Shai Halevi
Shai Halevi
Senior Principal Applied Scientist, AWS Cryptography
Verified email at - Homepage
Cited by
Cited by
Fully homomorphic encryption over the integers
M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
The random oracle methodology, revisited
R Canetti, O Goldreich, S Halevi
Journal of the ACM (JACM) 51 (4), 557-594, 2004
Candidate indistinguishability obfuscation and functional encryption for all circuits
S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters
SIAM Journal on Computing 45 (3), 882-929, 2016
Implementing gentry’s fully-homomorphic encryption scheme
C Gentry, S Halevi
Annual international conference on the theory and applications of …, 2011
Chosen-ciphertext security from identity-based encryption
R Canetti, S Halevi, J Katz
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
Homomorphic evaluation of the AES circuit
C Gentry, S Halevi, NP Smart
Annual Cryptology Conference, 850-867, 2012
A forward-secure public-key encryption scheme
R Canetti, S Halevi, J Katz
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
Public-key cryptosystems from lattice reduction problems
O Goldreich, S Goldwasser, S Halevi
Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 1997
Candidate multilinear maps from ideal lattices
S Garg, C Gentry, S Halevi
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
Proofs of ownership in remote storage systems
S Halevi, D Harnik, B Pinkas, A Shulman-Peleg
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Algorithms in HElib
S Halevi, V Shoup
International Cryptology Conference, 554-571, 2014
Fully homomorphic encryption with polylog overhead
C Gentry, S Halevi, NP Smart
Annual International Conference on the Theory and Applications of …, 2012
UMAC: Fast and secure message authentication
J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
Public-key cryptography and password protocols
S Halevi, H Krawczyk
ACM Transactions on Information and System Security (TISSEC) 2 (3), 230-268, 1999
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
D Boneh, C Gentry, S Gorbunov, S Halevi, V Nikolaenko, G Segev, ...
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
Chosen-ciphertext security from identity-based encryption
D Boneh, R Canetti, S Halevi, J Katz
SIAM Journal on Computing 36 (5), 1301-1328, 2007
Bootstrapping for helib
S Halevi, V Shoup
Journal of Cryptology 34 (1), 7, 2021
Attribute-based encryption for circuits from multilinear maps
S Garg, C Gentry, S Halevi, A Sahai, B Waters
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
Universally composable password-based key exchange
R Canetti, S Halevi, J Katz, Y Lindell, P MacKenzie
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20