What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Eli Ben-Sasson
Google Scholar
16
publications in security and cryptology related venues
Year
Venue
Title
2022
conf/tcc
Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves - (ECFFT Part II).
Eli Ben-Sasson
Dan Carmon
Swastik Kopparty
David Levit
2020
journals/tosc
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols.
Abdelrahaman Aly
Tomer Ashur
Eli Ben-Sasson
Siemen Dhooghe
Alan Szepieniec
2019
conf/crypto
Scalable Zero Knowledge with No Trusted Setup.
Eli Ben-Sasson
Iddo Bentov
Yinon Horesh
Michael Riabzev
2019
conf/eurocrypt
Aurora: Transparent Succinct Arguments for R1CS.
Eli Ben-Sasson
Alessandro Chiesa
Michael Riabzev
Nicholas Spooner
Madars Virza
Nicholas P. Ward
2019
conf/tcc
Linear-Size Constant-Query IOPs for Delegating Computation.
Eli Ben-Sasson
Alessandro Chiesa
Lior Goldberg
Tom Gur
Michael Riabzev
Nicholas Spooner
2017
conf/eurocrypt
Computational Integrity with a Public Random String from Quasi-Linear PCPs.
Eli Ben-Sasson
Iddo Bentov
Alessandro Chiesa
Ariel Gabizon
Daniel Genkin
Matan Hamilis
Evgenya Pergament
Michael Riabzev
Mark Silberstein
Eran Tromer
Madars Virza
2017
conf/tcc
Zero Knowledge Protocols from Succinct Constraint Detection.
Eli Ben-Sasson
Alessandro Chiesa
Michael A. Forbes
Ariel Gabizon
Michael Riabzev
Nicholas Spooner
2016
conf/pkc
On Public Key Encryption from Noisy Codewords.
Eli Ben-Sasson
Iddo Bentov
Ivan Damgård
Yuval Ishai
Noga Ron-Zewi
2016
conf/tcc
Interactive Oracle Proofs.
Eli Ben-Sasson
Alessandro Chiesa
Nicholas Spooner
2016
conf/tcc
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs.
Eli Ben-Sasson
Alessandro Chiesa
Ariel Gabizon
Madars Virza
2015
conf/sp
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs.
Eli Ben-Sasson
Alessandro Chiesa
Matthew Green
Eran Tromer
Madars Virza
2014
conf/uss
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture.
Eli Ben-Sasson
Alessandro Chiesa
Eran Tromer
Madars Virza
2014
conf/crypto
Scalable Zero Knowledge via Cycles of Elliptic Curves.
Eli Ben-Sasson
Alessandro Chiesa
Eran Tromer
Madars Virza
2014
conf/sp
Zerocash: Decentralized Anonymous Payments from Bitcoin.
Eli Ben-Sasson
Alessandro Chiesa
Christina Garman
Matthew Green
Ian Miers
Eran Tromer
Madars Virza
2013
conf/crypto
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
Eli Ben-Sasson
Alessandro Chiesa
Daniel Genkin
Eran Tromer
Madars Virza
2012
conf/crypto
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority.
Eli Ben-Sasson
Serge Fehr
Rafail Ostrovsky
Coauthors
Abdelrahaman Aly
(1)
Alan Szepieniec
(1)
Alessandro Chiesa
(11)
Ariel Gabizon
(3)
Christina Garman
(1)
Dan Carmon
(1)
Daniel Genkin
(2)
David Levit
(1)
Eli Ben-Sasson
(16)
Eran Tromer
(6)
Evgenya Pergament
(1)
Ian Miers
(1)
Iddo Bentov
(3)
Ivan Damgård
(1)
Lior Goldberg
(1)
Madars Virza
(8)
Mark Silberstein
(1)
Matan Hamilis
(1)
Matthew Green
(2)
Michael A. Forbes
(1)
Michael Riabzev
(5)
Nicholas P. Ward
(1)
Nicholas Spooner
(4)
Noga Ron-Zewi
(1)
Rafail Ostrovsky
(1)
Serge Fehr
(1)
Siemen Dhooghe
(1)
Swastik Kopparty
(1)
Tom Gur
(1)
Tomer Ashur
(1)
Yinon Horesh
(1)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to