Couteau, Geoffroy ; Hazay, Carmit ; Hegde, Aditya et al. / Breaking the 1/λ-Rate Barrier for Arithmetic Garbling. Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2025, Proceedings. editor / Serge Fehr ; Pierre-Alain Fouque. Springer Science and Business Media Deutschland GmbH, 2025. pp. 182-213 (Lecture Notes in Computer Science).
Hazay, Carmit ; Heath, David ; Kolesnikov, Vladimir et al. / LogRobin++ : Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK. Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. editor / Kai-Min Chung ; Yu Sasaki. Springer Science and Business Media Deutschland GmbH, 2025. pp. 367-401 (Lecture Notes in Computer Science).
Couteau, Geoffroy ; Hazay, Carmit ; Hegde, Aditya et al. / ω(1/λ)-Rate Boolean Garbling Scheme from Generic Groups. Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings. editor / Yael Tauman Kalai ; Seny F. Kamara. Springer Science and Business Media Deutschland GmbH, 2025. pp. 489-521 (Lecture Notes in Computer Science).
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David et al. / Non-interactive Threshold BBS+ from Pseudorandom Correlations. Topics in Cryptology – CT-RSA 2025 - Cryptographers’ Track at the RSA Conference 2025, Proceedings. editor / Arpita Patra. Springer Science and Business Media Deutschland GmbH, 2025. pp. 198-222 (Lecture Notes in Computer Science).
Albouy, Timothé ; Frey, Davide ; Gelles, Ran et al. / Brief Announcement : Towards Optimal Communication Byzantine Reliable Broadcast Under a Message Adversary. 38th International Symposium on Distributed Computing, DISC 2024. editor / Dan Alistarh. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2024. (Leibniz International Proceedings in Informatics, LIPIcs).
Berti, Francesco ; Hazay, Carmit ; Levi, Itamar. / LR-OT : Leakage-Resilient Oblivious Transfer. Security and Cryptography for Networks - 14th International Conference, SCN 2024, Proceedings. editor / Clemente Galdi ; Duong Hieu Phan. Springer Science and Business Media Deutschland GmbH, 2024. pp. 182-204 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Yang, Yibin. / Toward Malicious Constant-Rate 2PC via Arithmetic Garbling. Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, Proceedings. editor / Marc Joye ; Gregor Leander. Springer Science and Business Media Deutschland GmbH, 2024. pp. 401-431 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Acharaya, Anasuya ; Hazay, Carmit ; Kolesnikov, Vladimir et al. / Malicious Security for SCALES : Outsourced Computation with Ephemeral Servers. Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. editor / Leonid Reyzin ; Douglas Stebila. Springer Science and Business Media Deutschland GmbH, 2024. pp. 3-38 (Lecture Notes in Computer Science).
Yang, Yibin ; Heath, David ; Hazay, Carmit et al. / Tight ZK CPU* Batched ZK Branching with Cost Proportional to Evaluated Instruction. CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, 2024. pp. 3095-3109 (CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security).
Wang, Ruihan ; Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / Ligetron : Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser. Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers Inc., 2024. pp. 1760-1776 (Proceedings - IEEE Symposium on Security and Privacy).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / Beyond MPC-in-the-Head : Black-Box Constructions of Short Zero-Knowledge Proofs. Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. editor / Guy Rothblum ; Hoeteck Wee. Springer Science and Business Media Deutschland GmbH, 2023. pp. 3-33 (Lecture Notes in Computer Science).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / Your Reputation’s Safe with Me : Framing-Free Distributed Zero-Knowledge Proofs. Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. editor / Guy Rothblum ; Hoeteck Wee. Springer Science and Business Media Deutschland GmbH, 2023. pp. 34-64 (Lecture Notes in Computer Science).
