How to leak a secret RL Rivest, A Shamir, Y Tauman International Conference on the Theory and Application of Cryptology and …, 2001 | 1735 | 2001 |

Delegating computation: interactive proofs for muggles S Goldwasser, YT Kalai, GN Rothblum Journal of the ACM (JACM) 62 (4), 1-64, 2015 | 541 | 2015 |

Improved online/offline signature schemes A Shamir, Y Tauman Annual International Cryptology Conference, 355-367, 2001 | 464 | 2001 |

Improved online/offline signature schemes A Shamir, Y Tauman Annual International Cryptology Conference, 355-367, 2001 | 464 | 2001 |

Improved delegation of computation using fully homomorphic encryption KM Chung, Y Kalai, S Vadhan Annual Cryptology Conference, 483-501, 2010 | 440 | 2010 |

On the (in) security of the Fiat-Shamir paradigm S Goldwasser, YT Kalai 44th Annual IEEE Symposium on Foundations of Computer Science, 2003 …, 2003 | 358 | 2003 |

Reusable garbled circuits and succinct functional encryption S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013 | 352 | 2013 |

Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage Z Brakerski, YT Kalai, J Katz, V Vaikuntanathan 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 501-510, 2010 | 248 | 2010 |

One-time programs S Goldwasser, YT Kalai, GN Rothblum Annual International Cryptology Conference, 39-56, 2008 | 243 | 2008 |

Protecting obfuscation against algebraic attacks B Barak, S Garg, YT Kalai, O Paneth, A Sahai Annual International Conference on the Theory and Applications of …, 2014 | 239 | 2014 |

On the impossibility of obfuscation with auxiliary input S Goldwasser, YT Kalai 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05), 553-562, 2005 | 227 | 2005 |

On cryptography with auxiliary input Y Dodis, YT Kalai, S Lovett Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009 | 224 | 2009 |

Public-key encryption schemes with auxiliary inputs Y Dodis, S Goldwasser, YT Kalai, C Peikert, V Vaikuntanathan Theory of Cryptography Conference, 361-381, 2010 | 221 | 2010 |

Robustness of the learning with errors assumption S Goldwasser, YT Kalai, C Peikert, V Vaikuntanathan Tsinghua University Press, 2010 | 165 | 2010 |

How to run turing machines on encrypted data S Goldwasser, YT Kalai, RA Popa, V Vaikuntanathan, N Zeldovich Annual Cryptology Conference, 536-553, 2013 | 161 | 2013 |

Smooth projective hashing and two-message oblivious transfer YT Kalai Annual International Conference on the Theory and Applications of …, 2005 | 151 | 2005 |

Memory delegation KM Chung, YT Kalai, FH Liu, R Raz Annual Cryptology Conference, 151-168, 2011 | 142 | 2011 |

How to delegate computations: the power of no-signaling proofs YT Kalai, R Raz, RD Rothblum Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014 | 111 | 2014 |

How to leak a secret: Theory and applications of ring signatures RL Rivest, A Shamir, Y Tauman Theoretical Computer Science, 164-186, 2006 | 92 | 2006 |

Smooth projective hashing and two-message oblivious transfer S Halevi, YT Kalai Journal of Cryptology 25 (1), 158-193, 2012 | 89 | 2012 |