What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Carmit Hazay
Google Scholar
81
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Mor Weiss
2025
conf/ctrsa
Non-interactive Threshold BBS+ from Pseudorandom Correlations.
Sebastian Faust
Carmit Hazay
David Kretzler
Leandro Rometsch
Benjamin Schlosser
2025
conf/eurocrypt
Breaking the 1/λ-Rate Barrier for Arithmetic Garbling.
Geoffroy Couteau
Carmit Hazay
Aditya Hegde
Naman Kumar
2025
conf/crypto
ømega (1/λ )-Rate Boolean Garbling Scheme from Generic Groups.
Geoffroy Couteau
Carmit Hazay
Aditya Hegde
Naman Kumar
2024
journals/joc
The Price of Active Security in Cryptographic Protocols.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Mor Weiss
2024
conf/ccs
Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction.
Yibin Yang
David Heath
Carmit Hazay
Vladimir Kolesnikov
Muthuramakrishnan Venkitasubramaniam
2024
conf/crypto
Malicious Security for SCALES - Outsourced Computation with Ephemeral Servers.
Anasuya Acharya
Carmit Hazay
Vladimir Kolesnikov
Manoj Prabhakaran
2024
conf/sp
Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser.
Ruihan Wang
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2024
conf/eurocrypt
Toward Malicious Constant-Rate 2PC via Arithmetic Garbling.
Carmit Hazay
Yibin Yang
2024
conf/asiacrypt
sfLogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK.
Carmit Hazay
David Heath
Vladimir Kolesnikov
Muthuramakrishnan Venkitasubramaniam
Yibin Yang
2023
journals/tches
Garbled Circuits from an SCA Perspective Free XOR can be Quite Expensive. . .
Itamar Levi
Carmit Hazay
2023
journals/joc
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model.
Carmit Hazay
Yuval Ishai
Muthuramakrishnan Venkitasubramaniam
2023
conf/ccs
Batchman and Robin: Batched and Non-batched Branching for Interactive ZK.
Yibin Yang
David Heath
Carmit Hazay
Vladimir Kolesnikov
Muthuramakrishnan Venkitasubramaniam
2023
conf/crypto
Best of Both Worlds - Revisiting the Spymasters Double Agent Problem.
Anasuya Acharya
Carmit Hazay
Oxana Poburinnaya
Muthuramakrishnan Venkitasubramaniam
2023
conf/acns
A New Approach to Garbled Circuits.
Anasuya Acharya
Tomer Ashur
Efrat Cohen
Carmit Hazay
Avishay Yanai
2023
conf/asiaccs
Flag: A Framework for Lightweight Robust Secure Aggregation.
Laasya Bangalore
Mohammad Hossein Faghihi Sereshgi
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2023
conf/pkc
Private Polynomial Commitments and Applications to MPC.
Rishabh Bhadauria
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Wenxuan Wu
Yupeng Zhang
2023
conf/ctrsa
Putting the Online Phase on a Diet: Covert Security from Short MACs.
Sebastian Faust
Carmit Hazay
David Kretzler
Benjamin Schlosser
2023
conf/tcc
Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Mor Weiss
2023
conf/tcc
Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Mor Weiss
2022
journals/popets
Fully Secure PSI via MPC-in-the-Head.
S. Dov Gordon
Carmit Hazay
Phi Hung Le
2022
journals/joc
TinyKeys: A New Approach to Efficient Multi-Party Computation.
Carmit Hazay
Emmanuela Orsini
Peter Scholl
Eduardo Soria-Vazquez
2022
journals/joc
ZK-PCPs from Leakage-Resilient Secret Sharing.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Mor Weiss
2022
conf/pkc
Financially Backed Covert Security.
Sebastian Faust
Carmit Hazay
David Kretzler
Benjamin Schlosser
2022
conf/eurocrypt
Asymptotically Quasi-Optimal Cryptography.
Leo de Castro
Carmit Hazay
Yuval Ishai
Vinod Vaikuntanathan
Muthuramakrishnan Venkitasubramaniam
2022
conf/tcc
On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives.
Laasya Bangalore
Rishabh Bhadauria
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2022
conf/tcc
SCALES - MPC with Small Clients and Larger Ephemeral Servers.
Anasuya Acharya
Carmit Hazay
Vladimir Kolesnikov
Manoj Prabhakaran
2021
journals/joc
Round-Optimal Secure Multi-party Computation.
Shai Halevi
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
2021
conf/sp
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.
