BibTeX records: Tal Rabin

download as .bib file

@inproceedings{DBLP:conf/ccs/BlumLLKR23,
  author       = {Erica Blum and
                  Derek Leung and
                  Julian Loss and
                  Jonathan Katz and
                  Tal Rabin},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Analyzing the Real-World Security of the Algorand Blockchain},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {830--844},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623167},
  doi          = {10.1145/3576915.3623167},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlumLLKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviIKR23,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Additive Randomized Encodings and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {203--235},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_7},
  doi          = {10.1007/978-3-031-38557-5\_7},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviIKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MaWAPR23,
  author       = {Yiping Ma and
                  Jess Woods and
                  Sebastian Angel and
                  Antigoni Polychroniadou and
                  Tal Rabin},
  title        = {Flamingo: Multi-Round Single-Server Secure Aggregation with Applications
                  to Private Federated Learning},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {477--496},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179434},
  doi          = {10.1109/SP46215.2023.10179434},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MaWAPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FalkNR23,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Tal Rabin},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Proactive Secret Sharing with Constant Communication},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14370},
  pages        = {337--373},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48618-0\_12},
  doi          = {10.1007/978-3-031-48618-0\_12},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/FalkNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-09883,
  author       = {Yiping Ma and
                  Jess Woods and
                  Sebastian Angel and
                  Antigoni Polychroniadou and
                  Tal Rabin},
  title        = {Flamingo: Multi-Round Single-Server Secure Aggregation with Applications
                  to Private Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2308.09883},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.09883},
  doi          = {10.48550/ARXIV.2308.09883},
  eprinttype    = {arXiv},
  eprint       = {2308.09883},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-09883.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaHKRM23,
  author       = {Fabrice Benhamouda and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Tal Rabin and
                  Yiping Ma},
  title        = {{SPRINT:} High-Throughput Robust Distributed Schnorr Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/427},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaHKRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaWAPR23,
  author       = {Yiping Ma and
                  Jess Woods and
                  Sebastian Angel and
                  Antigoni Polychroniadou and
                  Tal Rabin},
  title        = {Flamingo: Multi-Round Single-Server Secure Aggregation with Applications
                  to Private Federated Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/486},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaWAPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviIKR23,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  title        = {Additive Randomized Encodings and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {870},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/870},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviIKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkNR23,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Tal Rabin},
  title        = {Proactive Secret Sharing with Constant Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {942},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/942},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaBKLLR23,
  author       = {Fabrice Benhamouda and
                  Erica Blum and
                  Jonathan Katz and
                  Derek Leung and
                  Julian Loss and
                  Tal Rabin},
  title        = {Analyzing the Real-World Security of the Algorand Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1344},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1344},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaBKLLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/Rabin22,
  author       = {Tal Rabin},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {New Multiparty Computational Model: From Nakamoto to {YOSO}},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3497774},
  doi          = {10.1145/3488932.3497774},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/Rabin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BenhamoudaHKMR22,
  author       = {Fabrice Benhamouda and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Alex Miao and
                  Tal Rabin},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Threshold Cryptography as a Service (in the Multiserver and {YOSO}
                  Models)},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {323--336},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559397},
  doi          = {10.1145/3548606.3559397},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BenhamoudaHKMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001ZRA22,
  author       = {Yiping Ma and
                  Ke Zhong and
                  Tal Rabin and
                  Sebastian Angel},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Incremental Offline/Online {PIR}},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1741--1758},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/ma},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001ZRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BenhamoudaDIR21,
  author       = {Fabrice Benhamouda and
                  Akshay Degwekar and
                  Yuval Ishai and
                  Tal Rabin},
  title        = {On the Local Leakage Resilience of Linear Secret Sharing Schemes},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {2},
  pages        = {10},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09375-2},
  doi          = {10.1007/S00145-021-09375-2},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BenhamoudaDIR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WaghTBKMR21,
  author       = {Sameer Wagh and
                  Shruti Tople and
                  Fabrice Benhamouda and
                  Eyal Kushilevitz and
                  Prateek Mittal and
                  Tal Rabin},
  title        = {Falcon: Honest-Majority Maliciously Secure Framework for Private Deep
                  Learning},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {1},
  pages        = {188--208},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0011},
  doi          = {10.2478/POPETS-2021-0011},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/WaghTBKMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AlmashaqbehBHJM21,
  author       = {Ghada Almashaqbeh and
                  Fabrice Benhamouda and
                  Seungwook Han and
                  Daniel Jaroslawicz and
                  Tal Malkin and
                  Alex Nicita and
                  Tal Rabin and
                  Abhishek Shah and
                  Eran Tromer},
  title        = {Gage {MPC:} Bypassing Residual Function Leakage for Non-Interactive
                  {MPC}},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {4},
  pages        = {528--548},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0083},
  doi          = {10.2478/POPETS-2021-0083},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/AlmashaqbehBHJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryHKMNRY21,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Bernardo Magri and
                  Jesper Buus Nielsen and
                  Tal Rabin and
                  Sophia Yakoubov},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {{YOSO:} You Only Speak Once - Secure {MPC} with Stateless Ephemeral
                  Roles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {64--93},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_3},
  doi          = {10.1007/978-3-030-84245-1\_3},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryHKMNRY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHKMNRY21,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Bernardo Magri and
                  Jesper Buus Nielsen and
                  Tal Rabin and
                  Sophia Yakoubov},
  title        = {{YOSO:} You Only Speak Once / Secure {MPC} with Stateless Ephemeral
                  Roles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/210},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHKMNRY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlmashaqbehBHJM21,
  author       = {Ghada Almashaqbeh and
                  Fabrice Benhamouda and
                  Seungwook Han and
                  Daniel Jaroslawicz and
                  Tal Malkin and
                  Alex Nicita and
                  Tal Rabin and
                  Abhishek Shah and
                  Eran Tromer},
  title        = {Gage {MPC:} Bypassing Residual Function Leakage for Non-Interactive
                  {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/256},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlmashaqbehBHJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaZRA21,
  author       = {Yiping Ma and
                  Ke Zhong and
                  Tal Rabin and
                  Sebastian Angel},
  title        = {Incremental Offline/Online {PIR} (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1438},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1438},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MaZRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Rabin20,
  author       = {Tal Rabin},
  editor       = {Jorge Lobo and
                  Scott D. Stoller and
                  Peng Liu},
  title        = {Cryptography for {\#}MeToo},
  booktitle    = {Proceedings of the 25th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2020, Barcelona, Spain, June 10-12, 2020},
  pages        = {33},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3381991.3395398},
  doi          = {10.1145/3381991.3395398},
  timestamp    = {Sun, 14 Jun 2020 11:19:59 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Rabin20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BenhamoudaG0HK020,
  author       = {Fabrice Benhamouda and
                  Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Chengyu Lin and
                  Tal Rabin and
                  Leonid Reyzin},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Can a Public Blockchain Keep a Secret?},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {260--290},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_10},
  doi          = {10.1007/978-3-030-64375-1\_10},
  timestamp    = {Tue, 15 Dec 2020 11:52:09 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BenhamoudaG0HK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-02229,
  author       = {Sameer Wagh and
                  Shruti Tople and
                  Fabrice Benhamouda and
                  Eyal Kushilevitz and
                  Prateek Mittal and
                  Tal Rabin},
  title        = {{FALCON:} Honest-Majority Maliciously Secure Framework for Private
                  Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2004.02229},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.02229},
  eprinttype    = {arXiv},
  eprint       = {2004.02229},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-02229.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaGGHKL20,
  author       = {Fabrice Benhamouda and
                  Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Chengyu Lin and
                  Tal Rabin and
                  Leonid Reyzin},
  title        = {Can a Blockchain Keep a Secret?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaGGHKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayMRTN19,
  author       = {Carmit Hazay and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Tal Rabin and
                  Tomas Toft and
                  Angelo Agatino Nicolosi},
  title        = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party
                  Setting},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {265--323},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-017-9275-7},
  doi          = {10.1007/S00145-017-9275-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayMRTN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KuykendallKR19,
  author       = {Benjamin Kuykendall and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Cryptography for {\#}MeToo},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2019},
  number       = {3},
  pages        = {409--429},
  year         = {2019},
  url          = {https://doi.org/10.2478/popets-2019-0054},
  doi          = {10.2478/POPETS-2019-0054},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KuykendallKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaleviIKMR19,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Nikolaos Makriyannis and
                  Tal Rabin},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {On Fully Secure {MPC} with Solitary Output},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11891},
  pages        = {312--340},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36030-6\_13},
  doi          = {10.1007/978-3-030-36030-6\_13},
  timestamp    = {Mon, 25 Nov 2019 13:58:16 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HaleviIKMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaDIR19,
  author       = {Fabrice Benhamouda and
                  Akshay Degwekar and
                  Yuval Ishai and
                  Tal Rabin},
  title        = {On the Local Leakage Resilience of Linear Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {653},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/653},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaDIR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviIKMR19,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Nikolaos Makriyannis and
                  Tal Rabin},
  title        = {On Fully Secure {MPC} with Solitary Output},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1032},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviIKMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AsharovHLR18,
  author       = {Gilad Asharov and
                  Shai Halevi and
                  Yehuda Lindell and
                  Tal Rabin},
  title        = {Privacy-Preserving Search of Similar Patients in Genomic Data},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {4},
  pages        = {104--124},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0034},
  doi          = {10.1515/POPETS-2018-0034},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/AsharovHLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaDIR18,
  author       = {Fabrice Benhamouda and
                  Akshay Degwekar and
                  Yuval Ishai and
                  Tal Rabin},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {On the Local Leakage Resilience of Linear Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {531--561},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_18},
  doi          = {10.1007/978-3-319-96884-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BenhamoudaDIR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaleviIKR18,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Best Possible Information-Theoretic {MPC}},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {255--281},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_10},
  doi          = {10.1007/978-3-030-03810-6\_10},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaleviIKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviIKR18,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  title        = {Best Possible Information-Theoretic {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {913},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/913},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviIKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaKR17,
  author       = {Fabrice Benhamouda and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Robust Non-interactive Multiparty Computation Against Constant-Size
                  Collusion},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {391--419},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_13},
  doi          = {10.1007/978-3-319-63688-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BenhamoudaKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LindellR17,
  author       = {Yehuda Lindell and
                  Tal Rabin},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Secure Two-Party Computation with Fairness - {A} Necessary Design
                  Principle},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {565--580},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_19},
  doi          = {10.1007/978-3-319-70500-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LindellR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovHLR17,
  author       = {Gilad Asharov and
                  Shai Halevi and
                  Yehuda Lindell and
                  Tal Rabin},
  title        = {Privacy-Preserving Search of Similar Patients in Genomic Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovHLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaKR17,
  author       = {Fabrice Benhamouda and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Robust Non-Interactive Multiparty Computation Against Constant-Size
                  Collusion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/555},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellR17,
  author       = {Yehuda Lindell and
                  Tal Rabin},
  title        = {Secure Two-Party Computation with Fairness - {A} Necessary Design
                  Principle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/952},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolesnikovKLMR16,
  author       = {Vladimir Kolesnikov and
                  Hugo Krawczyk and
                  Yehuda Lindell and
                  Alex J. Malozemoff and
                  Tal Rabin},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Attribute-based Key Exchange with General Policies},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1451--1463},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978359},
  doi          = {10.1145/2976749.2978359},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KolesnikovKLMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/HaleviIJKR16,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Abhishek Jain and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Madhu Sudan},
  title        = {Secure Multiparty Computation with General Interaction Patterns},
  booktitle    = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical
                  Computer Science, Cambridge, MA, USA, January 14-16, 2016},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2840728.2840760},
  doi          = {10.1145/2840728.2840760},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/HaleviIJKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CranorRSVW16,
  author       = {Lorrie Faith Cranor and
                  Tal Rabin and
                  Vitaly Shmatikov and
                  Salil P. Vadhan and
                  Daniel J. Weitzner},
  title        = {Towards a Privacy Research Roadmap for the Computing Community},
  journal      = {CoRR},
  volume       = {abs/1604.03160},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.03160},
  eprinttype    = {arXiv},
  eprint       = {1604.03160},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CranorRSVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Fischlin0PR16,
  author       = {Marc Fischlin and
                  Alexander May and
                  David Pointcheval and
                  Tal Rabin},
  title        = {Public-Key Cryptography (Dagstuhl Seminar 16371)},
  journal      = {Dagstuhl Reports},
  volume       = {6},
  number       = {9},
  pages        = {46--58},
  year         = {2016},
  url          = {https://doi.org/10.4230/DagRep.6.9.46},
  doi          = {10.4230/DAGREP.6.9.46},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Fischlin0PR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovKLMR16,
  author       = {Vladimir Kolesnikov and
                  Hugo Krawczyk and
                  Yehuda Lindell and
                  Alex J. Malozemoff and
                  Tal Rabin},
  title        = {Attribute-based Key Exchange with General Policies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/518},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovKLMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviIJKR15,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Abhishek Jain and
                  Eyal Kushilevitz and
                  Tal Rabin},
  title        = {Secure Multiparty Computation with General Interaction Patterns},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1173},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1173},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviIJKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/FaustRRTV14,
  author       = {Sebastian Faust and
                  Tal Rabin and
                  Leonid Reyzin and
                  Eran Tromer and
                  Vinod Vaikuntanathan},
  title        = {Protecting Circuits from Computationally Bounded and Noisy Leakage},
  journal      = {{SIAM} J. Comput.},
  volume       = {43},
  number       = {5},
  pages        = {1564--1614},
  year         = {2014},
  url          = {https://doi.org/10.1137/120880343},
  doi          = {10.1137/120880343},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/FaustRRTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AsharovLR13,
  author       = {Gilad Asharov and
                  Yehuda Lindell and
                  Tal Rabin},
  editor       = {Amit Sahai},
  title        = {A Full Characterization of Functions that Imply Fair Coin Tossing
                  and Ramifications to Fairness},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {243--262},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_14},
  doi          = {10.1007/978-3-642-36594-2\_14},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AsharovLR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovLR13,
  author       = {Gilad Asharov and
                  Yehuda Lindell and
                  Tal Rabin},
  title        = {Full Characterization of Functions that Imply Fair Coin Tossing and
                  Ramifications to Fairness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovLR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KlincHJKR12,
  author       = {Demijan Klinc and
                  Carmit Hazay and
