BibTeX records: Benny Pinkas

download as .bib file

@article{DBLP:journals/iacr/AsharovHIKNPT24,
  author       = {Gilad Asharov and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Ariel Nof and
                  Benny Pinkas and
                  Junichi Tomida},
  title        = {Secure Statistical Analysis on Multiple Datasets: Join and Group-By},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/141},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovHIKNPT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasPTX24,
  author       = {Sourav Das and
                  Benny Pinkas and
                  Alin Tomescu and
                  Zhuolun Xiang},
  title        = {Distributed Randomness using Weighted VRFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/198},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DasPTX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AsharovHKNPT23,
  author       = {Gilad Asharov and
                  Koki Hamada and
                  Ryo Kikuchi and
                  Ariel Nof and
                  Benny Pinkas and
                  Junichi Tomida},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Secure Statistical Analysis on Multiple Datasets: Join and Group-By},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3298--3312},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623119},
  doi          = {10.1145/3576915.3623119},
  timestamp    = {Wed, 22 Nov 2023 17:56:33 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AsharovHKNPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumNP23,
  author       = {Benny Applebaum and
                  Oded Nir and
                  Benny Pinkas},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {How to Recover a Secret with O(n) Additions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {236--262},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_8},
  doi          = {10.1007/978-3-031-38557-5\_8},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ApplebaumNP23,
  author       = {Benny Applebaum and
                  Oded Nir and
                  Benny Pinkas},
  title        = {How to Recover a Secret with {\textdollar}O(n){\textdollar} Additions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR23-087}},
  year         = {2023},
  url          = {https://eccc.weizmann.ac.il/report/2023/087},
  eprinttype    = {ECCC},
  eprint       = {TR23-087},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ApplebaumNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenItzhakMPSSTVWYY23,
  author       = {Yaniv Ben{-}Itzhak and
                  Helen M{\"{o}}llering and
                  Benny Pinkas and
                  Thomas Schneider and
                  Ajith Suresh and
                  Oleksandr Tkachenko and
                  Shay Vargaftik and
                  Christian Weinert and
                  Hossein Yalame and
                  Avishay Yanai},
  title        = {ScionFL: Efficient and Robust Secure Quantized Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/652},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenItzhakMPSSTVWYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumNP23,
  author       = {Benny Applebaum and
                  Oded Nir and
                  Benny Pinkas},
  title        = {How to Recover a Secret with O(n) Additions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {838},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/838},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasXTSPR23,
  author       = {Sourav Das and
                  Zhuolun Xiang and
                  Alin Tomescu and
                  Alexander Spiegelman and
                  Benny Pinkas and
                  Ling Ren},
  title        = {A New Paradigm for Verifiable Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1196},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1196},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasXTSPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AsharovHIKNPTT22,
  author       = {Gilad Asharov and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Ariel Nof and
                  Benny Pinkas and
                  Katsumi Takahashi and
                  Junichi Tomida},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Efficient Secure Three-Party Sorting with Applications to Data Analysis
                  and Heavy Hitters},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {125--138},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560691},
  doi          = {10.1145/3548606.3560691},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AsharovHIKNPTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0004HJMP0S22,
  author       = {Daniel G{\"{u}}nther and
                  Marco Holz and
                  Benjamin Judkewitz and
                  Helen M{\"{o}}llering and
                  Benny Pinkas and
                  Thomas Schneider and
                  Ajith Suresh},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3351--3353},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563497},
  doi          = {10.1145/3548606.3563497},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0004HJMP0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0004HP022,
  author       = {Daniel G{\"{u}}nther and
                  Maurice Heymann and
                  Benny Pinkas and
                  Thomas Schneider},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {GPU-accelerated {PIR} with Client-Independent Preprocessing for Large-Scale
                  Applications},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1759--1776},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/gunther},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0004HP022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-00539,
  author       = {Daniel G{\"{u}}nther and
                  Marco Holz and
                  Benjamin Judkewitz and
                  Helen M{\"{o}}llering and
                  Benny Pinkas and
                  Thomas Schneider and
                  Ajith Suresh},
  title        = {Privacy-Preserving Epidemiological Modeling on Mobile Graphs},
  journal      = {CoRR},
  volume       = {abs/2206.00539},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.00539},
  doi          = {10.48550/ARXIV.2206.00539},
  eprinttype    = {arXiv},
  eprint       = {2206.00539},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-00539.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-07376,
  author       = {Yaniv Ben{-}Itzhak and
                  Helen M{\"{o}}llering and
                  Benny Pinkas and
                  Thomas Schneider and
                  Ajith Suresh and
                  Oleksandr Tkachenko and
                  Shay Vargaftik and
                  Christian Weinert and
                  Hossein Yalame and
                  Avishay Yanai},
  title        = {ScionFL: Secure Quantized Aggregation for Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2210.07376},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.07376},
  doi          = {10.48550/ARXIV.2210.07376},
  eprinttype    = {arXiv},
  eprint       = {2210.07376},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-07376.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TomescuBAAGPY22,
  author       = {Alin Tomescu and
                  Adithya Bhat and
                  Benny Applebaum and
                  Ittai Abraham and
                  Guy Gueta and
                  Benny Pinkas and
                  Avishay Yanai},
  title        = {{UTT:} Decentralized Ecash with Accountable Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/452},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TomescuBAAGPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovHIKNPTT22,
  author       = {Gilad Asharov and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Ariel Nof and
                  Benny Pinkas and
                  Katsumi Takahashi and
                  Junichi Tomida},
  title        = {Efficient Secure Three-Party Sorting with Applications to Data Analysis
                  and Heavy Hitters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1595},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1595},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovHIKNPTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aies/SegalAPBGK21,
  author       = {Shahar Segal and
                  Yossi Adi and
                  Benny Pinkas and
                  Carsten Baum and
                  Chaya Ganesh and
                  Joseph Keshet},
  editor       = {Marion Fourcade and
                  Benjamin Kuipers and
                  Seth Lazar and
                  Deirdre K. Mulligan},
  title        = {Fairness in the Eyes of the Data: Certifying Machine-Learning Models},
  booktitle    = {{AIES} '21: {AAAI/ACM} Conference on AI, Ethics, and Society, Virtual
                  Event, USA, May 19-21, 2021},
  pages        = {926--935},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3461702.3462554},
  doi          = {10.1145/3461702.3462554},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aies/SegalAPBGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Araki0OPRT21,
  author       = {Toshinori Araki and
                  Jun Furukawa and
                  Kazuma Ohara and
                  Benny Pinkas and
                  Hanan Rosemarin and
                  Hikaru Tsuchida},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Secure Graph Analysis at Scale},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {610--629},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484560},
  doi          = {10.1145/3460120.3484560},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Araki0OPRT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarimellaPRTY21,
  author       = {Gayathri Garimella and
                  Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Oblivious Key-Value Stores and Amplification for Private Set Intersection},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {395--425},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_14},
  doi          = {10.1007/978-3-030-84245-1\_14},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarimellaPRTY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cscml/2021,
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9},
  doi          = {10.1007/978-3-030-78086-9},
  isbn         = {978-3-030-78085-2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuntherHPS21,
  author       = {Daniel G{\"{u}}nther and
                  Maurice Heymann and
                  Benny Pinkas and
                  Thomas Schneider},
  title        = {GPU-accelerated {PIR} with Client-Independent Preprocessing for Large-Scale
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {823},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/823},
  timestamp    = {Thu, 08 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuntherHPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarimellaPRTY21,
  author       = {Gayathri Garimella and
                  Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  title        = {Oblivious Key-Value Stores and Amplification for Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {883},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/883},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarimellaPRTY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbrahamPY20,
  author       = {Ittai Abraham and
                  Benny Pinkas and
                  Avishay Yanai},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Blinder - Scalable, Robust Anonymous Committed Broadcast},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1233--1252},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417261},
  doi          = {10.1145/3372297.3417261},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AbrahamPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PinkasRTY20,
  author       = {Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {{PSI} from PaXoS: Fast, Malicious Private Set Intersection},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {739--767},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_25},
  doi          = {10.1007/978-3-030-45724-2\_25},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PinkasRTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TomescuCZAPGD20,
  author       = {Alin Tomescu and
                  Robert Chen and
                  Yiming Zheng and
                  Ittai Abraham and
                  Benny Pinkas and
                  Guy Golan{-}Gueta and
                  Srinivas Devadas},
  title        = {Towards Scalable Threshold Cryptosystems},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {877--893},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00059},
  doi          = {10.1109/SP40000.2020.00059},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/TomescuCZAPGD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BergerKP20,
  author       = {Jonathan Berger and
                  Amit Klein and
                  Benny Pinkas},
  title        = {Flaw Label: Exploiting IPv6 Flow Label},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1259--1276},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00075},
  doi          = {10.1109/SP40000.2020.00075},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BergerKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-01534,
  author       = {Shahar Segal and
                  Yossi Adi and
                  Benny Pinkas and
                  Carsten Baum and
                  Chaya Ganesh and
                  Joseph Keshet},
  title        = {Fairness in the Eyes of the Data: Certifying Machine-Learning Models},
  journal      = {CoRR},
  volume       = {abs/2009.01534},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.01534},
  eprinttype    = {arXiv},
  eprint       = {2009.01534},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-01534.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinkasRTY20,
  author       = {Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  title        = {{PSI} from PaXoS: Fast, Malicious Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinkasRTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbrahamPY20,
  author       = {Ittai Abraham and
                  Benny Pinkas and
                  Avishay Yanai},
  title        = {Blinder: {MPC} Based Scalable and Robust Anonymous Committed Broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbrahamPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HolzJMPS20,
  author       = {Marco Holz and
                  Benjamin Judkewitz and
                  Helen M{\"{o}}llering and
                  Benny Pinkas and
                  Thomas Schneider},
  title        = {{PEM:} Privacy-preserving Epidemiological Modeling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1546},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1546},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HolzJMPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LindellPSY19,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart and
                  Avishay Yanai},
  title        = {Efficient Constant-Round Multi-party Computation Combining {BMR} and
                  {SPDZ}},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {1026--1069},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09322-2},
  doi          = {10.1007/S00145-019-09322-2},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/LindellPSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchoppmannG0P19,
  author       = {Phillipp Schoppmann and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Mariana Raykova and
                  Benny Pinkas},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Make Some {ROOM} for the Zeros: Data Sparsity in Secure Distributed
                  Machine Learning},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1335--1350},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3339816},
  doi          = {10.1145/3319535.3339816},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchoppmannG0P19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaorPR19,
  author       = {Moni Naor and
                  Benny Pinkas and
                  Eyal Ronen},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {How to (not) Share a Password: Privacy Preserving Protocols for Finding
                  Heavy Hitters with Adversarial Behavior},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1369--1386},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363204},
  doi          = {10.1145/3319535.3363204},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaorPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PinkasRTY19,
  author       = {Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {SpOT-Light: Lightweight Private Set Intersection from Sparse {OT}
                  Extension},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {401--431},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_13},
  doi          = {10.1007/978-3-030-26954-8\_13},
  timestamp    = {Fri, 09 Aug 2019 14:27:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PinkasRTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/Golan-GuetaAGMP19,
  author       = {Guy Golan{-}Gueta and
                  Ittai Abraham and
                  Shelly Grossman and
                  Dahlia Malkhi and
                  Benny Pinkas and
                  Michael K. Reiter and
                  Dragos{-}Adrian Seredinschi and
                  Orr Tamir and
                  Alin Tomescu},
  title        = {{SBFT:} {A} Scalable and Decentralized Trust Infrastructure},
  booktitle    = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages        = {568--580},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSN.2019.00063},
  doi          = {10.1109/DSN.2019.00063},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/Golan-GuetaAGMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pinkas0TY19,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Oleksandr Tkachenko and
                  Avishay Yanai},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Efficient Circuit-Based {PSI} with Linear Communication},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11478},
  pages        = {122--153},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17659-4\_5},
  doi          = {10.1007/978-3-030-17659-4\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Pinkas0TY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KleinP19,
  author       = {Amit Klein and
                  Benny Pinkas},
  title        = {{DNS} Cache-Based User Tracking},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/dns-cache-based-user-tracking/},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KleinP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KleinP19,
  author       = {Amit Klein and
                  Benny Pinkas},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {From {IP} {ID} to Device {ID} and {KASLR} Bypass},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1063--1080},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/klein},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KleinP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10478,
  author       = {Amit Klein and
                  Benny Pinkas},
  title        = {From {IP} {ID} to Device {ID} and {KASLR} Bypass (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/1906.10478},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10478},
  eprinttype    = {arXiv},
  eprint       = {1906.10478},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10478.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinkasSTY19,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Oleksandr Tkachenko and
                  Avishay Yanai},
  title        = {Efficient Circuit-based {PSI} with Linear Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinkasSTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchoppmannGRP19,
  author       = {Phillipp Schoppmann and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Mariana Raykova and
                  Benny Pinkas},
  title        = {Make Some {ROOM} for the Zeros: Data Sparsity in Secure Distributed
                  Machine Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchoppmannGRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinkasRTY19,
  author       = {Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  title        = {SpOT-Light: Lightweight Private Set Intersection from Sparse {OT}
                  Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinkasRTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChidaHIKKP19,
  author       = {Koji Chida and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Naoto Kiribuchi and
                  Benny Pinkas},
  title        = {An Efficient Secure Three-Party Sorting Protocol with an Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/695},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChidaHIKKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GueronLNP18,
  author       = {Shay Gueron and
                  Yehuda Lindell and
                  Ariel Nof and
                  Benny Pinkas},
  title        = {Fast Garbling of Circuits Under Standard Assumptions},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {3},
  pages        = {798--844},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9271-y},
  doi          = {10.1007/S00145-017-9271-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GueronLNP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PinkasSZ18,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Michael Zohner},
  title        = {Scalable Private Set Intersection Based on {OT} Extension},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {7:1--7:35},
  year         = {2018},
  url          = {https://doi.org/10.1145/3154794},
  doi          = {10.1145/3154794},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PinkasSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HarcholAP18,
  author       = {Yotam Harchol and
                  Ittai Abraham and
                  Benny Pinkas},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Distributed {SSH} Key Management with Proactive {RSA} Threshold Signatures},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {22--43},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_2},
  doi          = {10.1007/978-3-319-93387-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HarcholAP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChidaHIKP18,
  author       = {Koji Chida and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Benny Pinkas},
  editor       = {Michael Brenner and
                  Kurt Rohloff},
  title        = {High-Throughput Secure {AES} Computation},
  booktitle    = {Proceedings of the 6th Workshop on Encrypted Computing {\&} Applied
                  Homomorphic Cryptography, WAHC@CCS 2018, Toronto, ON, Canada, October
                  19, 2018},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3267973.3267977},
  doi          = {10.1145/3267973.3267977},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChidaHIKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FrederiksenLOP18,
  author       = {Tore Kasper Frederiksen and
                  Yehuda Lindell and
                  Valery Osheter and
                  Benny Pinkas},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Fast Distributed {RSA} Key Generation for Semi-honest and Malicious
                  Adversaries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {331--361},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_12},
  doi          = {10.1007/978-3-319-96881-0\_12},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FrederiksenLOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pinkas0WW18,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Christian Weinert and
                  Udi Wieder},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Efficient Circuit-Based {PSI} via Cuckoo Hashing},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {125--157},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_5},
  doi          = {10.1007/978-3-319-78372-7\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Pinkas0WW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FrederiksenPY18,
  author       = {Tore Kasper Frederiksen and
                  Benny Pinkas and
                  Avishay Yanai},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Committed {MPC} - Maliciously Secure Multiparty Computation from Homomorphic
                  Commitments},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {587--619},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_20},
  doi          = {10.1007/978-3-319-76578-5\_20},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FrederiksenPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/InbarOP18,
  author       = {Roi Inbar and
                  Eran Omri and
                  Benny Pinkas},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Efficient Scalable Multiparty Private Set-Intersection via Garbled
                  Bloom Filters},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_13},
  doi          = {10.1007/978-3-319-98113-0\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/InbarOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AdiBCPK18,
  author       = {Yossi Adi and
                  Carsten Baum and
                  Moustapha Ciss{\'{e}} and
                  Benny Pinkas and
                  Joseph Keshet},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks
                  by Backdooring},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1615--1631},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/adi},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AdiBCPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-04528,
  author       = {Felix Kreuk and
                  Assi Barak and
                  Shir Aviv{-}Reuven and
                  Moran Baruch and
                  Benny Pinkas and
                  Joseph Keshet},
  title        = {Adversarial Examples on Discrete Sequences for Beating Whole-Binary
                  Malware Detection},
  journal      = {CoRR},
  volume       = {abs/1802.04528},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.04528},
  eprinttype    = {arXiv},
  eprint       = {1802.04528},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-04528.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-04633,
  author       = {Yossi Adi and
                  Carsten Baum and
                  Moustapha Ciss{\'{e}} and
                  Benny Pinkas and
                  Joseph Keshet},
  title        = {Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks
                  by Backdooring},
  journal      = {CoRR},
  volume       = {abs/1802.04633},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.04633},
  eprinttype    = {arXiv},
  eprint       = {1802.04633},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-04633.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-01626,
  author       = {Guy Golan{-}Gueta and
                  Ittai Abraham and
                  Shelly Grossman and
                  Dahlia Malkhi and
                  Benny Pinkas and
                  Michael K. Reiter and
                  Dragos{-}Adrian Seredinschi and
                  Orr Tamir and
                  Alin Tomescu},
  title        = {{SBFT:} a Scalable Decentralized Trust Infrastructure for Blockchains},
  journal      = {CoRR},
  volume       = {abs/1804.01626},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.01626},
  eprinttype    = {arXiv},
  eprint       = {1804.01626},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-01626.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorPR18,
  author       = {Moni Naor and
                  Benny Pinkas and
                  Eyal Ronen},
  title        = {How to (not) share a password: Privacy preserving protocols for finding
                  heavy hitters with adversarial behavior},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pinkas0WW18,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Christian Weinert and
                  Udi Wieder},
  title        = {Efficient Circuit-based {PSI} via Cuckoo Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pinkas0WW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HarcholAP18,
  author       = {Yotam Harchol and
                  Ittai Abraham and
                  Benny Pinkas},
  title        = {Distributed {SSH} Key Management with Proactive {RSA} Threshold Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HarcholAP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrederiksenLOP18,
  author       = {Tore Kasper Frederiksen and
                  Yehuda Lindell and
                  Valery Osheter and
                  Benny Pinkas},
  title        = {Fast Distributed {RSA} Key Generation for Semi-Honest and Malicious
                  Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrederiksenLOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DruckerGP17,
  author       = {Nir Drucker and
                  Shay Gueron and
                  Benny Pinkas},
  title        = {Faster Secure Cloud Computations with a Trusted Proxy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {6},
  pages        = {61--67},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.4251121},
  doi          = {10.1109/MSP.2017.4251121},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DruckerGP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KissL0AP17,
  author       = {{\'{A}}gnes Kiss and
                  Jian Liu and
                  Thomas Schneider and
                  N. Asokan and
                  Benny Pinkas},
  title        = {Private Set Intersection for Unequal Set Sizes with Mobile Applications},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {4},
  pages        = {177--197},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0044},
  doi          = {10.1515/POPETS-2017-0044},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KissL0AP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/KolmanP17,
  author       = {Eyal Kolman and
                  Benny Pinkas},
  title        = {Securely Computing a Ground Speed Model},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {8},
  number       = {4},
  pages        = {54:1--54:13},
  year         = {2017},
  url          = {https://doi.org/10.1145/2998550},
  doi          = {10.1145/2998550},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tist/KolmanP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TamrakarLPEPA17,
  author       = {Sandeep Tamrakar and
                  Jian Liu and
                  Andrew Paverd and
                  Jan{-}Erik Ekberg and
                  Benny Pinkas and
                  N. Asokan},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {The Circle Game: Scalable Private Membership Test Using Trusted Hardware},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {31--44},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053006},
  doi          = {10.1145/3052973.3053006},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TamrakarLPEPA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolesnikovMPRT17,
  author       = {Vladimir Kolesnikov and
                  Naor Matania and
                  Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Practical Multi-party Private Set Intersection from Symmetric-Key
                  Techniques},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1257--1272},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134065},
  doi          = {10.1145/3133956.3134065},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KolesnikovMPRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbrahamFNP017,
  author       = {Ittai Abraham and
                  Christopher W. Fletcher and
                  Kartik Nayak and
                  Benny Pinkas and
                  Ling Ren},
  editor       = {Serge Fehr},
  title        = {Asymptotically Tight Bounds for Composing {ORAM} with {PIR}},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {91--120},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_5},
  doi          = {10.1007/978-3-662-54365-8\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbrahamFNP017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrederiksenPY17,
  author       = {Tore Kasper Frederiksen and
                  Benny Pinkas and
                  Avishay Yanai},
  title        = {Committed {MPC} - Maliciously Secure Multiparty Computation from Homomorphic
                  Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {550},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/550},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrederiksenPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KissLSAP17,
  author       = {{\'{A}}gnes Kiss and
                  Jian Liu and
                  Thomas Schneider and
                  N. Asokan and
                  Benny Pinkas},
  title        = {Private Set Intersection for Unequal Set Sizes with Mobile Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/670},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KissLSAP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovMPRT17,
  author       = {Vladimir Kolesnikov and
                  Naor Matania and
                  Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {Practical Multi-party Private Set Intersection from Symmetric-Key
                  Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {799},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/799},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovMPRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ArcherBPP16,
  author       = {David W. Archer and
                  Dan Bogdanov and
                  Benny Pinkas and
                  Pille Pullonen},
  title        = {Maturity and Performance of Programmable Secure Computation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {5},
  pages        = {48--56},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.97},
  doi          = {10.1109/MSP.2016.97},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ArcherBPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FreedmanHNP16,
  author       = {Michael J. Freedman and
                  Carmit Hazay and
                  Kobbi Nissim and
                  Benny Pinkas},
  title        = {Efficient Set Intersection with Simulation-Based Security},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {1},
  pages        = {115--155},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-014-9190-0},
  doi          = {10.1007/S00145-014-9190-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FreedmanHNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TamrakarLPEPA16,
  author       = {Sandeep Tamrakar and
                  Jian Liu and
                  Andrew Paverd and
                  Jan{-}Erik Ekberg and
                  Benny Pinkas and
                  N. Asokan},
  title        = {The Circle Game: Scalable Private Membership Test Using Trusted Hardware},
  journal      = {CoRR},
  volume       = {abs/1606.01655},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01655},
  eprinttype    = {arXiv},
  eprint       = {1606.01655},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TamrakarLPEPA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NayakRAP16,
  author       = {Kartik Nayak and
                  Ling Ren and
                  Ittai Abraham and
                  Benny Pinkas},
  title        = {An Oblivious {RAM} with Sub-logarithmic Bandwidth Blowup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {849},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/849},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NayakRAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pinkas0Z16,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Michael Zohner},
  title        = {Scalable Private Set Intersection Based on {OT} Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {930},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/930},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pinkas0Z16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LindellP15,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {An Efficient Protocol for Secure Two-Party Computation in the Presence
                  of Malicious Adversaries},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {2},
  pages        = {312--350},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-014-9177-x},
  doi          = {10.1007/S00145-014-9177-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LindellP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GueronLNP15,
  author       = {Shay Gueron and
                  Yehuda Lindell and
                  Ariel Nof and
                  Benny Pinkas},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Fast Garbling of Circuits Under Standard Assumptions},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {567--578},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813619},
  doi          = {10.1145/2810103.2813619},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GueronLNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuAP15,
  author       = {Jian Liu and
                  N. Asokan and
                  Benny Pinkas},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Secure Deduplication of Encrypted Data without Additional Independent
                  Servers},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {874--885},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813623},
  doi          = {10.1145/2810103.2813623},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LindellPSY15,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart and
                  Avishay Yanai},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Efficient Constant Round Multi-party Computation Combining {BMR} and
                  {SPDZ}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_16},
  doi          = {10.1007/978-3-662-48000-7\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LindellPSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Pinkas0SZ15,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Gil Segev and
                  Michael Zohner},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Phasing: Private Set Intersection Using Permutation-based Hashing},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {515--530},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/pinkas},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Pinkas0SZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AfsharMPR15,
  author       = {Arash Afshar and
                  Payman Mohassel and
                  Benny Pinkas and
                  Ben Riva},
  title        = {Non-Interactive Secure Computation Based on Cut-and-Choose},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AfsharMPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuAP15,
  author       = {Jian Liu and
                  N. Asokan and
                  Benny Pinkas},
  title        = {Secure Deduplication of Encrypted Data without Additional Independent
                  Servers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellPSY15,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart and
                  Avishay Yanai},
  title        = {Efficient Constant Round Multi-Party Computation Combining {BMR} and
                  {SPDZ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellPSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pinkas0SZ15,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Gil Segev and
                  Michael Zohner},
  title        = {Phasing: Private Set Intersection using Permutation-based Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pinkas0SZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronLNP15,
  author       = {Shay Gueron and
                  Yehuda Lindell and
                  Ariel Nof and
                  Benny Pinkas},
  title        = {Fast Garbling of Circuits Under Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/751},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronLNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArcherBPP15,
  author       = {David W. Archer and
                  Dan Bogdanov and
                  Benny Pinkas and
                  Pille Pullonen},
  title        = {Maturity and Performance of Programmable Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1039},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArcherBPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AfsharMPR14,
  author       = {Arash Afshar and
                  Payman Mohassel and
                  Benny Pinkas and
                  Ben Riva},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Non-Interactive Secure Computation Based on Cut-and-Choose},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {387--404},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_22},
  doi          = {10.1007/978-3-642-55220-5\_22},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AfsharMPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Pinkas0Z14,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Michael Zohner},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Faster Private Set Intersection Based on {OT} Extension},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {797--812},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/pinkas},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Pinkas0Z14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinkasR14,
  author       = {Benny Pinkas and
                  Tzachy Reinman},
  title        = {A Simple Recursive Tree Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinkasR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pinkas0Z14,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Michael Zohner},
  title        = {Faster Private Set Intersection based on {OT} Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pinkas0Z14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/JarrousP13,
  author       = {Ayman Jarrous and
                  Benny Pinkas},
  title        = {Secure computation of functionalities based on Hamming distance and
                  its application to computing document similarity},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {21--46},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJACT.2013.053433},
  doi          = {10.1504/IJACT.2013.053433},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/JarrousP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/JarrousP13,
  author       = {Ayman Jarrous and
                  Benny Pinkas},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Sara Foresti},
  title        = {Canon-MPC, a system for casual non-interactive secure multi-party
                  computation using native client},
  booktitle    = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages        = {155--166},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517840.2517845},
  doi          = {10.1145/2517840.2517845},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/JarrousP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LindellP12,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {4},
  pages        = {680--722},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-011-9107-0},
  doi          = {10.1007/S00145-011-9107-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LindellP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BerkmanPY12,
  author       = {Omer Berkman and
                  Benny Pinkas and
                  Moti Yung},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Firm Grip Handshakes: {A} Tool for Bidirectional Vouching},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {142--157},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_12},
  doi          = {10.1007/978-3-642-35404-5\_12},
  timestamp    = {Sun, 02 Jun 2019 21:12:31 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BerkmanPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaleviHPS11,
  author       = {Shai Halevi and
                  Danny Harnik and
                  Benny Pinkas and
                  Alexandra Shulman{-}Peleg},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Proofs of ownership in remote storage systems},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {491--500},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046765},
  doi          = {10.1145/2046707.2046765},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaleviHPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviLP11,
  author       = {Shai Halevi and
                  Yehuda Lindell and
                  Benny Pinkas},
  editor       = {Phillip Rogaway},
  title        = {Secure Computation on the Web: Computing without Simultaneous Interaction},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {132--150},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_8},
  doi          = {10.1007/978-3-642-22792-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LindellOP11,
  author       = {Yehuda Lindell and
                  Eli Oxman and
                  Benny Pinkas},
  editor       = {Phillip Rogaway},
  title        = {The {IPS} Compiler: Optimizations, Variants and Concrete Efficiency},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {259--276},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_15},
  doi          = {10.1007/978-3-642-22792-9\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LindellOP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FischlinPSSV11,
  author       = {Marc Fischlin and
                  Benny Pinkas and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider and
                  Ivan Visconti},
  editor       = {Aggelos Kiayias},
  title        = {Secure Set Intersection with Untrusted Hardware Tokens},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_1},
  doi          = {10.1007/978-3-642-19074-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FischlinPSSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LindellP11,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  editor       = {Yuval Ishai},
  title        = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {329--346},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_20},
  doi          = {10.1007/978-3-642-19571-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LindellP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Pinkas11,
  author       = {Benny Pinkas},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Traitor Tracing},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1313--1316},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_158},
  doi          = {10.1007/978-1-4419-5906-5\_158},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Pinkas11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/PinkasSS11,
  author       = {Benny Pinkas and
                  Ahmad{-}Reza Sadeghi and
                  Nigel P. Smart},
  title        = {Secure Computing in the Cloud (Dagstuhl Seminar 11491)},
  journal      = {Dagstuhl Reports},
  volume       = {1},
  number       = {12},
  pages        = {1--10},
  year         = {2011},
  url          = {https://doi.org/10.4230/DagRep.1.12.1},
  doi          = {10.4230/DAGREP.1.12.1},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/PinkasSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviLP11,
  author       = {Shai Halevi and
                  Yehuda Lindell and
                  Benny Pinkas},
  title        = {Secure Computation on the Web: Computing without Simultaneous Interaction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviHPS11,
  author       = {Shai Halevi and
                  Danny Harnik and
                  Benny Pinkas and
                  Alexandra Shulman{-}Peleg},
  title        = {Proofs of Ownership in Remote Storage Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviHPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellPO11,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Eli Oxman},
