Eyal Kushilevitz

From MaRDI portal
Person:294743

Available identifiers

zbMath Open kushilevitz.eyalWikidataQ27996487 ScholiaQ27996487MaRDI QIDQ294743

List of research outcomes

PublicationDate of PublicationType
Additive randomized encodings and their applications2024-02-02Paper
Perfect MPC over layered graphs2024-02-02Paper
Random-index oblivious RAM2023-08-14Paper
Cryptography from one-way communication: on completeness of finite channels2023-03-29Paper
Efficient 3-party distributed ORAM2022-12-16Paper
CNF-FSS and Its Applications2022-07-08Paper
Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration2022-04-22Paper
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND2021-03-30Paper
On fully secure MPC with solitary output2020-04-30Paper
Lower and upper bounds on the randomness complexity of private computations of AND2020-04-30Paper
Cryptographic sensing2020-03-09Paper
Sub-logarithmic distributed oblivious RAM with small block size2020-01-28Paper
https://portal.mardi4nfdi.de/entity/Q57433852019-05-10Paper
Best possible information-theoretic MPC2018-12-06Paper
The complexity of multiparty PSM protocols and related models2018-07-09Paper
https://portal.mardi4nfdi.de/entity/Q46380562018-05-03Paper
Minimizing locality of one-way functions via semi-private randomized encodings2018-04-26Paper
Randomness vs. fault-tolerance2017-09-29Paper
An Ω(D log(N/D)) lower bound for broadcast in radio networks2017-09-29Paper
Randomized mutual exclusion algorithms revisited2017-08-21Paper
Ad Hoc PSM Protocols: Secure Computation Without Coordination2017-06-23Paper
https://portal.mardi4nfdi.de/entity/Q29578812017-01-30Paper
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys2017-01-13Paper
Secure Protocol Transformations2016-10-27Paper
From randomizing polynomials to parallel algorithms2016-10-07Paper
Improved upper bounds on information-theoretic private information retrieval (extended abstract)2016-09-29Paper
One-way functions are essential for single-server private information retrieval2016-09-29Paper
Learning unions of high-dimensional boxes over the reals2016-06-16Paper
Distribution Design2016-04-15Paper
Secure Multiparty Computation with General Interaction Patterns2016-04-15Paper
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption2016-04-08Paper
Amortizing randomness in private multiparty computations2016-03-02Paper
Cryptography with One-Way Communication2015-12-10Paper
Secure Computation with Minimal Interaction, Revisited2015-12-10Paper
Randomness in private computations2015-09-11Paper
Lower bounds for randomized mutual exclusion2015-05-07Paper
Private approximation of NP-hard functions2015-02-27Paper
The round complexity of verifiable secret sharing and secure multicast2015-02-27Paper
On the complexity of communication complexity2015-02-04Paper
Black-box constructions for secure computation2014-11-25Paper
Information-theoretically secure protocols and security under composition2014-11-25Paper
Choosing, agreeing, and eliminating in communication complexity2014-09-25Paper
Non-Interactive Secure Multiparty Computation2014-08-07Paper
How to Garble Arithmetic Circuits2014-07-30Paper
How to Garble Arithmetic Circuits2014-07-30Paper
The Communication Complexity of Set-Disjointness with Small Sets and 0-1 Intersection2014-07-25Paper
Extracting Correlations2014-07-25Paper
On the Cryptographic Complexity of the Worst Functions2014-02-18Paper
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys2013-09-17Paper
Robust Pseudorandom Generators2013-08-06Paper
On the Power of Correlated Randomness in Secure Computation2013-03-18Paper
Constant-Rate Oblivious Transfer from Noisy Channels2011-08-12Paper
Black-Box Constructions of Protocols for Secure Computation2011-07-29Paper
Partition arguments in multiparty communication complexity2011-06-07Paper
Efficient Non-interactive Secure Computation2011-05-27Paper
On Achieving the “Best of Both Worlds” in Secure Multiparty Computation2011-05-17Paper
Information-Theoretically Secure Protocols and Security under Composition2010-11-04Paper
From Secrecy to Soundness: Efficient Verification via Secure Computation2010-09-07Paper
Choosing, Agreeing, and Eliminating in Communication Complexity2010-09-07Paper
Secure Multiparty Computation with Minimal Interaction2010-08-24Paper
Learning with attribute costs2010-08-16Paper
Batch codes and their applications2010-08-15Paper
Zero-Knowledge Proofs from Secure Multiparty Computation2010-07-07Paper
Approximation, Randomization, and Combinatorial Optimization.. Algorithms and Techniques2010-05-26Paper
Cryptography with constant input locality2009-11-13Paper
Partition Arguments in Multiparty Communication Complexity2009-07-14Paper
Public Key Encryption That Allows PIR Queries2009-03-10Paper
Cryptography with Constant Input Locality2009-03-10Paper
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?2009-03-10Paper
https://portal.mardi4nfdi.de/entity/Q35495932009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35497282009-01-05Paper
