His scientific interests lie mostly in Secure two-party computation, Secure multi-party computation, Theoretical computer science, Computer security and Cryptography. His work deals with themes such as Distributed computing and Oblivious transfer, which intersect with Secure two-party computation. His study on Secure multi-party computation is covered under Protocol.
In his study, Field is inextricably linked to Computation, which falls within the broad field of Protocol. His research in Theoretical computer science intersects with topics in Cryptographic protocol, Universal composability, Homomorphic encryption, Mathematical proof and Data mining. His Cryptography study combines topics in areas such as Password, Hash function, Encryption, String and Series.
Yehuda Lindell mainly investigates Secure multi-party computation, Theoretical computer science, Computer security, Protocol and Cryptography. The study incorporates disciplines such as Correctness and Distributed computing in addition to Secure multi-party computation. His studies deal with areas such as Cryptographic protocol, Universal composability, Mathematical proof, Oblivious transfer and Security parameter as well as Theoretical computer science.
His work on Adversary, Adversary model, Encryption and Password as part of general Computer security study is frequently connected to Protocol, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. In general Protocol study, his work on Divide and choose often relates to the realm of Function, thereby connecting several areas of interest. In his study, Time complexity is strongly linked to Probabilistic logic, which falls under the umbrella field of Cryptography.
Yehuda Lindell mostly deals with Secure multi-party computation, Computer security, Computer network, Theoretical computer science and Public-key cryptography. Computation and Cryptography are the two main areas of interest in his Secure multi-party computation studies. His studies in Cryptography integrate themes in fields like Reduction, Telecommunications, Series and Network security.
His study in Computer security focuses on Authenticated encryption in particular. Within one scientific family, he focuses on topics pertaining to Security parameter under Theoretical computer science, and may sometimes address concerns connected to Oblivious transfer, Ideal, Polynomial and Range. The Protocol study combines topics in areas such as Adversary, Adversary model and Adversarial system.
His main research concerns Secure multi-party computation, Computer security, Cryptography, Computation and Computer network. The concepts of his Secure multi-party computation study are interwoven with issues in Correctness, Boolean circuit and Theoretical computer science. He performs integrative study on Theoretical computer science and Random permutation in his works.
Yehuda Lindell performs integrative Cryptography and Protocol research in his work. Yehuda Lindell combines subjects such as Field, Mathematical optimization, Computer engineering and Constant with his study of Computation. His Protocol research includes themes of Adversarial system and Adversary, Adversary model.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Introduction to Modern Cryptography
Jonathan Katz;Yehuda Lindell.
(2007)
Privacy preserving data mining
Y. Lindell;B. Pinkas.
Lecture Notes in Computer Science (2000)
A Proof of Security of Yao’s Protocol for Two-Party Computation
Yehuda Lindell;Benny Pinkas.
Journal of Cryptology (2009)
Universally composable two-party and multi-party secure computation
Ran Canetti;Yehuda Lindell;Rafail Ostrovsky;Amit Sahai.
symposium on the theory of computing (2002)
Introduction to Modern Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series)
Jonathan Katz;Yehuda Lindell.
(2020)
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Yehuda Lindell;Benny Pinkas.
international cryptology conference (2007)
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Yehuda Lindell;Benny Pinkas.
international cryptology conference (2007)
Secure Multiparty Computation for Privacy-Preserving Data Mining
Yehuda Lindell;Benny Pinkas.
Journal of Privacy and Confidentiality (2009)
Secure Multiparty Computation for Privacy-Preserving Data Mining
Yehuda Lindell;Benny Pinkas.
Journal of Privacy and Confidentiality (2009)
A Framework for Password-Based Authenticated Key Exchange.
Rosario Gennaro;Yehuda Lindell.
IACR Cryptology ePrint Archive (2003)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Bar-Ilan University
IBM (United States)
University of Maryland, College Park
Boston University
Harvard University
Technion – Israel Institute of Technology
KU Leuven
University of Haifa
Technical University of Darmstadt
Technion – Israel Institute of Technology
Stanford University
University of California, Berkeley
University of Maryland, College Park
City University of Hong Kong
Iowa State University
University of Technology Sydney
University of South Carolina
Nanjing University of Aeronautics and Astronautics
University of Connecticut
Baylor College of Medicine
Ikerbasque
International Centre for Theoretical Physics
Guildhall School of Music and Drama
Hannover Medical School
University College London
Chinese University of Hong Kong