Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tal Rabin
@inproceedings{DBLP:conf/ccs/BlumLLKR23, author = {Erica Blum and Derek Leung and Julian Loss and Jonathan Katz and Tal Rabin}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Analyzing the Real-World Security of the Algorand Blockchain}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {830--844}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623167}, doi = {10.1145/3576915.3623167}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlumLLKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaleviIKR23, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Additive Randomized Encodings and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {203--235}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_7}, doi = {10.1007/978-3-031-38557-5\_7}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaleviIKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MaWAPR23, author = {Yiping Ma and Jess Woods and Sebastian Angel and Antigoni Polychroniadou and Tal Rabin}, title = {Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {477--496}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179434}, doi = {10.1109/SP46215.2023.10179434}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/MaWAPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FalkNR23, author = {Brett Hemenway Falk and Daniel Noble and Tal Rabin}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Proactive Secret Sharing with Constant Communication}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14370}, pages = {337--373}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48618-0\_12}, doi = {10.1007/978-3-031-48618-0\_12}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/FalkNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-09883, author = {Yiping Ma and Jess Woods and Sebastian Angel and Antigoni Polychroniadou and Tal Rabin}, title = {Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning}, journal = {CoRR}, volume = {abs/2308.09883}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.09883}, doi = {10.48550/ARXIV.2308.09883}, eprinttype = {arXiv}, eprint = {2308.09883}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-09883.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaHKRM23, author = {Fabrice Benhamouda and Shai Halevi and Hugo Krawczyk and Tal Rabin and Yiping Ma}, title = {{SPRINT:} High-Throughput Robust Distributed Schnorr Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2023}, url = {https://eprint.iacr.org/2023/427}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaHKRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaWAPR23, author = {Yiping Ma and Jess Woods and Sebastian Angel and Antigoni Polychroniadou and Tal Rabin}, title = {Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2023}, url = {https://eprint.iacr.org/2023/486}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaWAPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviIKR23, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, title = {Additive Randomized Encodings and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {870}, year = {2023}, url = {https://eprint.iacr.org/2023/870}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviIKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkNR23, author = {Brett Hemenway Falk and Daniel Noble and Tal Rabin}, title = {Proactive Secret Sharing with Constant Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {942}, year = {2023}, url = {https://eprint.iacr.org/2023/942}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FalkNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaBKLLR23, author = {Fabrice Benhamouda and Erica Blum and Jonathan Katz and Derek Leung and Julian Loss and Tal Rabin}, title = {Analyzing the Real-World Security of the Algorand Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1344}, year = {2023}, url = {https://eprint.iacr.org/2023/1344}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaBKLLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/Rabin22, author = {Tal Rabin}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {New Multiparty Computational Model: From Nakamoto to {YOSO}}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497774}, doi = {10.1145/3488932.3497774}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/Rabin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BenhamoudaHKMR22, author = {Fabrice Benhamouda and Shai Halevi and Hugo Krawczyk and Alex Miao and Tal Rabin}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Threshold Cryptography as a Service (in the Multiserver and {YOSO} Models)}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {323--336}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559397}, doi = {10.1145/3548606.3559397}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BenhamoudaHKMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001ZRA22, author = {Yiping Ma and Ke Zhong and Tal Rabin and Sebastian Angel}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Incremental Offline/Online {PIR}}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1741--1758}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/ma}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001ZRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BenhamoudaDIR21, author = {Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin}, title = {On the Local Leakage Resilience of Linear Secret Sharing Schemes}, journal = {J. Cryptol.}, volume = {34}, number = {2}, pages = {10}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09375-2}, doi = {10.1007/S00145-021-09375-2}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BenhamoudaDIR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/WaghTBKMR21, author = {Sameer Wagh and Shruti Tople and Fabrice Benhamouda and Eyal Kushilevitz and Prateek Mittal and Tal Rabin}, title = {Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {1}, pages = {188--208}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0011}, doi = {10.2478/POPETS-2021-0011}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/WaghTBKMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AlmashaqbehBHJM21, author = {Ghada Almashaqbeh and Fabrice Benhamouda and Seungwook Han and Daniel Jaroslawicz and Tal Malkin and Alex Nicita and Tal Rabin and Abhishek Shah and Eran Tromer}, title = {Gage {MPC:} Bypassing Residual Function Leakage for Non-Interactive {MPC}}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {4}, pages = {528--548}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0083}, doi = {10.2478/POPETS-2021-0083}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/AlmashaqbehBHJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryHKMNRY21, author = {Craig Gentry and Shai Halevi and Hugo Krawczyk and Bernardo Magri and Jesper Buus Nielsen and Tal Rabin and Sophia Yakoubov}, editor = {Tal Malkin and Chris Peikert}, title = {{YOSO:} You Only Speak Once - Secure {MPC} with Stateless Ephemeral Roles}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {64--93}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_3}, doi = {10.1007/978-3-030-84245-1\_3}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryHKMNRY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHKMNRY21, author = {Craig Gentry and Shai Halevi and Hugo Krawczyk and Bernardo Magri and Jesper Buus Nielsen and Tal Rabin and Sophia Yakoubov}, title = {{YOSO:} You Only Speak Once / Secure {MPC} with Stateless Ephemeral Roles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2021}, url = {https://eprint.iacr.org/2021/210}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHKMNRY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlmashaqbehBHJM21, author = {Ghada Almashaqbeh and Fabrice Benhamouda and Seungwook Han and Daniel Jaroslawicz and Tal Malkin and Alex Nicita and Tal Rabin and Abhishek Shah and Eran Tromer}, title = {Gage {MPC:} Bypassing Residual Function Leakage for Non-Interactive {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2021}, url = {https://eprint.iacr.org/2021/256}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlmashaqbehBHJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaZRA21, author = {Yiping Ma and Ke Zhong and Tal Rabin and Sebastian Angel}, title = {Incremental Offline/Online {PIR} (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1438}, year = {2021}, url = {https://eprint.iacr.org/2021/1438}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MaZRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Rabin20, author = {Tal Rabin}, editor = {Jorge Lobo and Scott D. Stoller and Peng Liu}, title = {Cryptography for {\#}MeToo}, booktitle = {Proceedings of the 25th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2020, Barcelona, Spain, June 10-12, 2020}, pages = {33}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3381991.3395398}, doi = {10.1145/3381991.3395398}, timestamp = {Sun, 14 Jun 2020 11:19:59 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Rabin20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BenhamoudaG0HK020, author = {Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Can a Public Blockchain Keep a Secret?}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {260--290}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_10}, doi = {10.1007/978-3-030-64375-1\_10}, timestamp = {Tue, 15 Dec 2020 11:52:09 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BenhamoudaG0HK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-02229, author = {Sameer Wagh and Shruti Tople and Fabrice Benhamouda and Eyal Kushilevitz and Prateek Mittal and Tal Rabin}, title = {{FALCON:} Honest-Majority Maliciously Secure Framework for Private Deep Learning}, journal = {CoRR}, volume = {abs/2004.02229}, year = {2020}, url = {https://arxiv.org/abs/2004.02229}, eprinttype = {arXiv}, eprint = {2004.02229}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-02229.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaGGHKL20, author = {Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin}, title = {Can a Blockchain Keep a Secret?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2020}, url = {https://eprint.iacr.org/2020/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaGGHKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayMRTN19, author = {Carmit Hazay and Gert L{\ae}ss{\o}e Mikkelsen and Tal Rabin and Tomas Toft and Angelo Agatino Nicolosi}, title = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party Setting}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {265--323}, year = {2019}, url = {https://doi.org/10.1007/s00145-017-9275-7}, doi = {10.1007/S00145-017-9275-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayMRTN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KuykendallKR19, author = {Benjamin Kuykendall and Hugo Krawczyk and Tal Rabin}, title = {Cryptography for {\#}MeToo}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {3}, pages = {409--429}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0054}, doi = {10.2478/POPETS-2019-0054}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KuykendallKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaleviIKMR19, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Nikolaos Makriyannis and Tal Rabin}, editor = {Dennis Hofheinz and Alon Rosen}, title = {On Fully Secure {MPC} with Solitary Output}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {312--340}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_13}, doi = {10.1007/978-3-030-36030-6\_13}, timestamp = {Mon, 25 Nov 2019 13:58:16 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HaleviIKMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaDIR19, author = {Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin}, title = {On the Local Leakage Resilience of Linear Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {653}, year = {2019}, url = {https://eprint.iacr.org/2019/653}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaDIR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviIKMR19, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Nikolaos Makriyannis and Tal Rabin}, title = {On Fully Secure {MPC} with Solitary Output}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1032}, year = {2019}, url = {https://eprint.iacr.org/2019/1032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviIKMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AsharovHLR18, author = {Gilad Asharov and Shai Halevi and Yehuda Lindell and Tal Rabin}, title = {Privacy-Preserving Search of Similar Patients in Genomic Data}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {4}, pages = {104--124}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0034}, doi = {10.1515/POPETS-2018-0034}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/AsharovHLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BenhamoudaDIR18, author = {Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {On the Local Leakage Resilience of Linear Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {531--561}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_18}, doi = {10.1007/978-3-319-96884-1\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BenhamoudaDIR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaleviIKR18, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Best Possible Information-Theoretic {MPC}}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {255--281}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_10}, doi = {10.1007/978-3-030-03810-6\_10}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaleviIKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviIKR18, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, title = {Best Possible Information-Theoretic {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {913}, year = {2018}, url = {https://eprint.iacr.org/2018/913}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviIKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BenhamoudaKR17, author = {Fabrice Benhamouda and Hugo Krawczyk and Tal Rabin}, editor = {Jonathan Katz and Hovav Shacham}, title = {Robust Non-interactive Multiparty Computation Against Constant-Size Collusion}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {391--419}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_13}, doi = {10.1007/978-3-319-63688-7\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BenhamoudaKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LindellR17, author = {Yehuda Lindell and Tal Rabin}, editor = {Yael Kalai and Leonid Reyzin}, title = {Secure Two-Party Computation with Fairness - {A} Necessary Design Principle}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {565--580}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_19}, doi = {10.1007/978-3-319-70500-2\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LindellR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovHLR17, author = {Gilad Asharov and Shai Halevi and Yehuda Lindell and Tal Rabin}, title = {Privacy-Preserving Search of Similar Patients in Genomic Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2017}, url = {http://eprint.iacr.org/2017/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovHLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaKR17, author = {Fabrice Benhamouda and Hugo Krawczyk and Tal Rabin}, title = {Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2017}, url = {http://eprint.iacr.org/2017/555}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellR17, author = {Yehuda Lindell and Tal Rabin}, title = {Secure Two-Party Computation with Fairness - {A} Necessary Design Principle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2017}, url = {http://eprint.iacr.org/2017/952}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KolesnikovKLMR16, author = {Vladimir Kolesnikov and Hugo Krawczyk and Yehuda Lindell and Alex J. Malozemoff and Tal Rabin}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Attribute-based Key Exchange with General Policies}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1451--1463}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978359}, doi = {10.1145/2976749.2978359}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KolesnikovKLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/HaleviIJKR16, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Eyal Kushilevitz and Tal Rabin}, editor = {Madhu Sudan}, title = {Secure Multiparty Computation with General Interaction Patterns}, booktitle = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016}, pages = {157--168}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2840728.2840760}, doi = {10.1145/2840728.2840760}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/HaleviIJKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CranorRSVW16, author = {Lorrie Faith Cranor and Tal Rabin and Vitaly Shmatikov and Salil P. Vadhan and Daniel J. Weitzner}, title = {Towards a Privacy Research Roadmap for the Computing Community}, journal = {CoRR}, volume = {abs/1604.03160}, year = {2016}, url = {http://arxiv.org/abs/1604.03160}, eprinttype = {arXiv}, eprint = {1604.03160}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CranorRSVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Fischlin0PR16, author = {Marc Fischlin and Alexander May and David Pointcheval and Tal Rabin}, title = {Public-Key Cryptography (Dagstuhl Seminar 16371)}, journal = {Dagstuhl Reports}, volume = {6}, number = {9}, pages = {46--58}, year = {2016}, url = {https://doi.org/10.4230/DagRep.6.9.46}, doi = {10.4230/DAGREP.6.9.46}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Fischlin0PR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovKLMR16, author = {Vladimir Kolesnikov and Hugo Krawczyk and Yehuda Lindell and Alex J. Malozemoff and Tal Rabin}, title = {Attribute-based Key Exchange with General Policies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2016}, url = {http://eprint.iacr.org/2016/518}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovKLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviIJKR15, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Eyal Kushilevitz and Tal Rabin}, title = {Secure Multiparty Computation with General Interaction Patterns}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2015}, url = {http://eprint.iacr.org/2015/1173}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviIJKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/FaustRRTV14, author = {Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan}, title = {Protecting Circuits from Computationally Bounded and Noisy Leakage}, journal = {{SIAM} J. Comput.}, volume = {43}, number = {5}, pages = {1564--1614}, year = {2014}, url = {https://doi.org/10.1137/120880343}, doi = {10.1137/120880343}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/FaustRRTV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AsharovLR13, author = {Gilad Asharov and Yehuda Lindell and Tal Rabin}, editor = {Amit Sahai}, title = {A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {243--262}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_14}, doi = {10.1007/978-3-642-36594-2\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AsharovLR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovLR13, author = {Gilad Asharov and Yehuda Lindell and Tal Rabin}, title = {Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2013}, url = {http://eprint.iacr.org/2013/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovLR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KlincHJKR12, author = {Demijan Klinc and Carmit Hazay and Ashish Jagmohan and Hugo Krawczyk and Tal Rabin}, title = {On Compression of Data Encrypted With Block Ciphers}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {11}, pages = {6989--7001}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2210752}, doi = {10.1109/TIT.2012.2210752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/KlincHJKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HazayMRT12, author = {Carmit Hazay and Gert L{\ae}ss{\o}e Mikkelsen and Tal Rabin and Tomas Toft}, editor = {Orr Dunkelman}, title = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party Setting}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {313--331}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_20}, doi = {10.1007/978-3-642-27954-6\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HazayMRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BarakCLPR11, author = {Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin}, title = {Secure Computation Without Authentication}, journal = {J. Cryptol.}, volume = {24}, number = {4}, pages = {720--760}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9075-9}, doi = {10.1007/S00145-010-9075-9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BarakCLPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AsharovLR11, author = {Gilad Asharov and Yehuda Lindell and Tal Rabin}, editor = {Phillip Rogaway}, title = {Perfectly-Secure Multiplication for Any \emph{t {\textless} n}/3}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {240--258}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_14}, doi = {10.1007/978-3-642-22792-9\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AsharovLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayMRT11, author = {Carmit Hazay and Gert L{\ae}ss{\o}e Mikkelsen and Tal Rabin and Tomas Toft}, title = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2011}, url = {http://eprint.iacr.org/2011/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayMRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/KushilevitzLR10, author = {Eyal Kushilevitz and Yehuda Lindell and Tal Rabin}, title = {Information-Theoretically Secure Protocols and Security under Composition}, journal = {{SIAM} J. Comput.}, volume = {39}, number = {5}, pages = {2090--2112}, year = {2010}, url = {https://doi.org/10.1137/090755886}, doi = {10.1137/090755886}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/KushilevitzLR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GennaroKR10, author = {Rosario Gennaro and Hugo Krawczyk and Tal Rabin}, editor = {Jianying Zhou and Moti Yung}, title = {Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {309--328}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_19}, doi = {10.1007/978-3-642-13708-2\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GennaroKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/ChariDKPRRRSST10, author = {Suresh Chari and Vincenzo V. Diluoffo and Paul A. Karger and Elaine R. Palmer and Tal Rabin and Josyula R. Rao and Pankaj Rohatgi and Helmut Scherzer and Michael Steiner and David C. Toll}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {Designing a Side Channel Resistant Random Number Generator}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {49--64}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_5}, doi = {10.1007/978-3-642-12510-2\_5}, timestamp = {Sat, 30 May 2020 20:05:42 +0200}, biburl = {https://dblp.org/rec/conf/cardis/ChariDKPRRRSST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustRRTV10, author = {Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan}, editor = {Henri Gilbert}, title = {Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {135--156}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_7}, doi = {10.1007/978-3-642-13190-5\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustRRTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GennaroKKR10, author = {Rosario Gennaro and Jonathan Katz and Hugo Krawczyk and Tal Rabin}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Secure Network Coding over the Integers}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {142--160}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_9}, doi = {10.1007/978-3-642-13013-7\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GennaroKKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/AnR10, author = {Jee Hea An and Tal Rabin}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Security for Signcryption: The Two-User Model}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {21--42}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_2}, doi = {10.1007/978-3-540-89411-7\_2}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/series/isc/AnR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2010, editor = {Tal Rabin}, title = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7}, doi = {10.1007/978-3-642-14623-7}, isbn = {978-3-642-14622-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1009-1759, author = {Demijan Klinc and Carmit Hazay and Ashish Jagmohan and Hugo Krawczyk and Tal Rabin}, title = {On Compression of Data Encrypted with Block Ciphers}, journal = {CoRR}, volume = {abs/1009.1759}, year = {2010}, url = {http://arxiv.org/abs/1009.1759}, eprinttype = {arXiv}, eprint = {1009.1759}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1009-1759.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroKR10, author = {Rosario Gennaro and Hugo Krawczyk and Tal Rabin}, title = {Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2010}, url = {http://eprint.iacr.org/2010/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KlincHJKR10, author = {Demijan Klinc and Carmit Hazay and Ashish Jagmohan and Hugo Krawczyk and Tal Rabin}, title = {On Compression of Data Encrypted with Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2010}, url = {http://eprint.iacr.org/2010/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KlincHJKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PatraCRR09, author = {Arpita Patra and Ashish Choudhary and Tal Rabin and C. Pandu Rangan}, editor = {Shai Halevi}, title = {The Round Complexity of Verifiable Secret Sharing Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {487--504}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_29}, doi = {10.1007/978-3-642-03356-8\_29}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PatraCRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcc/KlincHJKR09, author = {Demijan Klinc and Carmit Hazay and Ashish Jagmohan and Hugo Krawczyk and Tal Rabin}, editor = {James A. Storer and Michael W. Marcellin}, title = {On Compression of Data Encrypted with Block Ciphers}, booktitle = {2009 Data Compression Conference {(DCC} 2009), 16-18 March 2009, Snowbird, UT, {USA}}, pages = {213--222}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DCC.2009.71}, doi = {10.1109/DCC.2009.