!!Rafail Ostrovsky - Selected Publications
\\
(1) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data \\
Y Dodis, R Ostrovsky, L Reyzin, A Smith \\
SIAM journal on computing 38 (1), 97-139 2008 \\
[[Over 2,500 scientific citations according to Google Scholar]\\
\\
(2) Public key encryption with keyword search \\
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano\\
Eurocrypt 2004. \\
[[Over 2,400 citations according to Google Scholar]\\
\\
(3) Searchable symmetric encryption: improved definitions and efficient constructions \\
R Curtmola, J Garay, S Kamara, R Ostrovsky\\
Journal of Computer Security 19 (5), 895-934 1734 2011 \\
[[Over 1,700 citations according to Google Scholar]\\
\\
(4) Software protection and simulation on oblivious RAMs \\
O Goldreich, R Ostrovsky\\
Journal of the ACM (JACM) 43 (3), 431-473 1263 1996 \\
[[Over 1,200 citations according to Google Scholar]\\
\\
(5) Replication is not needed: Single database, computationally-private information retrieval\\
E Kushilevitz, R Ostrovsky FOCS 1997, 364-373 \\
[[over 950 citations according to Google Scholar]\\
\\
(6) Universally composable two-party and multi-party secure computation\\
R Canetti, Y Lindell, R Ostrovsky, A Sahai, STOC 2002 \\
[[Over 650 citations according to Goggle Scholar]\\
\\
(7) How to withstand mobile virus attacks \\
R Ostrovsky, M Yung \\
PODC 91 \\
[[over 600 citations according to Google Scholar]\\
\\
(8) Efficient search for approximate nearest neighbor in high dimensional spaces\\
E Kushilevitz, R Ostrovsky, Y Rabani\\
SIAM Journal on Computing 30 (2), 457-474\\
[[Over 560 citations according to Google Scholar]\\
\\
(9) Deniable encryption\\
R Canetti, C Dwork, M Naor, R Ostrovsky Crypto1997\\
[[over 380 citations according to Google Scholar]\\
\\
(10) The effectiveness of lloyd-type methods for the k-means problem\\
R Ostrovsky, Y Rabani, LJ Schulman, C Swamy\\
Journal of the ACM (JACM) 59 (6), 28\\
[[over 370 citations according to google schoolar.]