default search action
Tal Rabin
Person information
- affiliation: University of Pennsylvania, Philadelphia, PA, USA
- affiliation (former): IBM Research
- award (2014): Anita Borg Institute Women of Vision Awards
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1994
- [b1]Tal Rabin:
Optimal secrecy and resilience for asynchronous distributed computations (בטיחות ועמידות אופטימליים עבור חשובים מבזרים אסינכרוניים.). Hebrew University of Jerusalem, Israel, 1994
Journal Articles
- 2021
- [j19]Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:
On the Local Leakage Resilience of Linear Secret Sharing Schemes. J. Cryptol. 34(2): 10 (2021) - [j18]Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin:
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning. Proc. Priv. Enhancing Technol. 2021(1): 188-208 (2021) - [j17]Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer:
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. Proc. Priv. Enhancing Technol. 2021(4): 528-548 (2021) - 2019
- [j16]Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi:
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. J. Cryptol. 32(2): 265-323 (2019) - [j15]Benjamin Kuykendall, Hugo Krawczyk, Tal Rabin:
Cryptography for #MeToo. Proc. Priv. Enhancing Technol. 2019(3): 409-429 (2019) - 2018
- [j14]Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin:
Privacy-Preserving Search of Similar Patients in Genomic Data. Proc. Priv. Enhancing Technol. 2018(4): 104-124 (2018) - 2014
- [j13]Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan:
Protecting Circuits from Computationally Bounded and Noisy Leakage. SIAM J. Comput. 43(5): 1564-1614 (2014) - 2012
- [j12]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted With Block Ciphers. IEEE Trans. Inf. Theory 58(11): 6989-7001 (2012) - 2011
- [j11]Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin:
Secure Computation Without Authentication. J. Cryptol. 24(4): 720-760 (2011) - 2010
- [j10]Eyal Kushilevitz, Yehuda Lindell, Tal Rabin:
Information-Theoretically Secure Protocols and Security under Composition. SIAM J. Comput. 39(5): 2090-2112 (2010) - 2007
- [j9]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptol. 20(1): 51-83 (2007) - [j8]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 20(3): 393 (2007) - [j7]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 20(3): 394 (2007) - 2006
- [j6]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the composition of authenticated Byzantine Agreement. J. ACM 53(6): 881-917 (2006) - 2001
- [j5]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001) - 2000
- [j4]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 13(2): 273-300 (2000) - [j3]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 13(4): 397-416 (2000) - [j2]Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin:
Secure distributed storage and retrieval. Theor. Comput. Sci. 243(1-2): 363-389 (2000) - 1994
- [j1]Tal Rabin:
Robust Sharing of Secrets When the Dealer is Honest or Cheating. J. ACM 41(6): 1089-1109 (1994)
Conference and Workshop Papers
- 2024
- [c64]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, Tal Rabin:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. EUROCRYPT (5) 2024: 62-91 - 2023
- [c63]Erica Blum, Derek Leung, Julian Loss, Jonathan Katz, Tal Rabin:
Analyzing the Real-World Security of the Algorand Blockchain. CCS 2023: 830-844 - [c62]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Additive Randomized Encodings and Their Applications. CRYPTO (1) 2023: 203-235 - [c61]Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. SP 2023: 477-496 - [c60]Brett Hemenway Falk, Daniel Noble, Tal Rabin:
Proactive Secret Sharing with Constant Communication. TCC (2) 2023: 337-373 - 2022
- [c59]Tal Rabin:
New Multiparty Computational Model: From Nakamoto to YOSO. AsiaCCS 2022: 1 - [c58]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin:
Threshold Cryptography as a Service (in the Multiserver and YOSO Models). CCS 2022: 323-336 - [c57]Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel:
Incremental Offline/Online PIR. USENIX Security Symposium 2022: 1741-1758 - 2021
- [c56]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles. CRYPTO (2) 2021: 64-93 - 2020
- [c55]Tal Rabin:
Cryptography for #MeToo. SACMAT 2020: 33 - [c54]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Public Blockchain Keep a Secret? TCC (1) 2020: 260-290 - 2019
- [c53]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin:
On Fully Secure MPC with Solitary Output. TCC (1) 2019: 312-340 - 2018
- [c52]Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:
On the Local Leakage Resilience of Linear Secret Sharing Schemes. CRYPTO (1) 2018: 531-561 - [c51]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Best Possible Information-Theoretic MPC. TCC (2) 2018: 255-281 - 2017
- [c50]Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-interactive Multiparty Computation Against Constant-Size Collusion. CRYPTO (1) 2017: 391-419 - [c49]Yehuda Lindell, Tal Rabin:
Secure Two-Party Computation with Fairness - A Necessary Design Principle. TCC (1) 2017: 565-580 - 2016
- [c48]Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. CCS 2016: 1451-1463 - [c47]Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin:
Secure Multiparty Computation with General Interaction Patterns. ITCS 2016: 157-168 - 2013
- [c46]Gilad Asharov, Yehuda Lindell, Tal Rabin:
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. TCC 2013: 243-262 - 2012
- [c45]Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft:
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. CT-RSA 2012: 313-331 - 2011
- [c44]Gilad Asharov, Yehuda Lindell, Tal Rabin:
Perfectly-Secure Multiplication for Any t < n/3. CRYPTO 2011: 240-258 - 2010
- [c43]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. ACNS 2010: 309-328 - [c42]Suresh Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin, Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David C. Toll:
Designing a Side Channel Resistant Random Number Generator. CARDIS 2010: 49-64 - [c41]Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan:
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. EUROCRYPT 2010: 135-156 - [c40]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding over the Integers. Public Key Cryptography 2010: 142-160 - 2009
- [c39]Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan:
The Round Complexity of Verifiable Secret Sharing Revisited. CRYPTO 2009: 487-504 - [c38]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. DCC 2009: 213-222 - 2008
- [c37]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65 - [c36]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107 - [c35]Shai Halevi, Tal Rabin:
Degradation and Amplification of Computational Hardness. TCC 2008: 626-643 - 2006
- [c34]Eyal Kushilevitz, Yehuda Lindell, Tal Rabin:
Information-theoretically secure protocols and security under composition. STOC 2006: 109-118 - 2005
- [c33]Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin:
Secure Computation Without Authentication. CRYPTO 2005: 361-377 - 2004
- [c32]Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 - [c31]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381 - [c30]Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277 - 2003
- [c29]Ran Canetti, Tal Rabin:
Universal Composition with Joint State. CRYPTO 2003: 265-281 - [c28]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390 - [c27]Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200 - 2002
- [c26]Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
On 2-Round Secure Multiparty Computation. CRYPTO 2002: 178-193 - [c25]Jee Hea An, Yevgeniy Dodis, Tal Rabin:
On the Security of Joint Signature and Encryption. EUROCRYPT 2002: 83-107 - [c24]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
Sequential composition of protocols without simultaneous termination. PODC 2002: 203-212 - [c23]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the composition of authenticated byzantine agreement. STOC 2002: 514-523 - 2001
- [c22]Eyal Kushilevitz, Tal Rabin:
Fair e-Lotteries and e-Casinos. CT-RSA 2001: 100-109 - [c21]Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
The round complexity of verifiable secret sharing and secure multicast. STOC 2001: 580-589 - 2000
- [c20]Yevgeniy Dodis, Shai Halevi, Tal Rabin:
A Cryptographic Solution to a Game Theoretic Problem. CRYPTO 2000: 112-130 - [c19]Hugo Krawczyk, Tal Rabin:
Chameleon Signatures. NDSS 2000 - 1999
- [c18]Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 - [c17]Rosario Gennaro, Shai Halevi, Tal Rabin:
Secure Hash-and-Sign Signatures Without the Random Oracle. EUROCRYPT 1999: 123-139 - [c16]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310 - [c15]Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin:
Efficient Multiparty Computations Secure Against an Adaptive Adversary. EUROCRYPT 1999: 311-326 - 1998
- [c14]Rosario Gennaro, Daniele Micciancio, Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. CCS 1998: 67-72 - [c13]Tal Rabin:
A Simplified Approach to Threshold and Proactive RSA. CRYPTO 1998: 89-104 - [c12]Mihir Bellare, Juan A. Garay, Tal Rabin:
Fast Batch Verification for Modular Exponentiation and Digital Signatures. EUROCRYPT 1998: 236-250 - [c11]Mihir Bellare, Juan A. Garay, Tal Rabin:
Batch Verification with Applications to Cryptography and Checking. LATIN 1998: 170-191 - [c10]Rosario Gennaro, Michael O. Rabin, Tal Rabin:
Simplified VSS and Fast-Track Multiparty Computations with Applications to Threshold Cryptography. PODC 1998: 101-111 - 1997
- [c9]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
RSA-Based Undeniable Signatures. CRYPTO 1997: 132-149 - [c8]Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin:
Secure Distributed Storage and Retrieval. WDAG 1997: 275-289 - 1996
- [c7]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172 - [c6]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371 - [c5]Mihir Bellare, Juan A. Garay, Tal Rabin:
Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing. PODC 1996: 191-200 - 1994
- [c4]Michael Ben-Or, Boaz Kelmer, Tal Rabin:
Asynchronous Secure Computations with Optimal Resilience (Extended Abstract). PODC 1994: 183-192 - 1993
- [c3]Ran Canetti, Tal Rabin:
Fast asynchronous Byzantine agreement with optimal resilience. STOC 1993: 42-51 - 1990
- [c2]Silvio Micali, Tal Rabin:
Collective Coin Tossing Without Assumptions nor Broadcasting. CRYPTO 1990: 253-266 - 1989
- [c1]Tal Rabin, Michael Ben-Or:
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract). STOC 1989: 73-85
Parts in Books or Collections
- 2010
- [p1]Jee Hea An, Tal Rabin:
Security for Signcryption: The Two-User Model. Practical Signcryption 2010: 21-42
Editorship
- 2010
- [e2]Tal Rabin:
Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings. Lecture Notes in Computer Science 6223, Springer 2010, ISBN 978-3-642-14622-0 [contents] - 2006
- [e1]Shai Halevi, Tal Rabin:
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings. Lecture Notes in Computer Science 3876, Springer 2006, ISBN 3-540-32731-2 [contents]
Informal and Other Publications
- 2023
- [i43]Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. CoRR abs/2308.09883 (2023) - [i42]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin, Yiping Ma:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. IACR Cryptol. ePrint Arch. 2023: 427 (2023) - [i41]Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. IACR Cryptol. ePrint Arch. 2023: 486 (2023) - [i40]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Additive Randomized Encodings and Their Applications. IACR Cryptol. ePrint Arch. 2023: 870 (2023) - [i39]Brett Hemenway Falk, Daniel Noble, Tal Rabin:
Proactive Secret Sharing with Constant Communication. IACR Cryptol. ePrint Arch. 2023: 942 (2023) - [i38]Fabrice Benhamouda, Erica Blum, Jonathan Katz, Derek Leung, Julian Loss, Tal Rabin:
Analyzing the Real-World Security of the Algorand Blockchain. IACR Cryptol. ePrint Arch. 2023: 1344 (2023) - 2021
- [i37]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles. IACR Cryptol. ePrint Arch. 2021: 210 (2021) - [i36]Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer:
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. IACR Cryptol. ePrint Arch. 2021: 256 (2021) - [i35]Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel:
Incremental Offline/Online PIR (extended version). IACR Cryptol. ePrint Arch. 2021: 1438 (2021) - 2020
- [i34]Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin:
FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. CoRR abs/2004.02229 (2020) - [i33]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Blockchain Keep a Secret? IACR Cryptol. ePrint Arch. 2020: 464 (2020) - 2019
- [i32]Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:
On the Local Leakage Resilience of Linear Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2019: 653 (2019) - [i31]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin:
