BibTeX records: Tal Malkin

download as .bib file

@article{DBLP:journals/joc/BallBCKMMM23,
  author       = {Marshall Ball and
                  Elette Boyle and
                  Ran Cohen and
                  Lisa Kohl and
                  Tal Malkin and
                  Pierre Meyer and
                  Tal Moran},
  title        = {Topology-Hiding Communication from Minimal Assumptions},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {4},
  pages        = {39},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09473-3},
  doi          = {10.1007/S00145-023-09473-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BallBCKMMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LinLM22,
  author       = {Chengyu Lin and
                  Zeyu Liu and
                  Tal Malkin},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {{XSPIR:} Efficient Symmetrically Private Information Retrieval from
                  Ring-LWE},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  pages        = {217--236},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_11},
  doi          = {10.1007/978-3-031-17140-6\_11},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LinLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlmashaqbehCEGM22,
  author       = {Ghada Almashaqbeh and
                  Ran Canetti and
                  Yaniv Erlich and
                  Jonathan Gershoni and
                  Tal Malkin and
                  Itsik Pe'er and
                  Anna Roitburd{-}Berman and
                  Eran Tromer},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Unclonable Polymers and Their Cryptographic Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {759--789},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_26},
  doi          = {10.1007/978-3-031-06944-4\_26},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlmashaqbehCEGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/Ball0M22,
  author       = {Marshall Ball and
                  Oded Goldreich and
                  Tal Malkin},
  editor       = {Mark Braverman},
  title        = {Randomness Extraction from Somewhat Dependent Sources},
  booktitle    = {13th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2022, January 31 - February 3, 2022, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {215},
  pages        = {12:1--12:14},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2022.12},
  doi          = {10.4230/LIPICS.ITCS.2022.12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/Ball0M22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AndoCLM22,
  author       = {Megumi Ando and
                  Miranda Christ and
                  Anna Lysyanskaya and
                  Tal Malkin},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Poly Onions: Achieving Anonymity in the Presence of Churn},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {715--746},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_25},
  doi          = {10.1007/978-3-031-22365-5\_25},
  timestamp    = {Fri, 23 Dec 2022 17:47:38 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AndoCLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndoCLM22,
  author       = {Megumi Ando and
                  Miranda Christ and
                  Anna Lysyanskaya and
                  Tal Malkin},
  title        = {Poly Onions: Achieving Anonymity in the Presence of Churn},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/392},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndoCLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlmashaqbehCEGM22,
  author       = {Ghada Almashaqbeh and
                  Ran Canetti and
                  Yaniv Erlich and
                  Jonathan Gershoni and
                  Tal Malkin and
                  Itsik Pe'er and
                  Anna Roitburd{-}Berman and
                  Eran Tromer},
  title        = {Unclonable Polymers and Their Cryptographic Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/658},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlmashaqbehCEGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AlmashaqbehBHJM21,
  author       = {Ghada Almashaqbeh and
                  Fabrice Benhamouda and
                  Seungwook Han and
                  Daniel Jaroslawicz and
                  Tal Malkin and
                  Alex Nicita and
                  Tal Rabin and
                  Abhishek Shah and
                  Eran Tromer},
  title        = {Gage {MPC:} Bypassing Residual Function Leakage for Non-Interactive
                  {MPC}},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {4},
  pages        = {528--548},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0083},
  doi          = {10.2478/POPETS-2021-0083},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/AlmashaqbehBHJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/BallCM21,
  author       = {Marshall Ball and
                  Alper {\c{C}}akan and
                  Tal Malkin},
  editor       = {Stefano Tessaro},
  title        = {Linear Threshold Secret-Sharing with Binary Reconstruction},
  booktitle    = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021,
                  July 23-26, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {199},
  pages        = {12:1--12:22},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2021.12},
  doi          = {10.4230/LIPICS.ITC.2021.12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/citc/BallCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/Ball0M21,
  author       = {Marshall Ball and
                  Oded Goldreich and
                  Tal Malkin},
  editor       = {Valentine Kabanets},
  title        = {Communication Complexity with Defective Randomness},
  booktitle    = {36th Computational Complexity Conference, {CCC} 2021, July 20-23,
                  2021, Toronto, Ontario, Canada (Virtual Conference)},
  series       = {LIPIcs},
  volume       = {200},
  pages        = {14:1--14:10},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.CCC.2021.14},
  doi          = {10.4230/LIPICS.CCC.2021.14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/Ball0M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2021-1,
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0},
  doi          = {10.1007/978-3-030-84242-0},
  isbn         = {978-3-030-84241-3},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2021-2,
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1},
  doi          = {10.1007/978-3-030-84245-1},
  isbn         = {978-3-030-84244-4},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2021-3,
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9},
  doi          = {10.1007/978-3-030-84252-9},
  isbn         = {978-3-030-84251-2},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2021-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2021-4,
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8},
  doi          = {10.1007/978-3-030-84259-8},
  isbn         = {978-3-030-84258-1},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2021-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BallCM21,
  author       = {Marshall Ball and
                  Alper {\c{C}}akan and
                  Tal Malkin},
  title        = {Linear Threshold Secret-Sharing with Binary Reconstruction},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR21-050}},
  year         = {2021},
  url          = {https://eccc.weizmann.ac.il/report/2021/050},
  eprinttype    = {ECCC},
  eprint       = {TR21-050},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/BallCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlmashaqbehBHJM21,
  author       = {Ghada Almashaqbeh and
                  Fabrice Benhamouda and
                  Seungwook Han and
                  Daniel Jaroslawicz and
                  Tal Malkin and
                  Alex Nicita and
                  Tal Rabin and
                  Abhishek Shah and
                  Eran Tromer},
  title        = {Gage {MPC:} Bypassing Residual Function Leakage for Non-Interactive
                  {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/256},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlmashaqbehBHJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallBCKMMM21,
  author       = {Marshall Ball and
                  Elette Boyle and
                  Ran Cohen and
                  Lisa Kohl and
                  Tal Malkin and
                  Pierre Meyer and
                  Tal Moran},
  title        = {Topology-Hiding Communication from Minimal Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/388},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallBCKMMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BallCLMT20,
  author       = {Marshall Ball and
                  Eshan Chattopadhyay and
                  Jyun{-}Jie Liao and
                  Tal Malkin and
                  Li{-}Yang Tan},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Non-malleability Against Polynomial Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {97--126},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_4},
  doi          = {10.1007/978-3-030-56877-1\_4},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BallCLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BallDKM20,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  editor       = {Thomas Vidick},
  title        = {Limits to Non-Malleability},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {80:1--80:32},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.80},
  doi          = {10.4230/LIPICS.ITCS.2020.80},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BallDKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BallHILM20,
  author       = {Marshall Ball and
                  Justin Holmgren and
                  Yuval Ishai and
                  Tianren Liu and
                  Tal Malkin},
  editor       = {Thomas Vidick},
  title        = {On the Complexity of Decomposable Randomized Encodings, Or: How Friendly
