Follow
Avishay Yanai
Avishay Yanai
VMware Research
Verified email at biu.ac.il - Homepage
Title
Cited by
Cited by
Year
SpOT-light: lightweight private set intersection from sparse OT extension
B Pinkas, M Rosulek, N Trieu, A Yanai
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
2332019
Efficient circuit-based PSI with linear communication
B Pinkas, T Schneider, O Tkachenko, A Yanai
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
2102019
PSI from PaXoS: fast, malicious private set intersection
B Pinkas, M Rosulek, N Trieu, A Yanai
Annual International Conference on the Theory and Applications of …, 2020
2072020
Efficient constant-round multi-party computation combining BMR and SPDZ
Y Lindell, B Pinkas, NP Smart, A Yanai
Journal of Cryptology 32, 1026-1069, 2019
1632019
Oblivious key-value stores and amplification for private set intersection
G Garimella, B Pinkas, M Rosulek, N Trieu, A Yanai
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
1172021
Senate: a {Maliciously-Secure}{MPC} platform for collaborative analytics
R Poddar, S Kalra, A Yanai, R Deng, RA Popa, JM Hellerstein
30th USENIX Security Symposium (USENIX Security 21), 2129-2146, 2021
862021
Blinder--Scalable, Robust Anonymous Committed Broadcast
I Abraham, B Pinkas, A Yanai
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
842020
Simple, fast malicious multiparty private set intersection
O Nevo, N Trieu, A Yanai
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
662021
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020
522020
Efficient maliciously secure multiparty computation for RAM
M Keller, A Yanai
Annual International Conference on the Theory and Applications of …, 2018
462018
Utt: Decentralized ecash with accountable privacy
A Tomescu, A Bhat, B Applebaum, I Abraham, G Gueta, B Pinkas, A Yanai
Cryptology ePrint Archive, 2022
372022
Committed MPC: Maliciously secure multiparty computation from homomorphic commitments
TK Frederiksen, B Pinkas, A Yanai
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
262018
Constant-round maliciously secure two-party computation in the RAM model
C Hazay, A Yanai
Journal of Cryptology 32 (4), 1144-1199, 2019
202019
A privacy preserving collusion secure DCOP algorithm
T Tassa, T Grinshpoun, A Yanai
arXiv preprint arXiv:1905.09013, 2019
172019
Multiparty Private Set Intersection Cardinality and Its Applications.
N Trieu, A Yanai, J Gao
IACR Cryptol. ePrint Arch. 2022, 735, 2022
16*2022
PC-SyncBB: A privacy preserving collusion secure DCOP algorithm
T Tassa, T Grinshpoun, A Yanai
Artificial Intelligence 297, 103501, 2021
162021
Fear not, vote truthfully: Secure Multiparty Computation of score based rules
L Dery, T Tassa, A Yanai
Expert Systems with Applications 168, 114434, 2021
122021
Scionfl: Efficient and robust secure quantized aggregation
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 490-511, 2024
102024
Efficient perfectly secure computation with optimal resilience
I Abraham, G Asharov, A Yanai
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
92021
Scionfl: Secure quantized aggregation for federated learning
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
CoRR, vol. abs/2210.07376, 2022
82022
The system can't perform the operation now. Try again later.
Articles 1–20