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dcc/KlincHJKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroKKR09, author = {Rosario Gennaro and Jonathan Katz and Hugo Krawczyk and Tal Rabin}, title = {Secure Network Coding Over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2009}, url = {http://eprint.iacr.org/2009/569}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroKKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KushilevitzLR09, author = {Eyal Kushilevitz and Yehuda Lindell and Tal Rabin}, title = {Information-Theoretically Secure Protocols and Security Under Composition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2009}, url = {http://eprint.iacr.org/2009/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KushilevitzLR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GennaroHKRRW08, author = {Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin and Steffen Reidt and Stephen D. Wolthusen}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {49--65}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_4}, doi = {10.1007/978-3-540-88313-5\_4}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GennaroHKRRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GennaroHKR08, author = {Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin}, editor = {Nigel P. Smart}, title = {Threshold {RSA} for Dynamic and Ad-Hoc Groups}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {88--107}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_6}, doi = {10.1007/978-3-540-78967-3\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GennaroHKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaleviR08, author = {Shai Halevi and Tal Rabin}, editor = {Ran Canetti}, title = {Degradation and Amplification of Computational Hardness}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {626--643}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_34}, doi = {10.1007/978-3-540-78524-8\_34}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaleviR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroHKR08, author = {Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin}, title = {Threshold {RSA} for Dynamic and Ad-Hoc Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2008}, url = {http://eprint.iacr.org/2008/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroHKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviR08, author = {Shai Halevi and Tal Rabin}, title = {Degradation and Amplification of Computational Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2008}, url = {http://eprint.iacr.org/2008/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCRR08, author = {Arpita Patra and Ashish Choudhary and Tal Rabin and C. Pandu Rangan}, title = {The Round Complexity of Verifiable Secret Sharing Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2008}, url = {http://eprint.iacr.org/2008/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroHKRRW08, author = {Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin and Steffen Reidt and Stephen D. Wolthusen}, title = {Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2008}, url = {http://eprint.iacr.org/2008/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroHKRRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GennaroJKR07, author = {Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, title = {Secure Distributed Key Generation for Discrete-Log Based Cryptosystems}, journal = {J. Cryptol.}, volume = {20}, number = {1}, pages = {51--83}, year = {2007}, url = {https://doi.org/10.1007/s00145-006-0347-3}, doi = {10.1007/S00145-006-0347-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GennaroJKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GennaroRJK07, author = {Rosario Gennaro and Tal Rabin and Stanislaw Jarecki and Hugo Krawczyk}, title = {Robust and Efficient Sharing of {RSA} Functions}, journal = {J. Cryptol.}, volume = {20}, number = {3}, pages = {393}, year = {2007}, url = {https://doi.org/10.1007/s00145-007-0201-2}, doi = {10.1007/S00145-007-0201-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GennaroRJK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GennaroRK07, author = {Rosario Gennaro and Tal Rabin and Hugo Krawczyk}, title = {RSA-Based Undeniable Signatures}, journal = {J. Cryptol.}, volume = {20}, number = {3}, pages = {394}, year = {2007}, url = {https://doi.org/10.1007/s00145-007-0202-1}, doi = {10.1007/S00145-007-0202-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GennaroRK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakCLPR07, author = {Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin}, title = {Secure Computation Without Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2007}, url = {http://eprint.iacr.org/2007/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakCLPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/LindellLR06, author = {Yehuda Lindell and Anna Lysyanskaya and Tal Rabin}, title = {On the composition of authenticated Byzantine Agreement}, journal = {J. {ACM}}, volume = {53}, number = {6}, pages = {881--917}, year = {2006}, url = {https://doi.org/10.1145/1217856.1217857}, doi = {10.1145/1217856.1217857}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/LindellLR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KushilevitzLR06, author = {Eyal Kushilevitz and Yehuda Lindell and Tal Rabin}, editor = {Jon M. Kleinberg}, title = {Information-theoretically secure protocols and security under composition}, booktitle = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006}, pages = {109--118}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1132516.1132532}, doi = {10.1145/1132516.1132532}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/KushilevitzLR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2006, editor = {Shai Halevi and Tal Rabin}, title = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878}, doi = {10.1007/11681878}, isbn = {3-540-32731-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarakCLPR05, author = {Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin}, editor = {Victor Shoup}, title = {Secure Computation Without Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {361--377}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_22}, doi = {10.1007/11535218\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarakCLPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisGHKR04, author = {Yevgeniy Dodis and Rosario Gennaro and Johan H{\aa}stad and Hugo Krawczyk and Tal Rabin}, editor = {Matthew K. Franklin}, title = {Randomness Extraction and Key Derivation Using the CBC, Cascade and {HMAC} Modes}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {494--510}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_30}, doi = {10.1007/978-3-540-28628-8\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisGHKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GennaroKR04, author = {Rosario Gennaro and Hugo Krawczyk and Tal Rabin}, editor = {Christian Cachin and Jan Camenisch}, title = {Secure Hashed Diffie-Hellman over Non-DDH Groups}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {361--381}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_22}, doi = {10.1007/978-3-540-24676-3\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GennaroKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GennaroLMMR04, author = {Rosario Gennaro and Anna Lysyanskaya and Tal Malkin and Silvio Micali and Tal Rabin}, editor = {Moni Naor}, title = {Algorithmic Tamper-Proof {(ATP)} Security: Theoretical