What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Benny Pinkas
Google Scholar
80
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
Daniel Günther
Marco Holz
Benjamin Judkewitz
Helen Möllering
Benny Pinkas
Thomas Schneider
Ajith Suresh
2025
conf/sp
Verifiable Secret Sharing Simplified.
Sourav Das
Zhuolun Xiang
Alin Tomescu
Alexander Spiegelman
Benny Pinkas
Ling Ren
2025
conf/eurocrypt
Distributed Randomness Using Weighted VUFs.
Sourav Das
Benny Pinkas
Alin Tomescu
Zhuolun Xiang
2025
conf/crypto
Efficiently-Thresholdizable Batched Identity Based Encryption, with Applications.
Amit Agarwal
Rex Fernando
Benny Pinkas
2024
conf/tcc
Distributing Keys and Random Secrets with Constant Complexity.
Benny Applebaum
Benny Pinkas
2023
conf/ccs
Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
Gilad Asharov
Koki Hamada
Ryo Kikuchi
Ariel Nof
Benny Pinkas
Junichi Tomida
2023
conf/crypto
How to Recover a Secret with O(n) Additions.
Benny Applebaum
Oded Nir
Benny Pinkas
2022
conf/ccs
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
Daniel Günther
Marco Holz
Benjamin Judkewitz
Helen Möllering
Benny Pinkas
Thomas Schneider
Ajith Suresh
2022
conf/ccs
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters.
Gilad Asharov
Koki Hamada
Dai Ikarashi
Ryo Kikuchi
Ariel Nof
Benny Pinkas
Katsumi Takahashi
Junichi Tomida
2022
conf/uss
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications.
Daniel Günther
Maurice Heymann
Benny Pinkas
Thomas Schneider
2021
conf/ccs
Secure Graph Analysis at Scale.
Toshinori Araki
Jun Furukawa
Kazuma Ohara
Benny Pinkas
Hanan Rosemarin
Hikaru Tsuchida
2021
conf/crypto
Oblivious Key-Value Stores and Amplification for Private Set Intersection.
Gayathri Garimella
Benny Pinkas
Mike Rosulek
Ni Trieu
Avishay Yanai
2020
conf/ccs
Blinder - Scalable, Robust Anonymous Committed Broadcast.
Ittai Abraham
Benny Pinkas
Avishay Yanai
2020
conf/sp
Towards Scalable Threshold Cryptosystems.
Alin Tomescu
Robert Chen
Yiming Zheng
Ittai Abraham
Benny Pinkas
Guy Golan-Gueta
Srinivas Devadas
2020
conf/sp
Flaw Label: Exploiting IPv6 Flow Label.
Jonathan Berger
Amit Klein
Benny Pinkas
2020
conf/eurocrypt
PSI from PaXoS: Fast, Malicious Private Set Intersection.
Benny Pinkas
Mike Rosulek
Ni Trieu
Avishay Yanai
2019
journals/joc
Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ.
Yehuda Lindell
Benny Pinkas
Nigel P. Smart
Avishay Yanai
2019
conf/ccs
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning.
Phillipp Schoppmann
Adrià Gascón
Mariana Raykova
Benny Pinkas
2019
conf/ccs
How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior.
Moni Naor
Benny Pinkas
Eyal Ronen
2019
conf/uss
From IP ID to Device ID and KASLR Bypass.
Amit Klein
Benny Pinkas
2019
conf/crypto
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension.
Benny Pinkas
Mike Rosulek
Ni Trieu
Avishay Yanai
2019
conf/ndss
DNS Cache-Based User Tracking.
Amit Klein
Benny Pinkas
2019
conf/dsn
SBFT: A Scalable and Decentralized Trust Infrastructure.
Guy Golan-Gueta
Ittai Abraham
Shelly Grossman
Dahlia Malkhi
Benny Pinkas
Michael K. Reiter
Dragos-Adrian Seredinschi
Orr Tamir
Alin Tomescu
2019
conf/eurocrypt
Efficient Circuit-Based PSI with Linear Communication.
Benny Pinkas
Thomas Schneider
Oleksandr Tkachenko
Avishay Yanai
2018
journals/joc
Fast Garbling of Circuits Under Standard Assumptions.
Shay Gueron
Yehuda Lindell
Ariel Nof
Benny Pinkas
2018
conf/ccs
High-Throughput Secure AES Computation.
Koji Chida
Koki Hamada
Dai Ikarashi
Ryo Kikuchi
Benny Pinkas
2018
conf/uss
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring.
Yossi Adi
Carsten Baum
Moustapha Cissé
Benny Pinkas
Joseph Keshet
2018
conf/crypto
Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries.
Tore Kasper Frederiksen
Yehuda Lindell
Valery Osheter
Benny Pinkas
2018
conf/acns
Distributed SSH Key Management with Proactive RSA Threshold Signatures.
Yotam Harchol
Ittai Abraham
Benny Pinkas
2018
conf/pkc
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments.
Tore Kasper Frederiksen
Benny Pinkas
Avishay Yanai
2018
conf/eurocrypt
Efficient Circuit-Based PSI via Cuckoo Hashing.
Benny Pinkas
Thomas Schneider
Christian Weinert
Udi Wieder
2017
journals/popets
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
Ágnes Kiss
Jian Liu
Thomas Schneider
N. Asokan
Benny Pinkas
2017
conf/ccs
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques.
Vladimir Kolesnikov
Naor Matania
Benny Pinkas
Mike Rosulek
Ni Trieu
2017
conf/ccs
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
Sandeep Tamrakar
Jian Liu
Andrew Paverd
Jan-Erik Ekberg
Benny Pinkas
N. Asokan
2017
conf/pkc
Asymptotically Tight Bounds for Composing ORAM with PIR.
Ittai Abraham
Christopher W. Fletcher
Kartik Nayak
Benny Pinkas
Ling Ren
2016
journals/joc
Efficient Set Intersection with Simulation-Based Security.
Michael J. Freedman
Carmit Hazay
Kobbi Nissim
Benny Pinkas
2015
journals/joc
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
Yehuda Lindell
Benny Pinkas
2015
conf/ccs
Fast Garbling of Circuits Under Standard Assumptions.
Shay Gueron
Yehuda Lindell
Ariel Nof
Benny Pinkas
2015
conf/ccs
Secure Deduplication of Encrypted Data without Additional Independent Servers.
Jian Liu
N. Asokan
Benny Pinkas
2015
conf/uss
Phasing: Private Set Intersection Using Permutation-based Hashing.
Benny Pinkas
Thomas Schneider
Gil Segev
Michael Zohner
2015
conf/crypto
Efficient Constant Round Multi-party Computation Combining BMR and SPDZ.
Yehuda Lindell
Benny Pinkas
Nigel P. Smart
Avishay Yanai
2014
conf/uss
Faster Private Set Intersection Based on OT Extension.
Benny Pinkas
Thomas Schneider
Michael Zohner
2014
conf/eurocrypt
Non-Interactive Secure Computation Based on Cut-and-Choose.
Arash Afshar
Payman Mohassel
Benny Pinkas
Ben Riva
2012
journals/joc
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer.
Yehuda Lindell
Benny Pinkas
2012
conf/cans
Firm Grip Handshakes: A Tool for Bidirectional Vouching.
Omer Berkman
Benny Pinkas
Moti Yung
2011
conf/ccs
Proofs of ownership in remote storage systems.
Shai Halevi
Danny Harnik
Benny Pinkas
Alexandra Shulman-Peleg
2011
conf/crypto
Secure Computation on the Web: Computing without Simultaneous Interaction.
Shai Halevi
Yehuda Lindell
Benny Pinkas
2011
conf/crypto
The IPS Compiler: Optimizations, Variants and Concrete Efficiency.
Yehuda Lindell
Eli Oxman
Benny Pinkas
2011
conf/ctrsa
Secure Set Intersection with Untrusted Hardware Tokens.
Marc Fischlin
Benny Pinkas
Ahmad-Reza Sadeghi
Thomas Schneider
Ivan Visconti
2011
conf/tcc
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer.
Yehuda Lindell
Benny Pinkas
2010
journals/joc
Secure Computation of the Median (and Other Elements of Specified Ranks).
Gagan Aggarwal
Nina Mishra
Benny Pinkas
2010
conf/crypto
Oblivious RAM Revisited.
Benny Pinkas
Tzachy Reinman
2010
conf/sp
SCiFI - A System for Secure Face Identification.
Margarita Osadchy
Benny Pinkas
Ayman Jarrous
Boaz Moskovich
2010
conf/acns
Privacy-Preserving Group Discovery with Linear Complexity.
Mark Manulis
Benny Pinkas
Bertram Poettering
2009
journals/joc
A Proof of Security of Yao's Protocol for Two-Party Computation.
Yehuda Lindell
Benny Pinkas
2009
conf/acns
Secure Hamming Distance Based Computation and Its Applications.
Ayman Jarrous
Benny Pinkas
2009
conf/asiacrypt
Secure Two-Party Computation Is Practical.
Benny Pinkas
Thomas Schneider
Nigel P. Smart
Stephen C. Williams
2008
conf/ccs
FairplayMP: a system for secure multi-party computation.
Assaf Ben-David
Noam Nisan
Benny Pinkas
2007
conf/ccs
Cryptanalysis of the windows random number generator.
Leo Dorrendorf
Zvi Gutterman
Benny Pinkas
2007
conf/eurocrypt
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
Yehuda Lindell
Benny Pinkas
2006
conf/sp
Analysis of the Linux Random Number Generator.
Zvi Gutterman
Benny Pinkas
Tzachy Reinman
2005
journals/joc
Computationally Secure Oblivious Transfer.
Moni Naor
Benny Pinkas
2005
conf/tcc
Keyword Search and Oblivious Pseudorandom Functions.
Michael J. Freedman
Yuval Ishai
Benny Pinkas
Omer Reingold
2004
conf/uss
Fairplay - Secure Two-Party Computation System.
Dahlia Malkhi
Noam Nisan
Benny Pinkas
Yaron Sella
2004
conf/eurocrypt
Secure Computation of the k th-Ranked Element.
Gagan Aggarwal
Nina Mishra
Benny Pinkas
2004
conf/eurocrypt
Efficient Private Matching and Set Intersection.
Michael J. Freedman
Kobbi Nissim
Benny Pinkas
2003
conf/eurocrypt
Fair Secure Two-Party Computation.
Benny Pinkas
2002
journals/joc
Privacy Preserving Data Mining.
Yehuda Lindell
Benny Pinkas
2002
conf/ccs
Securing passwords against dictionary attacks.
Benny Pinkas
Tomas Sander
2001
conf/ccs
Efficient State Updates for Key Management.
Benny Pinkas
2001
conf/ccs
Securely combining public-key cryptosystems.
Stuart Haber
Benny Pinkas
2000
conf/crypto
Privacy Preserving Data Mining.
Yehuda Lindell
Benny Pinkas
2000
conf/fc
Efficient Trace and Revoke Schemes.
Moni Naor
Benny Pinkas
2000
conf/asiacrypt
Distributed Oblivious Transfer.
Moni Naor
Benny Pinkas
1999
conf/crypto
Oblivious Transfer with Adaptive Queries.
Moni Naor
Benny Pinkas
1999
conf/eurocrypt
Distributed Pseudo-random Functions and KDCs.
Moni Naor
Benny Pinkas
Omer Reingold
1998
conf/crypto
Threshold Traitor Tracing.
Moni Naor
Benny Pinkas
1998
conf/eurocrypt
Secure and Efficient Metering.
