Computationally private information retrieval B Chor, N Gilboa Proceedings of the twenty-ninth annual ACM symposium on Theory of computing …, 1997 | 371 | 1997 |
Private information retrieval by keywords B Chor, N Gilboa, M Naor Technion-IIT, Department of Computer Science, 1997 | 242 | 1997 |
Two party RSA key generation N Gilboa Annual International Cryptology Conference, 116-129, 1999 | 185 | 1999 |
Function secret sharing E Boyle, N Gilboa, Y Ishai Annual international conference on the theory and applications of …, 2015 | 132 | 2015 |
Virtual private network mechanism incorporating security association processor Y Shapira, D Shohat, M Zezak, N Gilboa US Patent 7,107,464, 2006 | 123 | 2006 |
Breaking the circuit size barrier for secure computation under DDH E Boyle, N Gilboa, Y Ishai Annual International Cryptology Conference, 509-539, 2016 | 82 | 2016 |
Function secret sharing: Improvements and extensions E Boyle, N Gilboa, Y Ishai Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 77 | 2016 |
Distributed point functions and their applications N Gilboa, Y Ishai Annual International Conference on the Theory and Applications of …, 2014 | 73 | 2014 |
Group-based secure computation: optimizing rounds, communication, and computation E Boyle, N Gilboa, Y Ishai Annual International Conference on the Theory and Applications of …, 2017 | 51 | 2017 |
Method and system for secure communication between a public network and a local network A Bragagnini, D Buffa, P Pellegrino, L Scevola, D Shohat, Z Sadan, ... US Patent 8,274,979, 2012 | 39 | 2012 |
Foundations of homomorphic secret sharing E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro 9th Innovations in Theoretical Computer Science Conference (ITCS 2018), 2018 | 36 | 2018 |
Compressing vector OLE E Boyle, G Couteau, N Gilboa, Y Ishai Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 35 | 2018 |
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation S Dolev, N Gilboa, X Li Proceedings of the 3rd International Workshop on Security in Cloud Computing …, 2015 | 32* | 2015 |
Homomorphic secret sharing: optimizations and applications E Boyle, G Couteau, N Gilboa, Y Ishai, M Orrù Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 29 | 2017 |
Efficient pseudorandom correlation generators: Silent OT extension and more E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl Annual International Cryptology Conference, 489-518, 2019 | 28 | 2019 |
Efficient two-round OT extension and silent non-interactive secure computation E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Rindal, P Scholl Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 23 | 2019 |
Swarming secrets S Dolev, J Garay, N Gilboa, V Kolesnikov 2009 47th Annual Allerton Conference on Communication, Control, and …, 2009 | 22 | 2009 |
Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time S Dolev, N Gilboa, M Kopeetsky Proceedings of the 2010 ACM Symposium on Applied Computing, 1460-1465, 2010 | 21 | 2010 |
Zero-knowledge proofs on secret-shared data via fully linear PCPs D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai Annual International Cryptology Conference, 67-97, 2019 | 20 | 2019 |
Method and system for operating a telecommunication device using a hash table in particular for protecting such device from attacks N Gilboa US Patent 8,185,559, 2012 | 20 | 2012 |