Fully homomorphic encryption over the integers M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 2577 | 2010 |
The random oracle methodology, revisited R Canetti, O Goldreich, S Halevi Journal of the ACM (JACM) 51 (4), 557-594, 2004 | 2414 | 2004 |
Candidate indistinguishability obfuscation and functional encryption for all circuits S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters SIAM Journal on Computing 45 (3), 882-929, 2016 | 1602 | 2016 |
Implementing gentry’s fully-homomorphic encryption scheme C Gentry, S Halevi Annual international conference on the theory and applications of …, 2011 | 1408 | 2011 |
Chosen-ciphertext security from identity-based encryption R Canetti, S Halevi, J Katz Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 1116 | 2004 |
Homomorphic evaluation of the AES circuit C Gentry, S Halevi, NP Smart Annual Cryptology Conference, 850-867, 2012 | 1062 | 2012 |
A forward-secure public-key encryption scheme R Canetti, S Halevi, J Katz Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 1045 | 2003 |
Public-key cryptosystems from lattice reduction problems O Goldreich, S Goldwasser, S Halevi Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 1997 | 920 | 1997 |
Candidate multilinear maps from ideal lattices S Garg, C Gentry, S Halevi Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 916 | 2013 |
Proofs of ownership in remote storage systems S Halevi, D Harnik, B Pinkas, A Shulman-Peleg Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 913 | 2011 |
Algorithms in HElib S Halevi, V Shoup International Cryptology Conference, 554-571, 2014 | 780 | 2014 |
Fully homomorphic encryption with polylog overhead C Gentry, S Halevi, NP Smart Annual International Conference on the Theory and Applications of …, 2012 | 695 | 2012 |
UMAC: Fast and secure message authentication J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999 | 649 | 1999 |
Public-key cryptography and password protocols S Halevi, H Krawczyk ACM Transactions on Information and System Security (TISSEC) 2 (3), 230-268, 1999 | 587 | 1999 |
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits D Boneh, C Gentry, S Gorbunov, S Halevi, V Nikolaenko, G Segev, ... Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 497 | 2014 |
Secure hash-and-sign signatures without the random oracle R Gennaro, S Halevi, T Rabin Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999 | 462 | 1999 |
Chosen-ciphertext security from identity-based encryption D Boneh, R Canetti, S Halevi, J Katz SIAM Journal on Computing 36 (5), 1301-1328, 2007 | 415 | 2007 |
Bootstrapping for helib S Halevi, V Shoup Journal of Cryptology 34 (1), 7, 2021 | 386 | 2021 |
Attribute-based encryption for circuits from multilinear maps S Garg, C Gentry, S Halevi, A Sahai, B Waters Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 359 | 2013 |
Universally composable password-based key exchange R Canetti, S Halevi, J Katz, Y Lindell, P MacKenzie Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005 | 354 | 2005 |