His primary areas of investigation include Theoretical computer science, Secure multi-party computation, Cryptography, Oblivious transfer and Function. His Communication complexity study, which is part of a larger body of work in Theoretical computer science, is frequently linked to Block, bridging the gap between disciplines. His Secure multi-party computation study integrates concerns from other disciplines, such as Discrete mathematics and Pseudorandom generator.
His work is dedicated to discovering how Cryptography, Adversary are connected with Secrecy and Random number generation and other disciplines. His studies in Oblivious transfer integrate themes in fields like Random oracle and Private information retrieval. His work deals with themes such as Integer and Combinatorics, which intersect with Function.
Yuval Ishai mostly deals with Theoretical computer science, Secure multi-party computation, Cryptography, Discrete mathematics and Oblivious transfer. His specific area of interest is Theoretical computer science, where Yuval Ishai studies Communication complexity. Yuval Ishai has included themes like Computational complexity theory, Sublinear function and Private information retrieval in his Communication complexity study.
His study of Secure two-party computation is a part of Secure multi-party computation. His research integrates issues of Boolean circuit and Computer network in his study of Cryptography. As a part of the same scientific study, Yuval Ishai usually deals with the Discrete mathematics, concentrating on Security parameter and frequently concerns with Finite field and Gas meter prover.
Secure multi-party computation, Theoretical computer science, Function, Cryptography and Oblivious transfer are his primary areas of study. He interconnects Boolean circuit, Overhead, Secret sharing, Zero-knowledge proof and Bounded function in the investigation of issues within Secure multi-party computation. His Theoretical computer science research is multidisciplinary, incorporating elements of Homomorphic secret sharing, Mathematical proof, Protocol and Encryption.
His Function research integrates issues from Discrete mathematics, Cryptanalysis, Key generation and Obfuscation. Yuval Ishai usually deals with Cryptography and limits it to topics linked to Computer network and Binary tree and Tree. Computation covers Yuval Ishai research in Oblivious transfer.
Yuval Ishai spends much of his time researching Secure multi-party computation, Theoretical computer science, Cryptography, Oblivious transfer and Pseudorandom number generator. His research in Secure multi-party computation intersects with topics in Cryptographic primitive, Mathematical proof and Secret sharing. His Theoretical computer science research focuses on subjects like Protocol, which are linked to Code.
His Cryptography research includes elements of Boolean circuit, Boolean function, Overhead, Binary logarithm and Natural proof. His studies in Oblivious transfer integrate themes in fields like Matching, Simple and Pseudorandom function family. His Pseudorandom number generator research is multidisciplinary, incorporating perspectives in Function, Variety, Key exchange and Distribution.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Private circuits: Securing Hardware against probing attacks
Yuval Ishai;Amit Sahai;David Wagner.
Lecture Notes in Computer Science (2003)
Extending Oblivious Transfers Efficiently
Yuval Ishai;Joe Kilian;Kobbi Nissim;Erez Petrank.
international cryptology conference (2003)
Protecting data privacy in private information retrieval schemes
Yael Gertner;Yuval Ishai;Eyal Kushilevitz;Tal Malkin.
symposium on the theory of computing (1998)
Priced Oblivious Transfer: How to Sell Digital Goods
William Aiello;Yuval Ishai;Omer Reingold.
theory and application of cryptographic techniques (2001)
Founding Cryptography on Oblivious Transfer --- Efficiently
Yuval Ishai;Manoj Prabhakaran;Amit Sahai.
international cryptology conference (2008)
Keyword search and oblivious pseudorandom functions
Michael J. Freedman;Yuval Ishai;Benny Pinkas;Omer Reingold.
theory of cryptography conference (2005)
Cryptography in $NC^0$
Benny Applebaum;Yuval Ishai;Eyal Kushilevitz.
SIAM Journal on Computing (2006)
Zero-knowledge from secure multiparty computation
Yuval Ishai;Eyal Kushilevitz;Rafail Ostrovsky;Amit Sahai.
symposium on the theory of computing (2007)
Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval
A. Beimel;Y. Ishai;E. Kushilevitz;J.-F. Raymond.
foundations of computer science (2002)
Succinct non-interactive arguments via linear interactive proofs
Nir Bitansky;Alessandro Chiesa;Yuval Ishai;Omer Paneth.
theory of cryptography conference (2013)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: