Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tal Malkin
@article{DBLP:journals/joc/BallBCKMMM23, author = {Marshall Ball and Elette Boyle and Ran Cohen and Lisa Kohl and Tal Malkin and Pierre Meyer and Tal Moran}, title = {Topology-Hiding Communication from Minimal Assumptions}, journal = {J. Cryptol.}, volume = {36}, number = {4}, pages = {39}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09473-3}, doi = {10.1007/S00145-023-09473-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BallBCKMMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LinLM22, author = {Chengyu Lin and Zeyu Liu and Tal Malkin}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {{XSPIR:} Efficient Symmetrically Private Information Retrieval from Ring-LWE}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {217--236}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_11}, doi = {10.1007/978-3-031-17140-6\_11}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LinLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlmashaqbehCEGM22, author = {Ghada Almashaqbeh and Ran Canetti and Yaniv Erlich and Jonathan Gershoni and Tal Malkin and Itsik Pe'er and Anna Roitburd{-}Berman and Eran Tromer}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Unclonable Polymers and Their Cryptographic Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {759--789}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_26}, doi = {10.1007/978-3-031-06944-4\_26}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlmashaqbehCEGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/Ball0M22, author = {Marshall Ball and Oded Goldreich and Tal Malkin}, editor = {Mark Braverman}, title = {Randomness Extraction from Somewhat Dependent Sources}, booktitle = {13th Innovations in Theoretical Computer Science Conference, {ITCS} 2022, January 31 - February 3, 2022, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {215}, pages = {12:1--12:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2022.12}, doi = {10.4230/LIPICS.ITCS.2022.12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/Ball0M22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AndoCLM22, author = {Megumi Ando and Miranda Christ and Anna Lysyanskaya and Tal Malkin}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Poly Onions: Achieving Anonymity in the Presence of Churn}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {715--746}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_25}, doi = {10.1007/978-3-031-22365-5\_25}, timestamp = {Fri, 23 Dec 2022 17:47:38 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AndoCLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndoCLM22, author = {Megumi Ando and Miranda Christ and Anna Lysyanskaya and Tal Malkin}, title = {Poly Onions: Achieving Anonymity in the Presence of Churn}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2022}, url = {https://eprint.iacr.org/2022/392}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndoCLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlmashaqbehCEGM22, author = {Ghada Almashaqbeh and Ran Canetti and Yaniv Erlich and Jonathan Gershoni and Tal Malkin and Itsik Pe'er and Anna Roitburd{-}Berman and Eran Tromer}, title = {Unclonable Polymers and Their Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2022}, url = {https://eprint.iacr.org/2022/658}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlmashaqbehCEGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AlmashaqbehBHJM21, author = {Ghada Almashaqbeh and Fabrice Benhamouda and Seungwook Han and Daniel Jaroslawicz and Tal Malkin and Alex Nicita and Tal Rabin and Abhishek Shah and Eran Tromer}, title = {Gage {MPC:} Bypassing Residual Function Leakage for Non-Interactive {MPC}}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {4}, pages = {528--548}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0083}, doi = {10.2478/POPETS-2021-0083}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/AlmashaqbehBHJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/BallCM21, author = {Marshall Ball and Alper {\c{C}}akan and Tal Malkin}, editor = {Stefano Tessaro}, title = {Linear Threshold Secret-Sharing with Binary Reconstruction}, booktitle = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021, July 23-26, 2021, Virtual Conference}, series = {LIPIcs}, volume = {199}, pages = {12:1--12:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITC.2021.12}, doi = {10.4230/LIPICS.ITC.2021.12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/citc/BallCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/Ball0M21, author = {Marshall Ball and Oded Goldreich and Tal Malkin}, editor = {Valentine Kabanets}, title = {Communication Complexity with Defective Randomness}, booktitle = {36th Computational Complexity Conference, {CCC} 2021, July 20-23, 2021, Toronto, Ontario, Canada (Virtual Conference)}, series = {LIPIcs}, volume = {200}, pages = {14:1--14:10}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.CCC.2021.14}, doi = {10.4230/LIPICS.CCC.2021.14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/Ball0M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2021-1, editor = {Tal Malkin and Chris Peikert}, title = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0}, doi = {10.1007/978-3-030-84242-0}, isbn = {978-3-030-84241-3}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2021-2, editor = {Tal Malkin and Chris Peikert}, title = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1}, doi = {10.1007/978-3-030-84245-1}, isbn = {978-3-030-84244-4}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2021-3, editor = {Tal Malkin and Chris Peikert}, title = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9}, doi = {10.1007/978-3-030-84252-9}, isbn = {978-3-030-84251-2}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2021-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2021-4, editor = {Tal Malkin and Chris Peikert}, title = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8}, doi = {10.1007/978-3-030-84259-8}, isbn = {978-3-030-84258-1}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2021-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BallCM21, author = {Marshall Ball and Alper {\c{C}}akan and Tal Malkin}, title = {Linear Threshold Secret-Sharing with Binary Reconstruction}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR21-050}}, year = {2021}, url = {https://eccc.weizmann.ac.il/report/2021/050}, eprinttype = {ECCC}, eprint = {TR21-050}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/BallCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlmashaqbehBHJM21, author = {Ghada Almashaqbeh and Fabrice Benhamouda and Seungwook Han and Daniel Jaroslawicz and Tal Malkin and Alex Nicita and Tal Rabin and Abhishek Shah and Eran Tromer}, title = {Gage {MPC:} Bypassing Residual Function Leakage for Non-Interactive {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2021}, url = {https://eprint.iacr.org/2021/256}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlmashaqbehBHJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallBCKMMM21, author = {Marshall Ball and Elette Boyle and Ran Cohen and Lisa Kohl and Tal Malkin and Pierre Meyer and Tal Moran}, title = {Topology-Hiding Communication from Minimal Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2021}, url = {https://eprint.iacr.org/2021/388}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallBCKMMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BallCLMT20, author = {Marshall Ball and Eshan Chattopadhyay and Jyun{-}Jie Liao and Tal Malkin and Li{-}Yang Tan}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Non-malleability Against Polynomial Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {97--126}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_4}, doi = {10.1007/978-3-030-56877-1\_4}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BallCLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BallDKM20, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, editor = {Thomas Vidick}, title = {Limits to Non-Malleability}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {80:1--80:32}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.80}, doi = {10.4230/LIPICS.ITCS.2020.80}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BallDKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BallHILM20, author = {Marshall Ball and Justin Holmgren and Yuval Ishai and Tianren Liu and Tal Malkin}, editor = {Thomas Vidick}, title = {On the Complexity of Decomposable Randomized Encodings, Or: How Friendly Can a Garbling-Friendly {PRF} Be?}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {86:1--86:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.86}, doi = {10.4230/LIPICS.ITCS.2020.86}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BallHILM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/LarsenMWY20, author = {Kasper Green Larsen and Tal Malkin and Omri Weinstein and Kevin Yeo}, editor = {Shuchi Chawla}, title = {Lower Bounds for Oblivious Near-Neighbor Search}, booktitle = {Proceedings of the 2020 {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2020, Salt Lake City, UT, USA, January 5-8, 2020}, pages = {1116--1134}, publisher = {{SIAM}}, year = {2020}, url = {https://doi.org/10.1137/1.9781611975994.68}, doi = {10.1137/1.9781611975994.68}, timestamp = {Thu, 15 Jul 2021 13:48:53 +0200}, biburl = {https://dblp.org/rec/conf/soda/LarsenMWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BallBCKMMM20, author = {Marshall Ball and Elette Boyle and Ran Cohen and Lisa Kohl and Tal Malkin and Pierre Meyer and Tal Moran}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Topology-Hiding Communication from Minimal Assumptions}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12551}, pages = {473--501}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64378-2\_17}, doi = {10.1007/978-3-030-64378-2\_17}, timestamp = {Tue, 15 Dec 2020 12:01:12 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BallBCKMMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BallCLMT20, author = {Marshall Ball and Eshan Chattopadhyay and Jyun{-}Jie Liao and Tal Malkin and Li{-}Yang Tan}, title = {Non-Malleability against Polynomial Tampering}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR20-023}}, year = {2020}, url = {https://eccc.weizmann.ac.il/report/2020/023}, eprinttype = {ECCC}, eprint = {TR20-023}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/BallCLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BallGM20, author = {Marshall Ball and Oded Goldreich and Tal Malkin}, title = {Communication Complexity with Defective Randomness}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR20-054}}, year = {2020}, url = {https://eccc.weizmann.ac.il/report/2020/054}, eprinttype = {ECCC}, eprint = {TR20-054}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/BallGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallCLMT20, author = {Marshall Ball and Eshan Chattopadhyay and Jyun{-}Jie Liao and Tal Malkin and Li{-}Yang Tan}, title = {Non-Malleability against Polynomial Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2020}, url = {https://eprint.iacr.org/2020/147}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallCLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BartusekCJJLMMM19, author = {James Bartusek and Brent Carmer and Abhishek Jain and Zhengzhong Jin and Tancr{\`{e}}de Lepoint and Fermi Ma and Tal Malkin and Alex J. Malozemoff and Mariana Raykova}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Public-Key Function-Private Hidden Vector Encryption (and More)}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {489--519}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_17}, doi = {10.1007/978-3-030-34618-8\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BartusekCJJLMMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallDKLM19, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Non-Malleable Codes Against Bounded Polynomial Time Tampering}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {501--530}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_17}, doi = {10.1007/978-3-030-17653-2\_17}, timestamp = {Tue, 14 May 2019 13:47:56 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallDKLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AndoniMN19, author = {Alexandr Andoni and Tal Malkin and Negev Shekel Nosatzki}, editor = {Christel Baier and Ioannis Chatzigiannakis and Paola Flocchini and Stefano Leonardi}, title = {Two Party Distribution Testing: Communication and Security}, booktitle = {46th International Colloquium on Automata, Languages, and Programming, {ICALP} 2019, July 9-12, 2019, Patras, Greece}, series = {LIPIcs}, volume = {132}, pages = {15:1--15:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2019}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2019.15}, doi = {10.4230/LIPICS.ICALP.2019.15}, timestamp = {Tue, 27 Dec 2022 09:06:31 +0100}, biburl = {https://dblp.org/rec/conf/icalp/AndoniMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BallBCMM19, author = {Marshall Ball and Elette Boyle and Ran Cohen and Tal Malkin and Tal Moran}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Is Information-Theoretic Topology-Hiding Computation Possible?}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {502--530}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_20}, doi = {10.1007/978-3-030-36030-6\_20}, timestamp = {Mon, 25 Nov 2019 13:58:16 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BallBCMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-04828, author = {Kasper Green Larsen and Tal Malkin and Omri Weinstein and Kevin Yeo}, title = {Lower Bounds for Oblivious Near-Neighbor Search}, journal = {CoRR}, volume = {abs/1904.04828}, year = {2019}, url = {http://arxiv.org/abs/1904.04828}, eprinttype = {arXiv}, eprint = {1904.04828}, timestamp = {Thu, 25 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-04828.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BallGM19, author = {Marshall Ball and Oded Goldreich and Tal Malkin}, title = {Randomness Extraction from Somewhat Dependent Sources}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR19-183}}, year = {2019}, url = {https://eccc.weizmann.ac.il/report/2019/183}, eprinttype = {ECCC}, eprint = {TR19-183}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/BallGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/LarsenMWY19, author = {Kasper Green Larsen and Tal Malkin and Omri Weinstein and Kevin Yeo}, title = {Lower Bounds for Oblivious Near-Neighbor Search}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR19-055}}, year = {2019}, url = {https://eccc.weizmann.ac.il/report/2019/055}, eprinttype = {ECCC}, eprint = {TR19-055}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/LarsenMWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KangLMR19, author = {Yuan Kang and Chengyu Lin and Tal Malkin and Mariana Raykova}, title = {Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2019}, url = {https://eprint.iacr.org/2019/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KangLMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallCMRS19, author = {Marshall Ball and Brent Carmer and Tal Malkin and Mike Rosulek and Nichole Schimanski}, title = {Garbled Neural Networks are Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2019}, url = {https://eprint.iacr.org/2019/338}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallCMRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LarsenMWY19, author = {Kasper Green Larsen and Tal Malkin and Omri Weinstein and Kevin Yeo}, title = {Lower Bounds for Oblivious Near-Neighbor Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2019}, url = {https://eprint.iacr.org/2019/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LarsenMWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKM19, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, title = {Limits to Non-Malleability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2019}, url = {https://eprint.iacr.org/2019/449}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopKMPRS19, author = {Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi}, title = {In Pursuit of Clarity In Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2019}, url = {https://eprint.iacr.org/2019/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopKMPRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekCJJLMMM19, author = {James Bartusek and Brent Carmer and Abhishek Jain and Zhengzhong Jin and Tancr{\`{e}}de Lepoint and Fermi Ma and Tal Malkin and Alex J. Malozemoff and Mariana Raykova}, title = {Public-Key Function-Private Hidden Vector Encryption (and More)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2019}, url = {https://eprint.iacr.org/2019/746}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekCJJLMMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallBCMM19, author = {Marshall Ball and Elette Boyle and Ran Cohen and Tal Malkin and Tal Moran}, title = {Is Information-Theoretic Topology-Hiding Computation Possible?