What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Niv Gilboa
Google Scholar
38
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer.
Elette Boyle
Niv Gilboa
Matan Hamilis
Yuval Ishai
Ariel Nof
2025
conf/sp
Improved Constructions for Distributed Multi-Point Functions.
Elette Boyle
Niv Gilboa
Matan Hamilis
Yuval Ishai
Yaxin Tu
2024
conf/ccs
Secure Sorting and Selection via Function Secret Sharing.
Amit Agarwal
Elette Boyle
Nishanth Chandran
Niv Gilboa
Divya Gupta
Yuval Ishai
Mahimna Kelkar
Yiping Ma
2024
conf/crypto
Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators.
Amit Agarwal
Elette Boyle
Niv Gilboa
Yuval Ishai
Mahimna Kelkar
Yiping Ma
2024
conf/sp
Prune+PlumTree - Finding Eviction Sets at Scale.
Tom Kessous
Niv Gilboa
2023
journals/compsec
Characterization and Detection of Cross-Router Covert Channels.
Oren Shvartzman
Adar Ovadya
Kfir Zvi
Omer Shwartz
Rom Ogen
Yakov Mallah
Niv Gilboa
Yossi Oren
2023
conf/crypto
Arithmetic Sketching.
Dan Boneh
Elette Boyle
Henry Corrigan-Gibbs
Niv Gilboa
Yuval Ishai
2023
conf/eurocrypt
Oblivious Transfer with Constant Computational Overhead.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Nicolas Resch
Peter Scholl
2022
conf/crypto
Correlated Pseudorandomness from Expand-Accumulate Codes.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Nicolas Resch
Peter Scholl
2022
conf/crypto
Programmable Distributed Point Functions.
Elette Boyle
Niv Gilboa
Yuval Ishai
Victor I. Kolobov
2022
conf/eurocrypt
Secure Multiparty Computation with Sublinear Preprocessing.
Elette Boyle
Niv Gilboa
Yuval Ishai
Ariel Nof
2021
conf/crypto
Low-Complexity Weak Pseudorandom Functions in $\mathtt {AC}0[\mathtt {MOD}2]$.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Scholl
2021
conf/crypto
Sublinear GMW-Style Compiler for MPC with Preprocessing.
Elette Boyle
Niv Gilboa
Yuval Ishai
Ariel Nof
2021
conf/sp
Lightweight Techniques for Private Heavy Hitters.
Dan Boneh
Elette Boyle
Henry Corrigan-Gibbs
Niv Gilboa
Yuval Ishai
2021
conf/eurocrypt
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.
Elette Boyle
Nishanth Chandran
Niv Gilboa
Divya Gupta
Yuval Ishai
Nishant Kumar
Mayank Rathee
2021
conf/tcc
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
Fabrice Benhamouda
Elette Boyle
Niv Gilboa
Shai Halevi
Yuval Ishai
Ariel Nof
2020
conf/crypto
Efficient Pseudorandom Correlation Generators from Ring-LPN.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Scholl
2020
conf/asiacrypt
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs.
Elette Boyle
Niv Gilboa
Yuval Ishai
Ariel Nof
2019
conf/ccs
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs.
Elette Boyle
Niv Gilboa
Yuval Ishai
Ariel Nof
2019
conf/ccs
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Rindal
Peter Scholl
2019
conf/crypto
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Scholl
2019
conf/crypto
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.
Dan Boneh
Elette Boyle
Henry Corrigan-Gibbs
Niv Gilboa
Yuval Ishai
2019
conf/tcc
Secure Computation with Preprocessing via Function Secret Sharing.
Elette Boyle
Niv Gilboa
Yuval Ishai
2018
conf/ccs
Compressing Vector OLE.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
2017
conf/ccs
Homomorphic Secret Sharing: Optimizations and Applications.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Michele Orrù
2017
conf/eurocrypt
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation.
Elette Boyle
Niv Gilboa
Yuval Ishai
2016
conf/ccs
Function Secret Sharing: Improvements and Extensions.
Elette Boyle
Niv Gilboa
Yuval Ishai
2016
conf/crypto
Breaking the Circuit Size Barrier for Secure Computation Under DDH.
Elette Boyle
Niv Gilboa
Yuval Ishai
2015
conf/ccs
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract.
Shlomi Dolev
Niv Gilboa
Ximing Li
2015
conf/eurocrypt
Function Secret Sharing.
Elette Boyle
Niv Gilboa
Yuval Ishai
2014
conf/eurocrypt
Distributed Point Functions and Their Applications.
Niv Gilboa
Yuval Ishai
2013
conf/acns
Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).
Shlomi Dolev
Juan A. Garay
Niv Gilboa
Vladimir Kolesnikov
Yelena Yuditsky
2011
conf/ccs
Poster: arbitrators in the security infrastructure, supporting positive anonymity.
Shlomi Dolev
Niv Gilboa
Ofer Hermoni
2011
conf/ccs
Poster: attribute based broadcast encryption with permanent revocation.
Shlomi Dolev
Niv Gilboa
Marina Kopeetsky
2010
conf/ccs
Information security for sensors by overwhelming random sequences and permutations.
Shlomi Dolev
Niv Gilboa
Marina Kopeetsky
Giuseppe Persiano
Paul G. Spirakis
2010
conf/ccs
Rendezvous tunnel for anonymous publishing.
Ofer Hermoni
Niv Gilboa
Eyal Felstaine
Yuval Elovici
Shlomi Dolev
1999
conf/crypto
Two Party RSA Key Generation.
Niv Gilboa
1999
conf/crypto
Compressing Cryptographic Resources.
Niv Gilboa
Yuval Ishai
Coauthors
Adar Ovadya
(1)
Amit Agarwal
(2)
Ariel Nof
(6)
Dan Boneh
(3)
Divya Gupta
(2)
Elette Boyle
(27)
Eyal Felstaine
(1)
Fabrice Benhamouda
(1)
Geoffroy Couteau
(8)
Giuseppe Persiano
(1)
Henry Corrigan-Gibbs
(3)
Juan A. Garay
(1)
Kfir Zvi
(1)
Lisa Kohl
(6)
Mahimna Kelkar
(2)
Marina Kopeetsky
(2)
Matan Hamilis
(2)
Mayank Rathee
(1)
Michele Orrù
(1)
Nicolas Resch
(2)
Nishant Kumar
(1)
Nishanth Chandran
(2)
Niv Gilboa
(38)
Ofer Hermoni
(2)
Omer Shwartz
(1)
Oren Shvartzman
(1)
Paul G. Spirakis
(1)
Peter Rindal
(1)
Peter Scholl
(6)
Rom Ogen
(1)
Shai Halevi
(1)
Shlomi Dolev
(6)
Tom Kessous
(1)
Victor I. Kolobov
(1)
Vladimir Kolesnikov
(1)
Ximing Li
(1)
Yakov Mallah
(1)
Yaxin Tu
(1)
Yelena Yuditsky
(1)
Yiping Ma
(2)
Yossi Oren
(1)
Yuval Elovici
(1)
Yuval Ishai
(29)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to