Foundations for Security against Hardware Tampering}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {258--277}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_15}, doi = {10.1007/978-3-540-24638-1\_15}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GennaroLMMR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakLR04, author = {Boaz Barak and Yehuda Lindell and Tal Rabin}, title = {Protocol Initialization for the Framework of Universal Composability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2004}, url = {http://eprint.iacr.org/2004/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakLR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroKR04, author = {Rosario Gennaro and Hugo Krawczyk and Tal Rabin}, title = {Secure Hashed Diffie-Hellman over Non-DDH Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2004}, url = {http://eprint.iacr.org/2004/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellLR04, author = {Yehuda Lindell and Anna Lysyanskaya and Tal Rabin}, title = {On the Composition of Authenticated Byzantine Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2004}, url = {http://eprint.iacr.org/2004/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellLR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiR03, author = {Ran Canetti and Tal Rabin}, editor = {Dan Boneh}, title = {Universal Composition with Joint State}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {265--281}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_16}, doi = {10.1007/978-3-540-45146-4\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GennaroJKR03, author = {Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, editor = {Marc Joye}, title = {Secure Applications of Pedersen's Distributed Key Generation Protocol}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {373--390}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_26}, doi = {10.1007/3-540-36563-X\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GennaroJKR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ScherzerCKKRT03, author = {Helmut Scherzer and Ran Canetti and Paul A. Karger and Hugo Krawczyk and Tal Rabin and David C. Toll}, editor = {Einar Snekkenes and Dieter Gollmann}, title = {Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card}, booktitle = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, pages = {181--200}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39650-5\_11}, doi = {10.1007/978-3-540-39650-5\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ScherzerCKKRT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GennaroIKR02, author = {Rosario Gennaro and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, editor = {Moti Yung}, title = {On 2-Round Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {178--193}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_12}, doi = {10.1007/3-540-45708-9\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GennaroIKR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnDR02, author = {Jee Hea An and Yevgeniy Dodis and Tal Rabin}, editor = {Lars R. Knudsen}, title = {On the Security of Joint Signature and Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {83--107}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_6}, doi = {10.1007/3-540-46035-7\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnDR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/LindellLR02, author = {Yehuda Lindell and Anna Lysyanskaya and Tal Rabin}, editor = {Aleta Ricciardi}, title = {Sequential composition of protocols without simultaneous termination}, booktitle = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2002, Monterey, California, USA, July 21-24, 2002}, pages = {203--212}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/571825.571859}, doi = {10.1145/571825.571859}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/LindellLR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/LindellLR02, author = {Yehuda Lindell and Anna Lysyanskaya and Tal Rabin}, editor = {John H. Reif}, title = {On the composition of authenticated byzantine agreement}, booktitle = {Proceedings on 34th Annual {ACM} Symposium on Theory of Computing, May 19-21, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {514--523}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/509907.509982}, doi = {10.1145/509907.509982}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/LindellLR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnDR02, author = {Jee Hea An and Yevgeniy Dodis and Tal Rabin}, title = {On the Security of Joint Signature and Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2002}, url = {http://eprint.iacr.org/2002/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnDR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiR02, author = {Ran Canetti and Tal Rabin}, title = {Universal Composition with Joint State}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2002}, url = {http://eprint.iacr.org/2002/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/GennaroJKR01, author = {Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, title = {Robust Threshold {DSS} Signatures}, journal = {Inf. Comput.}, volume = {164}, number = {1}, pages = {54--84}, year = {2001}, url = {https://doi.org/10.1006/inco.2000.2881}, doi = {10.1006/INCO.2000.2881}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/GennaroJKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KushilevitzR01, author = {Eyal Kushilevitz and Tal Rabin}, editor = {David Naccache}, title = {Fair e-Lotteries and e-Casinos}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {100--109}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_9}, doi = {10.1007/3-540-45353-9\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KushilevitzR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GennaroIKR01, author = {Rosario Gennaro and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, editor = {Jeffrey Scott Vitter and Paul G. Spirakis and Mihalis Yannakakis}, title = {The round complexity of verifiable secret sharing and secure multicast}, booktitle = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing, July 6-8, 2001, Heraklion, Crete, Greece}, pages = {580--589}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/380752.380853}, doi = {10.1145/380752.380853}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GennaroIKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GennaroRJK00, author = {Rosario Gennaro and Tal Rabin and Stanislaw Jarecki and Hugo Krawczyk}, title = {Robust and Efficient Sharing of {RSA} Functions}, journal = {J. Cryptol.}, volume = {13}, number = {2}, pages = {273--300}, year = {2000}, url = {https://doi.org/10.1007/s001459910011}, doi = {10.1007/S001459910011}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GennaroRJK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GennaroRK00, author = {Rosario Gennaro and Tal Rabin and Hugo Krawczyk}, title = {RSA-Based Undeniable Signatures}, journal = {J. Cryptol.