Search the dblp DataBase
Tal Moran :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tal Moran , Ronen Shaltiel , Amnon Ta-Shma Non-interactive Timestamping in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:460-476 [Conf ] Tal Moran , Moni Naor Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:373-392 [Conf ] Tal Moran , Moni Naor Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:88-108 [Conf ] Tal Moran , Moni Naor Basing Cryptographic Protocols on Tamper-Evident Seals. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:285-297 [Conf ] Tal Moran , Moni Naor , Gil Segev Deterministic History-Independent Strategies for Storing Information on Write-Once Memories. [Citation Graph (0, 0)][DBLP ] ICALP, 2007, pp:303-315 [Conf ] Split-ballot voting: everlasting privacy with distributed trust. [Citation Graph (, )][DBLP ] David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware. [Citation Graph (, )][DBLP ] The Phish-Market Protocol: Securely Sharing Attack Data between Competitors. [Citation Graph (, )][DBLP ] An Optimally Fair Coin Toss. [Citation Graph (, )][DBLP ] On Complete Primitives for Fairness. [Citation Graph (, )][DBLP ] Attacking Paper-Based E2E Voting Systems. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs