Skip to main content

Publications

2025

Couteau, Geoffroy ; Hazay, Carmit ; Hegde, Aditya et al. / Breaking the 1/λ-Rate Barrier for Arithmetic Garbling. Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2025, Proceedings. editor / Serge Fehr ; Pierre-Alain Fouque. Springer Science and Business Media Deutschland GmbH, 2025. pp. 182-213 (Lecture Notes in Computer Science).
Hazay, Carmit ; Heath, David ; Kolesnikov, Vladimir et al. / LogRobin++ : Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK. Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. editor / Kai-Min Chung ; Yu Sasaki. Springer Science and Business Media Deutschland GmbH, 2025. pp. 367-401 (Lecture Notes in Computer Science).
Couteau, Geoffroy ; Hazay, Carmit ; Hegde, Aditya et al. / ω(1/λ)-Rate Boolean Garbling Scheme from Generic Groups. Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings. editor / Yael Tauman Kalai ; Seny F. Kamara. Springer Science and Business Media Deutschland GmbH, 2025. pp. 489-521 (Lecture Notes in Computer Science).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / Protecting Distributed Primitives Against Leakage : Equivocal Secret Sharing and more. In: Journal of Cryptology. 2025 ; Vol. 38, No. 1.
Albouy, Timothé ; Frey, Davide ; Gelles, Ran et al. / Near-Optimal Communication Byzantine Reliable Broadcast Under a Message Adversary. 28th International Conference on Principles of Distributed Systems, OPODIS 2024. editor / Silvia Bonomi ; Letterio Galletta ; Etienne Riviere ; Valerio Schiavoni. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2025. (Leibniz International Proceedings in Informatics, LIPIcs).
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David et al. / Non-interactive Threshold BBS+ from Pseudorandom Correlations. Topics in Cryptology – CT-RSA 2025 - Cryptographers’ Track at the RSA Conference 2025, Proceedings. editor / Arpita Patra. Springer Science and Business Media Deutschland GmbH, 2025. pp. 198-222 (Lecture Notes in Computer Science).
Berti, Francesco ; Hazay, Carmit ; Levi, Itamar. / LR-OT : Leakage-resilient oblivious transfer. In: Cryptography and Communications. 2025.

2024

Albouy, Timothé ; Frey, Davide ; Gelles, Ran et al. / Brief Announcement : Towards Optimal Communication Byzantine Reliable Broadcast Under a Message Adversary. 38th International Symposium on Distributed Computing, DISC 2024. editor / Dan Alistarh. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2024. (Leibniz International Proceedings in Informatics, LIPIcs).
Berti, Francesco ; Hazay, Carmit ; Levi, Itamar. / LR-OT : Leakage-Resilient Oblivious Transfer. Security and Cryptography for Networks - 14th International Conference, SCN 2024, Proceedings. editor / Clemente Galdi ; Duong Hieu Phan. Springer Science and Business Media Deutschland GmbH, 2024. pp. 182-204 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Yang, Yibin. / Toward Malicious Constant-Rate 2PC via Arithmetic Garbling. Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, Proceedings. editor / Marc Joye ; Gregor Leander. Springer Science and Business Media Deutschland GmbH, 2024. pp. 401-431 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Acharaya, Anasuya ; Hazay, Carmit ; Kolesnikov, Vladimir et al. / Malicious Security for SCALES : Outsourced Computation with Ephemeral Servers. Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. editor / Leonid Reyzin ; Douglas Stebila. Springer Science and Business Media Deutschland GmbH, 2024. pp. 3-38 (Lecture Notes in Computer Science).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / The Price of Active Security in Cryptographic Protocols. In: Journal of Cryptology. 2024 ; Vol. 37, No. 3.
Yang, Yibin ; Heath, David ; Hazay, Carmit et al. / Tight ZK CPU* Batched ZK Branching with Cost Proportional to Evaluated Instruction. CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, 2024. pp. 3095-3109 (CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security).
Wang, Ruihan ; Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / Ligetron : Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser. Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers Inc., 2024. pp. 1760-1776 (Proceedings - IEEE Symposium on Security and Privacy).

