D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 57 Citations 21,417 115 World Ranking 2494 National Ranking 45

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Cryptography
  • Programming language

Benny Pinkas focuses on Theoretical computer science, Cryptography, Secure two-party computation, Oblivious transfer and Computer security. The Theoretical computer science study which covers Data mining that intersects with Relevance. His study on Divide and choose is often connected to Context as part of broader study in Cryptography.

Benny Pinkas is investigating Computation and Protocol as part of his examination of Secure two-party computation. His research in Oblivious transfer intersects with topics in Cryptographic protocol, Overhead, Private information retrieval, Random oracle and Private set intersection. His work in the fields of Computer security, such as Traitor tracing, Encryption, Authentication and Authentication protocol, intersects with other areas such as Petabyte.

His most cited work include:

  • Efficient Private Matching and Set Intersection (981 citations)
  • Privacy Preserving Data Mining (958 citations)
  • Fairplay—a secure two-party computation system (744 citations)

What are the main themes of his work throughout his whole career to date?

Benny Pinkas mainly investigates Theoretical computer science, Computer security, Secure multi-party computation, Protocol and Cryptography. His Theoretical computer science study incorporates themes from Overhead, Oblivious transfer, Random oracle and Intersection, Private set intersection. His Computer security research incorporates themes from Revocation and Service.

In general Secure multi-party computation, his work in Secure two-party computation is often linked to Protocol linking many areas of study. His Protocol research incorporates elements of Value and The Internet. His Cryptography study integrates concerns from other disciplines, such as Real-time computing and Encryption.

He most often published in these fields:

  • Theoretical computer science (35.22%)
  • Computer security (30.82%)
  • Secure multi-party computation (27.67%)

What were the highlights of his more recent work (between 2016-2020)?

  • Secure multi-party computation (27.67%)
  • Computer network (16.98%)
  • Protocol (27.04%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Secure multi-party computation, Computer network, Protocol, Computer security and Private set intersection. His Secure multi-party computation course of study focuses on Scalability and Distributed computing, Block and Server. He studied Protocol and The Internet that intersect with Differential privacy, Password and Hacker.

His Private set intersection research is multidisciplinary, incorporating perspectives in Theoretical computer science, Paxos and Computation. His research integrates issues of Intersection, Set and Pseudorandom function family in his study of Theoretical computer science. His study explores the link between Cryptographic protocol and topics such as Key that cross with problems in Cryptography.

Between 2016 and 2020, his most popular works were:

  • Turning your weakness into a strength: watermarking deep neural networks by backdooring (106 citations)
  • Scalable Private Set Intersection Based on OT Extension (83 citations)
  • SBFT: A Scalable and Decentralized Trust Infrastructure (61 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Cryptography
  • Programming language

His primary areas of investigation include Private set intersection, Secure multi-party computation, Theoretical computer science, Artificial intelligence and Scalability. The various areas that Benny Pinkas examines in his Private set intersection study include Computer network, Protocol and Computation. His Protocol research includes elements of Cloud computing, The Internet and Extension.

His research in Secure multi-party computation tackles topics such as Intersection which are related to areas like Cardinality, Oblivious transfer and Hash function. The concepts of his Theoretical computer science study are interwoven with issues in Information technology, Set and Bloom filter. Malware is a subfield of Computer security that Benny Pinkas explores.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Privacy preserving data mining

Y. Lindell;B. Pinkas.
Lecture Notes in Computer Science (2000)

1661 Citations

Efficient private matching and set intersection

Michael J. Freedman;Kobbi Nissim;Benny Pinkas.
Lecture Notes in Computer Science (2004)

1453 Citations

Multicast security: a taxonomy and some efficient constructions

R. Canetti;J. Garay;G. Itkis;D. Micciancio.
international conference on computer communications (1999)

1153 Citations

Fairplay—a secure two-party computation system

Dahlia Malkhi;Noam Nisan;Benny Pinkas;Yaron Sella.
usenix security symposium (2004)

1100 Citations

Efficient oblivious transfer protocols

Moni Naor;Benny Pinkas.
symposium on discrete algorithms (2001)

959 Citations

Tracing traitors

B. Chor;A. Fiat;M. Naor;B. Pinkas.
IEEE Transactions on Information Theory (2000)

933 Citations

Privacy preserving auctions and mechanism design

Moni Naor;Benny Pinkas;Reuban Sumner.
electronic commerce (1999)

895 Citations

A Proof of Security of Yao’s Protocol for Two-Party Computation

Yehuda Lindell;Benny Pinkas.
Journal of Cryptology (2009)

838 Citations

Oblivious transfer and polynomial evaluation

Moni Naor;Benny Pinkas.
symposium on the theory of computing (1999)

818 Citations

Proofs of Ownership in Remote Storage Systems.

Shai Halevi;Danny Harnik;Benny Pinkas;Alexandra Shulman-Peleg.
IACR Cryptology ePrint Archive (2011)

801 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Benny Pinkas

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 83

Thomas Schneider

Thomas Schneider

Technical University of Darmstadt

Publications: 81

Rafail Ostrovsky

Rafail Ostrovsky

University of California, Los Angeles

Publications: 73

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 68

Yehuda Lindell

Yehuda Lindell

Bar-Ilan University

Publications: 63

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 60

Vladimir Kolesnikov

Vladimir Kolesnikov

Georgia Institute of Technology

Publications: 58

Florian Kerschbaum

Florian Kerschbaum

University of Waterloo

Publications: 55

Dan Boneh

Dan Boneh

Stanford University

Publications: 50

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 47

Aggelos Kiayias

Aggelos Kiayias

University of Edinburgh

Publications: 47

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 44

Stefan Katzenbeisser

Stefan Katzenbeisser

University of Passau

Publications: 43

Emiliano De Cristofaro

Emiliano De Cristofaro

University College London

Publications: 40

Yevgeniy Dodis

Yevgeniy Dodis

New York University

Publications: 40

Murat Kantarcioglu

Murat Kantarcioglu

The University of Texas at Dallas

Publications: 40

Trending Scientists

Robert J. Webster

Robert J. Webster

Vanderbilt University

Liang-Hung Lu

Liang-Hung Lu

National Taiwan University

Xiaoyang Zhang

Xiaoyang Zhang

Shandong University

Ajayan Vinu

Ajayan Vinu

University of Newcastle Australia

Huibi Xu

Huibi Xu

Huazhong University of Science and Technology

Yanwen Ma

Yanwen Ma

Nanjing University of Posts and Telecommunications

Yuichi Ikuhara

Yuichi Ikuhara

University of Tokyo

Fan Zhang

Fan Zhang

Fudan University

Peter S. Braund

Peter S. Braund

University of Leicester

Joan M. Herbers

Joan M. Herbers

Colorado State University

Takashi Suda

Takashi Suda

Kanazawa University

John Wainwright

John Wainwright

Durham University

Pinhas Alpert

Pinhas Alpert

Tel Aviv University

Jiancheng Shi

Jiancheng Shi

Chinese Academy of Sciences

Aldina Barral

Aldina Barral

Oswaldo Cruz Foundation

Liping Yu

Liping Yu

University of Colorado Denver

Something went wrong. Please try again later.