If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2023

    CSHER: A System for Compact Storage with HE-Retrieval

    Akavia, A., Oren, N., Sapir, B. & Vald, M., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. p. 4751-4768 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 7).

    University of Haifa

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE

    Akavia, A., Galili, B., Shaul, H., Weiss, M. & Yakhini, Z., 2023, Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE Computer Society, p. 489-504 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2023-July).

    University of Haifa, Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Achievable CCA2 Relaxation for Homomorphic Encryption

    Akavia, A., Gentry, C., Halevi, S. & Vald, M., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 70-99 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

    University of Haifa

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments

    Manevich, Y. & Akavia, A., 2022, Proceedings - 7th IEEE European Symposium on Security and Privacy, Euro S and P 2022. Institute of Electrical and Electronics Engineers Inc., p. 606-625 20 p. (Proceedings - 7th IEEE European Symposium on Security and Privacy, Euro S and P 2022).

    University of Haifa

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Private Epigenetic PaceMaker Detector Using Homomorphic Encryption - Extended Abstract

    Goldenberg, M., Snir, S. & Akavia, A., 2022, Bioinformatics Research and Applications - 18th International Symposium, ISBRA 2022, Proceedings. Bansal, M. S., Cai, Z. & Mangul, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 52-61 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13760 LNBI).

    University of Haifa

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Privacy-Preserving Decision Trees Training and Prediction

    Akavia, A., Leibovich, M., Resheff, Y. S., Ron, R., Shahar, M. & Vald, M., 2021, Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2020, Proceedings. Hutter, F., Kersting, K., Lijffijt, J. & Valera, I. (eds.). Springer Science and Business Media Deutschland GmbH, p. 145-161 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12457 LNAI).

    University of Haifa, Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    Linear-regression on packed encrypted data in the two-server model

    Akavia, A., Shaul, H., Weiss, M. & Yakhini, Z., 11 Nov 2019, WAHC 2019 - Proceedings of the 7th ACM Workshop on Encrypted Computing and Applied Homomorphic Cryptography. p. 21-32 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    University of Haifa

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2018

    Secure search on encrypted data via multi-ring sketch

    Akavia, A., Feldman, D. & Shaul, H., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 985-1001 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    University of Haifa

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2017

    Topology-hiding computation beyond logarithmic diameter

    Akavia, A. & Moran, T., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 609-637 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10212 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Topology-hiding computation on all graphs

    Akavia, A., LaVigne, R. & Moran, T., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Shacham, H. & Katz, J. (eds.). Springer Verlag, p. 447-467 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10401 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2016

    To share content or not to share? This is the peering question

    Mokryn, O., Akavia, A. & Ben-Yaacov, D., 11 Feb 2016, 20th IEEE Symposium on Computers and Communication, ISCC 2015. Institute of Electrical and Electronics Engineers Inc., p. 869-876 8 p. 7405623. (Proceedings - IEEE Symposium on Computers and Communications; vol. 2016-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2014

    Candidate weak pseudorandom functions in AC0 · MOD2

    Akavia, A., Bogdanov, A., Guo, S., Kamath, A. & Rosen, A., 2014, ITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science. p. 251-259 9 p. (ITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2012

    Distributed public key schemes secure against continual leakage

    Akavia, A., Goldwasser, S. & Hazay, C., 2012, PODC'12 - Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing. p. 155-164 10 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access