H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 79 Citations 32,762 304 World Ranking 466 National Ranking 276

Research.com Recognitions

Awards & Achievements

2022 - W. Wallace McDowell Award, IEEE Computer Society For visionary contributions to computer security theory and practice, including foreseeing new cloud vulnerabilities and then pioneering corresponding novel solutions.

2019 - Member of Academia Europaea

2017 - Edward J. McCluskey Technical Achievement Award, IEEE Computer Society For outstanding contributions to cryptographic protocols and systems, enhancing the scope of cryptographic applications and of assured cryptographic security

2017 - IEEE Fellow For contributions to cryptography


What is he best known for?

The fields of study he is best known for:

  • Algorithm
  • Statistics
  • Operating system

His main research concerns Theoretical computer science, Cryptography, Computer security, Encryption and Security parameter. His Theoretical computer science research is multidisciplinary, incorporating perspectives in Oblivious transfer, Cryptographic primitive, Hash function, Commitment scheme and Secure multi-party computation. His Cryptography research includes themes of Block, Authentication and Digital signature.

In his study, which falls under the umbrella issue of Computer security, Revocation, Impossibility and Task is strongly linked to Identity. His Encryption research includes themes of Verifiable computing and Oracle. His biological study spans a wide range of topics, including Private information retrieval and Communication complexity.

His most cited work include:

  • Public Key Encryption with Keyword Search (2206 citations)
  • Software protection and simulation on oblivious RAMs (1197 citations)
  • Searchable symmetric encryption: improved definitions and efficient constructions (1167 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Theoretical computer science, Cryptography, Discrete mathematics, Secure multi-party computation and Computer security. His Theoretical computer science research is multidisciplinary, relying on both Mathematical proof, Cryptographic primitive, Protocol, Encryption and Computation. His work deals with themes such as Key, Private information retrieval and Bounded function, which intersect with Cryptography.

He has included themes like Combinatorics, Security parameter, Zero-knowledge proof, Constant and Function in his Discrete mathematics study. His Secure multi-party computation study incorporates themes from Communication complexity and Oblivious transfer. His research on Computer security frequently connects to adjacent areas such as Scheme.

He most often published in these fields:

  • Theoretical computer science (34.14%)
  • Cryptography (22.69%)
  • Discrete mathematics (19.68%)

What were the highlights of his more recent work (between 2016-2021)?

  • Secure multi-party computation (18.88%)
  • Theoretical computer science (34.14%)
  • Computation (12.05%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Secure multi-party computation, Theoretical computer science, Computation, Computer security and Discrete mathematics. The various areas that he examines in his Secure multi-party computation study include One-way function, Communication complexity, Encryption and Server. His Theoretical computer science study combines topics from a wide range of disciplines, such as Security token, Set, Construct, Protocol and Function.

His research in the fields of Oblivious transfer and Secure two-party computation overlaps with other disciplines such as Work. As part of the same scientific family, Rafail Ostrovsky usually focuses on Oblivious transfer, concentrating on Constant and intersecting with Scheme. His research investigates the link between Cryptography and topics such as Correctness that cross with problems in Secrecy.

Between 2016 and 2021, his most popular works were:

  • Coding for Interactive Communication Correcting Insertions and Deletions (23 citations)
  • Four-Round Concurrent Non-Malleable Commitments from One-Way Functions (19 citations)
  • Trapdoor Hash Functions and Their Applications (17 citations)

In his most recent research, the most cited papers focused on:

  • Algorithm
  • Statistics
  • Programming language

His primary areas of study are Secure multi-party computation, Theoretical computer science, Computation, Discrete mathematics and Protocol. His Secure multi-party computation research is covered under the topics of Cryptography, Computer security and Computer network. Specifically, his work in Computer security is concerned with the study of Adversary.

Rafail Ostrovsky has researched Theoretical computer science in several fields, including One-way function, Communication channel, Encryption, Coding and Hamming distance. His work carried out in the field of Discrete mathematics brings together such families of science as Reduction, Pseudorandom number generator, Security parameter, Hash function and Upper and lower bounds. Rafail Ostrovsky combines subjects such as Communication complexity and Constant with his study of Protocol.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Public Key Encryption with Keyword Search

Dan Boneh;Giovanni Di Crescenzo;Rafail Ostrovsky;Giuseppe Persiano.
theory and application of cryptographic techniques (2004)

3169 Citations

Searchable symmetric encryption: Improved definitions and efficient constructions

Reza Curtmola;Juan Garay;Seny Kamara;Rafail Ostrovsky.
Journal of Computer Security (2011)

2365 Citations

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data

Yevgeniy Dodis;Rafail Ostrovsky;Leonid Reyzin;Adam Smith.
SIAM Journal on Computing (2008)

2041 Citations

Software protection and simulation on oblivious RAMs

Oded Goldreich;Rafail Ostrovsky.
Journal of the ACM (1996)

1562 Citations

Attribute-based encryption with non-monotonic access structures

Rafail Ostrovsky;Amit Sahai;Brent Waters.
computer and communications security (2007)

1275 Citations

Replication is not needed: single database, computationally-private information retrieval

E. Kushilevitz;R. Ostrovsky.
foundations of computer science (1997)

1075 Citations

Universally composable two-party and multi-party secure computation

Ran Canetti;Yehuda Lindell;Rafail Ostrovsky;Amit Sahai.
symposium on the theory of computing (2002)

759 Citations

Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces

Eyal Kushilevitz;Rafail Ostrovsky;Yuval Rabani.
SIAM Journal on Computing (2000)

638 Citations

How to withstand mobile virus attacks (extended abstract)

Rafail Ostrovsky;Moti Yung.
principles of distributed computing (1991)

587 Citations

Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords

Jonathan Katz;Rafail Ostrovsky;Moti Yung.
theory and application of cryptographic techniques (2001)

507 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Rafail Ostrovsky

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 115

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 106

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 97

Ran Canetti

Ran Canetti

Boston University

Publications: 88

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 88

Rafael Pass

Rafael Pass

Cornell University

Publications: 77

Yi Mu

Yi Mu

Fujian Normal University

Publications: 71

Brent Waters

Brent Waters

The University of Texas at Austin

Publications: 71

Ivan Damgård

Ivan Damgård

Aarhus University

Publications: 70

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 65

Elaine Shi

Elaine Shi

Carnegie Mellon University

Publications: 64

Vinod Vaikuntanathan

Vinod Vaikuntanathan


Publications: 60

Moni Naor

Moni Naor

Weizmann Institute of Science

Publications: 60

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 59

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 58

Something went wrong. Please try again later.