|
Search the dblp DataBase
Tal Malkin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew McDaniel
On the performance, feasibility, and use of forward-secure signatures. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:131-144 [Conf]
- Amos Beimel, Yuval Ishai, Tal Malkin
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:55-73 [Conf]
- Amos Beimel, Tal Malkin, Silvio Micali
The All-or-Nothing Nature of Two-Party Secure Computation. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:80-97 [Conf]
- Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin
Mercurial Commitments with Applications to Zero-Knowledge Sets. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:422-439 [Conf]
- Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
On Adaptive vs. Non-adaptive Security of Multiparty Protocols. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:262-279 [Conf]
- Ran Canetti, Tal Malkin, Kobbi Nissim
Efficient Communication-Storage Tradeoffs for Multicast Encryption. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:459-474 [Conf]
- Giovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsky
Single Database Private Information Retrieval Implies Oblivious Transfer. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2000, pp:122-138 [Conf]
- Tal Malkin, Daniele Micciancio, Sara K. Miner
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2002, pp:400-417 [Conf]
- Tal Malkin, Satoshi Obana, Moti Yung
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:306-322 [Conf]
- Tal Malkin, François-Xavier Standaert, Moti Yung
A Comparative Cost/Security Analysis of Fault Attack Countermeasures. [Citation Graph (0, 0)][DBLP] FDTC, 2006, pp:159-172 [Conf]
- Yael Gertner, Sampath Kannan, Tal Malkin, Omer Reingold, Mahesh Viswanathan
The Relationship between Public Key Encryption and Oblivious Transfer. [Citation Graph (0, 0)][DBLP] FOCS, 2000, pp:325-335 [Conf]
- Yael Gertner, Tal Malkin, Omer Reingold
On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates. [Citation Graph (0, 0)][DBLP] FOCS, 2001, pp:126-135 [Conf]
- Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright
Secure Multiparty Computation of Approximations. [Citation Graph (0, 0)][DBLP] ICALP, 2001, pp:927-938 [Conf]
- Yael Gertner, Shafi Goldwasser, Tal Malkin
A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication. [Citation Graph (0, 0)][DBLP] RANDOM, 1998, pp:200-217 [Conf]
- Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin
WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:218-232 [Conf]
- Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
One-Way Functions Are Essential for Single-Server Private Information Retrieval. [Citation Graph (0, 0)][DBLP] STOC, 1999, pp:89-98 [Conf]
- Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
Protecting Data Privacy in Private Information Retrieval Schemes. [Citation Graph (0, 0)][DBLP] STOC, 1998, pp:151-160 [Conf]
- Amos Beimel, Tal Malkin
A Quantitative Approach to Reductions in Secure Computation. [Citation Graph (0, 0)][DBLP] TCC, 2004, pp:238-257 [Conf]
- Yael Gertner, Tal Malkin, Steven Myers
Towards a Separation of Semantic and CCA Security for Public Key Encryption. [Citation Graph (0, 0)][DBLP] TCC, 2007, pp:434-455 [Conf]
- Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. [Citation Graph (0, 0)][DBLP] TCC, 2004, pp:258-277 [Conf]
- Tal Malkin, Ryan Moriarty, Nikolai Yakovenko
Generalized Environmental Security from Number Theoretic Assumptions. [Citation Graph (0, 0)][DBLP] TCC, 2006, pp:343-359 [Conf]
- Amos Beimel, Tal Malkin
A Quantitative Approach to Reductions in Secure Computation [Citation Graph (0, 0)][DBLP] Electronic Colloquium on Computational Complexity (ECCC), 2003, v:, n:086, pp:- [Journal]
- Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
Protecting Data Privacy in Private Information Retrieval Schemes. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2000, v:60, n:3, pp:592-629 [Journal]
- Amos Beimel, Yuval Ishai, Tal Malkin
Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2004, v:17, n:2, pp:125-151 [Journal]
- Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
Adaptive versus Non-Adaptive Security of Multi-Party Protocols. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2004, v:17, n:3, pp:153-207 [Journal]
- Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright
Secure multiparty computation of approximations. [Citation Graph (0, 0)][DBLP] ACM Transactions on Algorithms, 2006, v:2, n:3, pp:435-472 [Journal]
- Jon Feldman, Tal Malkin, Rocco A. Servedio, Clifford Stein, Martin J. Wainwright
LP Decoding Corrects a Constant Fraction of Errors. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:82-89 [Journal]
- Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
Two-Party Computing with Encrypted Data. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:298-314 [Conf]
- Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb
How Should We Solve Search Problems Privately? [Citation Graph (0, 0)][DBLP] CRYPTO, 2007, pp:31-49 [Conf]
- Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright
Private Multiparty Sampling and Approximation of Vector Combinations. [Citation Graph (0, 0)][DBLP] ICALP, 2007, pp:243-254 [Conf]
Efficient Robust Private Set Intersection. [Citation Graph (, )][DBLP]
Secure Multi-party Computation Minimizing Online Rounds. [Citation Graph (, )][DBLP]
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. [Citation Graph (, )][DBLP]
A block cipher based pseudo random number generator secure against side-channel key recovery. [Citation Graph (, )][DBLP]
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. [Citation Graph (, )][DBLP]
Optimal Cryptographic Hardness of Learning Monotone Functions. [Citation Graph (, )][DBLP]
Privacy Preserving Pattern Classification. [Citation Graph (, )][DBLP]
Cryptographic strength of ssl/tls servers: current and recent practices. [Citation Graph (, )][DBLP]
Reputation Systems for Anonymous Networks. [Citation Graph (, )][DBLP]
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. [Citation Graph (, )][DBLP]
Simple, Black-Box Constructions of Adaptively Secure Protocols. [Citation Graph (, )][DBLP]
Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk). [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.008secs
|