On Fully Secure MPC with Solitary Output. IACR Cryptol. ePrint Arch. 2019: 1032 (2019) - 2018
- [i30]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Best Possible Information-Theoretic MPC. IACR Cryptol. ePrint Arch. 2018: 913 (2018) - 2017
- [i29]Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin:
Privacy-Preserving Search of Similar Patients in Genomic Data. IACR Cryptol. ePrint Arch. 2017: 144 (2017) - [i28]Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion. IACR Cryptol. ePrint Arch. 2017: 555 (2017) - [i27]Yehuda Lindell, Tal Rabin:
Secure Two-Party Computation with Fairness - A Necessary Design Principle. IACR Cryptol. ePrint Arch. 2017: 952 (2017) - 2016
- [i26]Lorrie Faith Cranor, Tal Rabin, Vitaly Shmatikov, Salil P. Vadhan, Daniel J. Weitzner:
Towards a Privacy Research Roadmap for the Computing Community. CoRR abs/1604.03160 (2016) - [i25]Marc Fischlin, Alexander May, David Pointcheval, Tal Rabin:
Public-Key Cryptography (Dagstuhl Seminar 16371). Dagstuhl Reports 6(9): 46-58 (2016) - [i24]Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. IACR Cryptol. ePrint Arch. 2016: 518 (2016) - 2015
- [i23]Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin:
Secure Multiparty Computation with General Interaction Patterns. IACR Cryptol. ePrint Arch. 2015: 1173 (2015) - 2013
- [i22]Gilad Asharov, Yehuda Lindell, Tal Rabin:
Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. IACR Cryptol. ePrint Arch. 2013: 110 (2013) - 2011
- [i21]Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft:
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. IACR Cryptol. ePrint Arch. 2011: 494 (2011) - 2010
- [i20]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. CoRR abs/1009.1759 (2010) - [i19]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. IACR Cryptol. ePrint Arch. 2010: 68 (2010) - [i18]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. IACR Cryptol. ePrint Arch. 2010: 477 (2010) - 2009
- [i17]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding Over the Integers. IACR Cryptol. ePrint Arch. 2009: 569 (2009) - [i16]Eyal Kushilevitz, Yehuda Lindell, Tal Rabin:
Information-Theoretically Secure Protocols and Security Under Composition. IACR Cryptol. ePrint Arch. 2009: 630 (2009) - 2008
- [i15]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. IACR Cryptol. ePrint Arch. 2008: 45 (2008) - [i14]Shai Halevi, Tal Rabin:
Degradation and Amplification of Computational Hardness. IACR Cryptol. ePrint Arch. 2008: 102 (2008) - [i13]Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan:
The Round Complexity of Verifiable Secret Sharing Revisited. IACR Cryptol. ePrint Arch. 2008: 172 (2008) - [i12]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs. IACR Cryptol. ePrint Arch. 2008: 308 (2008) - 2007
- [i11]Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin:
Secure Computation Without Authentication. IACR Cryptol. ePrint Arch. 2007: 464 (2007) - 2004
- [i10]Boaz Barak, Yehuda Lindell, Tal Rabin:
Protocol Initialization for the Framework of Universal Composability. IACR Cryptol. ePrint Arch. 2004: 6 (2004) - [i9]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. IACR Cryptol. ePrint Arch. 2004: 99 (2004) - [i8]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the Composition of Authenticated Byzantine Agreement. IACR Cryptol. ePrint Arch. 2004: 181 (2004) - 2002
- [i7]Jee Hea An, Yevgeniy Dodis, Tal Rabin:
On the Security of Joint Signature and Encryption. IACR Cryptol. ePrint Arch. 2002: 46 (2002) - [i6]Ran Canetti, Tal Rabin:
Universal Composition with Joint State. IACR Cryptol. ePrint Arch. 2002: 47 (2002) - 1999
- [i5]Rosario Gennaro, Shai Halevi, Tal Rabin:
Secure Hash-and-Sign Signatures without the Random Oracle. IACR Cryptol. ePrint Arch. 1999: 13 (1999) - 1998
- [i4]Mihir Bellare, Juan A. Garay, Tal Rabin:
Fast Batch Verification for Modular Exponentiation and Digital Signatures. IACR Cryptol. ePrint Arch. 1998: 7 (1998) - [i3]Rosario Gennaro, Daniele Micciancio, Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. IACR Cryptol. ePrint Arch. 1998: 8 (1998) - [i2]Hugo Krawczyk, Tal Rabin:
Chameleon Hashing and Signatures. IACR Cryptol. ePrint Arch. 1998: 10 (1998) - [i1]Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin:
Secure Distributed Storage and Retrieval. IACR Cryptol. ePrint Arch. 1998: 25 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint