil, Y. & Pinkas, B., 2007, Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 52-78 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    257 Scopus citations
  • An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

    Lindell, Y. & Pinkas, B., 2007, Advances in Cryptology – EUROCRYPT 2007.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cryptanalysis of the windows random number generator

    Dorrendorf, L., Gutterman, Z. & Pinkas, B., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 476-485 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    40 Scopus citations
  • Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles

    Gradwohl, R., Naor, M., Pinkas, B. & Rothblum, G. N., 2007, Fun with Algorithms - 4th International Conference, FUN 2007, Proceedings. Springer Verlag, p. 166-182 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4475 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2006

    Analysis of the linux random number generator

    Gutterman, Z., Pinkas, B. & Reinman, T., 2006, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006. p. 371-385 15 p. 1624027. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    154 Scopus citations
  • 2004

    Fairplay-Secure Two-Party Computation System

    Malkhi, D., Nisan, N., Pinkas, B. & Sella, Y., 2004, USENIX Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure computation of surveys

    Feigenbaum, J., Pinkas, B., Ryger, R. & Saint-Jean, F., 2004, EU Workshop on Secure Multiparty Protocols.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure computation of the k th-ranked element

    Aggarwal, G., Mishra, N. & Pinkas, B., 2004, International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2002

    Certified email with a light on-line trusted third party: Design and implementation

    Abadi, M., Glew, N., Horne, B. & Pinkas, B., 2002, Proceedings of the 11th International Conference on World Wide Web, WWW '02. p. 387-395 9 p. (Proceedings of the 11th International Conference on World Wide Web, WWW '02).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    83 Scopus citations
  • Certified email with a light on-line trusted third party: design and implementation

    Abadi, M., Glew, N., Horne, B. & Pinkas, B., 2002, the World Wide Web conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient state updates for key management

    Pinkas, B., 2002, Security and Privacy in Digital Rights Management - ACM CCS-8Workshop DRM 2001 Philadelphia, PA, USA, November 5, 2001 Revised Papers. Sander, T. (ed.). Springer Verlag, p. 40-56 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2320).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2001

    Efficient oblivious transfer protocols

    Naor, M. & Pinkas, B., 2001, Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms. p. 448-457 10 p. (Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    567 Scopus citations
  • Efficient trace and revoke schemes

    Naor, M. & Pinkas, B., 2001, Financial Cryptography - 4th International Conference, FC 2000, Proceedings. Frankel, Y. (ed.). Springer Verlag, p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1962).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    194 Scopus citations
  • 2000

    Distributed oblivious transfer

    Naor, M. & Pinkas, B., 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (ed.). Springer Verlag, p. 205-219 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1976).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    48 Scopus citations
  • Privacy preserving data mining

    Lindell, Y. & Pinkas, B., 2000, CRYPTO 2000.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Privacy preserving data mining

    Lindell, Y. & Pinkas, B., 2000, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Bellare, M. (ed.). Springer Verlag, p. 36-54 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    717 Scopus citations
  • 1999

    Distributed pseudo-random functions and KDCs

    Naor, M., Pinkas, B. & Reingold, O., 1999, Advances in Cryptology – EUROCRYPT 1999 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Stern, J. (ed.). Springer Verlag, p. 327-346 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1592).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    133 Scopus citations
  • Multicast security: A taxonomy and some efficient constructions

    Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M. & Pinkas, B., 1999, Proceedings - IEEE INFOCOM'99: The Conference on Computer Communications - 18th Annual Joint Conference of the IEEE Computer and Communications Societies: The Future is Now. p. 708-716 9 p. 751457. (Proceedings - IEEE INFOCOM; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    623 Scopus citations
  • Multicast security: A taxonomy and some efficient constructions

    Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M. & Pinkas, B., 1999, INFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Oblivious transfer and polynomial evaluation

    Naor M & Pinkas, B., 1999, Proceedings of the thirty-first annual ACM symposium on Theory of computing.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Oblivious transfer with adaptive queries

    Naor, M. & Pinkas, B., 1999, Advances in Cryptology – CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Wiener, M. (ed.). Springer Verlag, p. 573-590 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1666).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    139 Scopus citations
  • Privacy preserving auctions and mechanism design

    Naor, M., Pinkas, B. & Sumner, R., 1999, Proceedings of the 1st ACM Conference on Electronic Commerce, EC 1999. p. 129-139 11 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    511 Scopus citations
  • 1998

    Secure and efficient metering

    Naor, M. & Pinkas, B., 1998, Advances in Cryptology — EUROCRYPT 1998, International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Nyberg, K. (ed.). Springer Verlag, p. 576-590 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1403).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    57 Scopus citations
  • Threshold traitor tracing

    Naor, M. & Pinkas, B., 1998, Advances in Cryptology – CRYPTO 1998 - 18th Annual International Cryptology Conference, Proceedings. Krawczyk, H. (ed.). Springer Verlag, p. 502-517 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1462).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    92 Scopus citations
  • 1997

    Visual authentication and identification

    Naor, M. & Pinkas, B., 1997, Advances in Cryptology — CRYPTO 1997 - 17th Annual International Cryptology Conference, Proceedings. Kaliski, B. S. (ed.). Springer Verlag, p. 322-336 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1294).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    207 Scopus citations
  • 1991

    On the impossibility of private key cryptography with weakly random keys

    McInnes, J. L. & Pinkas, B., 1991, Advances in Cryptology – CRYPTO 1990, Proceedings. Menezes, A. J. & Vanstone, S. A. (eds.). Springer Verlag, p. 421-435 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    37 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.