Shai Halevi

Results: 19



#Item
1After-the-Fact Leakage in Public-Key Encryption Huijia Lin∗ Cornell University Shai Halevi IBM Research

After-the-Fact Leakage in Public-Key Encryption Huijia Lin∗ Cornell University Shai Halevi IBM Research

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2011-01-06 01:53:57
    2How to Compress (Reusable) Garbled Circuits Craig Gentry∗ Sergey Gorbunov†  Shai Halevi‡

    How to Compress (Reusable) Garbled Circuits Craig Gentry∗ Sergey Gorbunov† Shai Halevi‡

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2013-12-09 21:49:28
      3A Forward-Secure Public-Key Encryption Scheme∗ Ran Canetti† Shai Halevi†  Jonathan Katz‡

      A Forward-Secure Public-Key Encryption Scheme∗ Ran Canetti† Shai Halevi† Jonathan Katz‡

      Add to Reading List

      Source URL: www.cs.umd.edu

      - Date: 2006-12-29 08:35:29
        4TCC 2016­B Call for Papers Submission Deadline   Friday, May 20, 2016, Anywhere on Earth  Notification of Decision

        TCC 2016­B Call for Papers Submission Deadline   Friday, May 20, 2016, Anywhere on Earth Notification of Decision

        Add to Reading List

        Source URL: tcc2016b.sklois.cn

        Language: English - Date: 2016-05-03 02:55:25
        5A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway†  June 17, 2003

        A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        Language: English - Date: 2003-08-29 18:48:29
        6Garbled RAM, Revisited  Daniel Wichs (Northeastern University) Joint work with: Craig Gentry, Shai Halevi,  Seteve Lu,  Rafail Ostrovsky, Mariana Raykova

        Garbled RAM, Revisited Daniel Wichs (Northeastern University) Joint work with: Craig Gentry, Shai Halevi,  Seteve Lu,  Rafail Ostrovsky, Mariana Raykova

        Add to Reading List

        Source URL: ec14.compute.dtu.dk

        Language: English - Date: 2014-05-16 06:52:20
          7Homomorphic Evaluation of the AES Circuit (Updated Implementation) Craig Gentry IBM Research  Shai Halevi

          Homomorphic Evaluation of the AES Circuit (Updated Implementation) Craig Gentry IBM Research Shai Halevi

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-01-03 14:06:44
            8Field Switching in BGV-Style Homomorphic Encryption Craig Gentry IBM Research Shai Halevi IBM Research

            Field Switching in BGV-Style Homomorphic Encryption Craig Gentry IBM Research Shai Halevi IBM Research

            Add to Reading List

            Source URL: web.eecs.umich.edu

            Language: English - Date: 2015-09-08 16:32:03
              9Implementing Gentry’s Fully-Homomorphic Encryption Scheme Craig Gentry Shai Halevi  IBM Research

              Implementing Gentry’s Fully-Homomorphic Encryption Scheme Craig Gentry Shai Halevi IBM Research

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2011-02-04 14:26:37
                10A Two Layered Approach for Securing an Object Store Network Alain Azagury∗ Ran Canetti† Michael Factor∗ Shai Halevi† Ealan Henis∗

                A Two Layered Approach for Securing an Object Store Network Alain Azagury∗ Ran Canetti† Michael Factor∗ Shai Halevi† Ealan Henis∗

                Add to Reading List

                Source URL: www.cs.tau.ac.il

                Language: English - Date: 2008-11-05 15:38:44