2023

Ames, Scott ; Hazay, Carmit ; Ishai, Yuval et al. / Ligero : lightweight sublinear arguments without a trusted setup. In: Designs, Codes, and Cryptography. 2023 ; Vol. 91, No. 11. pp. 3379-3424.
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / Beyond MPC-in-the-Head : Black-Box Constructions of Short Zero-Knowledge Proofs. Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. editor / Guy Rothblum ; Hoeteck Wee. Springer Science and Business Media Deutschland GmbH, 2023. pp. 3-33 (Lecture Notes in Computer Science).
Hazay, Carmit ; Stam, Martijn. / Preface. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2023 ; Vol. 14007 LNCS. pp. v-vi.
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / Your Reputation’s Safe with Me : Framing-Free Distributed Zero-Knowledge Proofs. Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. editor / Guy Rothblum ; Hoeteck Wee. Springer Science and Business Media Deutschland GmbH, 2023. pp. 34-64 (Lecture Notes in Computer Science).
Hazay, Carmit ; Ishai, Yuval ; Venkitasubramaniam, Muthuramakrishnan. / Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model. In: Journal of Cryptology. 2023 ; Vol. 36, No. 3.
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David et al. / Putting the Online Phase on a Diet : Covert Security from Short MACs. Topics in Cryptology – CT-RSA 2023 - Cryptographers’ Track at the RSA Conference 2023, Proceedings. editor / Mike Rosulek. Springer Science and Business Media Deutschland GmbH, 2023. pp. 360-386 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David et al. / Statement-Oblivious Threshold Witness Encryption. Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE Computer Society, 2023. pp. 17-32 (Proceedings - IEEE Computer Security Foundations Symposium).
Bhadauria, Rishabh ; Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan et al. / Private Polynomial Commitments and Applications to MPC. Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. editor / Alexandra Boldyreva ; Vladimir Kolesnikov. Springer Science and Business Media Deutschland GmbH, 2023. pp. 127-158 (Lecture Notes in Computer Science).
Bangalore, Laasya ; Sereshgi, Mohammad Hossein Faghihi ; Hazay, Carmit et al. / Flag : A Framework for Lightweight Robust Secure Aggregation. ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, 2023. pp. 14-28 (Proceedings of the ACM Conference on Computer and Communications Security).
Levi, Itamar ; Hazay, Carmit. / Garbled Circuits from an SCA Perspective : Free XOR can be Quite Expensive…. In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2023 ; Vol. 2023, No. 2. pp. 54-79.
Acharya, Anasuya ; Hazay, Carmit ; Poburinnaya, Oxana et al. / Best of Both Worlds : Revisiting the Spymasters Double Agent Problem. Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. editor / Helena Handschuh ; Anna Lysyanskaya. Springer Science and Business Media Deutschland GmbH, 2023. pp. 328-359 (Lecture Notes in Computer Science).
Acharya, Anasuya ; Ashur, Tomer ; Cohen, Efrat et al. / A New Approach to Garbled Circuits. Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Proceedings. editor / Mehdi Tibouchi ; XiaoFeng Wang. Springer Science and Business Media Deutschland GmbH, 2023. pp. 611-641 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

