Pinkas

Results: 36



#Item
1

An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2008-01-30 02:51:31
    2

    Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-10-29 04:46:48
      3

      Phasing: Private Set Intersection using Permutation-based Hashing (Full Version)∗ Benny Pinkas Bar-Ilan University, Israel

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-07-27 04:51:05
        4

        On the Lindell-Pinkas Secure Computation of Logarithms: From Theory to Practice Raphael S. Ryger∗ Onur Kardes†

        Add to Reading List

        Source URL: www.csee.umbc.edu

        - Date: 2008-02-15 00:34:08
          5

          SCiFI – A system for Secure Computation of Face Identification Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovitch University of Haifa

          Add to Reading List

          Source URL: oakland31.cs.virginia.edu

          - Date: 2010-05-25 18:37:01
            6

            Distributed Pseudo-Random Functions and KDCs Moni Naor? Benny Pinkas?? Omer Reingold??? Dept. of Computer Science and Applied Math Weizmann Institute of Science Rehovot, Israel

            Add to Reading List

            Source URL: omereingold.files.wordpress.com

            Language: English - Date: 2014-10-21 19:12:21
              7

              Oblivious RAM Revisited Benny Pinkas∗ Dept. of Computer Science University of Haifa Mount Carmel, Haifa 31905, Israel

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2010-06-22 17:30:57
                8

                An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Benny Pinkas University of Haifa Yehuda Lindell, Bar-Ilan University

                Add to Reading List

                Source URL: www.iacr.org

                - Date: 2007-06-12 08:51:42
                  9

                  SCiFI – A system for Secure Computation of Face Identification Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovitch University of Haifa

                  Add to Reading List

                  Source URL: oakland10.cs.virginia.edu

                  Language: English - Date: 2010-05-25 18:37:01
                    10

                    Cracks in the Special Relationship Israel-US Ties under Obama and Netanyahu Proceedings of a symposium participated by: Dr. Ilai Saltzman, Jeremy Ben-Ami, and Alon Pinkas Edited by: Dr. Nimrod Goren

                    Add to Reading List

                    Source URL: www.mitvim.org.il

                    Language: English - Date: 2015-03-03 04:20:34
                      UPDATE