Megan Chen
Carmit Hazay
Yuval Ishai
Yuriy Kashnikov
Daniele Micciancio
Tarik Riviere
Abhi Shelat
Muthuramakrishnan Venkitasubramaniam
Ruihan Wang
2021
conf/eurocrypt
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
Sebastian Faust
Carmit Hazay
David Kretzler
Benjamin Schlosser
2020
journals/joc
On the Power of Secure Two-Party Computation.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2020
journals/joc
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.
Carmit Hazay
Peter Scholl
Eduardo Soria-Vazquez
2020
conf/ccs
Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC.
Jackson Abascal
Mohammad Hossein Faghihi Sereshgi
Carmit Hazay
Yuval Ishai
Muthuramakrishnan Venkitasubramaniam
2020
conf/ccs
Ligero++: A New Optimized Sublinear IOP.
Rishabh Bhadauria
Zhiyong Fang
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Tiancheng Xie
Yupeng Zhang
2020
conf/pkc
Going Beyond Dual Execution: MPC for Functions with Efficient Verification.
Carmit Hazay
Abhi Shelat
Muthuramakrishnan Venkitasubramaniam
2020
conf/eurocrypt
The Price of Active Security in Cryptographic Protocols.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Mor Weiss
2020
conf/eurocrypt
Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions?
Carmit Hazay
Rafael Pass
Muthuramakrishnan Venkitasubramaniam
2019
journals/joc
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
Carmit Hazay
Gert Læssøe Mikkelsen
Tal Rabin
Tomas Toft
Angelo Agatino Nicolosi
2019
journals/joc
What Security Can We Achieve Within 4 Rounds?
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2019
journals/joc
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.
Carmit Hazay
Avishay Yanai
2019
journals/joc
On Black-Box Complexity of Universally Composable Security in the CRS Model.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2019
conf/ccs
LevioSA: Lightweight Secure Arithmetic Computation.
Carmit Hazay
Yuval Ishai
Antonio Marcedone
Muthuramakrishnan Venkitasubramaniam
2019
conf/ccs
Fast Actively Secure Five-Party Computation with Security Beyond Abort.
Megha Byali
Carmit Hazay
Arpita Patra
Swati Singla
2018
journals/joc
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs.
Carmit Hazay
2018
conf/crypto
TinyKeys: A New Approach to Efficient Multi-Party Computation.
Carmit Hazay
Emmanuela Orsini
Peter Scholl
Eduardo Soria-Vazquez
2018
conf/crypto
Round-Optimal Secure Multi-Party Computation.
Shai Halevi
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
2018
conf/asiacrypt
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT).
Carmit Hazay
Emmanuela Orsini
Peter Scholl
Eduardo Soria-Vazquez
2018
conf/tcc
Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2017
journals/joc
Efficient One-Sided Adaptively Secure Computation.
Carmit Hazay
Arpita Patra
2017
conf/ccs
Ligero: Lightweight Sublinear Arguments Without a Trusted Setup.
Scott Ames
Carmit Hazay
Yuval Ishai
Muthuramakrishnan Venkitasubramaniam
2017
conf/pkc
Scalable Multi-party Private Set-Intersection.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2017
conf/pkc
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model.
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
2017
conf/asiacrypt
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.
Carmit Hazay
Peter Scholl
Eduardo Soria-Vazquez
2017
conf/tcc
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model.
Carmit Hazay
Yuval Ishai
Muthuramakrishnan Venkitasubramaniam
2016
journals/joc
Leakage-Resilient Cryptography from Minimal Assumptions.
Carmit Hazay
Adriana López-Alt
Hoeteck Wee
Daniel Wichs
2016
journals/joc
Efficient Set Intersection with Simulation-Based Security.
Michael J. Freedman
Carmit Hazay
Kobbi Nissim
Benny Pinkas
2016
journals/joc
Toward a Game Theoretic View of Secure Computation.
Gilad Asharov
Ran Canetti
Carmit Hazay
2016
journals/joc
Signature Schemes Secure Against Hard-to-Invert Leakage.
Sebastian Faust
Carmit Hazay
Jesper Buus Nielsen
Peter Sebastian Nordholt
Angela Zottarel
2016
journals/joc
Automata Evaluation and Text Search Protocols with Simulation-Based Security.
Rosario Gennaro
Carmit Hazay
Jeffrey S. Sorensen
2016
conf/crypto
On the Power of Secure Two-Party Computation.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2016
conf/tcc
Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity.
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
2016
conf/tcc
Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2016
conf/tcc
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.
Carmit Hazay
Avishay Yanai
2015
conf/asiacrypt
Selective Opening Security for Receivers.
Carmit Hazay
Arpita Patra
Bogdan Warinschi
2015
conf/asiacrypt
On Black-Box Complexity of Universally Composable Security in the CRS Model.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2015
conf/tcc
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs.
