D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 71 Citations 19,633 241 World Ranking 1101 National Ranking 21

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Operating system
  • Algebra

His scientific interests lie mostly in Secure two-party computation, Secure multi-party computation, Theoretical computer science, Computer security and Cryptography. His work deals with themes such as Distributed computing and Oblivious transfer, which intersect with Secure two-party computation. His study on Secure multi-party computation is covered under Protocol.

In his study, Field is inextricably linked to Computation, which falls within the broad field of Protocol. His research in Theoretical computer science intersects with topics in Cryptographic protocol, Universal composability, Homomorphic encryption, Mathematical proof and Data mining. His Cryptography study combines topics in areas such as Password, Hash function, Encryption, String and Series.

His most cited work include:

  • Introduction to Modern Cryptography (1269 citations)
  • Privacy Preserving Data Mining (958 citations)
  • Universally composable two-party and multi-party secure computation (632 citations)

What are the main themes of his work throughout his whole career to date?

Yehuda Lindell mainly investigates Secure multi-party computation, Theoretical computer science, Computer security, Protocol and Cryptography. The study incorporates disciplines such as Correctness and Distributed computing in addition to Secure multi-party computation. His studies deal with areas such as Cryptographic protocol, Universal composability, Mathematical proof, Oblivious transfer and Security parameter as well as Theoretical computer science.

His work on Adversary, Adversary model, Encryption and Password as part of general Computer security study is frequently connected to Protocol, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. In general Protocol study, his work on Divide and choose often relates to the realm of Function, thereby connecting several areas of interest. In his study, Time complexity is strongly linked to Probabilistic logic, which falls under the umbrella field of Cryptography.

He most often published in these fields:

  • Secure multi-party computation (44.49%)
  • Theoretical computer science (38.78%)
  • Computer security (34.22%)

What were the highlights of his more recent work (between 2017-2020)?

  • Secure multi-party computation (44.49%)
  • Computer security (34.22%)
  • Computer network (12.55%)

In recent papers he was focusing on the following fields of study:

Yehuda Lindell mostly deals with Secure multi-party computation, Computer security, Computer network, Theoretical computer science and Public-key cryptography. Computation and Cryptography are the two main areas of interest in his Secure multi-party computation studies. His studies in Cryptography integrate themes in fields like Reduction, Telecommunications, Series and Network security.

His study in Computer security focuses on Authenticated encryption in particular. Within one scientific family, he focuses on topics pertaining to Security parameter under Theoretical computer science, and may sometimes address concerns connected to Oblivious transfer, Ideal, Polynomial and Range. The Protocol study combines topics in areas such as Adversary, Adversary model and Adversarial system.

Between 2017 and 2020, his most popular works were:

  • Introduction to Modern Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series) (449 citations)
  • Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ (59 citations)
  • Fast Large-Scale Honest-Majority MPC for Malicious Adversaries (47 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Operating system
  • Algebra

His main research concerns Secure multi-party computation, Computer security, Cryptography, Computation and Computer network. The concepts of his Secure multi-party computation study are interwoven with issues in Correctness, Boolean circuit and Theoretical computer science. He performs integrative study on Theoretical computer science and Random permutation in his works.

Yehuda Lindell performs integrative Cryptography and Protocol research in his work. Yehuda Lindell combines subjects such as Field, Mathematical optimization, Computer engineering and Constant with his study of Computation. His Protocol research includes themes of Adversarial system and Adversary, Adversary model.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Introduction to Modern Cryptography

Jonathan Katz;Yehuda Lindell.
(2007)

1829 Citations

Privacy preserving data mining

Y. Lindell;B. Pinkas.
Lecture Notes in Computer Science (2000)

1661 Citations

A Proof of Security of Yao’s Protocol for Two-Party Computation

Yehuda Lindell;Benny Pinkas.
Journal of Cryptology (2009)

838 Citations

Universally composable two-party and multi-party secure computation

Ran Canetti;Yehuda Lindell;Rafail Ostrovsky;Amit Sahai.
symposium on the theory of computing (2002)

833 Citations

Introduction to Modern Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series)

Jonathan Katz;Yehuda Lindell.
(2020)

706 Citations

An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

Yehuda Lindell;Benny Pinkas.
international cryptology conference (2007)

485 Citations

An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

Yehuda Lindell;Benny Pinkas.
international cryptology conference (2007)

455 Citations

Secure Multiparty Computation for Privacy-Preserving Data Mining

Yehuda Lindell;Benny Pinkas.
Journal of Privacy and Confidentiality (2009)

436 Citations

Secure Multiparty Computation for Privacy-Preserving Data Mining

Yehuda Lindell;Benny Pinkas.
Journal of Privacy and Confidentiality (2009)

415 Citations

A Framework for Password-Based Authenticated Key Exchange.

Rosario Gennaro;Yehuda Lindell.
IACR Cryptology ePrint Archive (2003)

405 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Yehuda Lindell

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 106

Rafail Ostrovsky

Rafail Ostrovsky

University of California, Los Angeles

Publications: 88

Thomas Schneider

Thomas Schneider

Technical University of Darmstadt

Publications: 68

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 68

Rafael Pass

Rafael Pass

Cornell University

Publications: 61

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 57

Ran Canetti

Ran Canetti

Boston University

Publications: 49

Vipul Goyal

Vipul Goyal

Carnegie Mellon University

Publications: 48

Sanjam Garg

Sanjam Garg

University of California, Berkeley

Publications: 47

Ivan Damgård

Ivan Damgård

Aarhus University

Publications: 45

Vladimir Kolesnikov

Vladimir Kolesnikov

Georgia Institute of Technology

Publications: 42

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 41

Jesper Buus Nielsen

Jesper Buus Nielsen

Aarhus University

Publications: 40

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 36

Benny Pinkas

Benny Pinkas

Bar-Ilan University

Publications: 34

Dennis Hofheinz

Dennis Hofheinz

ETH Zurich

Publications: 33

Trending Scientists

Kenneth L. Judd

Kenneth L. Judd

Stanford University

Venkat Anantharam

Venkat Anantharam

University of California, Berkeley

Jack Minker

Jack Minker

University of Maryland, College Park

Richard Y. K. Fung

Richard Y. K. Fung

City University of Hong Kong

Hui Hu

Hui Hu

Iowa State University

Darryl Veitch

Darryl Veitch

University of Technology Sydney

Fanglin Chen

Fanglin Chen

University of South Carolina

Jianping He

Jianping He

Nanjing University of Aeronautics and Astronautics

Ali Tamayol

Ali Tamayol

University of Connecticut

Sophia Y. Tsai

Sophia Y. Tsai

Baylor College of Medicine

Joaquín Castilla

Joaquín Castilla

Ikerbasque

Fred Kucharski

Fred Kucharski

International Centre for Theoretical Physics

John A. Sloboda

John A. Sloboda

Guildhall School of Music and Drama

Christian Krettek

Christian Krettek

Hannover Medical School

David Abraham

David Abraham

University College London

Timothy Teo

Timothy Teo

Chinese University of Hong Kong

Something went wrong. Please try again later.