Search results

  • 2025

    Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., Mar 2025, In: Journal of Cryptology. 38, 1, 1.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • 2024

    Privacy Preserving Feature Selection for Sparse Linear Regression

    Akavia, A., Galili, B., Shaul, H., Weiss, M. & Yakhini, Z., 1 Jan 2024, In: Proceedings on Privacy Enhancing Technologies.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • The Price of Active Security in Cryptographic Protocols

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., Jul 2024, In: Journal of Cryptology. 37, 3, 30.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Zero-Knowledge IOPs Approaching Witness Length

    Ron-Zewi, N. & Weiss, M., 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 105-137 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14369 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE

    Akavia, A., Galili, B., Shaul, H., Weiss, M. & Yakhini, Z., 2023, Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE Computer Society, p. 489-504 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2023-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Your Reputation’s Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 34-64 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14369 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and More

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 3. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Shielding Probabilistically Checkable Proofs: Zero-Knowledge PCPs from Leakage Resilience

    Weiss, M., Jul 2022, In: Entropy. 24, 7, 970.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    1 Scopus citations
  • ZK-PCPs from Leakage-Resilient Secret Sharing

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., Oct 2022, In: Journal of Cryptology. 35, 4, 23.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • 2021

    Is There an Oblivious RAM Lower Bound for Online Reads?

    Weiss, M. & Wichs, D., Jul 2021, In: Journal of Cryptology. 34, 3, 18.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • ZK-PCPs from leakage-resilient secret sharing

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 1 Jul 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 6. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 199).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2020

    The Price of Active Security in Cryptographic Protocols

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 184-215 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • 2019

    Linear-regression on packed encrypted data in the two-server model

    Akavia, A., Shaul, H., Weiss, M. & Yakhini, Z., 11 Nov 2019, WAHC 2019 - Proceedings of the 7th ACM Workshop on Encrypted Computing and Applied Homomorphic Cryptography. Association for Computing Machinery, p. 21-32 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • On the Plausibility of Fully Homomorphic Encryption for RAMs

    Hamlin, A., Holmgren, J., Weiss, M. & Wichs, D., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 589-619 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11692 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Permuted Puzzles and Cryptographic Hardness

    Boyle, E., Holmgren, J. & Weiss, M., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Springer, p. 465-493 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Private anonymous data access

    Hamlin, A., Ostrovsky, R., Weiss, M. & Wichs, D., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 244-273 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2018

    Is There an Oblivious RAM Lower Bound for Online Reads?

    Weiss, M. & Wichs, D., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 603-635 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11240 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Multi-Key Searchable Encryption, Revisited

    Hamlin, A., Shelat, A., Weiss, M. & Wichs, D., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 95-124 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    34 Scopus citations
  • 2017

    How to construct a leakage-resilient (stateless) trusted party

    Genkin, D., Ishai, Y. & Weiss, M., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer Verlag, p. 209-244 36 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2016

    Binary AMD circuits from secure multiparty computation

    Genkin, D., Ishai, Y. & Weiss, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 336-366 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Making the best of a leaky situation: Zero-knowledge PCPs from leakage-resilient circuits

    Ishai, Y., Weiss, M. & Yang, G., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 3-32 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2014

    Probabilistically checkable proofs of proximity with zero-knowledge

    Ishai, Y. & Weiss, M., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. Springer Verlag, p. 121-145 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • 2013

    Zero knowledge LTCs and their applications

    Ishai, Y., Sahai, A., Viderman, M. & Weiss, M., 2013, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 16th International Workshop, APPROX 2013 and 17th International Workshop, RANDOM 2013, Proceedings. p. 607-622 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8096 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.