Algorithms in HElib

Victor Halevi , Shai and Shoup

2
Computing from partial solutions

Anna Gal Shai Halevi , Richard J Lipton , Erez Petrank

1997
A sufficient condition for key-privacy.

Shai Halevi
IACR Cryptology ePrint Archive 2005 5

27
2005
A plausible approach to computer-aided cryptographic proofs.

Shai Halevi
IACR Cryptology ePrint Archive 2005 181

96
2005
An observation regarding Jutla's modes of operation.

Shai Halevi
IACR Cryptology ePrint Archive 2001 15

17
2001
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation.

Shai Halevi , Suresh Chari , Wietse Z. Venema
network and distributed system security symposium

21
2010
Cryptanalysis of the Quadratic Zero-Testing of GGH.

Mehdi Tibouchi , Shai Halevi , Tancrède Lepoint , Amit Sahai
IACR Cryptology ePrint Archive 2015 845

46
2015
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue.

Shai Halevi , Charanjit S. Jutla , William Eric Hall , Arnab Roy
IACR Cryptology ePrint Archive 2015 114

2015
Graded Encoding, Variations on a Scheme.

Shai Halevi
IACR Cryptology ePrint Archive 2015 866

44
2015
Fully Secure Functional Encryption without Obfuscation.

Mark Zhandry , Shai Halevi , Sanjam Garg , Craig Gentry
IACR Cryptology ePrint Archive 2014 666

101
2014
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero.

Shai Halevi , Hemanta K. Maji , Amit Sahai , Craig Gentry
IACR Cryptology ePrint Archive 2014 929

42
2014
How to Compress (Reusable) Garbled Circuits.

Vinod Vaikuntanathan , Shai Halevi , Sergey Gorbunov , Dhinakaran Vinayagamurthy
IACR Cryptology ePrint Archive 2013 687

12
2013
Chosen-ciphertext security from identity-based encryption

Ran Canetti , Shai Halevi , Jonathan Katz
Lecture Notes in Computer Science 207 -222

1,080
2004
Erratum to: Theory of Cryptography

Shai Halevi , Tal Rabin
theory of cryptography conference

2006
Incremental Codes

Yevgeniy Dodis , Shai Halevi
randomization and approximation techniques in computer science 75 -89

1
2001
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free.

Adi Akavia , Shai Halevi , Craig Gentry , Max Leibovich
IACR Cryptology ePrint Archive 2018 1235

2018
Homomorphic Encryption for Finite Automata.

Daniele Micciancio , Shai Halevi , Baiyu Li , Craig Gentry
IACR Cryptology ePrint Archive 2019 176

34
2019