Efficient secure two-party protocols: Techniques and constructions C Hazay, Y Lindell Springer Science & Business Media, 2010 | 457 | 2010 |
Ligero: Lightweight sublinear arguments without a trusted setup S Ames, C Hazay, Y Ishai, M Venkitasubramaniam Proceedings of the 2017 acm sigsac conference on computer and communications …, 2017 | 454 | 2017 |
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries C Hazay, Y Lindell Theory of Cryptography Conference, 155-175, 2008 | 376 | 2008 |
Complete fairness in secure two-party computation SD Gordon, C Hazay, J Katz, Y Lindell Journal of the ACM (JACM) 58 (6), 1-37, 2011 | 206 | 2011 |
Efficient set operations in the presence of malicious adversaries C Hazay, K Nissim Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010 | 169 | 2010 |
Secure two-party computation with low communication I Damgård, S Faust, C Hazay Theory of Cryptography Conference, 54-74, 2012 | 149 | 2012 |
Scalable multi-party private set-intersection C Hazay, M Venkitasubramaniam IACR international workshop on public key cryptography, 175-203, 2017 | 138 | 2017 |
Efficient set intersection with simulation-based security MJ Freedman, C Hazay, K Nissim, B Pinkas Journal of Cryptology 29 (1), 115-155, 2016 | 133 | 2016 |
Low cost constant round MPC combining BMR and oblivious transfer C Hazay, P Scholl, E Soria-Vazquez Journal of cryptology 33 (4), 1732-1786, 2020 | 128 | 2020 |
Toward a game theoretic view of secure computation G Asharov, R Canetti, C Hazay Journal of Cryptology 29 (4), 879-926, 2016 | 122 | 2016 |
Efficient RSA key generation and threshold paillier in the two-party setting C Hazay, GL Mikkelsen, T Rabin, T Toft Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012 | 106 | 2012 |
On compression of data encrypted with block ciphers D Klinc, C Hazay, A Jagmohan, H Krawczyk, T Rabin IEEE transactions on information theory 58 (11), 6989-7001, 2012 | 101 | 2012 |
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries C Hazay, Y Lindell Journal of cryptology 23 (3), 422-456, 2010 | 100 | 2010 |
Computationally secure pattern matching in the presence of malicious adversaries C Hazay, T Toft Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010 | 100 | 2010 |
Constructions of truly practical secure protocols using standardsmartcards C Hazay, Y Lindell Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 90 | 2008 |
Ligero++: A new optimized sublinear IOP R Bhadauria, Z Fang, C Hazay, M Venkitasubramaniam, T Xie, Y Zhang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 89 | 2020 |
Leakage-resilient cryptography from minimal assumptions C Hazay, A López-Alt, H Wee, D Wichs Journal of Cryptology 29 (3), 514-551, 2016 | 89 | 2016 |
Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs C Hazay Journal of Cryptology 31 (2), 537-586, 2018 | 86 | 2018 |
Efficient set operations in the presence of malicious adversaries C Hazay, K Nissim Journal of cryptology 25 (3), 383-433, 2012 | 82 | 2012 |
Efficient RSA key generation and threshold paillier in the two-party setting C Hazay, GL Mikkelsen, T Rabin, T Toft, AA Nicolosi Journal of Cryptology 32, 265-323, 2019 | 80 | 2019 |