                  Ashish Jagmohan and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {On Compression of Data Encrypted With Block Ciphers},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {11},
  pages        = {6989--7001},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2210752},
  doi          = {10.1109/TIT.2012.2210752},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/KlincHJKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HazayMRT12,
  author       = {Carmit Hazay and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Tal Rabin and
                  Tomas Toft},
  editor       = {Orr Dunkelman},
  title        = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party
                  Setting},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {313--331},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_20},
  doi          = {10.1007/978-3-642-27954-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HazayMRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BarakCLPR11,
  author       = {Boaz Barak and
                  Ran Canetti and
                  Yehuda Lindell and
                  Rafael Pass and
                  Tal Rabin},
  title        = {Secure Computation Without Authentication},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {4},
  pages        = {720--760},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9075-9},
  doi          = {10.1007/S00145-010-9075-9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BarakCLPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AsharovLR11,
  author       = {Gilad Asharov and
                  Yehuda Lindell and
                  Tal Rabin},
  editor       = {Phillip Rogaway},
  title        = {Perfectly-Secure Multiplication for Any \emph{t {\textless} n}/3},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {240--258},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_14},
  doi          = {10.1007/978-3-642-22792-9\_14},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AsharovLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayMRT11,
  author       = {Carmit Hazay and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Tal Rabin and
                  Tomas Toft},
  title        = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayMRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/KushilevitzLR10,
  author       = {Eyal Kushilevitz and
                  Yehuda Lindell and
                  Tal Rabin},
  title        = {Information-Theoretically Secure Protocols and Security under Composition},
  journal      = {{SIAM} J. Comput.},
  volume       = {39},
  number       = {5},
  pages        = {2090--2112},
  year         = {2010},
  url          = {https://doi.org/10.1137/090755886},
  doi          = {10.1137/090755886},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/KushilevitzLR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GennaroKR10,
  author       = {Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with
                  Minimal Overhead},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {309--328},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_19},
  doi          = {10.1007/978-3-642-13708-2\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GennaroKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/ChariDKPRRRSST10,
  author       = {Suresh Chari and
                  Vincenzo V. Diluoffo and
                  Paul A. Karger and
                  Elaine R. Palmer and
                  Tal Rabin and
                  Josyula R. Rao and
                  Pankaj Rohatgi and
                  Helmut Scherzer and
                  Michael Steiner and
                  David C. Toll},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {Designing a Side Channel Resistant Random Number Generator},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_5},
  doi          = {10.1007/978-3-642-12510-2\_5},
  timestamp    = {Sat, 30 May 2020 20:05:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/ChariDKPRRRSST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FaustRRTV10,
  author       = {Sebastian Faust and
                  Tal Rabin and
                  Leonid Reyzin and
                  Eran Tromer and
                  Vinod Vaikuntanathan},
  editor       = {Henri Gilbert},
  title        = {Protecting Circuits from Leakage: the Computationally-Bounded and
                  Noisy Cases},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {135--156},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_7},
  doi          = {10.1007/978-3-642-13190-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FaustRRTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GennaroKKR10,
  author       = {Rosario Gennaro and
                  Jonathan Katz and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Secure Network Coding over the Integers},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {142--160},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_9},
  doi          = {10.1007/978-3-642-13013-7\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GennaroKKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/AnR10,
  author       = {Jee Hea An and
                  Tal Rabin},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Security for Signcryption: The Two-User Model},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {21--42},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_2},
  doi          = {10.1007/978-3-540-89411-7\_2},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/series/isc/AnR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor       = {Tal Rabin},
  title        = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7},
  doi          = {10.1007/978-3-642-14623-7},
  isbn         = {978-3-642-14622-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1009-1759,
  author       = {Demijan Klinc and
                  Carmit Hazay and
                  Ashish Jagmohan and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {On Compression of Data Encrypted with Block Ciphers},
  journal      = {CoRR},
  volume       = {abs/1009.1759},
  year         = {2010},
  url          = {http://arxiv.org/abs/1009.1759},
  eprinttype    = {arXiv},
  eprint       = {1009.1759},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1009-1759.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroKR10,
  author       = {Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with
                  Minimal Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KlincHJKR10,
  author       = {Demijan Klinc and
                  Carmit Hazay and
                  Ashish Jagmohan and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {On Compression of Data Encrypted with Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KlincHJKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PatraCRR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Tal Rabin and
                  C. Pandu Rangan},
  editor       = {Shai Halevi},
  title        = {The Round Complexity of Verifiable Secret Sharing Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {487--504},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_29},
  doi          = {10.1007/978-3-642-03356-8\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PatraCRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcc/KlincHJKR09,
  author       = {Demijan Klinc and
                  Carmit Hazay and
                  Ashish Jagmohan and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {James A. Storer and
                  Michael W. Marcellin},
  title        = {On Compression of Data Encrypted with Block Ciphers},
  booktitle    = {2009 Data Compression Conference {(DCC} 2009), 16-18 March 2009, Snowbird,
                  UT, {USA}},
  pages        = {213--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DCC.2009.71},
  doi          = {10.1109/DCC.2009.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dcc/KlincHJKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroKKR09,
  author       = {Rosario Gennaro and
                  Jonathan Katz and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Secure Network Coding Over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/569},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroKKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KushilevitzLR09,
  author       = {Eyal Kushilevitz and
                  Yehuda Lindell and
                  Tal Rabin},
  title        = {Information-Theoretically Secure Protocols and Security Under Composition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KushilevitzLR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GennaroHKRRW08,
  author       = {Rosario Gennaro and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Tal Rabin and
                  Steffen Reidt and
                  Stephen D. Wolthusen},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Strongly-Resilient and Non-interactive Hierarchical Key-Agreement
                  in MANETs},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {49--65},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_4},
  doi          = {10.1007/978-3-540-88313-5\_4},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GennaroHKRRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GennaroHKR08,
  author       = {Rosario Gennaro and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Nigel P. Smart},
  title        = {Threshold {RSA} for Dynamic and Ad-Hoc Groups},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {88--107},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_6},
  doi          = {10.1007/978-3-540-78967-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GennaroHKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaleviR08,
  author       = {Shai Halevi and
                  Tal Rabin},
  editor       = {Ran Canetti},
  title        = {Degradation and Amplification of Computational Hardness},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {626--643},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_34},
  doi          = {10.1007/978-3-540-78524-8\_34},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaleviR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroHKR08,
  author       = {Rosario Gennaro and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Threshold {RSA} for Dynamic and Ad-Hoc Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroHKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviR08,
  author       = {Shai Halevi and
                  Tal Rabin},
  title        = {Degradation and Amplification of Computational Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCRR08,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Tal Rabin and
                  C. Pandu Rangan},
  title        = {The Round Complexity of Verifiable Secret Sharing Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroHKRRW08,
  author       = {Rosario Gennaro and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Tal Rabin and
                  Steffen Reidt and
                  Stephen D. Wolthusen},
  title        = {Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement
                  in MANETs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroHKRRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GennaroJKR07,
  author       = {Rosario Gennaro and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Secure Distributed Key Generation for Discrete-Log Based Cryptosystems},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {1},
  pages        = {51--83},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-006-0347-3},
  doi          = {10.1007/S00145-006-0347-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GennaroJKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GennaroRJK07,
  author       = {Rosario Gennaro and
                  Tal Rabin and
                  Stanislaw Jarecki and
                  Hugo Krawczyk},
  title        = {Robust and Efficient Sharing of {RSA} Functions},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {3},
  pages        = {393},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-007-0201-2},
  doi          = {10.1007/S00145-007-0201-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GennaroRJK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GennaroRK07,
  author       = {Rosario Gennaro and
                  Tal Rabin and
                  Hugo Krawczyk},
  title        = {RSA-Based Undeniable Signatures},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {3},
  pages        = {394},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-007-0202-1},
  doi          = {10.1007/S00145-007-0202-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GennaroRK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakCLPR07,
  author       = {Boaz Barak and
                  Ran Canetti and
                  Yehuda Lindell and
                  Rafael Pass and
                  Tal Rabin},
  title        = {Secure Computation Without Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakCLPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/LindellLR06,
  author       = {Yehuda Lindell and
                  Anna Lysyanskaya and
                  Tal Rabin},
  title        = {On the composition of authenticated Byzantine Agreement},
  journal      = {J. {ACM}},
  volume       = {53},
  number       = {6},
  pages        = {881--917},
  year         = {2006},
  url          = {https://doi.org/10.1145/1217856.1217857},
  doi          = {10.1145/1217856.1217857},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/LindellLR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KushilevitzLR06,
  author       = {Eyal Kushilevitz and
                  Yehuda Lindell and
                  Tal Rabin},
  editor       = {Jon M. Kleinberg},
  title        = {Information-theoretically secure protocols and security under composition},
  booktitle    = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing,
                  Seattle, WA, USA, May 21-23, 2006},
  pages        = {109--118},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1132516.1132532},
  doi          = {10.1145/1132516.1132532},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/KushilevitzLR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2006,
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878},
  doi          = {10.1007/11681878},
  isbn         = {3-540-32731-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarakCLPR05,
  author       = {Boaz Barak and
                  Ran Canetti and
                  Yehuda Lindell and
                  Rafael Pass and
                  Tal Rabin},
  editor       = {Victor Shoup},
  title        = {Secure Computation Without Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {361--377},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_22},
  doi          = {10.1007/11535218\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarakCLPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisGHKR04,
  author       = {Yevgeniy Dodis and
                  Rosario Gennaro and
                  Johan H{\aa}stad and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Matthew K. Franklin},
  title        = {Randomness Extraction and Key Derivation Using the CBC, Cascade and
                  {HMAC} Modes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {494--510},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_30},
  doi          = {10.1007/978-3-540-28628-8\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisGHKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GennaroKR04,
  author       = {Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Secure Hashed Diffie-Hellman over Non-DDH Groups},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {361--381},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_22},
  doi          = {10.1007/978-3-540-24676-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GennaroKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GennaroLMMR04,
  author       = {Rosario Gennaro and
                  Anna Lysyanskaya and
                  Tal Malkin and
                  Silvio Micali and
                  Tal Rabin},
  editor       = {Moni Naor},
  title        = {Algorithmic Tamper-Proof {(ATP)} Security: Theoretical Foundations
                  for Security against Hardware Tampering},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {258--277},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_15},
  doi          = {10.1007/978-3-540-24638-1\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GennaroLMMR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakLR04,
  author       = {Boaz Barak and
                  Yehuda Lindell and
                  Tal Rabin},
  title        = {Protocol Initialization for the Framework of Universal Composability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakLR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroKR04,
  author       = {Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Secure Hashed Diffie-Hellman over Non-DDH Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellLR04,
  author       = {Yehuda Lindell and
                  Anna Lysyanskaya and
                  Tal Rabin},
  title        = {On the Composition of Authenticated Byzantine Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellLR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiR03,
  author       = {Ran Canetti and
                  Tal Rabin},
  editor       = {Dan Boneh},
  title        = {Universal Composition with Joint State},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {265--281},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_16},
  doi          = {10.1007/978-3-540-45146-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GennaroJKR03,
  author       = {Rosario Gennaro and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Marc Joye},
  title        = {Secure Applications of Pedersen's Distributed Key Generation Protocol},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {373--390},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_26},
  doi          = {10.1007/3-540-36563-X\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GennaroJKR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ScherzerCKKRT03,
  author       = {Helmut Scherzer and
                  Ran Canetti and
                  Paul A. Karger and
                  Hugo Krawczyk and
                  Tal Rabin and
                  David C. Toll},
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {Authenticating Mandatory Access Controls and Preserving Privacy for
                  a High-Assurance Smart Card},
  booktitle    = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  pages        = {181--200},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39650-5\_11},
  doi          = {10.1007/978-3-540-39650-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ScherzerCKKRT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GennaroIKR02,
  author       = {Rosario Gennaro and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Moti Yung},
  title        = {On 2-Round Secure Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {178--193},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_12},
  doi          = {10.1007/3-540-45708-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GennaroIKR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AnDR02,
  author       = {Jee Hea An and
                  Yevgeniy Dodis and
                  Tal Rabin},
  editor       = {Lars R. Knudsen},
  title        = {On the Security of Joint Signature and Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {83--107},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_6},
  doi          = {10.1007/3-540-46035-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AnDR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/LindellLR02,
  author       = {Yehuda Lindell and
                  Anna Lysyanskaya and
                  Tal Rabin},
  editor       = {Aleta Ricciardi},
  title        = {Sequential composition of protocols without simultaneous termination},
  booktitle    = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2002, Monterey, California, USA,
                  July 21-24, 2002},
  pages        = {203--212},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/571825.571859},
  doi          = {10.1145/571825.571859},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/LindellLR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LindellLR02,
  author       = {Yehuda Lindell and
                  Anna Lysyanskaya and
                  Tal Rabin},
  editor       = {John H. Reif},
  title        = {On the composition of authenticated byzantine agreement},
  booktitle    = {Proceedings on 34th Annual {ACM} Symposium on Theory of Computing,
                  May 19-21, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada},
  pages        = {514--523},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/509907.509982},
  doi          = {10.1145/509907.509982},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/LindellLR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnDR02,
  author       = {Jee Hea An and
                  Yevgeniy Dodis and
                  Tal Rabin},
  title        = {On the Security of Joint Signature and Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnDR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiR02,
  author       = {Ran Canetti and
                  Tal Rabin},
  title        = {Universal Composition with Joint State},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/GennaroJKR01,
  author       = {Rosario Gennaro and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Robust Threshold {DSS} Signatures},
  journal      = {Inf. Comput.},
  volume       = {164},
  number       = {1},
  pages        = {54--84},
  year         = {2001},
  url          = {https://doi.org/10.1006/inco.2000.2881},
  doi          = {10.1006/INCO.2000.2881},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/GennaroJKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KushilevitzR01,
  author       = {Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {David Naccache},
  title        = {Fair e-Lotteries and e-Casinos},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {100--109},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_9},
  doi          = {10.1007/3-540-45353-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KushilevitzR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GennaroIKR01,
  author       = {Rosario Gennaro and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Jeffrey Scott Vitter and
                  Paul G. Spirakis and
                  Mihalis Yannakakis},
  title        = {The round complexity of verifiable secret sharing and secure multicast},
  booktitle    = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing,
                  July 6-8, 2001, Heraklion, Crete, Greece},
  pages        = {580--589},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/380752.380853},
  doi          = {10.1145/380752.380853},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GennaroIKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GennaroRJK00,
  author       = {Rosario Gennaro and
                  Tal Rabin and
                  Stanislaw Jarecki and
                  Hugo Krawczyk},
  title        = {Robust and Efficient Sharing of {RSA} Functions},
  journal      = {J. Cryptol.},
  volume       = {13},
  number       = {2},
  pages        = {273--300},
