How to leak a secret RL Rivest, A Shamir, Y Tauman Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001 | 2288 | 2001 |
Delegating computation: interactive proofs for muggles S Goldwasser, YT Kalai, GN Rothblum Journal of the ACM (JACM) 62 (4), 1-64, 2015 | 733 | 2015 |
Improved online/offline signature schemes A Shamir, Y Tauman Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 521 | 2001 |
Improved online/offline signature schemes A Shamir, Y Tauman Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 521 | 2001 |
Improved delegation of computation using fully homomorphic encryption KM Chung, Y Kalai, S Vadhan Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 511 | 2010 |
Reusable garbled circuits and succinct functional encryption S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013 | 487 | 2013 |
On the (in) security of the Fiat-Shamir paradigm S Goldwasser, YT Kalai 44th Annual IEEE Symposium on Foundations of Computer Science, 2003 …, 2003 | 427 | 2003 |
One-Time Programs. S Goldwasser, YT Kalai, GN Rothblum Crypto 5157, 39-56, 2008 | 295 | 2008 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 292 | 2006 |
Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage Z Brakerski, YT Kalai, J Katz, V Vaikuntanathan 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 501-510, 2010 | 287 | 2010 |
Protecting obfuscation against algebraic attacks B Barak, S Garg, YT Kalai, O Paneth, A Sahai Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 285 | 2014 |
Public-key encryption schemes with auxiliary inputs Y Dodis, S Goldwasser, Y Tauman Kalai, C Peikert, V Vaikuntanathan Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 263 | 2010 |
On the impossibility of obfuscation with auxiliary input S Goldwasser, YT Kalai 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05), 553-562, 2005 | 259 | 2005 |
On cryptography with auxiliary input Y Dodis, YT Kalai, S Lovett Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009 | 255 | 2009 |
How to run turing machines on encrypted data S Goldwasser, YT Kalai, RA Popa, V Vaikuntanathan, N Zeldovich Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 239 | 2013 |
Robustness of the learning with errors assumption S Goldwasser, YT Kalai, C Peikert, V Vaikuntanathan Tsinghua University Press, 2010 | 212 | 2010 |
Smooth projective hashing and two-message oblivious transfer YT Kalai Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005 | 170 | 2005 |
Memory delegation KM Chung, YT Kalai, FH Liu, R Raz Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 155 | 2011 |
How to delegate computations: the power of no-signaling proofs YT Kalai, R Raz, RD Rothblum Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014 | 147 | 2014 |
Smooth projective hashing and two-message oblivious transfer S Halevi, YT Kalai Journal of Cryptology 25 (1), 158-193, 2012 | 127 | 2012 |