                  Can a Garbling-Friendly {PRF} Be?},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {86:1--86:22},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.86},
  doi          = {10.4230/LIPICS.ITCS.2020.86},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BallHILM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/LarsenMWY20,
  author       = {Kasper Green Larsen and
                  Tal Malkin and
                  Omri Weinstein and
                  Kevin Yeo},
  editor       = {Shuchi Chawla},
  title        = {Lower Bounds for Oblivious Near-Neighbor Search},
  booktitle    = {Proceedings of the 2020 {ACM-SIAM} Symposium on Discrete Algorithms,
                  {SODA} 2020, Salt Lake City, UT, USA, January 5-8, 2020},
  pages        = {1116--1134},
  publisher    = {{SIAM}},
  year         = {2020},
  url          = {https://doi.org/10.1137/1.9781611975994.68},
  doi          = {10.1137/1.9781611975994.68},
  timestamp    = {Thu, 15 Jul 2021 13:48:53 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/LarsenMWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BallBCKMMM20,
  author       = {Marshall Ball and
                  Elette Boyle and
                  Ran Cohen and
                  Lisa Kohl and
                  Tal Malkin and
                  Pierre Meyer and
                  Tal Moran},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Topology-Hiding Communication from Minimal Assumptions},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12551},
  pages        = {473--501},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64378-2\_17},
  doi          = {10.1007/978-3-030-64378-2\_17},
  timestamp    = {Tue, 15 Dec 2020 12:01:12 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BallBCKMMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BallCLMT20,
  author       = {Marshall Ball and
                  Eshan Chattopadhyay and
                  Jyun{-}Jie Liao and
                  Tal Malkin and
                  Li{-}Yang Tan},
  title        = {Non-Malleability against Polynomial Tampering},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR20-023}},
  year         = {2020},
  url          = {https://eccc.weizmann.ac.il/report/2020/023},
  eprinttype    = {ECCC},
  eprint       = {TR20-023},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/BallCLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BallGM20,
  author       = {Marshall Ball and
                  Oded Goldreich and
                  Tal Malkin},
  title        = {Communication Complexity with Defective Randomness},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR20-054}},
  year         = {2020},
  url          = {https://eccc.weizmann.ac.il/report/2020/054},
  eprinttype    = {ECCC},
  eprint       = {TR20-054},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/BallGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallCLMT20,
  author       = {Marshall Ball and
                  Eshan Chattopadhyay and
                  Jyun{-}Jie Liao and
                  Tal Malkin and
                  Li{-}Yang Tan},
  title        = {Non-Malleability against Polynomial Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/147},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallCLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BartusekCJJLMMM19,
  author       = {James Bartusek and
                  Brent Carmer and
                  Abhishek Jain and
                  Zhengzhong Jin and
                  Tancr{\`{e}}de Lepoint and
                  Fermi Ma and
                  Tal Malkin and
                  Alex J. Malozemoff and
                  Mariana Raykova},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Public-Key Function-Private Hidden Vector Encryption (and More)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {489--519},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_17},
  doi          = {10.1007/978-3-030-34618-8\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BartusekCJJLMMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BallDKLM19,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Huijia Lin and
                  Tal Malkin},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Non-Malleable Codes Against Bounded Polynomial Time Tampering},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {501--530},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_17},
  doi          = {10.1007/978-3-030-17653-2\_17},
  timestamp    = {Tue, 14 May 2019 13:47:56 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BallDKLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AndoniMN19,
  author       = {Alexandr Andoni and
                  Tal Malkin and
                  Negev Shekel Nosatzki},
  editor       = {Christel Baier and
                  Ioannis Chatzigiannakis and
                  Paola Flocchini and
                  Stefano Leonardi},
  title        = {Two Party Distribution Testing: Communication and Security},
  booktitle    = {46th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2019, July 9-12, 2019, Patras, Greece},
  series       = {LIPIcs},
  volume       = {132},
  pages        = {15:1--15:16},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2019.15},
  doi          = {10.4230/LIPICS.ICALP.2019.15},
  timestamp    = {Tue, 27 Dec 2022 09:06:31 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/AndoniMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BallBCMM19,
  author       = {Marshall Ball and
                  Elette Boyle and
                  Ran Cohen and
                  Tal Malkin and
                  Tal Moran},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Is Information-Theoretic Topology-Hiding Computation Possible?},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11891},
  pages        = {502--530},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36030-6\_20},
  doi          = {10.1007/978-3-030-36030-6\_20},
  timestamp    = {Mon, 25 Nov 2019 13:58:16 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BallBCMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-04828,
  author       = {Kasper Green Larsen and
                  Tal Malkin and
                  Omri Weinstein and
                  Kevin Yeo},
  title        = {Lower Bounds for Oblivious Near-Neighbor Search},
  journal      = {CoRR},
  volume       = {abs/1904.04828},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.04828},
  eprinttype    = {arXiv},
  eprint       = {1904.04828},
  timestamp    = {Thu, 25 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-04828.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BallGM19,
  author       = {Marshall Ball and
                  Oded Goldreich and
                  Tal Malkin},
  title        = {Randomness Extraction from Somewhat Dependent Sources},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR19-183}},
  year         = {2019},
  url          = {https://eccc.weizmann.ac.il/report/2019/183},
  eprinttype    = {ECCC},
  eprint       = {TR19-183},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/BallGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/LarsenMWY19,
  author       = {Kasper Green Larsen and
                  Tal Malkin and
                  Omri Weinstein and
                  Kevin Yeo},
  title        = {Lower Bounds for Oblivious Near-Neighbor Search},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR19-055}},
  year         = {2019},
  url          = {https://eccc.weizmann.ac.il/report/2019/055},
  eprinttype    = {ECCC},
  eprint       = {TR19-055},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/LarsenMWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KangLMR19,
  author       = {Yuan Kang and
                  Chengyu Lin and
                  Tal Malkin and
                  Mariana Raykova},
  title        = {Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KangLMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallCMRS19,
  author       = {Marshall Ball and
                  Brent Carmer and
                  Tal Malkin and
                  Mike Rosulek and
                  Nichole Schimanski},
  title        = {Garbled Neural Networks are Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/338},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallCMRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LarsenMWY19,
  author       = {Kasper Green Larsen and
                  Tal Malkin and
                  Omri Weinstein and
                  Kevin Yeo},
  title        = {Lower Bounds for Oblivious Near-Neighbor Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LarsenMWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKM19,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  title        = {Limits to Non-Malleability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/449},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopKMPRS19,
  author       = {Allison Bishop and
                  Lucas Kowalczyk and
                  Tal Malkin and
                  Valerio Pastro and
                  Mariana Raykova and
                  Kevin Shi},
  title        = {In Pursuit of Clarity In Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopKMPRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekCJJLMMM19,
  author       = {James Bartusek and
                  Brent Carmer and
                  Abhishek Jain and
                  Zhengzhong Jin and
                  Tancr{\`{e}}de Lepoint and
                  Fermi Ma and
                  Tal Malkin and
                  Alex J. Malozemoff and
                  Mariana Raykova},
  title        = {Public-Key Function-Private Hidden Vector Encryption (and More)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/746},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekCJJLMMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallBCMM19,
  author       = {Marshall Ball and
                  Elette Boyle and
                  Ran Cohen and
                  Tal Malkin and
                  Tal Moran},
  title        = {Is Information-Theoretic Topology-Hiding Computation Possible?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1094},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1094},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallBCMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChoiDMW18,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {Improved, black-box, non-malleable encryption from semantic security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {641--663},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0348-2},
  doi          = {10.1007/S10623-017-0348-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChoiDMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ChoiDMW18,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {A Black-Box Construction of Non-malleable Encryption from Semantically
                  Secure Encryption},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {1},
  pages        = {172--201},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9254-z},
  doi          = {10.1007/S00145-017-9254-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ChoiDMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KowalczykMUW18,
  author       = {Lucas Kowalczyk and
                  Tal Malkin and
                  Jonathan R. Ullman and
                  Daniel Wichs},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Hardness of Non-interactive Differential Privacy from One-Way Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {437--466},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_15},
  doi          = {10.1007/978-3-319-96884-1\_15},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KowalczykMUW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BishopKMP0S18,
  author       = {Allison Bishop and
                  Lucas Kowalczyk and
                  Tal Malkin and
                  Valerio Pastro and
                  Mariana Raykova and
                  Kevin Shi},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {731--752},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_25},
  doi          = {10.1007/978-3-319-96878-0\_25},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BishopKMP0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BallBMM18,
  author       = {Marshall Ball and
                  Elette Boyle and
                  Tal Malkin and
                  Tal Moran},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Exploring the Boundaries of Topology-Hiding Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {294--325},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_10},
  doi          = {10.1007/978-3-319-78372-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BallBMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BallDKM18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Non-malleable Codes from Average-Case Hardness: {\textdollar}{\textdollar}\{{\textbackslash}mathsf
                  \{A\}\}\{{\textbackslash}mathsf \{C\}\}{\^{}}0{\textdollar}{\textdollar}
                  , Decision Trees, and Streaming Space-Bounded Tampering},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {618--650},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_20},
  doi          = {10.1007/978-3-319-78372-7\_20},
  timestamp    = {Mon, 16 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BallDKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BallDGMT18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Siyao Guo and
                  Tal Malkin and
                  Li{-}Yang Tan},
  editor       = {Mikkel Thorup},
  title        = {Non-Malleable Codes for Small-Depth Circuits},
  booktitle    = {59th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2018, Paris, France, October 7-9, 2018},
  pages        = {826--837},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/FOCS.2018.00083},
  doi          = {10.1109/FOCS.2018.00083},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BallDGMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KowalczykLMM18,
  author       = {Lucas Kowalczyk and
                  Jiahui Liu and
                  Tal Malkin and
                  Kailash Meiyappan},
  editor       = {Kwangsu Lee},
  title        = {Mitigating the One-Use Restriction in Attribute-Based Encryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {23--36},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_2},
  doi          = {10.1007/978-3-030-12146-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KowalczykLMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KangLM018,
  author       = {Yuan Kang and
                  Chengyu Lin and
                  Tal Malkin and
                  Mariana Raykova},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {407--424},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_22},
  doi          = {10.1007/978-3-319-98113-0\_22},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KangLM018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-07673,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Siyao Guo and
                  Tal Malkin and
                  Li{-}Yang Tan},
  title        = {Non-Malleable Codes for Small-Depth Circuits},
  journal      = {CoRR},
  volume       = {abs/1802.07673},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.07673},
  eprinttype    = {arXiv},
  eprint       = {1802.07673},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-07673.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-04065,
  author       = {Alexandr Andoni and
                  Tal Malkin and
                  Negev Shekel Nosatzki},
  title        = {Two Party Distribution Testing: Communication and Security},
  journal      = {CoRR},
  volume       = {abs/1811.04065},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.04065},
  eprinttype    = {arXiv},
  eprint       = {1811.04065},
  timestamp    = {Fri, 23 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-04065.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BallDGMT18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Siyao Guo and
                  Tal Malkin and
                  Li{-}Yang Tan},
  title        = {Non-Malleable Codes for Small-Depth Circuits},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR18-040}},
  year         = {2018},
  url          = {https://eccc.weizmann.ac.il/report/2018/040},
  eprinttype    = {ECCC},
  eprint       = {TR18-040},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/BallDGMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDGMT18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Siyao Guo and
                  Tal Malkin and
                  Li{-}Yang Tan},
  title        = {Non-Malleable Codes for Small-Depth Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/207},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDGMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopKMP0S18,
  author       = {Allison Bishop and
                  Lucas Kowalczyk and
                  Tal Malkin and
                  Valerio Pastro and
                  Mariana Raykova and
                  Kevin Shi},
  title        = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopKMP0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KowalczykLMM18,
  author       = {Lucas Kowalczyk and
                  Jiahui Liu and
                  Tal Malkin and
                  Kailash Meiyappan},
  title        = {Mitigating the One-Use Restriction in Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/645},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KowalczykLMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKLM18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Huijia Lin and
                  Tal Malkin},
  title        = {Non-Malleable Codes Against Bounded Polynomial Time Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1015},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndoniMN18,
  author       = {Alexandr Andoni and
                  Tal Malkin and
                  Negev Shekel Nosatzki},
  title        = {Two Party Distribution Testing: Communication and Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1086},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndoniMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956},
  doi          = {10.1145/3133956},
  isbn         = {978-1-4503-4946-8},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKM17,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  title        = {Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees,
                  and Streaming Space-Bounded Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1061},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1061},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KowalczykMUW17,
  author       = {Lucas Kowalczyk and
                  Tal Malkin and
                  Jonathan R. Ullman and
                  Daniel Wichs},
  title        = {Hardness of Non-Interactive Differential Privacy from One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1107},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1107},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KowalczykMUW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BallMR16,
  author       = {Marshall Ball and
                  Tal Malkin and
                  Mike Rosulek},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Garbling Gadgets for Boolean and Arithmetic Circuits},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {565--577},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978410},
  doi          = {10.1145/2976749.2978410},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BallMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BallDKM16,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {881--908},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_31},
  doi          = {10.1007/978-3-662-49896-5\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BallDKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KowalczykMUZ16,
  author       = {Lucas Kowalczyk and
                  Tal Malkin and
                  Jonathan R. Ullman and
                  Mark Zhandry},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Strong Hardness of Privacy from Weak Traitor Tracing},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {659--689},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_25},
  doi          = {10.1007/978-3-662-53641-4\_25},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KowalczykMUZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016a1,
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9},
  doi          = {10.1007/978-3-662-49096-9},
  isbn         = {978-3-662-49095-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2016a1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016a2,
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0},
  doi          = {10.1007/978-3-662-49099-0},
  isbn         = {978-3-662-49098-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2016a2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KowalczykMUZ16,
  author       = {Lucas Kowalczyk and
                  Tal Malkin and
                  Jonathan R. Ullman and
                  Mark Zhandry},
  title        = {Strong Hardness of Privacy from Weak Traitor Tracing},
  journal      = {CoRR},
  volume       = {abs/1607.06141},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.06141},
  eprinttype    = {arXiv},
  eprint       = {1607.06141},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/KowalczykMUZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKM16,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  title        = {Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/307},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiDMW16,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {A Black-Box Construction of Non-Malleable Encryption from Semantically
                  Secure Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/720},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiDMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KowalczykMUZ16,
  author       = {Lucas Kowalczyk and
                  Tal Malkin and
                  Jonathan R. Ullman and
                  Mark Zhandry},
  title        = {Strong Hardness of Privacy from Weak Traitor Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {721},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/721},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KowalczykMUZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiDMW16a,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {Improved, Black-Box, Non-Malleable Encryption from Semantic Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {842},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/842},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiDMW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallMR16,
  author       = {Marshall Ball and
                  Tal Malkin and
                  Mike Rosulek},
  title        = {Garbling Gadgets for Boolean and Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {969},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/969},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FiscVKKKMB15,
  author       = {Ben A. Fisch and
                  Binh Vo and
                  Fernando Krell and
                  Abishek Kumarasubramanian and
                  Vladimir Kolesnikov and
                  Tal Malkin and
                  Steven M. Bellovin},
  title        = {Malicious-Client Security in Blind Seer: {A} Scalable Private {DBMS}},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {395--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.31},
  doi          = {10.1109/SP.2015.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FiscVKKKMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GuoMOR15,
  author       = {Siyao Guo and
                  Tal Malkin and
                  Igor C. Oliveira and
                  Alon Rosen},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {The Power of Negations in Cryptography},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {36--65},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_3},
  doi          = {10.1007/978-3-662-46494-6\_3},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GuoMOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2015,
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7},
  doi          = {10.1007/978-3-319-28166-7},
  isbn         = {978-3-319-28165-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/OliveiraGMR15,
  author       = {Igor Carboni Oliveira and
                  Siyao Guo and
                  Tal Malkin and
                  Alon Rosen},
  title        = {The Power of Negations in Cryptography},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR15-008}},
  year         = {2015},
  url          = {https://eccc.weizmann.ac.il/report/2015/008},
  eprinttype    = {ECCC},
  eprint       = {TR15-008},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/OliveiraGMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/LauMOT14,
  author       = {Lap Chi Lau and
                  Tal Malkin and
                  Ryan O'Donnell and
                  Luca Trevisan},
  title        = {Special Section on the Fifty-First Annual {IEEE} Symposium on Foundations
                  of Computer Science {(FOCS} 2010)},
  journal      = {{SIAM} J. Comput.},
  volume       = {43},
  number       = {1},
  pages        = {255},
  year         = {2014},
  url          = {https://doi.org/10.1137/140973608},
  doi          = {10.1137/140973608},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/LauMOT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/TeranishiYM14,
  author       = {Isamu Teranishi and
                  Moti Yung and
                  Tal Malkin},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Order-Preserving Encryption Secure Beyond One-Wayness},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_3},
  doi          = {10.1007/978-3-662-45608-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/TeranishiYM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PappasKVKMCGKB14,
  author       = {Vasilis Pappas and
                  Fernando Krell and
                  Binh Vo and
                  Vladimir Kolesnikov and
                  Tal Malkin and
                  Seung Geol Choi and
                  Wesley George and
                  Angelos D. Keromytis and
                  Steven M. Bellovin},
  title        = {Blind Seer: {A} Scalable Private {DBMS}},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {359--374},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.30},
  doi          = {10.1109/SP.2014.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PappasKVKMCGKB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledMM14,
  author       = {Dana Dachman{-}Soled and
                  Mohammad Mahmoody and
                  Tal Malkin},
  editor       = {Yehuda Lindell},
  title        = {Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {217--239},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_10},
  doi          = {10.1007/978-3-642-54242-8\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoMOR14,
  author       = {Siyao Guo and
                  Tal Malkin and
                  Igor C. Oliveira and
                  Alon Rosen},
  title        = {The Power of Negations in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {902},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/902},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoMOR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischVKKKMB14,
  author       = {Ben Fisch and
                  Binh Vo and
                  Fernando Krell and
                  Abishek Kumarasubramanian and
                  Vladimir Kolesnikov and
                  Tal Malkin and
                  Steven M. Bellovin},
  title        = {Malicious-Client Security in Blind Seer: {A} Scalable Private {DBMS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/963},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischVKKKMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ChaseHLMR13,
  author       = {Melissa Chase and
                  Alexander Healy and
                  Anna Lysyanskaya and
                  Tal Malkin and
                  Leonid Reyzin},
  title        = {Mercurial Commitments with Applications to Zero-Knowledge Sets},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {2},
  pages        = {251--279},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-012-9122-9},
  doi          = {10.1007/S00145-012-9122-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ChaseHLMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Dachman-SoledM0V13,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable
                  Commitments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {316--336},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_17},
  doi          = {10.1007/978-3-642-42033-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Dachman-SoledM0V13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GordonMRW13,
  author       = {S. Dov Gordon and
                  Tal Malkin and
                  Mike Rosulek and
                  Hoeteck Wee},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Multi-party Computation of Polynomials and Branching Programs without
                  Simultaneous Interaction},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {575--591},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_34},
  doi          = {10.1007/978-3-642-38348-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GordonMRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Malkin13,
  author       = {Tal Malkin},
  editor       = {Amit Sahai},
  title        = {Secure Computation for Big Data},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {355},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_20},
  doi          = {10.1007/978-3-642-36594-2\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Malkin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonMRW13,
  author       = {S. Dov Gordon and
                  Tal Malkin and
                  Mike Rosulek and
                  Hoeteck Wee},
  title        = {Multi-Party Computation of Polynomials and Branching Programs without
                  Simultaneous Interaction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonMRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkinTY13,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Moti Yung},
  title        = {Order-Preserving Encryption Secure Beyond One-Wayness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkinTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/0001CVLMBS12,
  author       = {Mariana Raykova and
                  Ang Cui and
                  Binh Vo and
                  Bin Liu and
                  Tal Malkin and
                  Steven M. Bellovin and
                  Salvatore J. Stolfo},
  title        = {Usable, Secure, Private Search},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {5},
  pages        = {53--60},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2011.155},
  doi          = {10.1109/MSP.2011.155},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/0001CVLMBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Dachman-SoledM0Y12,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Moti Yung},
  title        = {Efficient robust private set intersection},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {289--303},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.048080},
  doi          = {10.1504/IJACT.2012.048080},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Dachman-SoledM0Y12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GordonKKKM0V12,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Vladimir Kolesnikov and
                  Fernando Krell and
                  Tal Malkin and
                  Mariana Raykova and
                  Yevgeniy Vahlis},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Secure two-party computation in sublinear (amortized) time},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {513--524},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382251},
  doi          = {10.1145/2382196.2382251},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GordonKKKM0V12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChoiHKMR12,
  author       = {Seung Geol Choi and
                  Kyung{-}Wook Hwang and
                  Jonathan Katz and
                  Tal Malkin and
                  Dan Rubenstein},
  editor       = {Orr Dunkelman},
  title        = {Secure Multi-Party Computation of Boolean Circuits with Applications
                  to Privacy in On-Line Marketplaces},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {416--432},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_26},
  doi          = {10.1007/978-3-642-27954-6\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChoiHKMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/ChoromanskiM12,
  author       = {Krzysztof Choromanski and
                  Tal Malkin},
  editor       = {Michael Benedikt and
                  Markus Kr{\"{o}}tzsch and
                  Maurizio Lenzerini},
  title        = {The power of the dinur-nissim algorithm: breaking privacy of statistical
                  and graph databases},
  booktitle    = {Proceedings of the 31st {ACM} {SIGMOD-SIGACT-SIGART} Symposium on
                  Principles of Database Systems, {PODS} 2012, Scottsdale, AZ, USA,
                  May 20-24, 2012},
  pages        = {65--76},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2213556.2213570},
  doi          = {10.1145/2213556.2213570},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pods/ChoromanskiM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledGKM12,
  author       = {Dana Dachman{-}Soled and
                  Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Malkin},
  editor       = {Ronald Cramer},
  title        = {Computational Extractors and Pseudorandomness},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {383--403},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_22},
  doi          = {10.1007/978-3-642-28914-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledGKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY11,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Moti Yung},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Secure Efficient Multiparty Computing of Multivariate Polynomials
                  and Applications},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {130--146},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_8},
  doi          = {10.1007/978-3-642-21554-4\_8},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PappasRVBM11,
  author       = {Vasilis Pappas and
                  Mariana Raykova and
                  Binh Vo and
                  Steven M. Bellovin and
                  Tal Malkin},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Private search in the real world},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076744},
  doi          = {10.1145/2076732.2076744},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PappasRVBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiKM11,
  author       = {Seung Geol Choi and
                  Aggelos Kiayias and
                  Tal Malkin},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {BiTR: Built-in Tamper Resilience},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {740--758},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_40},
  doi          = {10.1007/978-3-642-25385-0\_40},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MalkinTY11,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Moti Yung},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Key dependent message security: recent results and applications},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943516},
  doi          = {10.1145/1943513.1943516},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MalkinTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MalkinTY11,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Moti Yung},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Circuit-Size Independent Public Key Encryption with {KDM}
                  Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {507--526},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_28},
  doi          = {10.1007/978-3-642-20465-4\_28},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MalkinTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MalkinTVY11,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Yevgeniy Vahlis and
                  Moti Yung},
  editor       = {Yuval Ishai},
  title        = {Signatures Resilient to Continual Leakage on Memory and Computation},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_7},
  doi          = {10.1007/978-3-642-19571-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MalkinTVY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledLMM11,
  author       = {Dana Dachman{-}Soled and
                  Yehuda Lindell and
                  Mohammad Mahmoody and
                  Tal Malkin},
  editor       = {Yuval Ishai},
  title        = {On the Black-Box Complexity of Optimally-Fair Coin Tossing},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {450--467},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_27},
  doi          = {10.1007/978-3-642-19571-6\_27},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledLMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiHKMR11,
  author       = {Seung Geol Choi and
                  Kyung{-}Wook Hwang and
                  Jonathan Katz and
                  Tal Malkin and
                  Dan Rubenstein},
  title        = {Secure Multi-Party Computation of Boolean Circuits with Applications
                  to Privacy in On-Line Marketplaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiHKMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonKKMRV11,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Vladimir Kolesnikov and
                  Tal Malkin and
                  Mariana Raykova and
                  Yevgeniy Vahlis},
  title        = {Secure Computation with Sublinear Amortized Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonKKMRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledMRV11,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/611},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledMRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGKM11,
  author       = {Dana Dachman{-}Soled and
                  Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Malkin},
  title        = {Computational Extractors and Pseudorandomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BeimelMNW10,
  author       = {Amos Beimel and
                  Tal Malkin and
                  Kobbi Nissim and
                  Enav Weinreb},
  title        = {How Should We Solve Search Problems Privately?},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {2},
  pages        = {344--371},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-008-9032-z},
  doi          = {10.1007/S00145-008-9032-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BeimelMNW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiKM10,
  author       = {Seung Geol Choi and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {BiTR: Built-in Tamper Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkinTVY10,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Yevgeniy Vahlis and
                  Moti Yung},
  title        = {Signatures Resilient to Continual Leakage on Memory and Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkinTVY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BlazeIKMR09,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Tal Malkin and
                  Aviel D. Rubin},
  title        = {Anonymity in Wireless Broadcast Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {37--51},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p37-51.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BlazeIKMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/IshaiMSW09,
  author       = {Yuval Ishai and
                  Tal Malkin and
                  Martin J. Strauss and
                  Rebecca N. Wright},
  title        = {Private multiparty sampling and approximation of vector combinations},