Carmit Hazay
2014
journals/joc
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries.
Carmit Hazay
Tomas Toft
2014
conf/tcc
One-Sided Adaptively Secure Two-Party Computation.
Carmit Hazay
Arpita Patra
2013
conf/eurocrypt
Leakage-Resilient Cryptography from Minimal Assumptions.
Carmit Hazay
Adriana López-Alt
Hoeteck Wee
Daniel Wichs
2012
journals/joc
Efficient Set Operations in the Presence of Malicious Adversaries.
Carmit Hazay
Kobbi Nissim
2012
conf/ctrsa
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
Carmit Hazay
Gert Læssøe Mikkelsen
Tal Rabin
Tomas Toft
2012
conf/asiacrypt
Signature Schemes Secure against Hard-to-Invert Leakage.
Sebastian Faust
Carmit Hazay
Jesper Buus Nielsen
Peter Sebastian Nordholt
Angela Zottarel
2012
conf/tcc
Secure Two-Party Computation with Low Communication.
Ivan Damgård
Sebastian Faust
Carmit Hazay
2011
conf/eurocrypt
Towards a Game Theoretic View of Secure Computation.
Gilad Asharov
Ran Canetti
Carmit Hazay
2010
journals/joc
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
Carmit Hazay
Yehuda Lindell
2010
conf/pkc
Text Search Protocols with Simulation Based Security.
Rosario Gennaro
Carmit Hazay
Jeffrey S. Sorensen
2010
conf/pkc
Efficient Set Operations in the Presence of Malicious Adversaries.
Carmit Hazay
Kobbi Nissim
2010
conf/asiacrypt
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries.
Carmit Hazay
Tomas Toft
2008
conf/ccs
Constructions of truly practical secure protocols using standard smartcards.
Carmit Hazay
Yehuda Lindell
2008
conf/tcc
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
Carmit Hazay
Yehuda Lindell
2007
conf/tcc
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions.
Carmit Hazay
Jonathan Katz
Chiu-Yuen Koo
Yehuda Lindell
Coauthors
Abhi Shelat
(2)
Aditya Hegde
(2)
Adriana López-Alt
(2)
Anasuya Acharya
(4)
Angela Zottarel
(2)
Angelo Agatino Nicolosi
(1)
Antigoni Polychroniadou
(4)
Antonio Marcedone
(1)
Arpita Patra
(4)
Avishay Yanai
(3)
Benjamin Schlosser
(4)
Benny Pinkas
(1)
Bogdan Warinschi
(1)
Carmit Hazay
(81)
Chiu-Yuen Koo
(1)
Daniel Wichs
(2)
Daniele Micciancio
(1)
David Heath
(3)
David Kretzler
(4)
Eduardo Soria-Vazquez
(5)
Efrat Cohen
(1)
Emmanuela Orsini
(3)
Geoffroy Couteau
(2)
Gert Læssøe Mikkelsen
(2)
Gilad Asharov
(2)
Hoeteck Wee
(2)
Itamar Levi
(1)
Ivan Damgård
(1)
Jackson Abascal
(1)
Jeffrey S. Sorensen
(2)
Jesper Buus Nielsen
(2)
Jonathan Katz
(1)
Kobbi Nissim
(3)
Laasya Bangalore
(2)
Leandro Rometsch
(1)
Leo de Castro
(1)
Manoj Prabhakaran
(2)
Megan Chen
(1)
Megha Byali
(1)
Michael J. Freedman
(1)
Mohammad Hossein Faghihi Sereshgi
(2)
Mor Weiss
(6)
Muthuramakrishnan Venkitasubramaniam
(36)
Naman Kumar
(2)
Oxana Poburinnaya
(1)
Peter Scholl
(5)
Peter Sebastian Nordholt
(2)
Phi Hung Le
(1)
Rafael Pass
(1)
Ran Canetti
(2)
Rishabh Bhadauria
(3)
Rosario Gennaro
(2)
Ruihan Wang
(2)
S. Dov Gordon
(1)
Scott Ames
(1)
Sebastian Faust
(7)
Shai Halevi
(2)
Swati Singla
(1)
Tal Rabin
(2)
Tarik Riviere
(1)
Tiancheng Xie
(1)
Tomas Toft
(4)
Tomer Ashur
(1)
Vinod Vaikuntanathan
(1)
Vladimir Kolesnikov
(5)
Wenxuan Wu
(1)
Yehuda Lindell
(4)
Yibin Yang
(4)
Yupeng Zhang
(2)
Yuriy Kashnikov
(1)
Yuval Ishai
(7)
Zhiyong Fang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to