2022

Levi, Itamar ; Hazay, Carmit. / Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . . In: Cryptology ePrint Archive. 2022.
Bangalore, Laasya ; Bhadauria, Rishabh ; Hazay, Carmit et al. / On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives. Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. editor / Eike Kiltz ; Vinod Vaikuntanathan. Springer Science and Business Media Deutschland GmbH, 2022. pp. 417-446 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Chandran, Gowri R. ; Hazay, Carmit ; Hundt, Robin et al. / Comparison-based MPC in Star Topology. SECRYPT 2022 - Proceedings of the 19th International Conference on Security and Cryptography. editor / Sabrina De Capitani di Vimercati ; Pierangela Samarati. Science and Technology Publications, Lda, 2022. pp. 69-82 (Proceedings of the International Conference on Security and Cryptography).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / ZK-PCPs from Leakage-Resilient Secret Sharing. In: Journal of Cryptology. 2022 ; Vol. 35, No. 4.
de Castro, Leo ; Hazay, Carmit ; Ishai, Yuval et al. / Asymptotically Quasi-Optimal Cryptography. Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. editor / Orr Dunkelman ; Stefan Dziembowski. Springer Science and Business Media Deutschland GmbH, 2022. pp. 303-334 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / Protecting Distributed Primitives Against Leakage : Equivocal Secret Sharing and More. 3rd Conference on Information-Theoretic Cryptography, ITC 2022. editor / Dana Dachman-Soled. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2022. (Leibniz International Proceedings in Informatics, LIPIcs).
Hazay, Carmit ; Lilintal, Mor. / Gradual GRAM and secure computation for RAM programs. In: Journal of Computer Security. 2022 ; Vol. 30, No. 1. pp. 197-229.
Acharya, Anasuya ; Hazay, Carmit ; Kolesnikov, Vladimir et al. / SCALES : MPC with Small Clients and Larger Ephemeral Servers. Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. editor / Eike Kiltz ; Vinod Vaikuntanathan. Springer Science and Business Media Deutschland GmbH, 2022. pp. 502-531 (Lecture Notes in Computer Science).
Gordon, S. Dov ; Hazay, Carmit ; Le, Phi Hung. / Fully Secure PSI via MPC-in-the-Head. In: Proceedings on Privacy Enhancing Technologies. 2022 ; Vol. 2022, No. 3. pp. 291–313.
Hazay, Carmit ; Orsini, Emmanuela ; Scholl, Peter et al. / TinyKeys : A New Approach to Efficient Multi-Party Computation. In: Journal of Cryptology. 2022 ; Vol. 35, No. 2.
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David et al. / Financially Backed Covert Security. Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. editor / Goichiro Hanaoka ; Junji Shikata ; Yohei Watanabe. Springer Science and Business Media Deutschland GmbH, 2022. pp. 99-129 (Lecture Notes in Computer Science).

2021

Chen, Megan ; Hazay, Carmit ; Ishai, Yuval et al. / Diogenes : Lightweight scalable RSA modulus generation with a dishonest majority. Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers Inc., 2021. pp. 590-607 (Proceedings - IEEE Symposium on Security and Privacy).
Yang, Yibin ; Heath, David ; Hazay, Carmit et al. / Batchman and Robin : Batched and Non-batched Branching for Interactive ZK. CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, 2021. pp. 1452-1466 (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).
Halevi, Shai ; Hazay, Carmit ; Polychroniadou, Antigoni et al. / Round-Optimal Secure Multi-party Computation. In: Journal of Cryptology. 2021 ; Vol. 34, No. 3.
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / ZK-PCPs from leakage-resilient secret sharing. 2nd Conference on Information-Theoretic Cryptography, ITC 2021. editor / Stefano Tessaro. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2021. (Leibniz International Proceedings in Informatics, LIPIcs).
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David et al. / Generic Compiler for Publicly Verifiable Covert Multi-Party Computation. Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. editor / Anne Canteaut ; François-Xavier Standaert. Springer Science and Business Media Deutschland GmbH, 2021. pp. 782-811 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

2020

Hazay, Carmit ; Scholl, Peter ; Soria-Vazquez, Eduardo. / Low Cost Constant Round MPC Combining BMR and Oblivious Transfer. In: Journal of Cryptology. 2020 ; Vol. 33, No. 4. pp. 1732-1786.
Abascal, Jackson ; Faghihi Sereshgi, Mohammad Hossein ; Hazay, Carmit et al. / Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC. CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2020. pp. 1591-1605 (Proceedings of the ACM Conference on Computer and Communications Security).
Bhadauria, Rishabh ; Fang, Zhiyong ; Hazay, Carmit et al. / Ligero++ : A New Optimized Sublinear IOP. CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2020. pp. 2025-2038 (Proceedings of the ACM Conference on Computer and Communications Security).
Hazay, Carmit ; Pass, Rafael ; Venkitasubramaniam, Muthuramakrishnan. / Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?. Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. editor / Anne Canteaut ; Yuval Ishai. Springer, 2020. pp. 599-619 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Shelat, Abhi ; Venkitasubramaniam, Muthuramakrishnan. / Going Beyond Dual Execution : MPC for Functions with Efficient Verification. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. editor / Aggelos Kiayias ; Markulf Kohlweiss ; Petros Wallden ; Vassilis Zikas. Springer Science and Business Media Deutschland GmbH, 2020. pp. 328-356 (Lecture Notes in Computer Science).
Bhadauria, Rishabh ; Hazay, Carmit. / Multi-clients verifiable computation via conditional disclosure of secrets. Security and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings. editor / Clemente Galdi ; Vladimir Kolesnikov. Springer Science and Business Media Deutschland GmbH, 2020. pp. 150-171 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / The Price of Active Security in Cryptographic Protocols. Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. editor / Anne Canteaut ; Yuval Ishai. Springer, 2020. pp. 184-215 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Lilintal, Mor. / Gradual gram and secure computation for ram programs. Security and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings. editor / Clemente Galdi ; Vladimir Kolesnikov. Springer Science and Business Media Deutschland GmbH, 2020. pp. 233-252 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / On the Power of Secure Two-Party Computation. In: Journal of Cryptology. 2020 ; Vol. 33, No. 1. pp. 271-318.

2019

Hazay, Carmit ; Marcedone, Antonio ; Ishai, Yuval et al. / Leviosa : Lightweight secure arithmetic computation. CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2019. pp. 327-344 (Proceedings of the ACM Conference on Computer and Communications Security).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / On Black-Box Complexity of Universally Composable Security in the CRS Model. In: Journal of Cryptology. 2019 ; Vol. 32, No. 3. pp. 635-689.
Hazay, Carmit ; Yanai, Avishay. / Constant-Round Maliciously Secure Two-Party Computation in the RAM Model. In: Journal of Cryptology. 2019 ; Vol. 32, No. 4. pp. 1144-1199.
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / What Security Can We Achieve Within 4 Rounds?. In: Journal of Cryptology. 2019 ; Vol. 32, No. 4. pp. 1200-1262.
Hazay, Carmit ; Mikkelsen, Gert Læssøe ; Rabin, Tal et al. / Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. In: Journal of Cryptology. 2019 ; Vol. 32, No. 2. pp. 265-323.
Byali, Megha ; Patra, Arpita ; Hazay, Carmit et al. / Fast actively secure five-party computation with security beyond abort. CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2019. pp. 1573-1590 (Proceedings of the ACM Conference on Computer and Communications Security).
Hazay, C. ; Byali, M. ; Patra, P. et al. / Fast Actively Secure Five-Party Computation with Security Beyond Abort. Proceedings of the ACM Conference on Computer and Communications Security. 2019.

2018

Hazay, C. ; Venkitasubramaniam, M. / Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations,. TCC. 2018.
Halevi, Shai ; Hazay, Carmit ; Polychroniadou, Antigoni et al. / Round-optimal secure multi-party computation. Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. editor / Alexandra Boldyreva ; Hovav Shacham. Springer Verlag, 2018. pp. 488-520 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit. / Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs. In: Journal of Cryptology. 2018 ; Vol. 31, No. 2. pp. 537-586.
Hazay, Carmit ; Orsini, Emmanuela ; Scholl, Peter et al. / TinyKeys : A new approach to efficient multi-party computation. Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. editor / Hovav Shacham ; Alexandra Boldyreva. Springer Verlag, 2018. pp. 3-33 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele. / Outsourced pattern matching. In: International Journal of Information Security. 2018 ; Vol. 17, No. 3. pp. 327-346.
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / Round-optimal fully black-box zero-knowledge arguments from one-way permutations. Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. editor / Amos Beimel ; Stefan Dziembowski. Springer Verlag, 2018. pp. 263-285 (Lecture Notes in Computer Science).
Hazay, C. ; Orsini, E. ; Scholl, P. et al. / Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). ASIACRYPT. 2018.
Hazay, Carmit ; Orsini, Emmanuela ; Scholl, Peter et al. / Concretely efficient large-scale MPC with active security (or, tinykeys for TinyOT). Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. editor / Thomas Peyrin ; Steven Galbraith. Springer Verlag, 2018. pp. 86-117 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

2017

Hazay, Carmit ; Polychroniadou, Antigoni ; Venkitasubramaniam, Muthuramakrishnan. / Constant round adaptively secure protocols in the tamper-proof hardware model. Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. editor / Serge Fehr. Springer Verlag, 2017. pp. 428-460 (Lecture Notes in Computer Science).
Ames, Scott ; Hazay, Carmit ; Ishai, Yuval et al. / Ligero : Lightweight sublinear arguments without a trusted setup. CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2017. pp. 2087-2104 (Proceedings of the ACM Conference on Computer and Communications Security).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / Scalable multi-party private set-intersection. Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. editor / Serge Fehr. Springer Verlag, 2017. pp. 175-203 (Lecture Notes in Computer Science).
Hazay, C. ; Ames, S. ; Ishai, Y. et al. / Ligero: Lightweight Sublinear Arguments Without a Trusted Setup. CCS. 2017.
Hazay, Carmit ; Ishai, Yuval ; Venkitasubramaniam, Muthuramakrishnan. / Actively secure garbled circuits with constant communication overhead in the plain model. Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. editor / Yael Kalai ; Leonid Reyzin. Springer Verlag, 2017. pp. 3-39 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Patra, Arpita. / Efficient One-Sided Adaptively Secure Computation. In: Journal of Cryptology. 2017 ; Vol. 30, No. 1. pp. 321-371.
Hazay, Carmit ; Scholl, Peter ; Soria-Vazquez, Eduardo. / Low cost constant round MPC combining BMR and oblivious transfer. Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. editor / Tsuyoshi Takagi ; Thomas Peyrin. Springer Verlag, 2017. pp. 598-628 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

2016

Hazay, Carmit ; Zarosim, Hila. / The feasibility of outsourced database search in the plain model. Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. editor / Roberto De Prisco ; Vassilis Zikas. Springer Verlag, 2016. pp. 313-332 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / Composable adaptive secure protocols without setup under polytime assumptions. Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. editor / Adam Smith ; Martin Hirt. Springer Verlag, 2016. pp. 400-432 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / What security can we achieve within 4 rounds?. Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. editor / Roberto De Prisco ; Vassilis Zikas. Springer Verlag, 2016. pp. 486-505 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Asharov, Gilad ; Canetti, Ran ; Hazay, Carmit. / Toward a Game Theoretic View of Secure Computation. In: Journal of Cryptology. 2016 ; Vol. 29, No. 4. pp. 879-926.
Hazay, Carmit ; Polychroniadou, Antigoni ; Venkitasubramaniam, Muthuramakrishnan. / Composable security in the tamper-proof hardware model under minimal complexity. Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. editor / Adam Smith ; Martin Hirt. Springer Verlag, 2016. pp. 367-399 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; López-Alt, Adriana ; Wee, Hoeteck et al. / Leakage-Resilient Cryptography from Minimal Assumptions. In: Journal of Cryptology. 2016 ; Vol. 29, No. 3. pp. 514-551.
Freedman, Michael J. ; Hazay, Carmit ; Nissim, Kobbi et al. / Efficient Set Intersection with Simulation-Based Security. In: Journal of Cryptology. 2016 ; Vol. 29, No. 1. pp. 115-155.
Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus et al. / Signature Schemes Secure Against Hard-to-Invert Leakage. In: Journal of Cryptology. 2016 ; Vol. 29, No. 2. pp. 422-455.
Gennaro, Rosario ; Hazay, Carmit ; Sorensen, Jeffrey S. / Automata Evaluation and Text Search Protocols with Simulation-Based Security. In: Journal of Cryptology. 2016 ; Vol. 29, No. 2. pp. 243-282.
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / On the power of secure two-party computation. Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. editor / Matthew Robshaw ; Jonathan Katz. Springer Verlag, 2016. pp. 397-429 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Yanai, Avishay. / Constant-round maliciously secure two-party computation in the RAM model. Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. editor / Adam Smith ; Martin Hirt. Springer Verlag, 2016. pp. 521-553 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

2015

Hazay, Carmit ; Patra, Arpita ; Warinschi, Bogdan. / Selective opening security for receivers. Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. editor / Jung Hee Cheon ; Tetsu Iwata. Springer Verlag, 2015. pp. 443-469 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Lindell, Yehuda ; Patra, Arpita. / Adaptively secure computation with partial erasures. PODC 2015 - Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, 2015. pp. 291-300 (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).
Hazay, Carmit. / Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs. Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. editor / Yevgeniy Dodis ; Jesper Buus Nielsen. Springer Verlag, 2015. pp. 90-120 (Lecture Notes in Computer Science).
Hazay, C. ; Venkitasubramaniam, M. / On Black-Box Complexity of Universally Composable Security in the CRS model. ASIACRYPT. Springer, 2015.
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / On black-box complexity of universally composable security in the CRS model. Advances in Cryptology – ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. editor / Tetsu Iwata ; Jung Hee Cheon. Springer Verlag, 2015. pp. 183-209 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

2014

Hazay, Carmit ; Toft, Tomas. / Computationally secure pattern matching in the presence of malicious adversaries. In: Journal of Cryptology. 2014 ; Vol. 27, No. 2. pp. 358-395.
Hazay, C. ; Patra, Arpita. / One-Sided Adaptively Secure Two-Party Computation. TCC. Springer Berlin Heidelberg, 2014.
Hazay, Carmit ; Patra, Arpita. / One-sided adaptively secure two-party computation. Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. Springer Verlag, 2014. pp. 368-393 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Cole, Richard ; Hazay, Carmit ; Lewenstein, Moshe et al. / Two-dimensional parameterized matching. In: ACM Transactions on Algorithms. 2014 ; Vol. 11, No. 2. pp. 1-30.

2013

Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele. / Outsourced pattern matching. Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Proceedings. PART 2. ed. 2013. pp. 545-556 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 2).
Faust, Sebastian ; Hazay, C. ; Venturi, Daniele. / Outsourced Pattern Matching. ICALP. 2013.
Hazay, Carmit ; López-Alt, Adriana ; Wee, Hoeteck et al. / Leakage-resilient cryptography from minimal assumptions. Advances in Cryptology, EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. 2013. pp. 160-176 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

