Shai Halevi

Results: 19



#Item
1

After-the-Fact Leakage in Public-Key Encryption Huijia Lin∗ Cornell University Shai Halevi IBM Research

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2011-01-06 01:53:57
    2

    How to Compress (Reusable) Garbled Circuits Craig Gentry∗ Sergey Gorbunov† Shai Halevi‡

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2013-12-09 21:49:28
      3

      A Forward-Secure Public-Key Encryption Scheme∗ Ran Canetti† Shai Halevi† Jonathan Katz‡

      Add to Reading List

      Source URL: www.cs.umd.edu

      - Date: 2006-12-29 08:35:29
        4Digital media / Research / Shai Halevi / International Association for Cryptologic Research / Theory of Cryptography Conference / Electronic submission / Cryptography / Academic publishing

        TCC 2016­B Call for Papers Submission Deadline   Friday, May 20, 2016, Anywhere on Earth Notification of Decision

        Add to Reading List

        Source URL: tcc2016b.sklois.cn

        Language: English - Date: 2016-05-03 02:55:25
        5Disk encryption theory / Cryptography / Block cipher / Advantage / Stream ciphers / Cipher / Vigenre cipher / Format-preserving encryption

        A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        Language: English - Date: 2003-08-29 18:48:29
        6

        Garbled RAM, Revisited Daniel Wichs (Northeastern University) Joint work with: Craig Gentry, Shai Halevi,  Seteve Lu,  Rafail Ostrovsky, Mariana Raykova

        Add to Reading List

        Source URL: ec14.compute.dtu.dk

        Language: English - Date: 2014-05-16 06:52:20
          7

          Homomorphic Evaluation of the AES Circuit (Updated Implementation) Craig Gentry IBM Research Shai Halevi

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-01-03 14:06:44
            8

            Field Switching in BGV-Style Homomorphic Encryption Craig Gentry IBM Research Shai Halevi IBM Research

            Add to Reading List

            Source URL: web.eecs.umich.edu

            Language: English - Date: 2015-09-08 16:32:03
              9

              Implementing Gentry’s Fully-Homomorphic Encryption Scheme Craig Gentry Shai Halevi IBM Research

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2011-02-04 14:26:37
                10

                A Two Layered Approach for Securing an Object Store Network Alain Azagury∗ Ran Canetti† Michael Factor∗ Shai Halevi† Ealan Henis∗

                Add to Reading List

                Source URL: www.cs.tau.ac.il

                Language: English - Date: 2008-11-05 15:38:44
                  UPDATE