Private circuits: Securing hardware against probing attacks Y Ishai, A Sahai, D Wagner Annual International Cryptology Conference, 463-481, 2003 | 956 | 2003 |

Extending oblivious transfers efficiently Y Ishai, J Kilian, K Nissim, E Petrank Annual International Cryptology Conference, 145-161, 2003 | 758 | 2003 |

Protecting data privacy in private information retrieval schemes Y Gertner, Y Ishai, E Kushilevitz, T Malkin Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 616 | 1998 |

Priced oblivious transfer: How to sell digital goods B Aiello, Y Ishai, O Reingold International Conference on the Theory and Applications of Cryptographic …, 2001 | 512 | 2001 |

Founding cryptography on oblivious transfer–efficiently Y Ishai, M Prabhakaran, A Sahai Annual international cryptology conference, 572-591, 2008 | 503 | 2008 |

Keyword search and oblivious pseudorandom functions MJ Freedman, Y Ishai, B Pinkas, O Reingold Theory of Cryptography Conference, 303-324, 2005 | 430 | 2005 |

Zero-knowledge proofs from secure multiparty computation Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai SIAM Journal on Computing 39 (3), 1121-1152, 2009 | 428* | 2009 |

Cryptography in B Applebaum, Y Ishai, E Kushilevitz SIAM Journal on Computing 36 (4), 845-888, 2006 | 333 | 2006 |

Succinct non-interactive arguments via linear interactive proofs N Bitansky, A Chiesa, Y Ishai, O Paneth, R Ostrovsky Theory of Cryptography Conference, 315-333, 2013 | 317 | 2013 |

Breaking the o (n/sup 1/(2k-1)/) barrier for information-theoretic private information retrieval A Beimel, Y Ishai, E Kushilevitz, JF Raymond The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002 …, 2002 | 310 | 2002 |

Randomizing polynomials: A new representation with applications to round-efficient secure computation Y Ishai, E Kushilevitz Proceedings 41st Annual Symposium on Foundations of Computer Science, 294-304, 2000 | 301 | 2000 |

Ligero: Lightweight sublinear arguments without a trusted setup S Ames, C Hazay, Y Ishai, M Venkitasubramaniam Proceedings of the 2017 acm sigsac conference on computer and communications …, 2017 | 277 | 2017 |

Share conversion, pseudorandom secret-sharing and applications to secure computation R Cramer, I Damgård, Y Ishai Theory of Cryptography Conference, 342-362, 2005 | 258 | 2005 |

Evaluating branching programs on encrypted data Y Ishai, A Paskin Theory of Cryptography Conference, 575-594, 2007 | 251 | 2007 |

Secure multiparty computation of approximations J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006 | 245* | 2006 |

Batch codes and their applications Y Ishai, E Kushilevitz, R Ostrovsky, A Sahai Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004 | 239 | 2004 |

From secrecy to soundness: Efficient verification via secure computation B Applebaum, Y Ishai, E Kushilevitz International Colloquium on Automata, Languages, and Programming, 152-163, 2010 | 219 | 2010 |

Function secret sharing E Boyle, N Gilboa, Y Ishai Annual international conference on the theory and applications of …, 2015 | 217 | 2015 |

Non-interactive and non-malleable commitment G Di Crescenzo, Y Ishai, R Ostrovsky Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 215 | 1998 |

Founding cryptography on tamper-proof hardware tokens V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia Theory of Cryptography Conference, 308-326, 2010 | 214 | 2010 |