  title        = {The {IPS} Compiler: Optimizations, Variants and Concrete Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellPO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HarnikPS10,
  author       = {Danny Harnik and
                  Benny Pinkas and
                  Alexandra Shulman{-}Peleg},
  title        = {Side Channels in Cloud Services: Deduplication in Cloud Storage},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {6},
  pages        = {40--47},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.187},
  doi          = {10.1109/MSP.2010.187},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HarnikPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/NaorP10,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Efficient trace and revoke schemes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {6},
  pages        = {411--424},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0121-2},
  doi          = {10.1007/S10207-010-0121-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/NaorP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AggarwalMP10,
  author       = {Gagan Aggarwal and
                  Nina Mishra and
                  Benny Pinkas},
  title        = {Secure Computation of the Median (and Other Elements of Specified
                  Ranks)},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {3},
  pages        = {373--401},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-010-9059-9},
  doi          = {10.1007/S00145-010-9059-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AggarwalMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/BicksonRDP10,
  author       = {Danny Bickson and
                  Tzachy Reinman and
                  Danny Dolev and
                  Benny Pinkas},
  title        = {Peer-to-peer secure multi-party numerical computation facing malicious
                  adversaries},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {3},
  number       = {2},
  pages        = {129--144},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12083-009-0051-9},
  doi          = {10.1007/S12083-009-0051-9},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/BicksonRDP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ManulisPP10,
  author       = {Mark Manulis and
                  Benny Pinkas and
                  Bertram Poettering},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Privacy-Preserving Group Discovery with Linear Complexity},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {420--437},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_25},
  doi          = {10.1007/978-3-642-13708-2\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ManulisPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PinkasR10,
  author       = {Benny Pinkas and
                  Tzachy Reinman},
  editor       = {Tal Rabin},
  title        = {Oblivious {RAM} Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {502--519},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_27},
  doi          = {10.1007/978-3-642-14623-7\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PinkasR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OsadchyPJM10,
  author       = {Margarita Osadchy and
                  Benny Pinkas and
                  Ayman Jarrous and
                  Boaz Moskovich},
  title        = {SCiFI - {A} System for Secure Face Identification},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {239--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.39},
  doi          = {10.1109/SP.2010.39},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/OsadchyPJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellP10,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinkasR10,
  author       = {Benny Pinkas and
                  Tzachy Reinman},
  title        = {Oblivious {RAM} Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinkasR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LindellP09,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {A Proof of Security of Yao's Protocol for Two-Party Computation},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {2},
  pages        = {161--188},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9036-8},
  doi          = {10.1007/S00145-008-9036-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LindellP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LindellP09,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {Secure Multiparty Computation for Privacy-Preserving Data Mining},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {1},
  year         = {2009},
  url          = {https://doi.org/10.29012/jpc.v1i1.566},
  doi          = {10.29012/JPC.V1I1.566},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/LindellP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/GradwohlNPR09,
  author       = {Ronen Gradwohl and
                  Moni Naor and
                  Benny Pinkas and
                  Guy N. Rothblum},
  title        = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions
                  of Sudoku Puzzles},
  journal      = {Theory Comput. Syst.},
  volume       = {44},
  number       = {2},
  pages        = {245--268},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00224-008-9119-9},
  doi          = {10.1007/S00224-008-9119-9},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mst/GradwohlNPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DorrendorfGP09,
  author       = {Leo Dorrendorf and
                  Zvi Gutterman and
                  Benny Pinkas},
  title        = {Cryptanalysis of the random number generator of the Windows operating
                  system},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {10:1--10:32},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609966},
  doi          = {10.1145/1609956.1609966},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DorrendorfGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/JarrousP09,
  author       = {Ayman Jarrous and
                  Benny Pinkas},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Secure Hamming Distance Based Computation and Its Applications},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {107--124},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_7},
  doi          = {10.1007/978-3-642-01957-9\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/JarrousP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PinkasSSW09,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Nigel P. Smart and
                  Stephen C. Williams},
  editor       = {Mitsuru Matsui},
  title        = {Secure Two-Party Computation Is Practical},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {250--267},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_15},
  doi          = {10.1007/978-3-642-10366-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PinkasSSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0901-2689,
  author       = {Danny Bickson and
                  Tzachy Reinman and
                  Danny Dolev and
                  Benny Pinkas},
  title        = {Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious
                  Adversaries},
  journal      = {CoRR},
  volume       = {abs/0901.2689},
  year         = {2009},
  url          = {http://arxiv.org/abs/0901.2689},
  eprinttype    = {arXiv},
  eprint       = {0901.2689},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0901-2689.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pinkas0SW09,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Nigel P. Smart and
                  Stephen C. Williams},
  title        = {Secure Two-Party Computation is Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pinkas0SW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Ben-DavidNP08,
  author       = {Assaf Ben{-}David and
                  Noam Nisan and
                  Benny Pinkas},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {FairplayMP: a system for secure multi-party computation},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {257--266},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455804},
  doi          = {10.1145/1455770.1455804},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Ben-DavidNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/BicksonDBP08,
  author       = {Danny Bickson and
                  Danny Dolev and
                  Genia Bezman and
                  Benny Pinkas},
  editor       = {Klaus Wehrle and
                  Wolfgang Kellerer and
                  Sandeep K. Singhal and
                  Ralf Steinmetz},
  title        = {Peer-to-Peer Secure Multi-party Numerical Computation},
  booktitle    = {Proceedings P2P'08, Eighth International Conference on Peer-to-Peer
                  Computing, 8-11 September 2008, Aachen, Germany},
  pages        = {257--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/P2P.2008.22},
  doi          = {10.1109/P2P.2008.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/p2p/BicksonDBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/LindellPS08,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Implementing Two-Party Computation Efficiently with Security Against
                  Malicious Adversaries},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {2--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_2},
  doi          = {10.1007/978-3-540-85855-3\_2},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/LindellPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0810-1624,
  author       = {Danny Bickson and
                  Genia Bezman and
                  Danny Dolev and
                  Benny Pinkas},
  title        = {Peer-to-Peer Secure Multi-Party Numerical Computation},
  journal      = {CoRR},
  volume       = {abs/0810.1624},
  year         = {2008},
  url          = {http://arxiv.org/abs/0810.1624},
  eprinttype    = {arXiv},
  eprint       = {0810.1624},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0810-1624.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellP08,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {An Efficient Protocol for Secure Two-Party Computation in the Presence
                  of Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellP08a,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {Secure Multiparty Computation for Privacy-Preserving Data Mining},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellP08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DorrendorfGP07,
  author       = {Leo Dorrendorf and
                  Zvi Gutterman and
                  Benny Pinkas},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Cryptanalysis of the windows random number generator},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {476--485},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315304},
  doi          = {10.1145/1315245.1315304},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DorrendorfGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LindellP07,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  editor       = {Moni Naor},
  title        = {An Efficient Protocol for Secure Two-Party Computation in the Presence
                  of Malicious Adversaries},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {52--78},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_4},
  doi          = {10.1007/978-3-540-72540-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LindellP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fun/GradwohlNPR07,
  author       = {Ronen Gradwohl and
                  Moni Naor and
                  Benny Pinkas and
                  Guy N. Rothblum},
  editor       = {Pierluigi Crescenzi and
                  Giuseppe Prencipe and
                  Geppino Pucci},
  title        = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions
                  of Sudoku Puzzles},
  booktitle    = {Fun with Algorithms, 4th International Conference, {FUN} 2007, Castiglioncello,
                  Italy, June 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4475},
  pages        = {166--182},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72914-3\_16},
  doi          = {10.1007/978-3-540-72914-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/fun/GradwohlNPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DorrendorfGP07,
  author       = {Leo Dorrendorf and
                  Zvi Gutterman and
                  Benny Pinkas},
  title        = {Cryptanalysis of the Random Number Generator of the Windows Operating
                  System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DorrendorfGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/NaorP06,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Oblivious Polynomial Evaluation},
  journal      = {{SIAM} J. Comput.},
  volume       = {35},
  number       = {5},
  pages        = {1254--1281},
  year         = {2006},
  url          = {https://doi.org/10.1137/S0097539704383633},
  doi          = {10.1137/S0097539704383633},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/NaorP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GuttermanPR06,
  author       = {Zvi Gutterman and
                  Benny Pinkas and
                  Tzachy Reinman},
  title        = {Analysis of the Linux Random Number Generator},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {371--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.5},
  doi          = {10.1109/SP.2006.5},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GuttermanPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuttermanPR06,
  author       = {Zvi Gutterman and
                  Benny Pinkas and
                  Tzachy Reinman},
  title        = {Analysis of the Linux Random Number Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuttermanPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NaorP05,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Computationally Secure Oblivious Transfer},
  journal      = {J. Cryptol.},
  volume       = {18},
  number       = {1},
  pages        = {1--35},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00145-004-0102-6},
  doi          = {10.1007/S00145-004-0102-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NaorP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FreedmanIPR05,
  author       = {Michael J. Freedman and
                  Yuval Ishai and
                  Benny Pinkas and
                  Omer Reingold},
  editor       = {Joe Kilian},
  title        = {Keyword Search and Oblivious Pseudorandom Functions},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {303--324},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_17},
  doi          = {10.1007/978-3-540-30576-7\_17},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FreedmanIPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Pinkas05,
  author       = {Benny Pinkas},
  editor       = {Henk C. A. van Tilborg},
  title        = {Traitor Tracing},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_434},
  doi          = {10.1007/0-387-23483-7\_434},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Pinkas05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/Pinkas04,
  author       = {Benny Pinkas},
  title        = {Efficient State Updates for Key Management},
  journal      = {Proc. {IEEE}},
  volume       = {92},
  number       = {6},
  pages        = {910--917},
  year         = {2004},
  url          = {https://doi.org/10.1109/JPROC.2004.827355},
  doi          = {10.1109/JPROC.2004.827355},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/Pinkas04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FreedmanNP04,
  author       = {Michael J. Freedman and
                  Kobbi Nissim and
                  Benny Pinkas},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Efficient Private Matching and Set Intersection},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_1},
  doi          = {10.1007/978-3-540-24676-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FreedmanNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AggarwalMP04,
  author       = {Gagan Aggarwal and
                  Nina Mishra and
                  Benny Pinkas},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Secure Computation of the k th-Ranked Element},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {40--55},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_3},
  doi          = {10.1007/978-3-540-24676-3\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AggarwalMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MalkhiNPS04,
  author       = {Dahlia Malkhi and
                  Noam Nisan and
                  Benny Pinkas and
                  Yaron Sella},
  editor       = {Matt Blaze},
  title        = {Fairplay - Secure Two-Party Computation System},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  pages        = {287--302},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/malkhi.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MalkhiNPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR04-063,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {A Proof of Yao's Protocol for Secure Two-Party Computation},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR04-063}},
  year         = {2004},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2004/TR04-063/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR04-063},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR04-063.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellP04,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {A Proof of Yao's Protocol for Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pinkas03,
  author       = {Benny Pinkas},
  editor       = {Eli Biham},
  title        = {Fair Secure Two-Party Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {87--105},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_6},
  doi          = {10.1007/3-540-39200-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Pinkas03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GohBPG03,
  author       = {Eu{-}Jin Goh and
                  Dan Boneh and
                  Benny Pinkas and
                  Philippe Golle},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {The Design and Implementation of Protocol-Based Hidden Key Recovery},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {165--179},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_13},
  doi          = {10.1007/10958513\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GohBPG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LindellP02,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {Privacy Preserving Data Mining},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {3},
  pages        = {177--206},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0019-2},
  doi          = {10.1007/S00145-001-0019-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LindellP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigkdd/Pinkas02,
  author       = {Benny Pinkas},
  title        = {Cryptographic Techniques for Privacy-Preserving Data Mining},
  journal      = {{SIGKDD} Explor.},
  volume       = {4},
  number       = {2},
  pages        = {12--19},
  year         = {2002},
  url          = {https://doi.org/10.1145/772862.772865},
  doi          = {10.1145/772862.772865},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigkdd/Pinkas02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PinkasS02,