  year         = {2000},
  url          = {https://doi.org/10.1007/s001459910011},
  doi          = {10.1007/S001459910011},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GennaroRJK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GennaroRK00,
  author       = {Rosario Gennaro and
                  Tal Rabin and
                  Hugo Krawczyk},
  title        = {RSA-Based Undeniable Signatures},
  journal      = {J. Cryptol.},
  volume       = {13},
  number       = {4},
  pages        = {397--416},
  year         = {2000},
  url          = {https://doi.org/10.1007/s001450010001},
  doi          = {10.1007/S001450010001},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GennaroRK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GarayGJR00,
  author       = {Juan A. Garay and
                  Rosario Gennaro and
                  Charanjit S. Jutla and
                  Tal Rabin},
  title        = {Secure distributed storage and retrieval},
  journal      = {Theor. Comput. Sci.},
  volume       = {243},
  number       = {1-2},
  pages        = {363--389},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0304-3975(98)00263-1},
  doi          = {10.1016/S0304-3975(98)00263-1},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/GarayGJR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisHR00,
  author       = {Yevgeniy Dodis and
                  Shai Halevi and
                  Tal Rabin},
  editor       = {Mihir Bellare},
  title        = {A Cryptographic Solution to a Game Theoretic Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {112--130},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_7},
  doi          = {10.1007/3-540-44598-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisHR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KrawczykR00,
  author       = {Hugo Krawczyk and
                  Tal Rabin},
  title        = {Chameleon Signatures},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2000, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2000},
  url          = {https://www.ndss-symposium.org/ndss2000/chameleon-signatures/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KrawczykR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiGJKR99,
  author       = {Ran Canetti and
                  Rosario Gennaro and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Michael J. Wiener},
  title        = {Adaptive Security for Threshold Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_7},
  doi          = {10.1007/3-540-48405-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiGJKR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GennaroHR99,
  author       = {Rosario Gennaro and
                  Shai Halevi and
                  Tal Rabin},
  editor       = {Jacques Stern},
  title        = {Secure Hash-and-Sign Signatures Without the Random Oracle},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {123--139},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_9},
  doi          = {10.1007/3-540-48910-X\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GennaroHR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GennaroJKR99,
  author       = {Rosario Gennaro and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Jacques Stern},
  title        = {Secure Distributed Key Generation for Discrete-Log Based Cryptosystems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {295--310},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_21},
  doi          = {10.1007/3-540-48910-X\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GennaroJKR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDDHR99,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Martin Hirt and
                  Tal Rabin},
  editor       = {Jacques Stern},
  title        = {Efficient Multiparty Computations Secure Against an Adaptive Adversary},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {311--326},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_22},
  doi          = {10.1007/3-540-48910-X\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDDHR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroHR99,
  author       = {Rosario Gennaro and
                  Shai Halevi and
                  Tal Rabin},
  title        = {Secure Hash-and-Sign Signatures without the Random Oracle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroHR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GennaroMR98,
  author       = {Rosario Gennaro and
                  Daniele Micciancio and
                  Tal Rabin},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {An Efficient Non-Interactive Statistical Zero-Knowledge Proof System
                  for Quasi-Safe Prime Products},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288108},
  doi          = {10.1145/288090.288108},
  timestamp    = {Tue, 10 Nov 2020 20:00:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GennaroMR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Rabin98,
  author       = {Tal Rabin},
  editor       = {Hugo Krawczyk},
  title        = {A Simplified Approach to Threshold and Proactive {RSA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {89--104},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055722},
  doi          = {10.1007/BFB0055722},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Rabin98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareGR98,
  author       = {Mihir Bellare and
                  Juan A. Garay and
                  Tal Rabin},
  editor       = {Kaisa Nyberg},
  title        = {Fast Batch Verification for Modular Exponentiation and Digital Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {236--250},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054130},
  doi          = {10.1007/BFB0054130},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareGR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latin/BellareGR98,
  author       = {Mihir Bellare and
                  Juan A. Garay and
                  Tal Rabin},
  editor       = {Claudio L. Lucchesi and
                  Arnaldo V. Moura},
  title        = {Batch Verification with Applications to Cryptography and Checking},
  booktitle    = {{LATIN} '98: Theoretical Informatics, Third Latin American Symposium,
                  Campinas, Brazil, April, 20-24, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1380},
  pages        = {170--191},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054320},
  doi          = {10.1007/BFB0054320},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/latin/BellareGR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/GennaroRR98,
  author       = {Rosario Gennaro and
                  Michael O. Rabin and
                  Tal Rabin},
  editor       = {Brian A. Coan and
                  Yehuda Afek},
  title        = {Simplified {VSS} and Fast-Track Multiparty Computations with Applications
                  to Threshold Cryptography},
  booktitle    = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June
                  28 - July 2, 1998},
  pages        = {101--111},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/277697.277716},
  doi          = {10.1145/277697.277716},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/GennaroRR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareGR98,
  author       = {Mihir Bellare and
                  Juan A. Garay and
                  Tal Rabin},
  title        = {Fast Batch Verification for Modular Exponentiation and Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareGR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroMR98,
  author       = {Rosario Gennaro and
                  Daniele Micciancio and
                  Tal Rabin},
  title        = {An Efficient Non-Interactive Statistical Zero-Knowledge Proof System
