Protecting obfuscation against arithmetic attacks E Miles, A Sahai, M Weiss Cryptology ePrint Archive, 2014 | 46 | 2014 |
Multi-key searchable encryption, revisited A Hamlin, A Shelat, M Weiss, D Wichs Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 45 | 2018 |
Private anonymous data access A Hamlin, R Ostrovsky, M Weiss, D Wichs Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 37 | 2019 |
Probabilistically checkable proofs of proximity with zero-knowledge Y Ishai, M Weiss Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014 | 37 | 2014 |
Linear-regression on packed encrypted data in the two-server model A Akavia, H Shaul, M Weiss, Z Yakhini Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied …, 2019 | 31 | 2019 |
Is there an oblivious RAM lower bound for online reads? M Weiss, D Wichs Journal of Cryptology 34 (3), 18, 2021 | 24 | 2021 |
Binary AMD circuits from secure multiparty computation D Genkin, Y Ishai, M Weiss Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016 | 23 | 2016 |
The price of active security in cryptographic protocols C Hazay, M Venkitasubramaniam, M Weiss Annual International Conference on the Theory and Applications of …, 2020 | 18 | 2020 |
Making the best of a leaky situation: zero-knowledge PCPs from leakage-resilient circuits Y Ishai, M Weiss, G Yang Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016 | 16 | 2016 |
Practical solutions for format-preserving encryption M Weiss, B Rozenberg, M Barham arXiv preprint arXiv:1506.04113, 2015 | 13 | 2015 |
Permuted puzzles and cryptographic hardness E Boyle, J Holmgren, M Weiss Theory of Cryptography Conference, 465-493, 2019 | 11 | 2019 |
On the plausibility of fully homomorphic encryption for RAMs A Hamlin, J Holmgren, M Weiss, D Wichs Annual International Cryptology Conference, 589-619, 2019 | 11 | 2019 |
Complex format-preserving encryption scheme B Rozenberg, M Weiss US Patent 9,634,838, 2017 | 10 | 2017 |
ZK-PCPs from leakage-resilient secret sharing C Hazay, M Venkitasubramaniam, M Weiss Journal of Cryptology 35 (4), 23, 2022 | 8 | 2022 |
How to construct a leakage-resilient (stateless) trusted party D Genkin, Y Ishai, M Weiss Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017 | 7 | 2017 |
Zero knowledge LTCs and their applications Y Ishai, A Sahai, M Viderman, M Weiss International Workshop on Approximation Algorithms for Combinatorial …, 2013 | 7 | 2013 |
On the security of doubly efficient PIR E Boyle, J Holmgren, F Ma, M Weiss Cryptology ePrint Archive, 2021 | 6 | 2021 |
Efficient privacy-preserving viral strain classification via k-mer signatures and FHE A Akavia, B Galili, H Shaul, M Weiss, Z Yakhini 2023 IEEE 36th Computer Security Foundations Symposium (CSF), 489-504, 2023 | 5 | 2023 |
Secure computation and probabilistic checking M Weiss, Y Ishai Computer Science Department, Technion, 2016 | 4 | 2016 |
Your reputation’s safe with me: Framing-free distributed zero-knowledge proofs C Hazay, M Venkitasubramaniam, M Weiss Theory of Cryptography Conference, 34-64, 2023 | 3 | 2023 |