Moni Naor
Benny Pinkas
1997
conf/crypto
Visual Authentication and Identification.
Moni Naor
Benny Pinkas
1990
conf/crypto
On the Impossibility of Private Key Cryptography with Weakly Random Keys.
James L. McInnes
Benny Pinkas
Coauthors
Adrià Gascón
(1)
Ágnes Kiss
(1)
Ahmad-Reza Sadeghi
(1)
Ajith Suresh
(2)
Alexander Spiegelman
(1)
Alexandra Shulman-Peleg
(1)
Alin Tomescu
(4)
Amit Agarwal
(1)
Amit Klein
(3)
Andrew Paverd
(1)
Arash Afshar
(1)
Ariel Nof
(4)
Assaf Ben-David
(1)
Avishay Yanai
(8)
Ayman Jarrous
(2)
Ben Riva
(1)
Benjamin Judkewitz
(2)
Benny Applebaum
(2)
Benny Pinkas
(80)
Bertram Poettering
(1)
Boaz Moskovich
(1)
Carmit Hazay
(1)
Carsten Baum
(1)
Christian Weinert
(1)
Christopher W. Fletcher
(1)
Dahlia Malkhi
(2)
Dai Ikarashi
(2)
Daniel Günther
(3)
Danny Harnik
(1)
Dragos-Adrian Seredinschi
(1)
Eli Oxman
(1)
Eyal Ronen
(1)
Gagan Aggarwal
(2)
Gayathri Garimella
(1)
Gil Segev
(1)
Gilad Asharov
(2)
Guy Golan-Gueta
(2)
Hanan Rosemarin
(1)
Helen Möllering
(2)
Hikaru Tsuchida
(1)
Ittai Abraham
(5)
Ivan Visconti
(1)
James L. McInnes
(1)
Jan-Erik Ekberg
(1)
Jian Liu
(3)
Jonathan Berger
(1)
Joseph Keshet
(1)
Jun Furukawa
(1)
Junichi Tomida
(2)
Kartik Nayak
(1)
Katsumi Takahashi
(1)
Kazuma Ohara
(1)
Kobbi Nissim
(2)
Koji Chida
(1)
Koki Hamada
(3)
Leo Dorrendorf
(1)
Ling Ren
(2)
Marc Fischlin
(1)
Marco Holz
(2)
Margarita Osadchy
(1)
Mariana Raykova
(1)
Mark Manulis
(1)
Maurice Heymann
(1)
Michael J. Freedman
(3)
Michael K. Reiter
(1)
Michael Zohner
(2)
Mike Rosulek
(4)
Moni Naor
(9)
Moti Yung
(1)
Moustapha Cissé
(1)
N. Asokan
(3)
Naor Matania
(1)
Ni Trieu
(4)
Nigel P. Smart
(3)
Nina Mishra
(2)
Noam Nisan
(2)
Oded Nir
(1)
Oleksandr Tkachenko
(1)
Omer Berkman
(1)
Omer Reingold
(2)
Orr Tamir
(1)
Payman Mohassel
(1)
Phillipp Schoppmann
(1)
Rex Fernando
(1)
Robert Chen
(1)
Ryo Kikuchi
(3)
Sandeep Tamrakar
(1)
Shai Halevi
(2)
Shay Gueron
(2)
Shelly Grossman
(1)
Sourav Das
(2)
Srinivas Devadas
(1)
Stephen C. Williams
(1)
Stuart Haber
(1)
Thomas Schneider
(10)
Tomas Sander
(1)
Tore Kasper Frederiksen
(2)
Toshinori Araki
(1)
Tzachy Reinman
(2)
Udi Wieder
(1)
Valery Osheter
(1)
Vladimir Kolesnikov
(1)
Yaron Sella
(1)
Yehuda Lindell
(14)
Yiming Zheng
(1)
Yossi Adi
(1)
Yotam Harchol
(1)
Yuval Ishai
(1)
Zhuolun Xiang
(2)
Zvi Gutterman
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to