Æȷοì
Avishay Yanai
Avishay Yanai
VMware Research
biu.ac.ilÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
SpOT-light: lightweight private set intersection from sparse OT extension
B Pinkas, M Rosulek, N Trieu, A Yanai
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology ¡¦, 2019
2432019
PSI from PaXoS: fast, malicious private set intersection
B Pinkas, M Rosulek, N Trieu, A Yanai
Annual International Conference on the Theory and Applications of ¡¦, 2020
2212020
Efficient circuit-based PSI with linear communication
B Pinkas, T Schneider, O Tkachenko, A Yanai
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference ¡¦, 2019
2152019
Efficient constant-round multi-party computation combining BMR and SPDZ
Y Lindell, B Pinkas, NP Smart, A Yanai
Journal of Cryptology 32, 1026-1069, 2019
1662019
Oblivious key-value stores and amplification for private set intersection
G Garimella, B Pinkas, M Rosulek, N Trieu, A Yanai
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology ¡¦, 2021
1292021
Senate: a {Maliciously-Secure}{MPC} platform for collaborative analytics
R Poddar, S Kalra, A Yanai, R Deng, RA Popa, JM Hellerstein
30th USENIX Security Symposium (USENIX Security 21), 2129-2146, 2021
892021
Blinder--Scalable, Robust Anonymous Committed Broadcast
I Abraham, B Pinkas, A Yanai
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications ¡¦, 2020
862020
Simple, fast malicious multiparty private set intersection
O Nevo, N Trieu, A Yanai
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications ¡¦, 2021
692021
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020
542020
Efficient maliciously secure multiparty computation for RAM
M Keller, A Yanai
Annual International Conference on the Theory and Applications of ¡¦, 2018
472018
Utt: Decentralized ecash with accountable privacy
A Tomescu, A Bhat, B Applebaum, I Abraham, G Gueta, B Pinkas, A Yanai
Cryptology ePrint Archive, 2022
402022
Committed MPC: Maliciously secure multiparty computation from homomorphic commitments
TK Frederiksen, B Pinkas, A Yanai
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on ¡¦, 2018
272018
Constant-round maliciously secure two-party computation in the RAM model
C Hazay, A Yanai
Journal of Cryptology 32 (4), 1144-1199, 2019
212019
Multiparty Private Set Intersection Cardinality and Its Applications.
N Trieu, A Yanai, J Gao
IACR Cryptol. ePrint Arch. 2022, 735, 2022
18*2022
A privacy preserving collusion secure DCOP algorithm
T Tassa, T Grinshpoun, A Yanai
arXiv preprint arXiv:1905.09013, 2019
172019
PC-SyncBB: A privacy preserving collusion secure DCOP algorithm
T Tassa, T Grinshpoun, A Yanai
Artificial Intelligence 297, 103501, 2021
162021
Fear not, vote truthfully: Secure Multiparty Computation of score based rules
L Dery, T Tassa, A Yanai
Expert Systems with Applications 168, 114434, 2021
132021
Scionfl: Efficient and robust secure quantized aggregation
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 490-511, 2024
112024
Efficient perfectly secure computation with optimal resilience
I Abraham, G Asharov, A Yanai
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC ¡¦, 2021
112021
Scionfl: Secure quantized aggregation for federated learning
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
CoRR, vol. abs/2210.07376, 2022
82022
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20