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1094}, year = {2019}, url = {https://eprint.iacr.org/2019/1094}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallBCMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChoiDMW18, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {Improved, black-box, non-malleable encryption from semantic security}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {641--663}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0348-2}, doi = {10.1007/S10623-017-0348-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChoiDMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ChoiDMW18, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption}, journal = {J. Cryptol.}, volume = {31}, number = {1}, pages = {172--201}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9254-z}, doi = {10.1007/S00145-017-9254-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ChoiDMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KowalczykMUW18, author = {Lucas Kowalczyk and Tal Malkin and Jonathan R. Ullman and Daniel Wichs}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Hardness of Non-interactive Differential Privacy from One-Way Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {437--466}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_15}, doi = {10.1007/978-3-319-96884-1\_15}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KowalczykMUW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BishopKMP0S18, author = {Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {731--752}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_25}, doi = {10.1007/978-3-319-96878-0\_25}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BishopKMP0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallBMM18, author = {Marshall Ball and Elette Boyle and Tal Malkin and Tal Moran}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Exploring the Boundaries of Topology-Hiding Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {294--325}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_10}, doi = {10.1007/978-3-319-78372-7\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallBMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallDKM18, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Non-malleable Codes from Average-Case Hardness: {\textdollar}{\textdollar}\{{\textbackslash}mathsf \{A\}\}\{{\textbackslash}mathsf \{C\}\}{\^{}}0{\textdollar}{\textdollar} , Decision Trees, and Streaming Space-Bounded Tampering}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {618--650}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_20}, doi = {10.1007/978-3-319-78372-7\_20}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallDKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BallDGMT18, author = {Marshall Ball and Dana Dachman{-}Soled and Siyao Guo and Tal Malkin and Li{-}Yang Tan}, editor = {Mikkel Thorup}, title = {Non-Malleable Codes for Small-Depth Circuits}, booktitle = {59th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2018, Paris, France, October 7-9, 2018}, pages = {826--837}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/FOCS.2018.00083}, doi = {10.1109/FOCS.2018.00083}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BallDGMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KowalczykLMM18, author = {Lucas Kowalczyk and Jiahui Liu and Tal Malkin and Kailash Meiyappan}, editor = {Kwangsu Lee}, title = {Mitigating the One-Use Restriction in Attribute-Based Encryption}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {23--36}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_2}, doi = {10.1007/978-3-030-12146-4\_2}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KowalczykLMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KangLM018, author = {Yuan Kang and Chengyu Lin and Tal Malkin and Mariana Raykova}, editor = {Dario Catalano and Roberto De Prisco}, title = {Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {407--424}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_22}, doi = {10.1007/978-3-319-98113-0\_22}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/KangLM018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-07673, author = {Marshall Ball and Dana Dachman{-}Soled and Siyao Guo and Tal Malkin and Li{-}Yang Tan}, title = {Non-Malleable Codes for Small-Depth Circuits}, journal = {CoRR}, volume = {abs/1802.07673}, year = {2018}, url = {http://arxiv.org/abs/1802.07673}, eprinttype = {arXiv}, eprint = {1802.07673}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-07673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-04065, author = {Alexandr Andoni and Tal Malkin and Negev Shekel Nosatzki}, title = {Two Party Distribution Testing: Communication and Security}, journal = {CoRR}, volume = {abs/1811.04065}, year = {2018}, url = {http://arxiv.org/abs/1811.04065}, eprinttype = {arXiv}, eprint = {1811.04065}, timestamp = {Fri, 23 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-04065.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BallDGMT18, author = {Marshall Ball and Dana Dachman{-}Soled and Siyao Guo and Tal Malkin and Li{-}Yang Tan}, title = {Non-Malleable Codes for Small-Depth Circuits}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-040}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/040}, eprinttype = {ECCC}, eprint = {TR18-040}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/BallDGMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDGMT18, author = {Marshall Ball and Dana Dachman{-}Soled and Siyao Guo and Tal Malkin and Li{-}Yang Tan}, title = {Non-Malleable Codes for Small-Depth Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2018}, url = {http://eprint.iacr.org/2018/207}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDGMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopKMP0S18, author = {Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi}, title = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2018}, url = {http://eprint.iacr.org/2018/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopKMP0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KowalczykLMM18, author = {Lucas Kowalczyk and Jiahui Liu and Tal Malkin and Kailash Meiyappan}, title = {Mitigating the One-Use Restriction in Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2018}, url = {https://eprint.iacr.org/2018/645}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KowalczykLMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKLM18, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin}, title = {Non-Malleable Codes Against Bounded Polynomial Time Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1015}, year = {2018}, url = {https://eprint.iacr.org/2018/1015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndoniMN18, author = {Alexandr Andoni and Tal Malkin and Negev Shekel Nosatzki}, title = {Two Party Distribution Testing: Communication and Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1086}, year = {2018}, url = {https://eprint.iacr.org/2018/1086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndoniMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2017, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956}, doi = {10.1145/3133956}, isbn = {978-1-4503-4946-8}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKM17, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, title = {Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1061}, year = {2017}, url = {http://eprint.iacr.org/2017/1061}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KowalczykMUW17, author = {Lucas Kowalczyk and Tal Malkin and Jonathan R. Ullman and Daniel Wichs}, title = {Hardness of Non-Interactive Differential Privacy from One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1107}, year = {2017}, url = {http://eprint.iacr.org/2017/1107}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KowalczykMUW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BallMR16, author = {Marshall Ball and Tal Malkin and Mike Rosulek}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Garbling Gadgets for Boolean and Arithmetic Circuits}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {565--577}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978410}, doi = {10.1145/2976749.2978410}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BallMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallDKM16, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {881--908}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_31}, doi = {10.1007/978-3-662-49896-5\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallDKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KowalczykMUZ16, author = {Lucas Kowalczyk and Tal Malkin and Jonathan R. Ullman and Mark Zhandry}, editor = {Martin Hirt and Adam D. Smith}, title = {Strong Hardness of Privacy from Weak Traitor Tracing}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {659--689}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_25}, doi = {10.1007/978-3-662-53641-4\_25}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KowalczykMUZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2016a1, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9}, doi = {10.1007/978-3-662-49096-9}, isbn = {978-3-662-49095-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2016a1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2016a2, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0}, doi = {10.1007/978-3-662-49099-0}, isbn = {978-3-662-49098-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2016a2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KowalczykMUZ16, author = {Lucas Kowalczyk and Tal Malkin and Jonathan R. Ullman and Mark Zhandry}, title = {Strong Hardness of Privacy from Weak Traitor Tracing}, journal = {CoRR}, volume = {abs/1607.06141}, year = {2016}, url = {http://arxiv.org/abs/1607.06141}, eprinttype = {arXiv}, eprint = {1607.06141}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/KowalczykMUZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKM16, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, title = {Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2016}, url = {http://eprint.iacr.org/2016/307}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiDMW16, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2016}, url = {http://eprint.iacr.org/2016/720}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiDMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KowalczykMUZ16, author = {Lucas Kowalczyk and Tal Malkin and Jonathan R. Ullman and Mark Zhandry}, title = {Strong Hardness of Privacy from Weak Traitor Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {721}, year = {2016}, url = {http://eprint.iacr.org/2016/721}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KowalczykMUZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiDMW16a, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {Improved, Black-Box, Non-Malleable Encryption from Semantic Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {842}, year = {2016}, url = {http://eprint.iacr.org/2016/842}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiDMW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallMR16, author = {Marshall Ball and Tal Malkin and Mike Rosulek}, title = {Garbling Gadgets for Boolean and Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {969}, year = {2016}, url = {http://eprint.iacr.org/2016/969}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FiscVKKKMB15, author = {Ben A. Fisch and Binh Vo and Fernando Krell and Abishek Kumarasubramanian and Vladimir Kolesnikov and Tal Malkin and Steven M. Bellovin}, title = {Malicious-Client Security in Blind Seer: {A} Scalable Private {DBMS}}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {395--410}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.31}, doi = {10.1109/SP.2015.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FiscVKKKMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GuoMOR15, author = {Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {The Power of Negations in Cryptography}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {36--65}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_3}, doi = {10.1007/978-3-662-46494-6\_3}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GuoMOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2015, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7}, doi = {10.1007/978-3-319-28166-7}, isbn = {978-3-319-28165-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/OliveiraGMR15, author = {Igor Carboni Oliveira and Siyao Guo and Tal Malkin and Alon Rosen}, title = {The Power of Negations in Cryptography}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR15-008}}, year = {2015}, url = {https://eccc.weizmann.ac.il/report/2015/008}, eprinttype = {ECCC}, eprint = {TR15-008}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/OliveiraGMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/LauMOT14, author = {Lap Chi Lau and Tal Malkin and Ryan O'Donnell and Luca Trevisan}, title = {Special Section on the Fifty-First Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2010)}, journal = {{SIAM} J. Comput.}, volume = {43}, number = {1}, pages = {255}, year = {2014}, url = {https://doi.org/10.1137/140973608}, doi = {10.1137/140973608}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/LauMOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/TeranishiYM14, author = {Isamu Teranishi and Moti Yung and Tal Malkin}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Order-Preserving Encryption Secure Beyond One-Wayness}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {42--61}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_3}, doi = {10.1007/978-3-662-45608-8\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/TeranishiYM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PappasKVKMCGKB14, author = {Vasilis Pappas and Fernando Krell and Binh Vo and Vladimir Kolesnikov and Tal Malkin and Seung Geol Choi and Wesley George and Angelos D. Keromytis and Steven M. Bellovin}, title = {Blind Seer: {A} Scalable Private {DBMS}}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {359--374}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.30}, doi = {10.1109/SP.2014.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PappasKVKMCGKB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledMM14, author = {Dana Dachman{-}Soled and Mohammad Mahmoody and Tal Malkin}, editor = {Yehuda Lindell}, title = {Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {217--239}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_10}, doi = {10.1007/978-3-642-54242-8\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoMOR14, author = {Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen}, title = {The Power of Negations in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {902}, year = {2014}, url = {http://eprint.iacr.org/2014/902}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoMOR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischVKKKMB14, author = {Ben Fisch and Binh Vo and Fernando Krell and Abishek Kumarasubramanian and Vladimir Kolesnikov and Tal Malkin and Steven M. Bellovin}, title = {Malicious-Client Security in Blind Seer: {A} Scalable Private {DBMS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2014}, url = {http://eprint.iacr.org/2014/963}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischVKKKMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ChaseHLMR13, author = {Melissa Chase and Alexander Healy and Anna Lysyanskaya and Tal Malkin and Leonid Reyzin}, title = {Mercurial Commitments with Applications to Zero-Knowledge Sets}, journal = {J. Cryptol.}, volume = {26}, number = {2}, pages = {251--279}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9122-9}, doi = {10.1007/S00145-012-9122-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ChaseHLMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Dachman-SoledM0V13, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam}, editor = {Kazue Sako and Palash Sarkar}, title = {Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {316--336}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_17}, doi = {10.1007/978-3-642-42033-7\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Dachman-SoledM0V13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GordonMRW13, author = {S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {575--591}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_34}, doi = {10.1007/978-3-642-38348-9\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GordonMRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Malkin13, author = {Tal Malkin}, editor = {Amit Sahai}, title = {Secure Computation for Big Data}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {355}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_20}, doi = {10.1007/978-3-642-36594-2\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Malkin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonMRW13, author = {S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee}, title = {Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2013}, url = {http://eprint.iacr.org/2013/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonMRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkinTY13, author = {Tal Malkin and Isamu Teranishi and Moti Yung}, title = {Order-Preserving Encryption Secure Beyond One-Wayness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2013}, url = {http://eprint.iacr.org/2013/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkinTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/0001CVLMBS12, author = {Mariana Raykova and Ang Cui and Binh Vo and Bin Liu and Tal Malkin and Steven M. Bellovin and Salvatore J. Stolfo}, title = {Usable, Secure, Private Search}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {5}, pages = {53--60}, year = {2012}, url = {https://doi.org/10.1109/MSP.2011.155}, doi = {10.1109/MSP.2011.155}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/0001CVLMBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Dachman-SoledM0Y12, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Moti Yung}, title = {Efficient robust private set intersection}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {4}, pages = {289--303}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.048080}, doi = {10.1504/IJACT.2012.048080}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Dachman-SoledM0Y12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GordonKKKM0V12, author = {S. Dov Gordon and Jonathan Katz and Vladimir Kolesnikov and Fernando Krell and Tal Malkin and Mariana Raykova and Yevgeniy Vahlis}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Secure two-party computation in sublinear (amortized) time}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {513--524}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382251}, doi = {10.1145/2382196.2382251}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GordonKKKM0V12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ChoiHKMR12, author = {Seung Geol Choi and Kyung{-}Wook Hwang and Jonathan Katz and Tal Malkin and Dan Rubenstein}, editor = {Orr Dunkelman}, title = {Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {416--432}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_26}, doi = {10.1007/978-3-642-27954-6\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ChoiHKMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/ChoromanskiM12, author = {Krzysztof Choromanski and Tal Malkin}, editor = {Michael Benedikt and Markus Kr{\"{o}}tzsch and Maurizio Lenzerini}, title = {The power of the dinur-nissim algorithm: breaking privacy of statistical and graph databases}, booktitle = {Proceedings of the 31st {ACM} {SIGMOD-SIGACT-SIGART} Symposium on Principles of Database Systems, {PODS} 2012, Scottsdale, AZ, USA, May 20-24, 2012}, pages = {65--76}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2213556.2213570}, doi = {10.1145/2213556.2213570}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pods/ChoromanskiM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledGKM12, author = {Dana Dachman{-}Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin}, editor = {Ronald Cramer}, title = {Computational Extractors and Pseudorandomness}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {383--403}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_22}, doi = {10.1007/978-3-642-28914-9\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledGKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY11, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Moti Yung}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {130--146}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_8}, doi = {10.1007/978-3-642-21554-4\_8}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PappasRVBM11, author = {Vasilis Pappas and Mariana Raykova and Binh Vo and Steven M. Bellovin and Tal Malkin}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Private search in the real world}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {83--92}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076744}, doi = {10.1145/2076732.2076744}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PappasRVBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChoiKM11, author = {Seung Geol Choi and Aggelos Kiayias and Tal Malkin}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {BiTR: Built-in Tamper Resilience}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {740--758}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_40}, doi = {10.1007/978-3-642-25385-0\_40}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChoiKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MalkinTY11, author = {Tal Malkin and Isamu Teranishi and Moti Yung}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Key dependent message security: recent results and applications}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {3--12}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943516}, doi = {10.1145/1943513.1943516}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MalkinTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MalkinTY11, author = {Tal Malkin and Isamu Teranishi and Moti Yung}, editor = {Kenneth G. Paterson}, title = {Efficient Circuit-Size Independent Public Key Encryption with {KDM} Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {507--526}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_28}, doi = {10.1007/978-3-642-20465-4\_28}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MalkinTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MalkinTVY11, author = {Tal Malkin and Isamu Teranishi and Yevgeniy Vahlis and Moti Yung}, editor = {Yuval Ishai}, title = {Signatures Resilient to Continual Leakage on Memory and Computation}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {89--106}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_7}, doi = {10.1007/978-3-642-19571-6\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MalkinTVY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledLMM11, author = {Dana Dachman{-}Soled and Yehuda Lindell and Mohammad Mahmoody and Tal Malkin}, editor = {Yuval Ishai}, title = {On the Black-Box Complexity of Optimally-Fair Coin Tossing}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {450--467}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_27}, doi = {10.1007/978-3-642-19571-6\_27}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledLMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiHKMR11, author = {Seung Geol Choi and Kyung{-}Wook Hwang and Jonathan Katz and Tal Malkin and Dan Rubenstein}, title = {Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2011}, url = {http://eprint.iacr.org/2011/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiHKMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonKKMRV11, author = {S. Dov Gordon and Jonathan Katz and Vladimir Kolesnikov and Tal Malkin and Mariana Raykova and Yevgeniy Vahlis}, title = {Secure Computation with Sublinear Amortized Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2011}, url = {http://eprint.iacr.org/2011/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonKKMRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledMRV11, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam}, title = {Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2011}, url = {http://eprint.iacr.org/2011/611}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledMRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGKM11, author = {Dana Dachman{-}Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin}, title = {Computational Extractors and Pseudorandomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2011}, url = {http://eprint.iacr.org/2011/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BeimelMNW10, author = {Amos Beimel and Tal Malkin and Kobbi Nissim and Enav Weinreb}, title = {How Should We Solve Search Problems Privately?}, journal = {J. Cryptol.}, volume = {23}, number = {2}, pages = {344--371}, year = {2010}, url = {https://doi.org/10.1007/s00145-008-9032-z}, doi = {10.1007/S00145-008-9032-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BeimelMNW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiKM10, author = {Seung Geol Choi and Aggelos Kiayias and Tal Malkin}, title = {BiTR: Built-in Tamper Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2010}, url = {http://eprint.iacr.org/2010/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkinTVY10, author = {Tal Malkin and Isamu Teranishi and Yevgeniy Vahlis and Moti Yung}, title = {Signatures Resilient to Continual Leakage on Memory and Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2010}, url = {http://eprint.iacr.org/2010/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkinTVY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BlazeIKMR09, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis and Tal Malkin and Aviel D. Rubin}, title = {Anonymity in Wireless Broadcast Networks}, journal = {Int. J. Netw. Secur.}, volume = {8}, number = {1}, pages = {37--51}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p37-51.