scispace - formally typeset
B

Benny Pinkas

Researcher at Bar-Ilan University

Publications -  156
Citations -  23468

Benny Pinkas is an academic researcher from Bar-Ilan University. The author has contributed to research in topics: Secure multi-party computation & Secure two-party computation. The author has an hindex of 64, co-authored 156 publications receiving 21122 citations. Previous affiliations of Benny Pinkas include Hebrew University of Jerusalem & VMware.

Papers
More filters
Proceedings ArticleDOI

SBFT: A Scalable and Decentralized Trust Infrastructure

TL;DR: SBFT as discussed by the authors is a Byzantine fault tolerant state machine replication system that addresses the challenges of scalability, decentralization and global geo-replication, and is optimized for decentralization.
Book ChapterDOI

Distributed Oblivious Transfer

TL;DR: These distributed oblivious transfer protocols provide information theoretic security, and do not require the parties to compute exponentiations or any other kind of public key operations, Consequently, the protocols are very efficient computationally.
Journal ArticleDOI

Cryptanalysis of the random number generator of the Windows operating system

TL;DR: In this article, the authors examined the binary code of a distribution of Windows 2000 and found that a buffer overflow attack or a similar attack can be used to learn a single state of the generator, which can be then used to predict all random values, such as SSL keys, used by a process in all its past and future operations.
Book ChapterDOI

Efficient Circuit-Based PSI via Cuckoo Hashing

TL;DR: There are many variants of the set intersection functionality that are not addressed by the existing custom PSI solutions and are easy to compute with generic MPC protocols (e.g., comparing the cardinality of the intersection with a threshold or measuring ad conversion rates).
Book ChapterDOI

PSI from PaXoS: Fast, Malicious Private Set Intersection

TL;DR: In this paper, a 2-party private set intersection (PSI) protocol is proposed which provides security against malicious participants, yet is almost as fast as the fastest known semi-honest PSI protocol.