}, volume = {13}, number = {4}, pages = {397--416}, year = {2000}, url = {https://doi.org/10.1007/s001450010001}, doi = {10.1007/S001450010001}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GennaroRK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/GarayGJR00, author = {Juan A. Garay and Rosario Gennaro and Charanjit S. Jutla and Tal Rabin}, title = {Secure distributed storage and retrieval}, journal = {Theor. Comput. Sci.}, volume = {243}, number = {1-2}, pages = {363--389}, year = {2000}, url = {https://doi.org/10.1016/S0304-3975(98)00263-1}, doi = {10.1016/S0304-3975(98)00263-1}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/GarayGJR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisHR00, author = {Yevgeniy Dodis and Shai Halevi and Tal Rabin}, editor = {Mihir Bellare}, title = {A Cryptographic Solution to a Game Theoretic Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {112--130}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_7}, doi = {10.1007/3-540-44598-6\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisHR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KrawczykR00, author = {Hugo Krawczyk and Tal Rabin}, title = {Chameleon Signatures}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2000, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2000}, url = {https://www.ndss-symposium.org/ndss2000/chameleon-signatures/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KrawczykR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiGJKR99, author = {Ran Canetti and Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, editor = {Michael J. Wiener}, title = {Adaptive Security for Threshold Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {98--115}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_7}, doi = {10.1007/3-540-48405-1\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiGJKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GennaroHR99, author = {Rosario Gennaro and Shai Halevi and Tal Rabin}, editor = {Jacques Stern}, title = {Secure Hash-and-Sign Signatures Without the Random Oracle}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {123--139}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_9}, doi = {10.1007/3-540-48910-X\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GennaroHR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GennaroJKR99, author = {Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, editor = {Jacques Stern}, title = {Secure Distributed Key Generation for Discrete-Log Based Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {295--310}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_21}, doi = {10.1007/3-540-48910-X\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GennaroJKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDDHR99, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski and Martin Hirt and Tal Rabin}, editor = {Jacques Stern}, title = {Efficient Multiparty Computations Secure Against an Adaptive Adversary}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {311--326}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_22}, doi = {10.1007/3-540-48910-X\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDDHR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroHR99, author = {Rosario Gennaro and Shai Halevi and Tal Rabin}, title = {Secure Hash-and-Sign Signatures without the Random Oracle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {1999}, url = {http://eprint.iacr.org/1999/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroHR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GennaroMR98, author = {Rosario Gennaro and Daniele Micciancio and Tal Rabin}, editor = {Li Gong and Michael K. Reiter}, title = {An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {67--72}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288108}, doi = {10.1145/288090.288108}, timestamp = {Tue, 10 Nov 2020 20:00:11 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GennaroMR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rabin98, author = {Tal Rabin}, editor = {Hugo Krawczyk}, title = {A Simplified Approach to Threshold and Proactive {RSA}}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {89--104}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055722}, doi = {10.1007/BFB0055722}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rabin98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareGR98, author = {Mihir Bellare and Juan A. Garay and Tal Rabin}, editor = {Kaisa Nyberg}, title = {Fast Batch Verification for Modular Exponentiation and Digital Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {236--250}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054130}, doi = {10.1007/BFB0054130}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareGR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latin/BellareGR98, author = {Mihir Bellare and Juan A. Garay and Tal Rabin}, editor = {Claudio L. Lucchesi and Arnaldo V. Moura}, title = {Batch Verification with Applications to Cryptography and Checking}, booktitle = {{LATIN} '98: Theoretical Informatics, Third Latin American Symposium, Campinas, Brazil, April, 20-24, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1380}, pages = {170--191}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054320}, doi = {10.1007/BFB0054320}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/latin/BellareGR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/GennaroRR98, author = {Rosario Gennaro and Michael O. Rabin and Tal Rabin}, editor = {Brian A. Coan and Yehuda Afek}, title = {Simplified {VSS} and Fast-Track Multiparty Computations with Applications to Threshold Cryptography}, booktitle = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June 28 - July 2, 1998}, pages = {101--111}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/277697.277716}, doi = {10.1145/277697.277716}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/GennaroRR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareGR98, author = {Mihir Bellare and Juan A. Garay and Tal Rabin}, title = {Fast Batch Verification for Modular Exponentiation and Digital Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {1998}, url = {http://eprint.iacr.org/1998/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareGR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroMR98, author = {Rosario Gennaro and Daniele Micciancio and Tal Rabin}, title = {An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {1998}, url = {http://eprint.iacr.org/1998/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroMR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrawczykR98, author = {Hugo Krawczyk and Tal Rabin}, title = {Chameleon Hashing and Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {1998}, url = {http://eprint.iacr.org/1998/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrawczykR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayGJR98, author = {Juan A. Garay and Rosario Gennaro and Charanjit S. Jutla and Tal Rabin}, title = {Secure Distributed Storage and Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {1998}, url = {http://eprint.iacr.org/1998/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayGJR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GennaroKR97, author = {Rosario Gennaro and Hugo Krawczyk and Tal Rabin}, editor = {Burton S. Kaliski Jr.