Testing monotonicity over graph products2008-09-04Paper
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)2008-08-20Paper
Distribution-Free Property-Testing2008-08-14Paper
Distribution-free connectivity testing for sparse graphs2008-05-27Paper
OT-Combiners via Secure Computation2008-03-05Paper
Computationally private randomizing polynomials and their applications2007-11-05Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Cryptography in $NC^0$2007-09-07Paper
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation2007-09-04Paper
On Pseudorandom Generators with Linear Stretch in NC02007-08-28Paper
On the limitations of universally composable two-party computation without set-up assumptions2006-08-14Paper
Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques2006-07-07Paper
https://portal.mardi4nfdi.de/entity/Q33749032006-03-01Paper
Theory of Cryptography2005-12-07Paper
Computation in Noisy Radio Networks2005-09-16Paper
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques2005-08-25Paper
Automata, Languages and Programming2005-08-24Paper
General constructions for information-theoretic private information retrieval2005-08-03Paper
Private information retrieval2005-01-25Paper
https://portal.mardi4nfdi.de/entity/Q47371612004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44713712004-07-28Paper
Private computation using a PEZ dispenser.2004-03-14Paper
Amortizing Randomness in Private Multiparty Computations2004-01-08Paper
https://portal.mardi4nfdi.de/entity/Q44348692003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44349012003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44142642003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q44091172003-06-30Paper
Learning functions represented as multiplicity automata2003-06-25Paper
PAC learning with nasty noise.2003-01-21Paper
The query complexity of finding local minima in the lattice2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q27244302002-10-28Paper
https://portal.mardi4nfdi.de/entity/Q45425322002-09-17Paper
https://portal.mardi4nfdi.de/entity/Q45425542002-09-17Paper
https://portal.mardi4nfdi.de/entity/Q45425842002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q45269972001-02-28Paper
Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces2000-10-18Paper
Adaptive packet routing for bursty adversarial traffic2000-08-27Paper
Protecting data privacy in private information retrieval schemes2000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q49553132000-07-24Paper
Computing Functions of a Shared Secret2000-07-20Paper
Randomness versus fault-tolerance2000-05-08Paper
https://portal.mardi4nfdi.de/entity/Q42319092000-04-26Paper
Reducibility and Completeness in Private Computations2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42493222000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q49407122000-03-01Paper
The linear-array conjecture in communication complexity is false1999-12-08Paper
https://portal.mardi4nfdi.de/entity/Q42285091999-10-04Paper
Characterizing linear size circuits in terms of privacy1999-09-22Paper
https://portal.mardi4nfdi.de/entity/Q42341051999-06-29Paper
https://portal.mardi4nfdi.de/entity/Q42496301999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42501871999-06-17Paper
Learning boxes in high dimension1999-05-18Paper
https://portal.mardi4nfdi.de/entity/Q42284481999-05-18Paper
On Learning Read-k-Satisfy-j DNF1998-09-21Paper
Log-Space Polynomial End-to-End Communication1998-09-21Paper
Lower Bounds for Randomized Mutual Exclusion1998-09-21Paper
A simple algorithm for learning O(log n)-term DNF1998-07-23Paper
A Randomness-Rounds Tradeoff in Private Computation1998-05-11Paper
An $\Omega(D\log (N/D))$ Lower Bound for Broadcast in Radio Networks1998-05-10Paper
Randomness in Private Computations1998-02-09Paper
Online learning versus offline learning1997-12-17Paper
On learning visual concepts and DNF formulae1996-11-04Paper
Communication Complexity1996-04-24Paper
Witness sets for families of binary vectors1996-02-26Paper
Amortized Communication Complexity1996-01-28Paper
Fractional Covers and Communication Complexity1995-07-10Paper
Learning by distances1995-07-10Paper
Private Computations over the Integers1995-06-27Paper
On Lotteries with Unique Winners1995-05-04Paper
Learning Decision Trees Using the Fourier Spectrum1994-11-24Paper
Privacy, additional information and communication1994-10-26Paper
On the structure of the privacy hierarchy1994-05-26Paper
Secret sharing over infinite domains1993-08-29Paper
A perfect zero-knowledge proof system for a problem equivalent to the discrete logarithm1993-08-29Paper
A communication-privacy tradeoff for modular addition1993-05-16Paper
Privacy and Communication Complexity1992-09-27Paper
A Zero-One Law for Boolean Privacy1991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q57504021990-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Eyal Kushilevitz