Search the dblp DataBase
Tal Rabin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tal Rabin , Michael Ben-Or Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract) [Citation Graph (1, 0)][DBLP ] STOC, 1989, pp:73-85 [Conf ] Rosario Gennaro , Daniele Micciancio , Tal Rabin An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:67-72 [Conf ] Boaz Barak , Ran Canetti , Yehuda Lindell , Rafael Pass , Tal Rabin Secure Computation Without Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:361-377 [Conf ] Ran Canetti , Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Adaptive Security for Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:98-115 [Conf ] Ran Canetti , Tal Rabin Universal Composition with Joint State. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:265-281 [Conf ] Yevgeniy Dodis , Rosario Gennaro , Johan Håstad , Hugo Krawczyk , Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:494-510 [Conf ] Yevgeniy Dodis , Shai Halevi , Tal Rabin A Cryptographic Solution to a Game Theoretic Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:112-130 [Conf ] Rosario Gennaro , Yuval Ishai , Eyal Kushilevitz , Tal Rabin On 2-Round Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:178-193 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:157-172 [Conf ] Rosario Gennaro , Hugo Krawczyk , Tal Rabin RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:132-149 [Conf ] Silvio Micali , Tal Rabin Collective Coin Tossing Without Assumptions nor Broadcasting. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:253-266 [Conf ] Tal Rabin A Simplified Approach to Threshold and Proactive RSA. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:89-104 [Conf ] Eyal Kushilevitz , Tal Rabin Fair e-Lotteries and e-Casinos. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:100-109 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Applications of Pedersen's Distributed Key Generation Protocol. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:373-390 [Conf ] Helmut Scherzer , Ran Canetti , Paul A. Karger , Hugo Krawczyk , Tal Rabin , David C. Toll Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:181-200 [Conf ] Jee Hea An , Yevgeniy Dodis , Tal Rabin On the Security of Joint Signature and Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:83-107 [Conf ] Mihir Bellare , Juan A. Garay , Tal Rabin Fast Batch Verification for Modular Exponentiation and Digital Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:236-250 [Conf ] Ronald Cramer , Ivan Damgård , Stefan Dziembowski , Martin Hirt , Tal Rabin Efficient Multiparty Computations Secure Against an Adaptive Adversary. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:311-326 [Conf ] Rosario Gennaro , Shai Halevi , Tal Rabin Secure Hash-and-Sign Signatures Without the Random Oracle. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:123-139 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:354-371 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:295-310 [Conf ] Rosario Gennaro , Hugo Krawczyk , Tal Rabin Secure Hashed Diffie-Hellman over Non-DDH Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:361-381 [Conf ] Mihir Bellare , Juan A. Garay , Tal Rabin Batch Verification with Applications to Cryptography and Checking. [Citation Graph (0, 0)][DBLP ] LATIN, 1998, pp:170-191 [Conf ] Hugo Krawczyk , Tal Rabin Chameleon Signatures. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Mihir Bellare , Juan A. Garay , Tal Rabin Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing. [Citation Graph (0, 0)][DBLP ] PODC, 1996, pp:191-200 [Conf ] Michael Ben-Or , Boaz Kelmer , Tal Rabin Asynchronous Secure Computations with Optimal Resilience (Extended Abstract). [Citation Graph (0, 0)][DBLP ] PODC, 1994, pp:183-192 [Conf ] Rosario Gennaro , Michael O. Rabin , Tal Rabin Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography. [Citation Graph (0, 0)][DBLP ] PODC, 1998, pp:101-111 [Conf ] Yehuda Lindell , Anna Lysyanskaya , Tal Rabin Sequential composition of protocols without simultaneous termination. [Citation Graph (0, 0)][DBLP ] PODC, 2002, pp:203-212 [Conf ] Ran Canetti , Tal Rabin Fast asynchronous Byzantine agreement with optimal resilience. [Citation Graph (0, 0)][DBLP ] STOC, 1993, pp:42-51 [Conf ] Rosario Gennaro , Yuval Ishai , Eyal Kushilevitz , Tal Rabin The round complexity of verifiable secret sharing and secure multicast. [Citation Graph (0, 0)][DBLP ] STOC, 2001, pp:580-589 [Conf ] Eyal Kushilevitz , Yehuda Lindell , Tal Rabin Information-theoretically secure protocols and security under composition. [Citation Graph (0, 0)][DBLP ] STOC, 2006, pp:109-118 [Conf ] Yehuda Lindell , Anna Lysyanskaya , Tal Rabin On the composition of authenticated byzantine agreement. [Citation Graph (0, 0)][DBLP ] STOC, 2002, pp:514-523 [Conf ] Rosario Gennaro , Anna Lysyanskaya , Tal Malkin , Silvio Micali , Tal Rabin Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:258-277 [Conf ] Juan A. Garay , Rosario Gennaro , Charanjit S. Jutla , Tal Rabin Secure Distributed Storage and Retrieval. [Citation Graph (0, 0)][DBLP ] WDAG, 1997, pp:275-289 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2001, v:164, n:1, pp:54-84 [Journal ] Tal Rabin Robust Sharing of Secrets When the Dealer is Honest or Cheating. [Citation Graph (0, 0)][DBLP ] J. ACM, 1994, v:41, n:6, pp:1089-1109 [Journal ] Yehuda Lindell , Anna Lysyanskaya , Tal Rabin On the composition of authenticated Byzantine Agreement. [Citation Graph (0, 0)][DBLP ] J. ACM, 2006, v:53, n:6, pp:881-917 [Journal ] Rosario Gennaro , Tal Rabin , Stanislaw Jarecki , Hugo Krawczyk Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2000, v:13, n:2, pp:273-300 [Journal ] Rosario Gennaro , Tal Rabin , Hugo Krawczyk RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2000, v:13, n:4, pp:397-416 [Journal ] Juan A. Garay , Rosario Gennaro , Charanjit S. Jutla , Tal Rabin Secure distributed storage and retrieval. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2000, v:243, n:1-2, pp:363-389 [Journal ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:1, pp:51-83 [Journal ] Rosario Gennaro , Tal Rabin , Stanislaw Jarecki , Hugo Krawczyk Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:3, pp:393- [Journal ] Rosario Gennaro , Tal Rabin , Hugo Krawczyk RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:3, pp:394- [Journal ] Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. [Citation Graph (, )][DBLP ] Designing a Side Channel Resistant Random Number Generator. [Citation Graph (, )][DBLP ] The Round Complexity of Verifiable Secret Sharing Revisited. [Citation Graph (, )][DBLP ] On Compression of Data Encrypted with Block Ciphers. [Citation Graph (, )][DBLP ] Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. [Citation Graph (, )][DBLP ] Threshold RSA for Dynamic and Ad-Hoc Groups. [Citation Graph (, )][DBLP ] Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. [Citation Graph (, )][DBLP ] Secure Network Coding over the Integers. [Citation Graph (, )][DBLP ] Degradation and Amplification of Computational Hardness. [Citation Graph (, )][DBLP ] Search in 0.101secs, Finished in 0.105secs