}, title = {RSA-Based Undeniable Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {132--149}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052232}, doi = {10.1007/BFB0052232}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GennaroKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/GarayGJR97, author = {Juan A. Garay and Rosario Gennaro and Charanjit S. Jutla and Tal Rabin}, editor = {Marios Mavronicolas and Philippas Tsigas}, title = {Secure Distributed Storage and Retrieval}, booktitle = {Distributed Algorithms, 11th International Workshop, {WDAG} '97, Saarbr{\"{u}}cken, Germany, September 24-26, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1320}, pages = {275--289}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030690}, doi = {10.1007/BFB0030690}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/GarayGJR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GennaroJKR96, author = {Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, editor = {Neal Koblitz}, title = {Robust and Efficient Sharing of {RSA} Functions}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {157--172}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_13}, doi = {10.1007/3-540-68697-5\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GennaroJKR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GennaroJKR96, author = {Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, editor = {Ueli M. Maurer}, title = {Robust Threshold {DSS} Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {354--371}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_31}, doi = {10.1007/3-540-68339-9\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GennaroJKR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/BellareGR96, author = {Mihir Bellare and Juan A. Garay and Tal Rabin}, editor = {James E. Burns and Yoram Moses}, title = {Distributed Pseudo-Random Bit Generators - {A} New Way to Speed-Up Shared Coin Tossing}, booktitle = {Proceedings of the Fifteenth Annual {ACM} Symposium on Principles of Distributed Computing, Philadelphia, Pennsylvania, USA, May 23-26, 1996}, pages = {191--200}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/248052.248090}, doi = {10.1145/248052.248090}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/BellareGR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/il/Rabin94, author = {Tal Rabin}, title = {Optimal secrecy and resilience for asynchronous distributed computations ({\unicode{1489}}{\unicode{1496}}{\unicode{1497}}{\unicode{1495}}{\unicode{1493}}{\unicode{1514}} {\unicode{1493}}{\unicode{1506}}{\unicode{1502}}{\unicode{1497}}{\unicode{1491}}{\unicode{1493}}{\unicode{1514}} {\unicode{1488}}{\unicode{1493}}{\unicode{1508}}{\unicode{1496}}{\unicode{1497}}{\unicode{1502}}{\unicode{1500}}{\unicode{1497}}{\unicode{1497}}{\unicode{1501}} {\unicode{1506}}{\unicode{1489}}{\unicode{1493}}{\unicode{1512}} {\unicode{1495}}{\unicode{1513}}{\unicode{1493}}{\unicode{1489}}{\unicode{1497}}{\unicode{1501}} {\unicode{1502}}{\unicode{1489}}{\unicode{1494}}{\unicode{1512}}{\unicode{1497}}{\unicode{1501}} {\unicode{1488}}{\unicode{1505}}{\unicode{1497}}{\unicode{1504}}{\unicode{1499}}{\unicode{1512}}{\unicode{1493}}{\unicode{1504}}{\unicode{1497}}{\unicode{1497}}{\unicode{1501}}.)}, school = {Hebrew University of Jerusalem, Israel}, year = {1994}, url = {https://huji-primo.hosted.exlibrisgroup.com/permalink/f/13ns5ae/972HUJI\_ALMA21159273620003701}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/il/Rabin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/Rabin94, author = {Tal Rabin}, title = {Robust Sharing of Secrets When the Dealer is Honest or Cheating}, journal = {J. {ACM}}, volume = {41}, number = {6}, pages = {1089--1109}, year = {1994}, url = {https://doi.org/10.1145/195613.195621}, doi = {10.1145/195613.195621}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/Rabin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Ben-OrKR94, author = {Michael Ben{-}Or and Boaz Kelmer and Tal Rabin}, editor = {James H. Anderson and David Peleg and Elizabeth Borowsky}, title = {Asynchronous Secure Computations with Optimal Resilience (Extended Abstract)}, booktitle = {Proceedings of the Thirteenth Annual {ACM} Symposium on Principles of Distributed Computing, Los Angeles, California, USA, August 14-17, 1994}, pages = {183--192}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/197917.198088}, doi = {10.1145/197917.198088}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/Ben-OrKR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CanettiR93, author = {Ran Canetti and Tal Rabin}, editor = {S. Rao Kosaraju and David S. Johnson and Alok Aggarwal}, title = {Fast asynchronous Byzantine agreement with optimal resilience}, booktitle = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of Computing, May 16-18, 1993, San Diego, CA, {USA}}, pages = {42--51}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/167088.167105}, doi = {10.1145/167088.167105}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CanettiR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MicaliR90, author = {Silvio Micali and Tal Rabin}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Collective Coin Tossing Without Assumptions nor Broadcasting}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {253--266}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_18}, doi = {10.1007/3-540-38424-3\_18}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MicaliR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/RabinB89, author = {Tal Rabin and Michael Ben{-}Or}, editor = {David S. Johnson}, title = {Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract)}, booktitle = {Proceedings of the 21st Annual {ACM} Symposium on Theory of Computing, May 14-17, 1989, Seattle, Washington, {USA}}, pages = {73--85}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/73007.73014}, doi = {10.1145/73007.73014}, timestamp = {Wed, 24 Nov 2021 12:15:31 +0100}, biburl = {https://dblp.org/rec/conf/stoc/RabinB89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.