  journal      = {Theor. Comput. Sci.},
  volume       = {410},
  number       = {18},
  pages        = {1730--1745},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.tcs.2008.12.062},
  doi          = {10.1016/J.TCS.2008.12.062},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/IshaiMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toc/Dachman-SoledLMSWW09,
  author       = {Dana Dachman{-}Soled and
                  Homin K. Lee and
                  Tal Malkin and
                  Rocco A. Servedio and
                  Andrew Wan and
                  Hoeteck Wee},
  title        = {Optimal Cryptographic Hardness of Learning Monotone Functions},
  journal      = {Theory Comput.},
  volume       = {5},
  number       = {1},
  pages        = {257--282},
  year         = {2009},
  url          = {https://doi.org/10.4086/toc.2009.v005a013},
  doi          = {10.4086/TOC.2009.V005A013},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toc/Dachman-SoledLMSWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY09,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Moti Yung},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Efficient Robust Private Set Intersection},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {125--142},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_8},
  doi          = {10.1007/978-3-642-01957-9\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiEMY09,
  author       = {Seung Geol Choi and
                  Ariel Elbaz and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Mitsuru Matsui},
  title        = {Secure Multi-party Computation Minimizing Online Rounds},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {268--286},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_16},
  doi          = {10.1007/978-3-642-10366-7\_16},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiEMY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiDMW09,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  editor       = {Mitsuru Matsui},
  title        = {Improved Non-committing Encryption with Applications to Adaptively
                  Secure Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {287--302},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_17},
  doi          = {10.1007/978-3-642-10366-7\_17},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiDMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RaykovaVBM09,
  author       = {Mariana Raykova and
                  Binh Vo and
                  Steven M. Bellovin and
                  Tal Malkin},
  editor       = {Radu Sion and
                  Dawn Song},
  title        = {Secure anonymous database search},
  booktitle    = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
                  {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  pages        = {115--126},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655008.1655025},
  doi          = {10.1145/1655008.1655025},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RaykovaVBM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/StandaertMY09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Antoine Joux},
  title        = {A Unified Framework for the Analysis of Side-Channel Key Recovery
                  Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {443--461},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_26},
  doi          = {10.1007/978-3-642-01001-9\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/StandaertMY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChoiDMW09,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  editor       = {Omer Reingold},
  title        = {Simple, Black-Box Constructions of Adaptively Secure Protocols},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {387--402},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_23},
  doi          = {10.1007/978-3-642-00457-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChoiDMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/09/AvidanEMM09,
  author       = {Shai Avidan and
                  Ariel Elbaz and
                  Tal Malkin and
                  Ryan Moriarty},
  editor       = {Andrew W. Senior},
  title        = {Oblivious Image Matching},
  booktitle    = {Protecting Privacy in Video Surveillance},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-1-84882-301-3\_4},
  doi          = {10.1007/978-1-84882-301-3\_4},
  timestamp    = {Thu, 14 Oct 2021 08:45:59 +0200},
  biburl       = {https://dblp.org/rec/books/sp/09/AvidanEMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PetitSPMY08,
  author       = {Christophe Petit and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {A block cipher based pseudo random number generator secure against
                  side-channel key recovery},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {56--65},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368322},
  doi          = {10.1145/1368310.1368322},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PetitSPMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Dachman-SoledLMSWW08,
  author       = {Dana Dachman{-}Soled and
                  Homin K. Lee and
                  Tal Malkin and
                  Rocco A. Servedio and
                  Andrew Wan and
                  Hoeteck Wee},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Optimal Cryptographic Hardness of Learning Monotone Functions},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {I:} Tack {A:} Algorithms, Automata, Complexity, and Games},
  series       = {Lecture Notes in Computer Science},
  volume       = {5125},
  pages        = {36--47},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70575-8\_4},
  doi          = {10.1007/978-3-540-70575-8\_4},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/Dachman-SoledLMSWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/AvidanEM08,
  author       = {Shai Avidan and
                  Ariel Elbaz and
                  Tal Malkin},
  title        = {Privacy Preserving Pattern Classification},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2008, October 12-15, 2008, San Diego, California, {USA}},
  pages        = {1684--1687},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICIP.2008.4712097},
  doi          = {10.1109/ICIP.2008.4712097},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/AvidanEM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/StandaertMY08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Does Physical Security of Cryptographic Devices Need a Formal Study?
                  (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_7},
  doi          = {10.1007/978-3-540-85093-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/StandaertMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/AndroulakiCBM08,
  author       = {Elli Androulaki and
                  Seung Geol Choi and
                  Steven M. Bellovin and
                  Tal Malkin},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {Reputation Systems for Anonymous Networks},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {202--218},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_13},
  doi          = {10.1007/978-3-540-70630-4\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/AndroulakiCBM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChoiDMW08,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  editor       = {Ran Canetti},
  title        = {Black-Box Construction of a Non-malleable Encryption Scheme from Any
                  Semantically Secure One},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {427--444},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_24},
  doi          = {10.1007/978-3-540-78524-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChoiDMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2008,
  editor       = {Tal Malkin},
  title        = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5},
  doi          = {10.1007/978-3-540-79263-5},
  isbn         = {978-3-540-79262-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FeldmanMSSW07,
  author       = {Jon Feldman and
                  Tal Malkin and
                  Rocco A. Servedio and
                  Clifford Stein and
                  Martin J. Wainwright},
  title        = {{LP} Decoding Corrects a Constant Fraction of Errors},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {1},
  pages        = {82--89},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2006.887523},
  doi          = {10.1109/TIT.2006.887523},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/FeldmanMSSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiEJMY07,
  author       = {Seung Geol Choi and
                  Ariel Elbaz and
                  Ari Juels and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Kaoru Kurosawa},
  title        = {Two-Party Computing with Encrypted Data},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {298--314},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_18},
  doi          = {10.1007/978-3-540-76900-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiEJMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeimelMNW07,
  author       = {Amos Beimel and
                  Tal Malkin and
                  Kobbi Nissim and
                  Enav Weinreb},
  editor       = {Alfred Menezes},
  title        = {How Should We Solve Search Problems Privately?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {31--49},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_3},
  doi          = {10.1007/978-3-540-74143-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeimelMNW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/IshaiMSW07,
  author       = {Yuval Ishai and
                  Tal Malkin and
                  Martin J. Strauss and
                  Rebecca N. Wright},
  editor       = {Lars Arge and
                  Christian Cachin and
                  Tomasz Jurdzinski and
                  Andrzej Tarlecki},
  title        = {Private Multiparty Sampling and Approximation of Vector Combinations},
  booktitle    = {Automata, Languages and Programming, 34th International Colloquium,
                  {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4596},
  pages        = {243--254},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73420-8\_23},
  doi          = {10.1007/978-3-540-73420-8\_23},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/IshaiMSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/LeeMN07,
  author       = {Homin K. Lee and
                  Tal Malkin and
                  Erich M. Nahum},
  editor       = {Constantine Dovrolis and
                  Matthew Roughan},
  title        = {Cryptographic strength of ssl/tls servers: current and recent practices},
  booktitle    = {Proceedings of the 7th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2007, San Diego, California, USA, October 24-26, 2007},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1298306.1298318},
  doi          = {10.1145/1298306.1298318},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/LeeMN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GertnerMM07,
  author       = {Yael Gertner and
                  Tal Malkin and
                  Steven A. Myers},
  editor       = {Salil P. Vadhan},
  title        = {Towards a Separation of Semantic and {CCA} Security for Public Key
                  Encryption},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {434--455},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_24},
  doi          = {10.1007/978-3-540-70936-7\_24},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GertnerMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtzemoglouM07,
  author       = {Philip Atzemoglou and
                  Tal Malkin},
  title        = {ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtzemoglouM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitSPMY07,
  author       = {Christophe Petit and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Tal Malkin and
                  Moti Yung},
  title        = {A Block Cipher based {PRNG} Secure Against Side-Channel Key Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/356},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitSPMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talg/FeigenbaumIMNSW06,
  author       = {Joan Feigenbaum and
                  Yuval Ishai and
                  Tal Malkin and
                  Kobbi Nissim and
                  Martin J. Strauss and
                  Rebecca N. Wright},
  title        = {Secure multiparty computation of approximations},
  journal      = {{ACM} Trans. Algorithms},
  volume       = {2},
  number       = {3},
  pages        = {435--472},
  year         = {2006},
  url          = {https://doi.org/10.1145/1159892.1159900},
  doi          = {10.1145/1159892.1159900},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/talg/FeigenbaumIMNSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/MalkinSY06,
  author       = {Tal Malkin and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Moti Yung},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {A Comparative Cost/Security Analysis of Fault Attack Countermeasures},
  booktitle    = {Fault Diagnosis and Tolerance in Cryptography, Third International
                  Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4236},
  pages        = {159--172},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889700\_15},
  doi          = {10.1007/11889700\_15},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/MalkinSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MalkinMY06,
  author       = {Tal Malkin and
                  Ryan Moriarty and
                  Nikolai Yakovenko},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Generalized Environmental Security from Number Theoretic Assumptions},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {343--359},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_18},
  doi          = {10.1007/11681878\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MalkinMY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2006,
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853},
  doi          = {10.1007/11745853},
  isbn         = {3-540-33851-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertMY06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  title        = {A Unified Framework for the Analysis of Side-Channel Key Recovery
                  Attacks (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertMY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GertnerMM06,
  author       = {Yael Gertner and
                  Tal Malkin and
                  Steven A. Myers},
  title        = {Towards a Separation of Semantic and {CCA} Security for Public Key
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/447},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GertnerMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaseHLMR05,
  author       = {Melissa Chase and
                  Alexander Healy and
                  Anna Lysyanskaya and
                  Tal Malkin and
                  Leonid Reyzin},
  editor       = {Ronald Cramer},
  title        = {Mercurial Commitments with Applications to Zero-Knowledge Sets},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {422--439},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_25},
  doi          = {10.1007/11426639\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChaseHLMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BeimelIM04,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Tal Malkin},
  title        = {Reducing the Servers' Computation in Private Information Retrieval:
                  {PIR} with Preprocessing},
  journal      = {J. Cryptol.},
  volume       = {17},
  number       = {2},
  pages        = {125--151},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00145-004-0134-y},
  doi          = {10.1007/S00145-004-0134-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BeimelIM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CanettiDDIM04,
  author       = {Ran Canetti and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Yuval Ishai and
                  Tal Malkin},
  title        = {Adaptive versus Non-Adaptive Security of Multi-Party Protocols},
  journal      = {J. Cryptol.},
  volume       = {17},
  number       = {3},
  pages        = {153--207},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00145-004-0135-x},
  doi          = {10.1007/S00145-004-0135-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CanettiDDIM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MalkinOY04,
  author       = {Tal Malkin and
                  Satoshi Obana and
                  Moti Yung},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {The Hierarchy of Key Evolving Signatures and a Characterization of
                  Proxy Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {306--322},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_19},
  doi          = {10.1007/978-3-540-24676-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MalkinOY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/FeldmanMSSW04,
  author       = {Jon Feldman and
                  Tal Malkin and
                  Rocco A. Servedio and
                  Cliff Stein and
                  Martin J. Wainwright},
  title        = {{LP} decoding corrects a constant fraction of errors},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {68},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365106},
  doi          = {10.1109/ISIT.2004.1365106},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/FeldmanMSSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BeimelM04,
  author       = {Amos Beimel and
                  Tal Malkin},
  editor       = {Moni Naor},
  title        = {A Quantitative Approach to Reductions in Secure Computation},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {238--257},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_14},
  doi          = {10.1007/978-3-540-24638-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BeimelM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GennaroLMMR04,
  author       = {Rosario Gennaro and
                  Anna Lysyanskaya and
                  Tal Malkin and
                  Silvio Micali and
                  Tal Rabin},
  editor       = {Moni Naor},
  title        = {Algorithmic Tamper-Proof {(ATP)} Security: Theoretical Foundations
                  for Security against Hardware Tampering},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {258--277},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_15},
  doi          = {10.1007/978-3-540-24638-1\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GennaroLMMR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkinOY04,
  author       = {Tal Malkin and
                  Satoshi Obana and
                  Moti Yung},
  title        = {The Hierarchy of Key Evolving Signatures and a Characterization of
                  Proxy Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkinOY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CroninJMM03,
  author       = {Eric Cronin and
                  Sugih Jamin and
                  Tal Malkin and
                  Patrick D. McDaniel},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {On the performance, feasibility, and use of forward-secure signatures},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {131--144},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948130},
  doi          = {10.1145/948109.948130},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CroninJMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeIKMR03,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Tal Malkin and
                  Aviel D. Rubin},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{WAR:} Wireless Anonymous Routing},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {218--232},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_27},
  doi          = {10.1007/11542322\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeIKMR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR03-086,
  author       = {Amos Beimel and
                  Tal Malkin},
  title        = {A Quantitative Approach to Reductions in Secure Computation},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR03-086}},
  year         = {2003},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2003/TR03-086/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR03-086},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR03-086.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MalkinMM02,
  author       = {Tal Malkin and
                  Daniele Micciancio and
                  Sara K. Miner},
  editor       = {Lars R. Knudsen},
  title        = {Efficient Generic Forward-Secure Signatures with an Unbounded Number
                  Of Time Periods},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {400--417},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_27},
  doi          = {10.1007/3-540-46035-7\_27},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MalkinMM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiDDIM01,
  author       = {Ran Canetti and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Yuval Ishai and
                  Tal Malkin},
  editor       = {Birgit Pfitzmann},
  title        = {On Adaptive vs. Non-adaptive Security of Multiparty Protocols},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {262--279},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_17},
  doi          = {10.1007/3-540-44987-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiDDIM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GertnerMR01,
  author       = {Yael Gertner and
                  Tal Malkin and
                  Omer Reingold},
  title        = {On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates},
  booktitle    = {42nd Annual Symposium on Foundations of Computer Science, {FOCS} 2001,
                  14-17 October 2001, Las Vegas, Nevada, {USA}},
  pages        = {126--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SFCS.2001.959887},
  doi          = {10.1109/SFCS.2001.959887},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GertnerMR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FeigenbaumIMNSW01,
  author       = {Joan Feigenbaum and
                  Yuval Ishai and
                  Tal Malkin and
                  Kobbi Nissim and
                  Martin Strauss and
                  Rebecca N. Wright},
  editor       = {Fernando Orejas and
                  Paul G. Spirakis and
                  Jan van Leeuwen},
  title        = {Secure Multiparty Computation of Approximations},
  booktitle    = {Automata, Languages and Programming, 28th International Colloquium,
                  {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2076},
  pages        = {927--938},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-48224-5\_75},
  doi          = {10.1007/3-540-48224-5\_75},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FeigenbaumIMNSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiDDIM01,
  author       = {Ran Canetti and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Yuval Ishai and
                  Tal Malkin},
  title        = {On adaptive vs. non-adaptive security of multiparty protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/017},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiDDIM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeigenbaumIMNSW01,
  author       = {Joan Feigenbaum and
                  Yuval Ishai and
                  Tal Malkin and
                  Kobbi Nissim and
                  Martin Strauss and
                  Rebecca N. Wright},
  title        = {Secure Multiparty Computation of Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeigenbaumIMNSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkinMM01,
  author       = {Tal Malkin and
                  Daniele Micciancio and
                  Sara Miner More},
  title        = {Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkinMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Malkin00,
  author       = {Tal Malkin},
  title        = {A study of secure database access and general two-party computation},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {2000},
  url          = {https://hdl.handle.net/1721.1/86427},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Malkin00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/GertnerIKM00,
  author       = {Yael Gertner and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Protecting Data Privacy in Private Information Retrieval Schemes},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {60},
  number       = {3},
  pages        = {592--629},
  year         = {2000},
  url          = {https://doi.org/10.1006/jcss.1999.1689},
  doi          = {10.1006/JCSS.1999.1689},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/GertnerIKM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeimelIM00,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Tal Malkin},
  editor       = {Mihir Bellare},
  title        = {Reducing the Servers Computation in Private Information Retrieval:
                  {PIR} with Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_4},
  doi          = {10.1007/3-540-44598-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeimelIM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CrescenzoMO00,
  author       = {Giovanni Di Crescenzo and
                  Tal Malkin and
                  Rafail Ostrovsky},
  editor       = {Bart Preneel},
  title        = {Single Database Private Information Retrieval Implies Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {122--138},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_10},
  doi          = {10.1007/3-540-45539-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CrescenzoMO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GertnerKMRV00,
  author       = {Yael Gertner and
                  Sampath Kannan and
                  Tal Malkin and
                  Omer Reingold and
                  Mahesh Viswanathan},
  title        = {The Relationship between Public Key Encryption and Oblivious Transfer},
  booktitle    = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000,
                  12-14 November 2000, Redondo Beach, California, {USA}},
  pages        = {325--335},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SFCS.2000.892121},
  doi          = {10.1109/SFCS.2000.892121},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GertnerKMRV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeimelMM99,
  author       = {Amos Beimel and
                  Tal Malkin and
                  Silvio Micali},
  editor       = {Michael J. Wiener},
  title        = {The All-or-Nothing Nature of Two-Party Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {80--97},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_6},
  doi          = {10.1007/3-540-48405-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeimelMM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiMN99,
  author       = {Ran Canetti and
                  Tal Malkin and
                  Kobbi Nissim},
  editor       = {Jacques Stern},
  title        = {Efficient Communication-Storage Tradeoffs for Multicast Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {459--474},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_32},
  doi          = {10.1007/3-540-48910-X\_32},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiMN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BeimelIKM99,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Malkin},
  editor       = {Jeffrey Scott Vitter and
                  Lawrence L. Larmore and
                  Frank Thomson Leighton},
  title        = {One-Way Functions Are Essential for Single-Server Private Information
                  Retrieval},
  booktitle    = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of
                  Computing, May 1-4, 1999, Atlanta, Georgia, {USA}},
  pages        = {89--98},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/301250.301277},
  doi          = {10.1145/301250.301277},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BeimelIKM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/random/GertnerGM98,
  author       = {Yael Gertner and
                  Shafi Goldwasser and
                  Tal Malkin},
  editor       = {Michael Luby and
                  Jos{\'{e}} D. P. Rolim and
                  Maria J. Serna},
  title        = {A Random Server Model for Private Information Retrieval or How to
                  Achieve Information Theoretic {PIR} Avoiding Database Replication},
  booktitle    = {Randomization and Approximation Techniques in Computer Science, Second
                  International Workshop, RANDOM'98, Barcelona, Spain, October 8-10,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1518},
  pages        = {200--217},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49543-6\_17},
  doi          = {10.1007/3-540-49543-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/random/GertnerGM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GertnerIKM98,
  author       = {Yael Gertner and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Malkin},
  editor       = {Jeffrey Scott Vitter},
  title        = {Protecting Data Privacy in Private Information Retrieval Schemes},
  booktitle    = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
                  of Computing, Dallas, Texas, USA, May 23-26, 1998},
  pages        = {151--160},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/276698.276723},
  doi          = {10.1145/276698.276723},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GertnerIKM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GertnerGM98,
  author       = {Yael Gertner and
                  Shafi Goldwasser and
                  Tal Malkin},
  title        = {A Random Server Model for Private Information Retrieval (or How to
                  Achieve Information Theoretic {PIR} Avoiding Data Replication)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GertnerGM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics