Shai Halevi

Results: 19



#Item
11MINUTES IACR MEMBERSHIP MEETING CRYPTO’11  Opening. AtPreneel opens the meeting and gives a presentation about the IACR during which he thanks the ex-officers and the outgoing membership secretary Shai Halevi. [

MINUTES IACR MEMBERSHIP MEETING CRYPTO’11 Opening. AtPreneel opens the meeting and gives a presentation about the IACR during which he thanks the ex-officers and the outgoing membership secretary Shai Halevi. [

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-16 10:11:47
    12The Random Oracle Methodology, Revisited∗ Ran Canetti† Oded Goldreich‡  Shai Halevi§

    The Random Oracle Methodology, Revisited∗ Ran Canetti† Oded Goldreich‡ Shai Halevi§

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2003-08-01 15:32:21
    13Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal ? , Craig Gentry ?? , Shai Halevi ? ? ? , and Amit Sahai† Abstract. The classic Leftover Hash Lemma (LHL) is one of the most useful tools in cr

    Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal ? , Craig Gentry ?? , Shai Halevi ? ? ? , and Amit Sahai† Abstract. The classic Leftover Hash Lemma (LHL) is one of the most useful tools in cr

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-03-22 00:09:18
    14One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

    One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-12-22 12:08:05
    15Hardness amplification of weakly verifiable puzzles Ran Canetti? , Shai Halevi, and Michael Steiner IBM T.J. Watson Research Center, Hawthorne, NY, USA. [removed], [removed], [removed]

    Hardness amplification of weakly verifiable puzzles Ran Canetti? , Shai Halevi, and Michael Steiner IBM T.J. Watson Research Center, Hawthorne, NY, USA. [removed], [removed], [removed]

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2008-09-15 00:54:52
    16FULLY HOMOMORPHIC ENCRYPTION WITH POLYLOG OVERHEAD Craig Gentry and Shai Halevi IBM Watson Nigel Smart

    FULLY HOMOMORPHIC ENCRYPTION WITH POLYLOG OVERHEAD Craig Gentry and Shai Halevi IBM Watson Nigel Smart

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2012-04-28 06:08:51
    17Fully Secure Functional Encryption without Obfuscation Sanjam Garg∗ Craig Gentry†  Shai Halevi‡

    Fully Secure Functional Encryption without Obfuscation Sanjam Garg∗ Craig Gentry† Shai Halevi‡

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-11-12 08:24:27
    18The Hash Function “Fugue 2.0” Shai Halevi

    The Hash Function “Fugue 2.0” Shai Halevi

    Add to Reading List

    Source URL: researcher.watson.ibm.com

    Language: English - Date: 2012-04-03 14:49:38
    19The Hash Function “Fugue” Shai Halevi

    The Hash Function “Fugue” Shai Halevi

    Add to Reading List

    Source URL: researcher.watson.ibm.com

    Language: English - Date: 2012-04-03 14:47:34