                  for Quasi-Safe Prime Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroMR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrawczykR98,
  author       = {Hugo Krawczyk and
                  Tal Rabin},
  title        = {Chameleon Hashing and Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrawczykR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayGJR98,
  author       = {Juan A. Garay and
                  Rosario Gennaro and
                  Charanjit S. Jutla and
                  Tal Rabin},
  title        = {Secure Distributed Storage and Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayGJR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GennaroKR97,
  author       = {Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Burton S. Kaliski Jr.},
  title        = {RSA-Based Undeniable Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {132--149},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052232},
  doi          = {10.1007/BFB0052232},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GennaroKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/GarayGJR97,
  author       = {Juan A. Garay and
                  Rosario Gennaro and
                  Charanjit S. Jutla and
                  Tal Rabin},
  editor       = {Marios Mavronicolas and
                  Philippas Tsigas},
  title        = {Secure Distributed Storage and Retrieval},
  booktitle    = {Distributed Algorithms, 11th International Workshop, {WDAG} '97, Saarbr{\"{u}}cken,
                  Germany, September 24-26, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1320},
  pages        = {275--289},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030690},
  doi          = {10.1007/BFB0030690},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/GarayGJR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GennaroJKR96,
  author       = {Rosario Gennaro and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Neal Koblitz},
  title        = {Robust and Efficient Sharing of {RSA} Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {157--172},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_13},
  doi          = {10.1007/3-540-68697-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GennaroJKR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GennaroJKR96,
  author       = {Rosario Gennaro and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Ueli M. Maurer},
  title        = {Robust Threshold {DSS} Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {354--371},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_31},
  doi          = {10.1007/3-540-68339-9\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GennaroJKR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/BellareGR96,
  author       = {Mihir Bellare and
                  Juan A. Garay and
                  Tal Rabin},
  editor       = {James E. Burns and
                  Yoram Moses},
  title        = {Distributed Pseudo-Random Bit Generators - {A} New Way to Speed-Up
                  Shared Coin Tossing},
  booktitle    = {Proceedings of the Fifteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Philadelphia, Pennsylvania, USA, May 23-26,
                  1996},
  pages        = {191--200},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/248052.248090},
  doi          = {10.1145/248052.248090},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/BellareGR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/il/Rabin94,
  author       = {Tal Rabin},
  title        = {Optimal secrecy and resilience for asynchronous distributed computations
                  ({\unicode{1489}}{\unicode{1496}}{\unicode{1497}}{\unicode{1495}}{\unicode{1493}}{\unicode{1514}}
                  {\unicode{1493}}{\unicode{1506}}{\unicode{1502}}{\unicode{1497}}{\unicode{1491}}{\unicode{1493}}{\unicode{1514}}
                  {\unicode{1488}}{\unicode{1493}}{\unicode{1508}}{\unicode{1496}}{\unicode{1497}}{\unicode{1502}}{\unicode{1500}}{\unicode{1497}}{\unicode{1497}}{\unicode{1501}}
                  {\unicode{1506}}{\unicode{1489}}{\unicode{1493}}{\unicode{1512}} {\unicode{1495}}{\unicode{1513}}{\unicode{1493}}{\unicode{1489}}{\unicode{1497}}{\unicode{1501}}
                  {\unicode{1502}}{\unicode{1489}}{\unicode{1494}}{\unicode{1512}}{\unicode{1497}}{\unicode{1501}}
                  {\unicode{1488}}{\unicode{1505}}{\unicode{1497}}{\unicode{1504}}{\unicode{1499}}{\unicode{1512}}{\unicode{1493}}{\unicode{1504}}{\unicode{1497}}{\unicode{1497}}{\unicode{1501}}.)},
  school       = {Hebrew University of Jerusalem, Israel},
  year         = {1994},
  url          = {https://huji-primo.hosted.exlibrisgroup.com/permalink/f/13ns5ae/972HUJI\_ALMA21159273620003701},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/il/Rabin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/Rabin94,
  author       = {Tal Rabin},
  title        = {Robust Sharing of Secrets When the Dealer is Honest or Cheating},
  journal      = {J. {ACM}},
  volume       = {41},
  number       = {6},
  pages        = {1089--1109},
  year         = {1994},
  url          = {https://doi.org/10.1145/195613.195621},
  doi          = {10.1145/195613.195621},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/Rabin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Ben-OrKR94,
  author       = {Michael Ben{-}Or and
                  Boaz Kelmer and
                  Tal Rabin},
  editor       = {James H. Anderson and
                  David Peleg and
                  Elizabeth Borowsky},
  title        = {Asynchronous Secure Computations with Optimal Resilience (Extended
                  Abstract)},
  booktitle    = {Proceedings of the Thirteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Los Angeles, California, USA, August 14-17,
                  1994},
  pages        = {183--192},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/197917.198088},
  doi          = {10.1145/197917.198088},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/Ben-OrKR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CanettiR93,
  author       = {Ran Canetti and
                  Tal Rabin},
  editor       = {S. Rao Kosaraju and
                  David S. Johnson and
                  Alok Aggarwal},
  title        = {Fast asynchronous Byzantine agreement with optimal resilience},
  booktitle    = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of
                  Computing, May 16-18, 1993, San Diego, CA, {USA}},
  pages        = {42--51},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/167088.167105},
  doi          = {10.1145/167088.167105},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CanettiR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicaliR90,
  author       = {Silvio Micali and
                  Tal Rabin},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Collective Coin Tossing Without Assumptions nor Broadcasting},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {253--266},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_18},
  doi          = {10.1007/3-540-38424-3\_18},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MicaliR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/RabinB89,
  author       = {Tal Rabin and
                  Michael Ben{-}Or},
  editor       = {David S. Johnson},
  title        = {Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
                  (Extended Abstract)},
  booktitle    = {Proceedings of the 21st Annual {ACM} Symposium on Theory of Computing,
                  May 14-17, 1989, Seattle, Washington, {USA}},
  pages        = {73--85},
  publisher    = {{ACM}},
  year         = {1989},
  url          = {https://doi.org/10.1145/73007.73014},
  doi          = {10.1145/73007.73014},
  timestamp    = {Wed, 24 Nov 2021 12:15:31 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/RabinB89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics