A New Framework for Garbled Circuits. T Ashur, E Cohen, C Hazay, A Yanai IACR Cryptol. ePrint Arch. 2021, 739, 2021 | 6* | 2021 |
A note on the relation between the definitions of security for semi-honest and malicious adversaries C Hazay, Y Lindell Cryptology ePrint Archive, 2010 | 31 | 2010 |
A note on zero-knowledge proofs of knowledge and the ZKPOK ideal functionality C Hazay, Y Lindell Cryptology ePrint Archive, 2010 | 11 | 2010 |
Actively secure garbled circuits with constant communication overhead in the plain model C Hazay, Y Ishai, M Venkitasubramaniam Journal of Cryptology 36 (3), 26, 2023 | 1 | 2023 |
Actively secure garbled circuits with constant communication overhead in the plain model C Hazay, Y Ishai, M Venkitasubramaniam Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017 | 22 | 2017 |
Adaptively secure computation with partial erasures C Hazay, Y Lindell, A Patra Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing …, 2015 | 17 | 2015 |
Advances in Cryptology–EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023 … C Hazay, M Stam Springer Nature, 2023 | 5 | 2023 |
Approximate parameterized matching C Hazay, M Lewenstein, D Sokol Algorithms–ESA 2004: 12th Annual European Symposium, Bergen, Norway …, 2004 | 26 | 2004 |
Approximate parameterized matching C Hazay, M Lewenstein, D Sokol ACM Transactions on Algorithms (TALG) 3 (3), 29-es, 2007 | 56 | 2007 |
Asymptotically quasi-optimal cryptography L de Castro, C Hazay, Y Ishai, V Vaikuntanathan, M Venkitasubramaniam Annual International Conference on the Theory and Applications of …, 2022 | 5 | 2022 |
Automata evaluation and text search protocols with simulation based security R Gennaro, C Hazay, JS Sorensen Cryptology ePrint Archive, 2010 | 31* | 2010 |
Batchman and robin: Batched and non-batched branching for interactive zk Y Yang, D Heath, C Hazay, V Kolesnikov, M Venkitasubramaniam Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
Best of Both Worlds: Revisiting the Spymasters Double Agent Problem A Acharya, C Hazay, O Poburinnaya, M Venkitasubramaniam Annual International Cryptology Conference, 328-359, 2023 | | 2023 |
Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs C Hazay, M Venkitasubramaniam, M Weiss Theory of Cryptography Conference, 3-33, 2023 | 1 | 2023 |
BSF/DIMACS/DyDAn Workshop on Data Privacy R Wright, DD Director, A Smith, S Raskhodnikova, A Slavkovic, J Abowd, ... | | |
cG Copyright American Mathematical Society 2014 D Klinc, C Hazay, A Jagmohan, H Krawczyk, T Rabin IEEE Trans. Inform. Theory 58 (11), 6989-7001, 2012 | | 2012 |
Check for Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs Carmit Hazay1, 2, Muthuramakrishnan Venkitasubramaniam2 C Hazay, M Venkitasubramaniam Theory of Cryptography: 21st International Conference, TCC 2023, Taipei …, 2023 | | 2023 |
Comparison-based mpc in star topology (full version) GR Chandran, C Hazay, R Hundt, T Schneider Cryptology ePrint Archive, 2022 | 1 | 2022 |
Comparison-based MPC in Star Topology. GR Chandran, C Hazay, R Hundt, T Schneider SECRYPT, 69-82, 2022 | 2 | 2022 |
Complete fairness in secure two-party computation SD Gordon, C Hazay, J Katz, Y Lindell Journal of the ACM (JACM) 58 (6), 1-37, 2011 | 204 | 2011 |