Towards efficient private distributed computation on unbounded input streams
Dolev, Shlomi, Garay, Juan, Gilboa, Niv, Kolesnikov, Vladimir, Yuditsky, Yelena
Published in Journal of mathematical cryptology (01.06.2015)
Published in Journal of mathematical cryptology (01.06.2015)
Get full text
Journal Article
Prune+PlumTree - Finding Eviction Sets at Scale
Kessous, Tom, Gilboa, Niv
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Get full text
Conference Proceeding
Characterization and Detection of Cross-Router Covert Channels
Shvartzman, Oren, Ovadya, Adar, Zvi, Kfir, Shwartz, Omer, Ogen, Rom, Mallah, Yakov, Gilboa, Niv, Oren, Yossi
Published in Computers & security (01.04.2023)
Published in Computers & security (01.04.2023)
Get full text
Journal Article
Lightweight Techniques for Private Heavy Hitters
Boneh, Dan, Boyle, Elette, Corrigan-Gibbs, Henry, Gilboa, Niv, Ishai, Yuval
Published in 2021 IEEE Symposium on Security and Privacy (SP) (01.05.2021)
Published in 2021 IEEE Symposium on Security and Privacy (SP) (01.05.2021)
Get full text
Conference Proceeding
Correlated Pseudorandom Functions from Variable-Density LPN
Boyle, Elette, Couteau, Geoffroy, Gilboa, Niv, Ishai, Yuval, Kohl, Lisa, Scholl, Peter
Published in 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS) (01.11.2020)
Published in 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS) (01.11.2020)
Get full text
Conference Proceeding
Perennial secure multi-party computation of universal Turing machine
Dolev, Shlomi, Garay, Juan A., Gilboa, Niv, Kolesnikov, Vladimir, Kumaramangalam, Muni Venkateswarlu
Published in Theoretical computer science (17.05.2019)
Published in Theoretical computer science (17.05.2019)
Get full text
Journal Article
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
Benhamouda, Fabrice, Boyle, Elette, Gilboa, Niv, Halevi, Shai, Ishai, Yuval, Nof, Ariel
Published in Theory of Cryptography (04.11.2021)
Published in Theory of Cryptography (04.11.2021)
Get full text
Book Chapter
Rendezvous tunnel for anonymous publishing
Hermoni, Ofer, Gilboa, Niv, Felstaine, Eyal, Dolev, Shlomi
Published in Peer-to-peer networking and applications (01.05.2015)
Published in Peer-to-peer networking and applications (01.05.2015)
Get full text
Journal Article
Digital arbitration for trusted communication
Brownstein, Dan, Dolev, Shlomi, Gilboa, Niv, Hermoni, Ofer
Published in Journal of trust management (08.06.2016)
Published in Journal of trust management (08.06.2016)
Get full text
Journal Article
Information security for sensors by overwhelming random sequences and permutations
Dolev, Shlomi, Gilboa, Niv, Kopeetsky, Marina, Persiano, Giuseppe, Spirakis, Paul G.
Published in Ad hoc networks (01.01.2014)
Published in Ad hoc networks (01.01.2014)
Get full text
Journal Article