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David et al. / Putting the Online Phase on a Diet : Covert Security from Short MACs. Topics in Cryptology – CT-RSA 2023 - Cryptographers’ Track at the RSA Conference 2023, Proceedings. editor / Mike Rosulek. Springer Science and Business Media Deutschland GmbH, 2023. pp. 360-386 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Bhadauria, Rishabh ; Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan et al. / Private Polynomial Commitments and Applications to MPC. Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. editor / Alexandra Boldyreva ; Vladimir Kolesnikov. Springer Science and Business Media Deutschland GmbH, 2023. pp. 127-158 (Lecture Notes in Computer Science).
Bangalore, Laasya ; Sereshgi, Mohammad Hossein Faghihi ; Hazay, Carmit et al. / Flag : A Framework for Lightweight Robust Secure Aggregation. ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, 2023. pp. 14-28 (Proceedings of the ACM Conference on Computer and Communications Security).
Acharya, Anasuya ; Hazay, Carmit ; Poburinnaya, Oxana et al. / Best of Both Worlds : Revisiting the Spymasters Double Agent Problem. Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. editor / Helena Handschuh ; Anna Lysyanskaya. Springer Science and Business Media Deutschland GmbH, 2023. pp. 328-359 (Lecture Notes in Computer Science).
Acharya, Anasuya ; Ashur, Tomer ; Cohen, Efrat et al. / A New Approach to Garbled Circuits. Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Proceedings. editor / Mehdi Tibouchi ; XiaoFeng Wang. Springer Science and Business Media Deutschland GmbH, 2023. pp. 611-641 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Bangalore, Laasya ; Bhadauria, Rishabh ; Hazay, Carmit et al. / On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives. Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. editor / Eike Kiltz ; Vinod Vaikuntanathan. Springer Science and Business Media Deutschland GmbH, 2022. pp. 417-446 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Chandran, Gowri R. ; Hazay, Carmit ; Hundt, Robin et al. / Comparison-based MPC in Star Topology. SECRYPT 2022 - Proceedings of the 19th International Conference on Security and Cryptography. editor / Sabrina De Capitani di Vimercati ; Pierangela Samarati. Science and Technology Publications, Lda, 2022. pp. 69-82 (Proceedings of the International Conference on Security and Cryptography).
de Castro, Leo ; Hazay, Carmit ; Ishai, Yuval et al. / Asymptotically Quasi-Optimal Cryptography. Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. editor / Orr Dunkelman ; Stefan Dziembowski. Springer Science and Business Media Deutschland GmbH, 2022. pp. 303-334 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Acharya, Anasuya ; Hazay, Carmit ; Kolesnikov, Vladimir et al. / SCALES : MPC with Small Clients and Larger Ephemeral Servers. Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. editor / Eike Kiltz ; Vinod Vaikuntanathan. Springer Science and Business Media Deutschland GmbH, 2022. pp. 502-531 (Lecture Notes in Computer Science).
Hazay, Carmit ; Orsini, Emmanuela ; Scholl, Peter et al. / TinyKeys : A New Approach to Efficient Multi-Party Computation. In: Journal of Cryptology. 2022 ; Vol. 35, No. 2.
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David et al. / Financially Backed Covert Security. Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. editor / Goichiro Hanaoka ; Junji Shikata ; Yohei Watanabe. Springer Science and Business Media Deutschland GmbH, 2022. pp. 99-129 (Lecture Notes in Computer Science).
Chen, Megan ; Hazay, Carmit ; Ishai, Yuval et al. / Diogenes : Lightweight scalable RSA modulus generation with a dishonest majority. Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers Inc., 2021. pp. 590-607 (Proceedings - IEEE Symposium on Security and Privacy).
Yang, Yibin ; Heath, David ; Hazay, Carmit et al. / Batchman and Robin : Batched and Non-batched Branching for Interactive ZK. CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, 2021. pp. 1452-1466 (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David et al. / Generic Compiler for Publicly Verifiable Covert Multi-Party Computation. Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. editor / Anne Canteaut ; François-Xavier Standaert. Springer Science and Business Media Deutschland GmbH, 2021. pp. 782-811 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Abascal, Jackson ; Faghihi Sereshgi, Mohammad Hossein ; Hazay, Carmit et al. / Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC. CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2020. pp. 1591-1605 (Proceedings of the ACM Conference on Computer and Communications Security).
Bhadauria, Rishabh ; Fang, Zhiyong ; Hazay, Carmit et al. / Ligero++ : A New Optimized Sublinear IOP. CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2020. pp. 2025-2038 (Proceedings of the ACM Conference on Computer and Communications Security).
Hazay, Carmit ; Pass, Rafael ; Venkitasubramaniam, Muthuramakrishnan. / Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?. Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. editor / Anne Canteaut ; Yuval Ishai. Springer, 2020. pp. 599-619 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Shelat, Abhi ; Venkitasubramaniam, Muthuramakrishnan. / Going Beyond Dual Execution : MPC for Functions with Efficient Verification. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. editor / Aggelos Kiayias ; Markulf Kohlweiss ; Petros Wallden ; Vassilis Zikas. Springer Science and Business Media Deutschland GmbH, 2020. pp. 328-356 (Lecture Notes in Computer Science).
Bhadauria, Rishabh ; Hazay, Carmit. / Multi-clients verifiable computation via conditional disclosure of secrets. Security and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings. editor / Clemente Galdi ; Vladimir Kolesnikov. Springer Science and Business Media Deutschland GmbH, 2020. pp. 150-171 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan ; Weiss, Mor. / The Price of Active Security in Cryptographic Protocols. Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. editor / Anne Canteaut ; Yuval Ishai. Springer, 2020. pp. 184-215 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Lilintal, Mor. / Gradual gram and secure computation for ram programs. Security and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings. editor / Clemente Galdi ; Vladimir Kolesnikov. Springer Science and Business Media Deutschland GmbH, 2020. pp. 233-252 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / On the Power of Secure Two-Party Computation. In: Journal of Cryptology. 2020 ; Vol. 33, No. 1. pp. 271-318.
Hazay, Carmit ; Marcedone, Antonio ; Ishai, Yuval et al. / Leviosa : Lightweight secure arithmetic computation. CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2019. pp. 327-344 (Proceedings of the ACM Conference on Computer and Communications Security).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / On Black-Box Complexity of Universally Composable Security in the CRS Model. In: Journal of Cryptology. 2019 ; Vol. 32, No. 3. pp. 635-689.
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / What Security Can We Achieve Within 4 Rounds?. In: Journal of Cryptology. 2019 ; Vol. 32, No. 4. pp. 1200-1262.
Hazay, Carmit ; Mikkelsen, Gert Læssøe ; Rabin, Tal et al. / Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. In: Journal of Cryptology. 2019 ; Vol. 32, No. 2. pp. 265-323.
Byali, Megha ; Patra, Arpita ; Hazay, Carmit et al. / Fast actively secure five-party computation with security beyond abort. CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2019. pp. 1573-1590 (Proceedings of the ACM Conference on Computer and Communications Security).
Hazay, C. ; Byali, M. ; Patra, P. et al. / Fast Actively Secure Five-Party Computation with Security Beyond Abort. Proceedings of the ACM Conference on Computer and Communications Security. 2019.
Hazay, Carmit ; Orsini, Emmanuela ; Scholl, Peter et al. / TinyKeys : A new approach to efficient multi-party computation. Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. editor / Hovav Shacham ; Alexandra Boldyreva. Springer Verlag, 2018. pp. 3-33 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Orsini, Emmanuela ; Scholl, Peter et al. / Concretely efficient large-scale MPC with active security (or, tinykeys for TinyOT). Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. editor / Thomas Peyrin ; Steven Galbraith. Springer Verlag, 2018. pp. 86-117 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Ames, Scott ; Hazay, Carmit ; Ishai, Yuval et al. / Ligero : Lightweight sublinear arguments without a trusted setup. CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2017. pp. 2087-2104 (Proceedings of the ACM Conference on Computer and Communications Security).
Hazay, Carmit ; Ishai, Yuval ; Venkitasubramaniam, Muthuramakrishnan. / Actively secure garbled circuits with constant communication overhead in the plain model. Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. editor / Yael Kalai ; Leonid Reyzin. Springer Verlag, 2017. pp. 3-39 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Scholl, Peter ; Soria-Vazquez, Eduardo. / Low cost constant round MPC combining BMR and oblivious transfer. Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. editor / Tsuyoshi Takagi ; Thomas Peyrin. Springer Verlag, 2017. pp. 598-628 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Zarosim, Hila. / The feasibility of outsourced database search in the plain model. Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. editor / Roberto De Prisco ; Vassilis Zikas. Springer Verlag, 2016. pp. 313-332 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / Composable adaptive secure protocols without setup under polytime assumptions. Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. editor / Adam Smith ; Martin Hirt. Springer Verlag, 2016. pp. 400-432 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / What security can we achieve within 4 rounds?. Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. editor / Roberto De Prisco ; Vassilis Zikas. Springer Verlag, 2016. pp. 486-505 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Asharov, Gilad ; Canetti, Ran ; Hazay, Carmit. / Toward a Game Theoretic View of Secure Computation. In: Journal of Cryptology. 2016 ; Vol. 29, No. 4. pp. 879-926.
Hazay, Carmit ; Polychroniadou, Antigoni ; Venkitasubramaniam, Muthuramakrishnan. / Composable security in the tamper-proof hardware model under minimal complexity. Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. editor / Adam Smith ; Martin Hirt. Springer Verlag, 2016. pp. 367-399 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Freedman, Michael J. ; Hazay, Carmit ; Nissim, Kobbi et al. / Efficient Set Intersection with Simulation-Based Security. In: Journal of Cryptology. 2016 ; Vol. 29, No. 1. pp. 115-155.
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / On the power of secure two-party computation. Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. editor / Matthew Robshaw ; Jonathan Katz. Springer Verlag, 2016. pp. 397-429 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Yanai, Avishay. / Constant-round maliciously secure two-party computation in the RAM model. Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. editor / Adam Smith ; Martin Hirt. Springer Verlag, 2016. pp. 521-553 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Patra, Arpita ; Warinschi, Bogdan. / Selective opening security for receivers. Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. editor / Jung Hee Cheon ; Tetsu Iwata. Springer Verlag, 2015. pp. 443-469 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Lindell, Yehuda ; Patra, Arpita. / Adaptively secure computation with partial erasures. PODC 2015 - Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, 2015. pp. 291-300 (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).
Hazay, Carmit ; Venkitasubramaniam, Muthuramakrishnan. / On black-box complexity of universally composable security in the CRS model. Advances in Cryptology – ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. editor / Tetsu Iwata ; Jung Hee Cheon. Springer Verlag, 2015. pp. 183-209 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Patra, Arpita. / One-sided adaptively secure two-party computation. Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. Springer Verlag, 2014. pp. 368-393 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele. / Outsourced pattern matching. Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Proceedings. PART 2. ed. 2013. pp. 545-556 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 2).
Hazay, Carmit ; López-Alt, Adriana ; Wee, Hoeteck et al. / Leakage-resilient cryptography from minimal assumptions. Advances in Cryptology, EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. 2013. pp. 160-176 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Damgård, Ivan ; Faust, Sebastian ; Hazay, Carmit. / Secure two-party computation with low communication. Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. Springer Verlag, 2012. pp. 54-74 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Mikkelsen, Gert Læssøe ; Rabin, Tal et al. / Efficient RSA key generation and threshold Paillier in the two-party setting. Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings. 2012. pp. 313-331 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Akavia, Adi ; Goldwasser, Shafi ; Hazay, Carmit. / Distributed public key schemes secure against continual leakage. PODC'12 - Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing. 2012. pp. 155-164 (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).
Klinc, Demijan ; Hazay, Carmit ; Jagmohan, Ashish et al. / On compression of data encrypted with block ciphers. In: IEEE Transactions on Information Theory. 2012 ; Vol. 58, No. 11. pp. 6989-7001.
Hazay, Carmit ; Nissim, Kobbi. / Efficient set operations in the presence of malicious adversaries. In: Journal of Cryptology. 2012 ; Vol. 25, No. 3. pp. 383-433.
Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus et al. / Signature schemes secure against hard-to-invert leakage. Advances in Cryptology, ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. 2012. pp. 98-115 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Asharov, Gilad ; Canetti, Ran ; Hazay, Carmit. / Towards a game theoretic view of secure computation. Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. 2011. pp. 426-445 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, C. (Inventor) ; Jagmohan, A. (Inventor) ; Klinc, D. (Inventor) et al. / Compressing encrypted data without the encryption key. Washington, DC: U.S. Patent and Trademark Office. Patent No.: No.20110103580.
Gordon, S. Dov ; Hazay, Carmit ; Katz, Jonathan et al. / Complete fairness in secure two-party computation. In: Journal of the ACM. 2011 ; Vol. 58, No. 6.
Hazay, Carmit ; Lindell, Yehuda. / Oblivious transfer and applications. Information Security and Cryptography. Springer International Publishing, 2010. pp. 177-212 (Information Security and Cryptography).
Hazay, Carmit ; Toft, Tomas. / Computationally secure pattern matching in the presence of malicious adversaries. Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, 2010. pp. 195-212 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Nissim, Kobbi. / Efficient set operations in the presence of malicious adversaries. Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. Springer Verlag, 2010. pp. 312-331 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Lindell, Yehuda. / Sigma protocols and efficient zero-knowledge1. Information Security and Cryptography. Springer International Publishing, 2010. pp. 147-175 (Information Security and Cryptography).
Gennaro, Rosario ; Hazay, Carmit ; Sorensen, Jeffrey S. / Text search protocols with simulation based security. Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. Springer Verlag, 2010. pp. 332-350 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hazay, Carmit ; Lindell, Yehuda. / Malicious adversaries. Information Security and Cryptography. Springer International Publishing, 2010. pp. 81-108 (Information Security and Cryptography).
Hazay, Carmit ; Lindell, Yehuda. / The kth-ranked element. Information Security and Cryptography. Springer International Publishing, 2010. pp. 213-226 (Information Security and Cryptography).
Hazay, Carmit ; Lindell, Yehuda. / Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Journal of Cryptology. 2010 ; Vol. 23, No. 3. pp. 422-456.
Hazay, Carmit ; Lindell, Yehuda. / Semi-honest adversaries. Information Security and Cryptography. Springer International Publishing, 2010. pp. 53-80 (Information Security and Cryptography).
Hazay, Carmit ; Lindell, Yehuda. / Covert adversaries. Information Security and Cryptography. Springer International Publishing, 2010. pp. 109-143 (Information Security and Cryptography).
Hazay, Carmit ; Lindell, Yehuda. / Definitions. Information Security and Cryptography. Springer International Publishing, 2010. pp. 19-49 (Information Security and Cryptography).
Hazay, Carmit ; Lindell, Yehuda. / Search problems. Information Security and Cryptography. Springer International Publishing, 2010. pp. 227-254 (Information Security and Cryptography).
Klinc, Demijan ; Hazay, Carmit ; Jagmohan, Ashish et al. / On compression of data encrypted with block ciphers. Proceedings - 2009 Data Compression Conference, DCC 2009. 2009. pp. 213-222 (Proceedings - 2009 Data Compression Conference, DCC 2009).
Hazay, Carmit ; Lindell, Yehuda. / Constructions of truly practical secure protocols using standard smartcards. Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. 2008. pp. 491-500 (Proceedings of the ACM Conference on Computer and Communications Security).
Hazay, C. ; Lindell, Y. / Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. TCC. 2008.
Hazay, Carmit ; Lindell, Yehuda. / Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. Springer Verlag, 2008. pp. 155-175 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Dov Gordon, S. ; Hazay, Carmit ; Lindell, Yehuda et al. / Complete fairness in secure two-party computation. STOC'08: Proceedings of the 2008 ACM Symposium on Theory of Computing. 2008. pp. 413-422 (Proceedings of the Annual ACM Symposium on Theory of Computing).
Hazay, Carmit ; Katz, Jonathan ; Koo, Chiu Yuen et al. / Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Springer Verlag, 2007. pp. 323-341 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).