[go: up one dir, main page]

Follow
Anat Paskin-Cherniavsky
Anat Paskin-Cherniavsky
Verified email at ariel.ac.il
Title
Cited by
Cited by
Year
Evaluating branching programs on encrypted data
Y Ishai, A Paskin
Theory of Cryptography Conference, 575-594, 2007
3492007
On the power of correlated randomness in secure computation
Y Ishai, E Kushilevitz, S Meldgaard, C Orlandi, A Paskin-Cherniavsky
Theory of cryptography conference, 600-620, 2013
1672013
Non-interactive secure multiparty computation
A Beimel, A Gabizon, Y Ishai, E Kushilevitz, S Meldgaard, ...
Annual Cryptology Conference, 387-404, 2014
1322014
Maliciously Circuit-private FHE
R Ostrovsky, A Paskin-Cherniavsky, B Paskin-Cherniavsky
IACR Cryptology ePrint Archive 2013 (307), 2013
872013
Secure multiparty computation with minimal interaction
Y Ishai, E Kushilevitz, A Paskin
Annual Cryptology Conference, 577-594, 2010
822010
Psimple: Practical multiparty maliciously-secure private set intersection
A Ben-Efraim, O Nissenbaum, E Omri, A Paskin-Cherniavsky
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
672022
Secure computation with minimal interaction, revisited
Y Ishai, R Kumaresan, E Kushilevitz, A Paskin-Cherniavsky
Annual Cryptology Conference, 359-378, 2015
602015
Evolving secret sharing: dynamic thresholds and robustness
I Komargodski, A Paskin-Cherniavsky
Theory of Cryptography Conference, 379-393, 2017
532017
Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Conference on the Theory and Applications of …, 2021
332021
MPC with friends and foes
B Alon, E Omri, A Paskin-Cherniavsky
Annual International Cryptology Conference, 677-706, 2020
302020
Constructing locally leakage-resilient linear secret-sharing schemes
HK Maji, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Cryptology Conference, 779-808, 2021
29*2021
Improved bound on the local leakage-resilience of Shamir’s secret sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
232022
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme {\&} Its Consequences
HK Maji, HH Nguyen, A Paskin, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography, ITC, 2022
152022
Lower bounds for leakage-resilient secret-sharing schemes against probing attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
152021
Locally Decodable Codes for edit distance
R Ostrovsky, A Paskin-Cherniavsky
IACR Cryptology ePrint Archive 2014 (260), 2014
152014
Secure computation with minimal interaction
A Paskin-Cherniavsky, Y Ishai, E Kushilevitz
Computer Science Department, Technion, 2012
122012
Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
Theory of Cryptography Conference, 355-383, 2022
112022
Statistical randomized encodings: A complexity theoretic view
S Agrawal, Y Ishai, D Khurana, A Paskin-Cherniavsky
International Colloquium on Automata, Languages, and Programming, 1-13, 2015
112015
Constructing leakage-resilient Shamir’s secret sharing: Over composite order fields
HK Maji, HH Nguyen, A Paskin-Cherniavsky, X Ye
Annual International Conference on the Theory and Applications of …, 2024
102024
How to infinitely share a secret more efficiently
A Paskin-Cherniavsky
Cryptology ePrint Archive, 2016
92016
The system can't perform the operation now. Try again later.
Articles 1–20