1![After-the-Fact Leakage in Public-Key Encryption Huijia Lin∗ Cornell University Shai Halevi IBM Research After-the-Fact Leakage in Public-Key Encryption Huijia Lin∗ Cornell University Shai Halevi IBM Research](https://www.pdfsearch.io/img/0db24535efc115d773c4ce66ed8c7d35.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2011-01-06 01:53:57
|
---|
2![How to Compress (Reusable) Garbled Circuits Craig Gentry∗ Sergey Gorbunov† Shai Halevi‡ How to Compress (Reusable) Garbled Circuits Craig Gentry∗ Sergey Gorbunov† Shai Halevi‡](https://www.pdfsearch.io/img/7c0673656769517eba69dd2c51c735fb.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2013-12-09 21:49:28
|
---|
3![A Forward-Secure Public-Key Encryption Scheme∗ Ran Canetti† Shai Halevi† Jonathan Katz‡ A Forward-Secure Public-Key Encryption Scheme∗ Ran Canetti† Shai Halevi† Jonathan Katz‡](https://www.pdfsearch.io/img/861ac7d5b99ee8e1d3fc5cdbc4cc1b7c.jpg) | Add to Reading ListSource URL: www.cs.umd.edu- Date: 2006-12-29 08:35:29
|
---|
4![TCC 2016B Call for Papers Submission Deadline Friday, May 20, 2016, Anywhere on Earth Notification of Decision TCC 2016B Call for Papers Submission Deadline Friday, May 20, 2016, Anywhere on Earth Notification of Decision](https://www.pdfsearch.io/img/abeb33e7add8967317aee488d1ee6c71.jpg) | Add to Reading ListSource URL: tcc2016b.sklois.cnLanguage: English - Date: 2016-05-03 02:55:25
|
---|
5![A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003 A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003](https://www.pdfsearch.io/img/db6b6e4e9b3aed5a8c0d5808c9e88e7e.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2003-08-29 18:48:29
|
---|
6![Garbled RAM, Revisited Daniel Wichs (Northeastern University) Joint work with: Craig Gentry, Shai Halevi, Seteve Lu, Rafail Ostrovsky, Mariana Raykova Garbled RAM, Revisited Daniel Wichs (Northeastern University) Joint work with: Craig Gentry, Shai Halevi, Seteve Lu, Rafail Ostrovsky, Mariana Raykova](https://www.pdfsearch.io/img/32641e0aeb4e4a02d279bdc98c40b104.jpg) | Add to Reading ListSource URL: ec14.compute.dtu.dkLanguage: English - Date: 2014-05-16 06:52:20
|
---|
7![Homomorphic Evaluation of the AES Circuit (Updated Implementation) Craig Gentry IBM Research Shai Halevi Homomorphic Evaluation of the AES Circuit (Updated Implementation) Craig Gentry IBM Research Shai Halevi](https://www.pdfsearch.io/img/95137b155879f1dee37d8f90914ddaa0.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-01-03 14:06:44
|
---|
8![Field Switching in BGV-Style Homomorphic Encryption Craig Gentry IBM Research Shai Halevi IBM Research Field Switching in BGV-Style Homomorphic Encryption Craig Gentry IBM Research Shai Halevi IBM Research](https://www.pdfsearch.io/img/eb7c56933ca56e6329fea252a424a00e.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2015-09-08 16:32:03
|
---|
9![Implementing Gentry’s Fully-Homomorphic Encryption Scheme Craig Gentry Shai Halevi IBM Research Implementing Gentry’s Fully-Homomorphic Encryption Scheme Craig Gentry Shai Halevi IBM Research](https://www.pdfsearch.io/img/d2b44a346ed88f54b6e605d20953521b.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-02-04 14:26:37
|
---|
10![A Two Layered Approach for Securing an Object Store Network Alain Azagury∗ Ran Canetti† Michael Factor∗ Shai Halevi† Ealan Henis∗ A Two Layered Approach for Securing an Object Store Network Alain Azagury∗ Ran Canetti† Michael Factor∗ Shai Halevi† Ealan Henis∗](https://www.pdfsearch.io/img/629e9208d8be20eee4b271a891687f7e.jpg) | Add to Reading ListSource URL: www.cs.tau.ac.ilLanguage: English - Date: 2008-11-05 15:38:44
|
---|