  author       = {Benny Pinkas and
                  Tomas Sander},
  editor       = {Vijayalakshmi Atluri},
  title        = {Securing passwords against dictionary attacks},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {161--170},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586133},
  doi          = {10.1145/586110.586133},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PinkasS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Pinkas01,
  author       = {Benny Pinkas},
  editor       = {Tomas Sander},
  title        = {Efficient State Updates for Key Management},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_4},
  doi          = {10.1007/3-540-47870-1\_4},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Pinkas01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaberP01,
  author       = {Stuart Haber and
                  Benny Pinkas},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Securely combining public-key cryptosystems},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {215--224},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502013},
  doi          = {10.1145/501983.502013},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaberP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/HornePS01,
  author       = {Bill G. Horne and
                  Benny Pinkas and
                  Tomas Sander},
  editor       = {Michael P. Wellman and
                  Yoav Shoham},
  title        = {Escrow services and incentives in peer-to-peer networks},
  booktitle    = {Proceedings 3rd {ACM} Conference on Electronic Commerce (EC-2001),
                  Tampa, Florida, USA, October 14-17, 2001},
  pages        = {85--94},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501158.501168},
  doi          = {10.1145/501158.501168},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/HornePS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/NaorP01,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {S. Rao Kosaraju},
  title        = {Efficient oblivious transfer protocols},
  booktitle    = {Proceedings of the Twelfth Annual Symposium on Discrete Algorithms,
                  January 7-9, 2001, Washington, DC, {USA}},
  pages        = {448--457},
  publisher    = {{ACM/SIAM}},
  year         = {2001},
  url          = {http://dl.acm.org/citation.cfm?id=365411.365502},
  timestamp    = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/NaorP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ChorFNP00,
  author       = {Benny Chor and
                  Amos Fiat and
                  Moni Naor and
                  Benny Pinkas},
  title        = {Tracing traitors},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {3},
  pages        = {893--910},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.841169},
  doi          = {10.1109/18.841169},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ChorFNP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaorP00,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Tatsuaki Okamoto},
  title        = {Distributed Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_16},
  doi          = {10.1007/3-540-44448-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NaorP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LindellP00,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  editor       = {Mihir Bellare},
  title        = {Privacy Preserving Data Mining},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {36--54},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_3},
  doi          = {10.1007/3-540-44598-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LindellP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/NaorP00,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Yair Frankel},
  title        = {Efficient Trace and Revoke Schemes},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_1},
  doi          = {10.1007/3-540-45472-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/NaorP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AnupamMNPR99,
  author       = {Vinod Anupam and
                  Alain J. Mayer and
                  Kobbi Nissim and
                  Benny Pinkas and
                  Michael K. Reiter},
  title        = {On the Security of Pay-per-Click and Other Web Advertising Schemes},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {11-16},
  pages        = {1091--1100},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1389-1286(99)00023-7},
  doi          = {10.1016/S1389-1286(99)00023-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AnupamMNPR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorP99,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Michael J. Wiener},
  title        = {Oblivious Transfer with Adaptive Queries},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {573--590},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_36},
  doi          = {10.1007/3-540-48405-1\_36},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaorPR99,
  author       = {Moni Naor and
                  Benny Pinkas and
                  Omer Reingold},
  editor       = {Jacques Stern},
  title        = {Distributed Pseudo-random Functions and KDCs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {327--346},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_23},
  doi          = {10.1007/3-540-48910-X\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NaorPR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/CanettiGIMNP99,
  author       = {Ran Canetti and
                  Juan A. Garay and
                  Gene Itkis and
                  Daniele Micciancio and
                  Moni Naor and
                  Benny Pinkas},
  title        = {Multicast Security: {A} Taxonomy and Some Efficient Constructions},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications,
                  Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999},
  pages        = {708--716},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/INFCOM.1999.751457},
  doi          = {10.1109/INFCOM.1999.751457},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/CanettiGIMNP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/NaorPS99,
  author       = {Moni Naor and
                  Benny Pinkas and
                  Reuban Sumner},
  editor       = {Stuart I. Feldman and
                  Michael P. Wellman},
  title        = {Privacy preserving auctions and mechanism design},
  booktitle    = {Proceedings of the First {ACM} Conference on Electronic Commerce (EC-99),
                  Denver, CO, USA, November 3-5, 1999},
  pages        = {129--139},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/336992.337028},
  doi          = {10.1145/336992.337028},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/NaorPS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorP99,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Jeffrey Scott Vitter and
                  Lawrence L. Larmore and
                  Frank Thomson Leighton},
  title        = {Oblivious Transfer and Polynomial Evaluation},
  booktitle    = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of
                  Computing, May 1-4, 1999, Atlanta, Georgia, {USA}},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/301250.301312},
  doi          = {10.1145/301250.301312},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/NaorP98,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Secure Accounting and Auditing on the Web},
  journal      = {Comput. Networks},
  volume       = {30},
  number       = {1-7},
  pages        = {541--550},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0169-7552(98)00116-0},
  doi          = {10.1016/S0169-7552(98)00116-0},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/NaorP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorP98,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Hugo Krawczyk},
  title        = {Threshold Traitor Tracing},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {502--517},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055750},
  doi          = {10.1007/BFB0055750},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaorP98,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Kaisa Nyberg},
  title        = {Secure and Efficient Metering},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {576--590},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054155},
  doi          = {10.1007/BFB0054155},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NaorP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorP97,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Visual Authentication and Identification},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {322--336},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052245},
  doi          = {10.1007/BFB0052245},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorP97,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Visual Authentication and Identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {1997},
  url          = {http://eprint.iacr.org/1997/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/McInnesP90,
  author       = {James L. McInnes and
                  Benny Pinkas},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {On the Impossibility of Private Key Cryptography with Weakly Random
                  Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {421--435},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_31},
  doi          = {10.1007/3-540-38424-3\_31},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/McInnesP90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics