The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tal Rabin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tal Rabin, Michael Ben-Or
    Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract) [Citation Graph (1, 0)][DBLP]
    STOC, 1989, pp:73-85 [Conf]
  2. Rosario Gennaro, Daniele Micciancio, Tal Rabin
    An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:67-72 [Conf]
  3. Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
    Secure Computation Without Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:361-377 [Conf]
  4. Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Adaptive Security for Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:98-115 [Conf]
  5. Ran Canetti, Tal Rabin
    Universal Composition with Joint State. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:265-281 [Conf]
  6. Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin
    Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:494-510 [Conf]
  7. Yevgeniy Dodis, Shai Halevi, Tal Rabin
    A Cryptographic Solution to a Game Theoretic Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:112-130 [Conf]
  8. Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
    On 2-Round Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:178-193 [Conf]
  9. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:157-172 [Conf]
  10. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
    RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:132-149 [Conf]
  11. Silvio Micali, Tal Rabin
    Collective Coin Tossing Without Assumptions nor Broadcasting. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:253-266 [Conf]
  12. Tal Rabin
    A Simplified Approach to Threshold and Proactive RSA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:89-104 [Conf]
  13. Eyal Kushilevitz, Tal Rabin
    Fair e-Lotteries and e-Casinos. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:100-109 [Conf]
  14. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Applications of Pedersen's Distributed Key Generation Protocol. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:373-390 [Conf]
  15. Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll
    Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:181-200 [Conf]
  16. Jee Hea An, Yevgeniy Dodis, Tal Rabin
    On the Security of Joint Signature and Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:83-107 [Conf]
  17. Mihir Bellare, Juan A. Garay, Tal Rabin
    Fast Batch Verification for Modular Exponentiation and Digital Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:236-250 [Conf]
  18. Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin
    Efficient Multiparty Computations Secure Against an Adaptive Adversary. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:311-326 [Conf]
  19. Rosario Gennaro, Shai Halevi, Tal Rabin
    Secure Hash-and-Sign Signatures Without the Random Oracle. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:123-139 [Conf]
  20. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:354-371 [Conf]
  21. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:295-310 [Conf]
  22. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
    Secure Hashed Diffie-Hellman over Non-DDH Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:361-381 [Conf]
  23. Mihir Bellare, Juan A. Garay, Tal Rabin
    Batch Verification with Applications to Cryptography and Checking. [Citation Graph (0, 0)][DBLP]
    LATIN, 1998, pp:170-191 [Conf]
  24. Hugo Krawczyk, Tal Rabin
    Chameleon Signatures. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  25. Mihir Bellare, Juan A. Garay, Tal Rabin
    Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing. [Citation Graph (0, 0)][DBLP]
    PODC, 1996, pp:191-200 [Conf]
  26. Michael Ben-Or, Boaz Kelmer, Tal Rabin
    Asynchronous Secure Computations with Optimal Resilience (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 1994, pp:183-192 [Conf]
  27. Rosario Gennaro, Michael O. Rabin, Tal Rabin
    Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography. [Citation Graph (0, 0)][DBLP]
    PODC, 1998, pp:101-111 [Conf]
  28. Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
    Sequential composition of protocols without simultaneous termination. [Citation Graph (0, 0)][DBLP]
    PODC, 2002, pp:203-212 [Conf]
  29. Ran Canetti, Tal Rabin
    Fast asynchronous Byzantine agreement with optimal resilience. [Citation Graph (0, 0)][DBLP]
    STOC, 1993, pp:42-51 [Conf]
  30. Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
    The round complexity of verifiable secret sharing and secure multicast. [Citation Graph (0, 0)][DBLP]
    STOC, 2001, pp:580-589 [Conf]
  31. Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
    Information-theoretically secure protocols and security under composition. [Citation Graph (0, 0)][DBLP]
    STOC, 2006, pp:109-118 [Conf]
  32. Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
    On the composition of authenticated byzantine agreement. [Citation Graph (0, 0)][DBLP]
    STOC, 2002, pp:514-523 [Conf]
  33. Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin
    Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:258-277 [Conf]
  34. Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin
    Secure Distributed Storage and Retrieval. [Citation Graph (0, 0)][DBLP]
    WDAG, 1997, pp:275-289 [Conf]
  35. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:164, n:1, pp:54-84 [Journal]
  36. Tal Rabin
    Robust Sharing of Secrets When the Dealer is Honest or Cheating. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1994, v:41, n:6, pp:1089-1109 [Journal]
  37. Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
    On the composition of authenticated Byzantine Agreement. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2006, v:53, n:6, pp:881-917 [Journal]
  38. Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:2, pp:273-300 [Journal]
  39. Rosario Gennaro, Tal Rabin, Hugo Krawczyk
    RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:4, pp:397-416 [Journal]
  40. Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin
    Secure distributed storage and retrieval. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:243, n:1-2, pp:363-389 [Journal]
  41. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:1, pp:51-83 [Journal]
  42. Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:393- [Journal]
  43. Rosario Gennaro, Tal Rabin, Hugo Krawczyk
    RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:394- [Journal]

  44. Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. [Citation Graph (, )][DBLP]


  45. Designing a Side Channel Resistant Random Number Generator. [Citation Graph (, )][DBLP]


  46. The Round Complexity of Verifiable Secret Sharing Revisited. [Citation Graph (, )][DBLP]


  47. On Compression of Data Encrypted with Block Ciphers. [Citation Graph (, )][DBLP]


  48. Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. [Citation Graph (, )][DBLP]


  49. Threshold RSA for Dynamic and Ad-Hoc Groups. [Citation Graph (, )][DBLP]


  50. Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. [Citation Graph (, )][DBLP]


  51. Secure Network Coding over the Integers. [Citation Graph (, )][DBLP]


  52. Degradation and Amplification of Computational Hardness. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002