2012

Damgård, Ivan ; Faust, Sebastian ; Hazay, Carmit. / Secure two-party computation with low communication. Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. Springer Verlag, 2012. pp. 54-74 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Mikkelsen, Gert Læssøe ; Rabin, Tal et al. / Efficient RSA key generation and threshold Paillier in the two-party setting. Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings. 2012. pp. 313-331 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Faust, Sebastian ; Hazay, C. ; Nielsen, Jesper Buus et al. / Signature Schemes Secure against Hard-to-Invert Leakage. ASIACRYPT. 2012.
Akavia, Adi ; Goldwasser, Shafi ; Hazay, Carmit. / Distributed public key schemes secure against continual leakage. PODC'12 - Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing. 2012. pp. 155-164 (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).
Akavia, A ; Goldwasser, S. ; Hazay, C. / Distributed Public Key Schemes Secure against Continual Leakage. PODC. 2012.
Klinc, Demijan ; Hazay, Carmit ; Jagmohan, Ashish et al. / On compression of data encrypted with block ciphers. In: IEEE Transactions on Information Theory. 2012 ; Vol. 58, No. 11. pp. 6989-7001.
Hazay, C. ; Mikkelsen, Gert Læssøe ; Rabin, Tal et al. / Efficient RSA Key Generation and Threshold Paillier in the Two-Party. RSA. 2012.
Hazay, Carmit ; Nissim, Kobbi. / Efficient set operations in the presence of malicious adversaries. In: Journal of Cryptology. 2012 ; Vol. 25, No. 3. pp. 383-433.
Damgård, Ivan ; Faust, Sebastian ; Hazay, C. / Secure Two-Party Computation with Low Communication. TCC. 2012.
Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus et al. / Signature schemes secure against hard-to-invert leakage. Advances in Cryptology, ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. 2012. pp. 98-115 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

2011

Asharov, Gilad ; Canetti, Ran ; Hazay, Carmit. / Towards a game theoretic view of secure computation. Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. 2011. pp. 426-445 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, C. (Inventor) ; Jagmohan, A. (Inventor) ; Klinc, D. (Inventor) et al. / Compressing encrypted data without the encryption key. Washington, DC: U.S. Patent and Trademark Office. Patent No.: No.20110103580.
Gordon, S. Dov ; Hazay, Carmit ; Katz, Jonathan et al. / Complete fairness in secure two-party computation. In: Journal of the ACM. 2011 ; Vol. 58, No. 6.

2010

Hazay, Carmit ; Lindell, Yehuda. / Oblivious transfer and applications. Information Security and Cryptography. Springer International Publishing, 2010. pp. 177-212 (Information Security and Cryptography).
חזאי, כרמית. / לחשוב על בטוח (ממחקרי אוניברסיטת בר-אילן). In: גליליאו: כתב עת למדע ומחשבה. 2010 ; Vol. 138. pp. 50-55.
Hazay, Carmit ; Toft, Tomas. / Computationally secure pattern matching in the presence of malicious adversaries. Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, 2010. pp. 195-212 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Nissim, Kobbi. / Efficient set operations in the presence of malicious adversaries. Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. Springer Verlag, 2010. pp. 312-331 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, C. ; Lindell, Y. / Efficient Secure Two-Party Protocols. ,Israel : Springer, 2010. 262 p.
Hazay, Carmit ; Lindell, Yehuda. / Sigma protocols and efficient zero-knowledge1. Information Security and Cryptography. Springer International Publishing, 2010. pp. 147-175 (Information Security and Cryptography).
Gennaro, Rosario ; Hazay, Carmit ; Sorensen, Jeffrey S. / Text search protocols with simulation based security. Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. Springer Verlag, 2010. pp. 332-350 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Lindell, Yehuda. / Malicious adversaries. Information Security and Cryptography. Springer International Publishing, 2010. pp. 81-108 (Information Security and Cryptography).
Hazay, C. ; Toft, T. / Computationally Secure Pattern Matching in the Presence of Malicious Adversaries. ASIACRYPT. 2010.
Hazay, Carmit ; Lindell, Yehuda. / The kth-ranked element. Information Security and Cryptography. Springer International Publishing, 2010. pp. 213-226 (Information Security and Cryptography).
Hazay, C. ; Lindell, Y. / Efficient secure two-party protocols: Techniques and constructions. Springer Science & Business Media, 2010.
Hazay, Carmit ; Lindell, Yehuda. / Introduction. In: Information Security and Cryptography. 2010 ; Vol. 15. pp. 3-18.
Gennaro, R. ; Hazay, C. ; Sorensen, J. F. / Text Search Protocols with Simulation Based Security. PKC. 2010.
Hazay, Carmit ; Lindell, Yehuda. / Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Journal of Cryptology. 2010 ; Vol. 23, No. 3. pp. 422-456.
Hazay, Carmit ; Lindell, Yehuda. / Semi-honest adversaries. Information Security and Cryptography. Springer International Publishing, 2010. pp. 53-80 (Information Security and Cryptography).
Hazay, Carmit ; Lindell, Yehuda. / Covert adversaries. Information Security and Cryptography. Springer International Publishing, 2010. pp. 109-143 (Information Security and Cryptography).
Hazay, Carmit ; Lindell, Yehuda. / Definitions. Information Security and Cryptography. Springer International Publishing, 2010. pp. 19-49 (Information Security and Cryptography).
Hazay, Carmit ; Lindell, Yehuda. / Search problems. Information Security and Cryptography. Springer International Publishing, 2010. pp. 227-254 (Information Security and Cryptography).