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BlazeIKMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/IshaiMSW09, author = {Yuval Ishai and Tal Malkin and Martin J. Strauss and Rebecca N. Wright}, title = {Private multiparty sampling and approximation of vector combinations}, journal = {Theor. Comput. Sci.}, volume = {410}, number = {18}, pages = {1730--1745}, year = {2009}, url = {https://doi.org/10.1016/j.tcs.2008.12.062}, doi = {10.1016/J.TCS.2008.12.062}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/IshaiMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toc/Dachman-SoledLMSWW09, author = {Dana Dachman{-}Soled and Homin K. Lee and Tal Malkin and Rocco A. Servedio and Andrew Wan and Hoeteck Wee}, title = {Optimal Cryptographic Hardness of Learning Monotone Functions}, journal = {Theory Comput.}, volume = {5}, number = {1}, pages = {257--282}, year = {2009}, url = {https://doi.org/10.4086/toc.2009.v005a013}, doi = {10.4086/TOC.2009.V005A013}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toc/Dachman-SoledLMSWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY09, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Moti Yung}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Efficient Robust Private Set Intersection}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {125--142}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_8}, doi = {10.1007/978-3-642-01957-9\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChoiEMY09, author = {Seung Geol Choi and Ariel Elbaz and Tal Malkin and Moti Yung}, editor = {Mitsuru Matsui}, title = {Secure Multi-party Computation Minimizing Online Rounds}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {268--286}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_16}, doi = {10.1007/978-3-642-10366-7\_16}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChoiEMY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChoiDMW09, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, editor = {Mitsuru Matsui}, title = {Improved Non-committing Encryption with Applications to Adaptively Secure Protocols}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {287--302}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_17}, doi = {10.1007/978-3-642-10366-7\_17}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChoiDMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RaykovaVBM09, author = {Mariana Raykova and Binh Vo and Steven M. Bellovin and Tal Malkin}, editor = {Radu Sion and Dawn Song}, title = {Secure anonymous database search}, booktitle = {Proceedings of the first {ACM} Cloud Computing Security Workshop, {CCSW} 2009, Chicago, IL, USA, November 13, 2009}, pages = {115--126}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655008.1655025}, doi = {10.1145/1655008.1655025}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RaykovaVBM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/StandaertMY09, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, editor = {Antoine Joux}, title = {A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {443--461}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_26}, doi = {10.1007/978-3-642-01001-9\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/StandaertMY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChoiDMW09, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, editor = {Omer Reingold}, title = {Simple, Black-Box Constructions of Adaptively Secure Protocols}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {387--402}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_23}, doi = {10.1007/978-3-642-00457-5\_23}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChoiDMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/09/AvidanEMM09, author = {Shai Avidan and Ariel Elbaz and Tal Malkin and Ryan Moriarty}, editor = {Andrew W. Senior}, title = {Oblivious Image Matching}, booktitle = {Protecting Privacy in Video Surveillance}, pages = {49--64}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-1-84882-301-3\_4}, doi = {10.1007/978-1-84882-301-3\_4}, timestamp = {Thu, 14 Oct 2021 08:45:59 +0200}, biburl = {https://dblp.org/rec/books/sp/09/AvidanEMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PetitSPMY08, author = {Christophe Petit and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Tal Malkin and Moti Yung}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {A block cipher based pseudo random number generator secure against side-channel key recovery}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {56--65}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368322}, doi = {10.1145/1368310.1368322}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PetitSPMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Dachman-SoledLMSWW08, author = {Dana Dachman{-}Soled and Homin K. Lee and Tal Malkin and Rocco A. Servedio and Andrew Wan and Hoeteck Wee}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Optimal Cryptographic Hardness of Learning Monotone Functions}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {I:} Tack {A:} Algorithms, Automata, Complexity, and Games}, series = {Lecture Notes in Computer Science}, volume = {5125}, pages = {36--47}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70575-8\_4}, doi = {10.1007/978-3-540-70575-8\_4}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/Dachman-SoledLMSWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/AvidanEM08, author = {Shai Avidan and Ariel Elbaz and Tal Malkin}, title = {Privacy Preserving Pattern Classification}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}}, pages = {1684--1687}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICIP.2008.4712097}, doi = {10.1109/ICIP.2008.4712097}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/AvidanEM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/StandaertMY08, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, editor = {Reihaneh Safavi{-}Naini}, title = {Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_7}, doi = {10.1007/978-3-540-85093-9\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/StandaertMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/AndroulakiCBM08, author = {Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin}, editor = {Nikita Borisov and Ian Goldberg}, title = {Reputation Systems for Anonymous Networks}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {202--218}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_13}, doi = {10.1007/978-3-540-70630-4\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/AndroulakiCBM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChoiDMW08, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, editor = {Ran Canetti}, title = {Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {427--444}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_24}, doi = {10.1007/978-3-540-78524-8\_24}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChoiDMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2008, editor = {Tal Malkin}, title = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5}, doi = {10.1007/978-3-540-79263-5}, isbn = {978-3-540-79262-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/FeldmanMSSW07, author = {Jon Feldman and Tal Malkin and Rocco A. Servedio and Clifford Stein and Martin J. Wainwright}, title = {{LP} Decoding Corrects a Constant Fraction of Errors}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {1}, pages = {82--89}, year = {2007}, url = {https://doi.org/10.1109/TIT.2006.887523}, doi = {10.1109/TIT.2006.887523}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/FeldmanMSSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChoiEJMY07, author = {Seung Geol Choi and Ariel Elbaz and Ari Juels and Tal Malkin and Moti Yung}, editor = {Kaoru Kurosawa}, title = {Two-Party Computing with Encrypted Data}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {298--314}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_18}, doi = {10.1007/978-3-540-76900-2\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChoiEJMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelMNW07, author = {Amos Beimel and Tal Malkin and Kobbi Nissim and Enav Weinreb}, editor = {Alfred Menezes}, title = {How Should We Solve Search Problems Privately?}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {31--49}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_3}, doi = {10.1007/978-3-540-74143-5\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeimelMNW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/IshaiMSW07, author = {Yuval Ishai and Tal Malkin and Martin J. Strauss and Rebecca N. Wright}, editor = {Lars Arge and Christian Cachin and Tomasz Jurdzinski and Andrzej Tarlecki}, title = {Private Multiparty Sampling and Approximation of Vector Combinations}, booktitle = {Automata, Languages and Programming, 34th International Colloquium, {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4596}, pages = {243--254}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73420-8\_23}, doi = {10.1007/978-3-540-73420-8\_23}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/IshaiMSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/LeeMN07, author = {Homin K. Lee and Tal Malkin and Erich M. Nahum}, editor = {Constantine Dovrolis and Matthew Roughan}, title = {Cryptographic strength of ssl/tls servers: current and recent practices}, booktitle = {Proceedings of the 7th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2007, San Diego, California, USA, October 24-26, 2007}, pages = {83--92}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1298306.1298318}, doi = {10.1145/1298306.1298318}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/LeeMN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GertnerMM07, author = {Yael Gertner and Tal Malkin and Steven A. Myers}, editor = {Salil P. Vadhan}, title = {Towards a Separation of Semantic and {CCA} Security for Public Key Encryption}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {434--455}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_24}, doi = {10.1007/978-3-540-70936-7\_24}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GertnerMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtzemoglouM07, author = {Philip Atzemoglou and Tal Malkin}, title = {ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2007}, url = {http://eprint.iacr.org/2007/200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtzemoglouM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitSPMY07, author = {Christophe Petit and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Tal Malkin and Moti Yung}, title = {A Block Cipher based {PRNG} Secure Against Side-Channel Key Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2007}, url = {http://eprint.iacr.org/2007/356}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitSPMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talg/FeigenbaumIMNSW06, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin J. Strauss and Rebecca N. Wright}, title = {Secure multiparty computation of approximations}, journal = {{ACM} Trans. Algorithms}, volume = {2}, number = {3}, pages = {435--472}, year = {2006}, url = {https://doi.org/10.1145/1159892.1159900}, doi = {10.1145/1159892.1159900}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/talg/FeigenbaumIMNSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/MalkinSY06, author = {Tal Malkin and Fran{\c{c}}ois{-}Xavier Standaert and Moti Yung}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {A Comparative Cost/Security Analysis of Fault Attack Countermeasures}, booktitle = {Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4236}, pages = {159--172}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889700\_15}, doi = {10.1007/11889700\_15}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/MalkinSY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MalkinMY06, author = {Tal Malkin and Ryan Moriarty and Nikolai Yakovenko}, editor = {Shai Halevi and Tal Rabin}, title = {Generalized Environmental Security from Number Theoretic Assumptions}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {343--359}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_18}, doi = {10.1007/11681878\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MalkinMY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2006, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853}, doi = {10.1007/11745853}, isbn = {3-540-33851-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertMY06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, title = {A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2006}, url = {http://eprint.iacr.org/2006/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertMY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GertnerMM06, author = {Yael Gertner and Tal Malkin and Steven A. Myers}, title = {Towards a Separation of Semantic and {CCA} Security for Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2006}, url = {http://eprint.iacr.org/2006/447}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GertnerMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaseHLMR05, author = {Melissa Chase and Alexander Healy and Anna Lysyanskaya and Tal Malkin and Leonid Reyzin}, editor = {Ronald Cramer}, title = {Mercurial Commitments with Applications to Zero-Knowledge Sets}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {422--439}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_25}, doi = {10.1007/11426639\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaseHLMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BeimelIM04, author = {Amos Beimel and Yuval Ishai and Tal Malkin}, title = {Reducing the Servers' Computation in Private Information Retrieval: {PIR} with Preprocessing}, journal = {J. Cryptol.}, volume = {17}, number = {2}, pages = {125--151}, year = {2004}, url = {https://doi.org/10.1007/s00145-004-0134-y}, doi = {10.1007/S00145-004-0134-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BeimelIM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CanettiDDIM04, author = {Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, title = {Adaptive versus Non-Adaptive Security of Multi-Party Protocols}, journal = {J. Cryptol.}, volume = {17}, number = {3}, pages = {153--207}, year = {2004}, url = {https://doi.org/10.1007/s00145-004-0135-x}, doi = {10.1007/S00145-004-0135-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CanettiDDIM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MalkinOY04, author = {Tal Malkin and Satoshi Obana and Moti Yung}, editor = {Christian Cachin and Jan Camenisch}, title = {The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {306--322}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_19}, doi = {10.1007/978-3-540-24676-3\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MalkinOY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/FeldmanMSSW04, author = {Jon Feldman and Tal Malkin and Rocco A. Servedio and Cliff Stein and Martin J. Wainwright}, title = {{LP} decoding corrects a constant fraction of errors}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {68}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365106}, doi = {10.1109/ISIT.2004.1365106}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/FeldmanMSSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BeimelM04, author = {Amos Beimel and Tal Malkin}, editor = {Moni Naor}, title = {A Quantitative Approach to Reductions in Secure Computation}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {238--257}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_14}, doi = {10.1007/978-3-540-24638-1\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BeimelM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GennaroLMMR04, author = {Rosario Gennaro and Anna Lysyanskaya and Tal Malkin and Silvio Micali and Tal Rabin}, editor = {Moni Naor}, title = {Algorithmic Tamper-Proof {(ATP)} Security: Theoretical Foundations for Security against Hardware Tampering}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {258--277}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_15}, doi = {10.1007/978-3-540-24638-1\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GennaroLMMR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkinOY04, author = {Tal Malkin and Satoshi Obana and Moti Yung}, title = {The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2004}, url = {http://eprint.iacr.org/2004/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkinOY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CroninJMM03, author = {Eric Cronin and Sugih Jamin and Tal Malkin and Patrick D. McDaniel}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {On the performance, feasibility, and use of forward-secure signatures}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {131--144}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948130}, doi = {10.1145/948109.948130}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CroninJMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeIKMR03, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis and Tal Malkin and Aviel D. Rubin}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{WAR:} Wireless Anonymous Routing}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {218--232}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_27}, doi = {10.1007/11542322\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeIKMR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR03-086, author = {Amos Beimel and Tal Malkin}, title = {A Quantitative Approach to Reductions in Secure Computation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR03-086}}, year = {2003}, url = {https://eccc.weizmann.ac.il/eccc-reports/2003/TR03-086/index.html}, eprinttype = {ECCC}, eprint = {TR03-086}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR03-086.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MalkinMM02, author = {Tal Malkin and Daniele Micciancio and Sara K. Miner}, editor = {Lars R. Knudsen}, title = {Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {400--417}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_27}, doi = {10.1007/3-540-46035-7\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MalkinMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiDDIM01, author = {Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, editor = {Birgit Pfitzmann}, title = {On Adaptive vs. Non-adaptive Security of Multiparty Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {262--279}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_17}, doi = {10.1007/3-540-44987-6\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiDDIM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GertnerMR01, author = {Yael Gertner and Tal Malkin and Omer Reingold}, title = {On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates}, booktitle = {42nd Annual Symposium on Foundations of Computer Science, {FOCS} 2001, 14-17 October 2001, Las Vegas, Nevada, {USA}}, pages = {126--135}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SFCS.2001.959887}, doi = {10.1109/SFCS.2001.959887}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GertnerMR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FeigenbaumIMNSW01, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright}, editor = {Fernando Orejas and Paul G. Spirakis and Jan van Leeuwen}, title = {Secure Multiparty Computation of Approximations}, booktitle = {Automata, Languages and Programming, 28th International Colloquium, {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2076}, pages = {927--938}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-48224-5\_75}, doi = {10.1007/3-540-48224-5\_75}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FeigenbaumIMNSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiDDIM01, author = {Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, title = {On adaptive vs. non-adaptive security of multiparty protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2001}, url = {http://eprint.iacr.org/2001/017}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiDDIM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeigenbaumIMNSW01, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright}, title = {Secure Multiparty Computation of Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2001}, url = {http://eprint.iacr.org/2001/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeigenbaumIMNSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkinMM01, author = {Tal Malkin and Daniele Micciancio and Sara Miner More}, title = {Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2001}, url = {http://eprint.iacr.org/2001/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkinMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ndltd/Malkin00, author = {Tal Malkin}, title = {A study of secure database access and general two-party computation}, school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}}, year = {2000}, url = {https://hdl.handle.net/1721.1/86427}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ndltd/Malkin00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/GertnerIKM00, author = {Yael Gertner and Yuval Ishai and Eyal Kushilevitz and Tal Malkin}, title = {Protecting Data Privacy in Private Information Retrieval Schemes}, journal = {J. Comput. Syst. Sci.}, volume = {60}, number = {3}, pages = {592--629}, year = {2000}, url = {https://doi.org/10.1006/jcss.1999.1689}, doi = {10.1006/JCSS.1999.1689}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/GertnerIKM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelIM00, author = {Amos Beimel and Yuval Ishai and Tal Malkin}, editor = {Mihir Bellare}, title = {Reducing the Servers Computation in Private Information Retrieval: {PIR} with Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {55--73}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_4}, doi = {10.1007/3-540-44598-6\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeimelIM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CrescenzoMO00, author = {Giovanni Di Crescenzo and Tal Malkin and Rafail Ostrovsky}, editor = {Bart Preneel}, title = {Single Database Private Information Retrieval Implies Oblivious Transfer}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {122--138}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_10}, doi = {10.1007/3-540-45539-6\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CrescenzoMO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GertnerKMRV00, author = {Yael Gertner and Sampath Kannan and Tal Malkin and Omer Reingold and Mahesh Viswanathan}, title = {The Relationship between Public Key Encryption and Oblivious Transfer}, booktitle = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000, 12-14 November 2000, Redondo Beach, California, {USA}}, pages = {325--335}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SFCS.2000.892121}, doi = {10.1109/SFCS.2000.892121}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GertnerKMRV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelMM99, author = {Amos Beimel and Tal Malkin and Silvio Micali}, editor = {Michael J. Wiener}, title = {The All-or-Nothing Nature of Two-Party Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {80--97}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_6}, doi = {10.1007/3-540-48405-1\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeimelMM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiMN99, author = {Ran Canetti and Tal Malkin and Kobbi Nissim}, editor = {Jacques Stern}, title = {Efficient Communication-Storage Tradeoffs for Multicast Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {459--474}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_32}, doi = {10.1007/3-540-48910-X\_32}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiMN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BeimelIKM99, author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Tal Malkin}, editor = {Jeffrey Scott Vitter and Lawrence L. Larmore and Frank Thomson Leighton}, title = {One-Way Functions Are Essential for Single-Server Private Information Retrieval}, booktitle = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of Computing, May 1-4, 1999, Atlanta, Georgia, {USA}}, pages = {89--98}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/301250.301277}, doi = {10.1145/301250.301277}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BeimelIKM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/random/GertnerGM98, author = {Yael Gertner and Shafi Goldwasser and Tal Malkin}, editor = {Michael Luby and Jos{\'{e}} D. P. Rolim and Maria J. Serna}, title = {A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic {PIR} Avoiding Database Replication}, booktitle = {Randomization and Approximation Techniques in Computer Science, Second International Workshop, RANDOM'98, Barcelona, Spain, October 8-10, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1518}, pages = {200--217}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49543-6\_17}, doi = {10.1007/3-540-49543-6\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/random/GertnerGM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GertnerIKM98, author = {Yael Gertner and Yuval Ishai and Eyal Kushilevitz and Tal Malkin}, editor = {Jeffrey Scott Vitter}, title = {Protecting Data Privacy in Private Information Retrieval Schemes}, booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory of Computing, Dallas, Texas, USA, May 23-26, 1998}, pages = {151--160}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/276698.276723}, doi = {10.1145/276698.276723}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GertnerIKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GertnerGM98, author = {Yael Gertner and Shafi Goldwasser and Tal Malkin}, title = {A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic {PIR} Avoiding Data Replication)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {1998}, url = {http://eprint.iacr.org/1998/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GertnerGM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.