D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 60 Citations 22,902 103 World Ranking 1576 National Ranking 31

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Cryptography
  • Programming language

Benny Pinkas focuses on Theoretical computer science, Cryptography, Secure two-party computation, Oblivious transfer and Computer security. The Theoretical computer science study which covers Data mining that intersects with Relevance. His study on Divide and choose is often connected to Context as part of broader study in Cryptography.

Benny Pinkas is investigating Computation and Protocol as part of his examination of Secure two-party computation. His research in Oblivious transfer intersects with topics in Cryptographic protocol, Overhead, Private information retrieval, Random oracle and Private set intersection. His work in the fields of Computer security, such as Traitor tracing, Encryption, Authentication and Authentication protocol, intersects with other areas such as Petabyte.

His most cited work include:

  • Efficient Private Matching and Set Intersection (981 citations)
  • Privacy Preserving Data Mining (958 citations)
  • Fairplay—a secure two-party computation system (744 citations)

What are the main themes of his work throughout his whole career to date?

Benny Pinkas mainly investigates Theoretical computer science, Computer security, Secure multi-party computation, Protocol and Cryptography. His Theoretical computer science study incorporates themes from Overhead, Oblivious transfer, Random oracle and Intersection, Private set intersection. His Computer security research incorporates themes from Revocation and Service.

In general Secure multi-party computation, his work in Secure two-party computation is often linked to Protocol linking many areas of study. His Protocol research incorporates elements of Value and The Internet. His Cryptography study integrates concerns from other disciplines, such as Real-time computing and Encryption.

He most often published in these fields:

  • Theoretical computer science (35.22%)
  • Computer security (30.82%)
  • Secure multi-party computation (27.67%)

What were the highlights of his more recent work (between 2016-2020)?

  • Secure multi-party computation (27.67%)
  • Computer network (16.98%)
  • Protocol (27.04%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Secure multi-party computation, Computer network, Protocol, Computer security and Private set intersection. His Secure multi-party computation course of study focuses on Scalability and Distributed computing, Block and Server. He studied Protocol and The Internet that intersect with Differential privacy, Password and Hacker.

His Private set intersection research is multidisciplinary, incorporating perspectives in Theoretical computer science, Paxos and Computation. His research integrates issues of Intersection, Set and Pseudorandom function family in his study of Theoretical computer science. His study explores the link between Cryptographic protocol and topics such as Key that cross with problems in Cryptography.

Between 2016 and 2020, his most popular works were:

  • Turning your weakness into a strength: watermarking deep neural networks by backdooring (106 citations)
  • Scalable Private Set Intersection Based on OT Extension (83 citations)
  • SBFT: A Scalable and Decentralized Trust Infrastructure (61 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Cryptography
  • Programming language

His primary areas of investigation include Private set intersection, Secure multi-party computation, Theoretical computer science, Artificial intelligence and Scalability. The various areas that Benny Pinkas examines in his Private set intersection study include Computer network, Protocol and Computation. His Protocol research includes elements of Cloud computing, The Internet and Extension.

His research in Secure multi-party computation tackles topics such as Intersection which are related to areas like Cardinality, Oblivious transfer and Hash function. The concepts of his Theoretical computer science study are interwoven with issues in Information technology, Set and Bloom filter. Malware is a subfield of Computer security that Benny Pinkas explores.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Privacy Preserving Data Mining

Y. Lindell;B. Pinkas.
international cryptology conference (2000)

1582 Citations

Efficient Private Matching and Set Intersection

Michael J. Freedman;Kobbi Nissim;Benny Pinkas.
theory and application of cryptographic techniques (2004)

1365 Citations

Multicast security: a taxonomy and some efficient constructions

R. Canetti;J. Garay;G. Itkis;D. Micciancio.
international conference on computer communications (1999)

1095 Citations

Fairplay—a secure two-party computation system

Dahlia Malkhi;Noam Nisan;Benny Pinkas;Yaron Sella.
usenix security symposium (2004)

1061 Citations

Tracing traitors

B. Chor;A. Fiat;M. Naor;B. Pinkas.
IEEE Transactions on Information Theory (2000)

928 Citations

Efficient oblivious transfer protocols

Moni Naor;Benny Pinkas.
symposium on discrete algorithms (2001)

863 Citations

Privacy preserving auctions and mechanism design

Moni Naor;Benny Pinkas;Reuban Sumner.
electronic commerce (1999)

806 Citations

A Proof of Security of Yao’s Protocol for Two-Party Computation

Yehuda Lindell;Benny Pinkas.
Journal of Cryptology (2009)

780 Citations

Oblivious transfer and polynomial evaluation

Moni Naor;Benny Pinkas.
symposium on the theory of computing (1999)

758 Citations

Proofs of ownership in remote storage systems

Shai Halevi;Danny Harnik;Benny Pinkas;Alexandra Shulman-Peleg.
computer and communications security (2011)

734 Citations

Best Scientists Citing Benny Pinkas

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 83

Thomas Schneider

Thomas Schneider

TU Darmstadt

Publications: 81

Rafail Ostrovsky

Rafail Ostrovsky

University of California, Los Angeles

Publications: 73

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 68

Yehuda Lindell

Yehuda Lindell

Bar-Ilan University

Publications: 63

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 60

Vladimir Kolesnikov

Vladimir Kolesnikov

Georgia Institute of Technology

Publications: 58

Florian Kerschbaum

Florian Kerschbaum

University of Waterloo

Publications: 55

Dan Boneh

Dan Boneh

Stanford University

Publications: 50

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 47

Aggelos Kiayias

Aggelos Kiayias

University of Edinburgh

Publications: 47

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 44

Stefan Katzenbeisser

Stefan Katzenbeisser

University of Passau

Publications: 43

Emiliano De Cristofaro

Emiliano De Cristofaro

University College London

Publications: 40

Murat Kantarcioglu

Murat Kantarcioglu

The University of Texas at Dallas

Publications: 40

Yevgeniy Dodis

Yevgeniy Dodis

New York University

Publications: 40

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.