2009

Klinc, Demijan ; Hazay, Carmit ; Jagmohan, Ashish et al. / On compression of data encrypted with block ciphers. Proceedings - 2009 Data Compression Conference, DCC 2009. 2009. pp. 213-222 (Proceedings - 2009 Data Compression Conference, DCC 2009).

2008

Hazay, Carmit ; Lindell, Yehuda. / Constructions of truly practical secure protocols using standard smartcards. Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. 2008. pp. 491-500 (Proceedings of the ACM Conference on Computer and Communications Security).
Hazay, C. ; Lindell, Y. / Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. TCC. 2008.
Hazay, Carmit ; Lindell, Yehuda. / Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. Springer Verlag, 2008. pp. 155-175 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Dov Gordon, S. ; Hazay, Carmit ; Lindell, Yehuda et al. / Complete fairness in secure two-party computation. STOC'08: Proceedings of the 2008 ACM Symposium on Theory of Computing. 2008. pp. 413-422 (Proceedings of the Annual ACM Symposium on Theory of Computing).
Gordon, DS ; Hazay, C. ; Katz, Jonathan et al. / Complete Fairness in Secure Two-Party Computation. In: Journal of the ACM. 2008 ; Vol. 58. pp. 1-37.
Gordon, S.D. ; Hazay, C. ; Katz, J. et al. / Complete Fairness in Secure Two-Party Computation. 0th annual ACM symposium on Theory of computing. 2008.
Gordon, S. Dov ; Hazay, C. ; Katz, Jonathan et al. / Complete Fairness in Secure Two-Party Computation. STOC. 2008.
Hazay, C. ; Lindell, Y. / Constructions of Truly Practical Secure Protocols using Standard Smartcards. CCS. 2008.

2007

Hazay, Carmit ; Lewenstein, Moshe ; Sokol, Dina. / Approximate parameterized matching. In: ACM Transactions on Algorithms. 2007 ; Vol. 3, No. 3.
Hazay, C. ; Katz, J. ; Koo, C. Y. et al. / Concurrently-Secure Blind Signatures without Random Oracles or Setup Assumptions. TCC. 2007.
Hazay, Carmit ; Katz, Jonathan ; Koo, Chiu Yuen et al. / Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Springer Verlag, 2007. pp. 323-341 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

2005

Hazay, C. ; Lewenstein, Moshe ; Tzur, Dekel. / Faster Algorithm for 2D parameterized Matching. CPM. 2005.
Hazay, Carmit ; Lewenstein, Moshe ; Tsur, Dekel. / Two dimensional parameterized matching. In: Lecture Notes in Computer Science. 2005 ; Vol. 3537. pp. 266-279.

2004

Hazay, Carmit ; Lewenstein, Moshe ; Soko, Dina. / Approximate parameterized matching. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). editor / Susanne Albers ; Tomasz Radzik. Springer Verlag, 2004. pp. 414-425 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, C. ; Lewenstein, M. ; Sokol, D. / Approximate parameterized matching. ESA. 2004.