The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tal Malkin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew McDaniel
    On the performance, feasibility, and use of forward-secure signatures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:131-144 [Conf]
  2. Amos Beimel, Yuval Ishai, Tal Malkin
    Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:55-73 [Conf]
  3. Amos Beimel, Tal Malkin, Silvio Micali
    The All-or-Nothing Nature of Two-Party Secure Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:80-97 [Conf]
  4. Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin
    Mercurial Commitments with Applications to Zero-Knowledge Sets. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:422-439 [Conf]
  5. Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
    On Adaptive vs. Non-adaptive Security of Multiparty Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:262-279 [Conf]
  6. Ran Canetti, Tal Malkin, Kobbi Nissim
    Efficient Communication-Storage Tradeoffs for Multicast Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:459-474 [Conf]
  7. Giovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsky
    Single Database Private Information Retrieval Implies Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:122-138 [Conf]
  8. Tal Malkin, Daniele Micciancio, Sara K. Miner
    Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:400-417 [Conf]
  9. Tal Malkin, Satoshi Obana, Moti Yung
    The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:306-322 [Conf]
  10. Tal Malkin, François-Xavier Standaert, Moti Yung
    A Comparative Cost/Security Analysis of Fault Attack Countermeasures. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:159-172 [Conf]
  11. Yael Gertner, Sampath Kannan, Tal Malkin, Omer Reingold, Mahesh Viswanathan
    The Relationship between Public Key Encryption and Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    FOCS, 2000, pp:325-335 [Conf]
  12. Yael Gertner, Tal Malkin, Omer Reingold
    On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates. [Citation Graph (0, 0)][DBLP]
    FOCS, 2001, pp:126-135 [Conf]
  13. Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright
    Secure Multiparty Computation of Approximations. [Citation Graph (0, 0)][DBLP]
    ICALP, 2001, pp:927-938 [Conf]
  14. Yael Gertner, Shafi Goldwasser, Tal Malkin
    A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication. [Citation Graph (0, 0)][DBLP]
    RANDOM, 1998, pp:200-217 [Conf]
  15. Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin
    WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:218-232 [Conf]
  16. Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
    One-Way Functions Are Essential for Single-Server Private Information Retrieval. [Citation Graph (0, 0)][DBLP]
    STOC, 1999, pp:89-98 [Conf]
  17. Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
    Protecting Data Privacy in Private Information Retrieval Schemes. [Citation Graph (0, 0)][DBLP]
    STOC, 1998, pp:151-160 [Conf]
  18. Amos Beimel, Tal Malkin
    A Quantitative Approach to Reductions in Secure Computation. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:238-257 [Conf]
  19. Yael Gertner, Tal Malkin, Steven Myers
    Towards a Separation of Semantic and CCA Security for Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:434-455 [Conf]
  20. Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin
    Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:258-277 [Conf]
  21. Tal Malkin, Ryan Moriarty, Nikolai Yakovenko
    Generalized Environmental Security from Number Theoretic Assumptions. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:343-359 [Conf]
  22. Amos Beimel, Tal Malkin
    A Quantitative Approach to Reductions in Secure Computation [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2003, v:, n:086, pp:- [Journal]
  23. Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
    Protecting Data Privacy in Private Information Retrieval Schemes. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2000, v:60, n:3, pp:592-629 [Journal]
  24. Amos Beimel, Yuval Ishai, Tal Malkin
    Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2004, v:17, n:2, pp:125-151 [Journal]
  25. Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
    Adaptive versus Non-Adaptive Security of Multi-Party Protocols. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2004, v:17, n:3, pp:153-207 [Journal]
  26. Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright
    Secure multiparty computation of approximations. [Citation Graph (0, 0)][DBLP]
    ACM Transactions on Algorithms, 2006, v:2, n:3, pp:435-472 [Journal]
  27. Jon Feldman, Tal Malkin, Rocco A. Servedio, Clifford Stein, Martin J. Wainwright
    LP Decoding Corrects a Constant Fraction of Errors. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:82-89 [Journal]
  28. Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
    Two-Party Computing with Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:298-314 [Conf]
  29. Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb
    How Should We Solve Search Problems Privately? [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:31-49 [Conf]
  30. Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright
    Private Multiparty Sampling and Approximation of Vector Combinations. [Citation Graph (0, 0)][DBLP]
    ICALP, 2007, pp:243-254 [Conf]

  31. Efficient Robust Private Set Intersection. [Citation Graph (, )][DBLP]


  32. Secure Multi-party Computation Minimizing Online Rounds. [Citation Graph (, )][DBLP]


  33. Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. [Citation Graph (, )][DBLP]


  34. A block cipher based pseudo random number generator secure against side-channel key recovery. [Citation Graph (, )][DBLP]


  35. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. [Citation Graph (, )][DBLP]


  36. Optimal Cryptographic Hardness of Learning Monotone Functions. [Citation Graph (, )][DBLP]


  37. Privacy Preserving Pattern Classification. [Citation Graph (, )][DBLP]


  38. Cryptographic strength of ssl/tls servers: current and recent practices. [Citation Graph (, )][DBLP]


  39. Reputation Systems for Anonymous Networks. [Citation Graph (, )][DBLP]


  40. Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. [Citation Graph (, )][DBLP]


  41. Simple, Black-Box Constructions of Adaptively Secure Protocols. [Citation Graph (, )][DBLP]


  42. Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk). [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002