Benny Pinkas focuses on Theoretical computer science, Cryptography, Secure two-party computation, Oblivious transfer and Computer security. The Theoretical computer science study which covers Data mining that intersects with Relevance. His study on Divide and choose is often connected to Context as part of broader study in Cryptography.
Benny Pinkas is investigating Computation and Protocol as part of his examination of Secure two-party computation. His research in Oblivious transfer intersects with topics in Cryptographic protocol, Overhead, Private information retrieval, Random oracle and Private set intersection. His work in the fields of Computer security, such as Traitor tracing, Encryption, Authentication and Authentication protocol, intersects with other areas such as Petabyte.
Benny Pinkas mainly investigates Theoretical computer science, Computer security, Secure multi-party computation, Protocol and Cryptography. His Theoretical computer science study incorporates themes from Overhead, Oblivious transfer, Random oracle and Intersection, Private set intersection. His Computer security research incorporates themes from Revocation and Service.
In general Secure multi-party computation, his work in Secure two-party computation is often linked to Protocol linking many areas of study. His Protocol research incorporates elements of Value and The Internet. His Cryptography study integrates concerns from other disciplines, such as Real-time computing and Encryption.
The scientist’s investigation covers issues in Secure multi-party computation, Computer network, Protocol, Computer security and Private set intersection. His Secure multi-party computation course of study focuses on Scalability and Distributed computing, Block and Server. He studied Protocol and The Internet that intersect with Differential privacy, Password and Hacker.
His Private set intersection research is multidisciplinary, incorporating perspectives in Theoretical computer science, Paxos and Computation. His research integrates issues of Intersection, Set and Pseudorandom function family in his study of Theoretical computer science. His study explores the link between Cryptographic protocol and topics such as Key that cross with problems in Cryptography.
His primary areas of investigation include Private set intersection, Secure multi-party computation, Theoretical computer science, Artificial intelligence and Scalability. The various areas that Benny Pinkas examines in his Private set intersection study include Computer network, Protocol and Computation. His Protocol research includes elements of Cloud computing, The Internet and Extension.
His research in Secure multi-party computation tackles topics such as Intersection which are related to areas like Cardinality, Oblivious transfer and Hash function. The concepts of his Theoretical computer science study are interwoven with issues in Information technology, Set and Bloom filter. Malware is a subfield of Computer security that Benny Pinkas explores.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Privacy Preserving Data Mining
Y. Lindell;B. Pinkas.
international cryptology conference (2000)
Efficient Private Matching and Set Intersection
Michael J. Freedman;Kobbi Nissim;Benny Pinkas.
theory and application of cryptographic techniques (2004)
Multicast security: a taxonomy and some efficient constructions
R. Canetti;J. Garay;G. Itkis;D. Micciancio.
international conference on computer communications (1999)
Fairplay—a secure two-party computation system
Dahlia Malkhi;Noam Nisan;Benny Pinkas;Yaron Sella.
usenix security symposium (2004)
B. Chor;A. Fiat;M. Naor;B. Pinkas.
IEEE Transactions on Information Theory (2000)
Efficient oblivious transfer protocols
Moni Naor;Benny Pinkas.
symposium on discrete algorithms (2001)
Privacy preserving auctions and mechanism design
Moni Naor;Benny Pinkas;Reuban Sumner.
electronic commerce (1999)
A Proof of Security of Yao’s Protocol for Two-Party Computation
Yehuda Lindell;Benny Pinkas.
Journal of Cryptology (2009)
Oblivious transfer and polynomial evaluation
Moni Naor;Benny Pinkas.
symposium on the theory of computing (1999)
Proofs of ownership in remote storage systems
Shai Halevi;Danny Harnik;Benny Pinkas;Alexandra Shulman-Peleg.
computer and communications security (2011)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: