default search action
Tal Rabin
Person information
- affiliation: University of Pennsylvania, Philadelphia, PA, USA
- affiliation (former): IBM Research
- award (2014): Anita Borg Institute Women of Vision Awards
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c64]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, Tal Rabin:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. EUROCRYPT (5) 2024: 62-91 - 2023
- [c63]Erica Blum, Derek Leung, Julian Loss, Jonathan Katz, Tal Rabin:
Analyzing the Real-World Security of the Algorand Blockchain. CCS 2023: 830-844 - [c62]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Additive Randomized Encodings and Their Applications. CRYPTO (1) 2023: 203-235 - [c61]Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. SP 2023: 477-496 - [c60]Brett Hemenway Falk, Daniel Noble, Tal Rabin:
Proactive Secret Sharing with Constant Communication. TCC (2) 2023: 337-373 - [i43]Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. CoRR abs/2308.09883 (2023) - [i42]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin, Yiping Ma:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. IACR Cryptol. ePrint Arch. 2023: 427 (2023) - [i41]Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. IACR Cryptol. ePrint Arch. 2023: 486 (2023) - [i40]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Additive Randomized Encodings and Their Applications. IACR Cryptol. ePrint Arch. 2023: 870 (2023) - [i39]Brett Hemenway Falk, Daniel Noble, Tal Rabin:
Proactive Secret Sharing with Constant Communication. IACR Cryptol. ePrint Arch. 2023: 942 (2023) - [i38]Fabrice Benhamouda, Erica Blum, Jonathan Katz, Derek Leung, Julian Loss, Tal Rabin:
Analyzing the Real-World Security of the Algorand Blockchain. IACR Cryptol. ePrint Arch. 2023: 1344 (2023) - 2022
- [c59]Tal Rabin:
New Multiparty Computational Model: From Nakamoto to YOSO. AsiaCCS 2022: 1 - [c58]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin:
Threshold Cryptography as a Service (in the Multiserver and YOSO Models). CCS 2022: 323-336 - [c57]Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel:
Incremental Offline/Online PIR. USENIX Security Symposium 2022: 1741-1758 - 2021
- [j19]Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:
On the Local Leakage Resilience of Linear Secret Sharing Schemes. J. Cryptol. 34(2): 10 (2021) - [j18]Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin:
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning. Proc. Priv. Enhancing Technol. 2021(1): 188-208 (2021) - [j17]Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer:
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. Proc. Priv. Enhancing Technol. 2021(4): 528-548 (2021) - [c56]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles. CRYPTO (2) 2021: 64-93 - [i37]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles. IACR Cryptol. ePrint Arch. 2021: 210 (2021) - [i36]Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer:
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. IACR Cryptol. ePrint Arch. 2021: 256 (2021) - [i35]Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel:
Incremental Offline/Online PIR (extended version). IACR Cryptol. ePrint Arch. 2021: 1438 (2021) - 2020
- [c55]Tal Rabin:
Cryptography for #MeToo. SACMAT 2020: 33 - [c54]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Public Blockchain Keep a Secret? TCC (1) 2020: 260-290 - [i34]Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin:
FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. CoRR abs/2004.02229 (2020) - [i33]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Blockchain Keep a Secret? IACR Cryptol. ePrint Arch. 2020: 464 (2020)
2010 – 2019
- 2019
- [j16]Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi:
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. J. Cryptol. 32(2): 265-323 (2019) - [j15]Benjamin Kuykendall, Hugo Krawczyk, Tal Rabin:
Cryptography for #MeToo. Proc. Priv. Enhancing Technol. 2019(3): 409-429 (2019) - [c53]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin:
On Fully Secure MPC with Solitary Output. TCC (1) 2019: 312-340 - [i32]Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:
On the Local Leakage Resilience of Linear Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2019: 653 (2019) - [i31]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin:
On Fully Secure MPC with Solitary Output. IACR Cryptol. ePrint Arch. 2019: 1032 (2019) - 2018
- [j14]Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin:
Privacy-Preserving Search of Similar Patients in Genomic Data. Proc. Priv. Enhancing Technol. 2018(4): 104-124 (2018) - [c52]Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:
On the Local Leakage Resilience of Linear Secret Sharing Schemes. CRYPTO (1) 2018: 531-561 - [c51]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Best Possible Information-Theoretic MPC. TCC (2) 2018: 255-281 - [i30]Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
Best Possible Information-Theoretic MPC. IACR Cryptol. ePrint Arch. 2018: 913 (2018) - 2017
- [c50]Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-interactive Multiparty Computation Against Constant-Size Collusion. CRYPTO (1) 2017: 391-419 - [c49]Yehuda Lindell, Tal Rabin:
Secure Two-Party Computation with Fairness - A Necessary Design Principle. TCC (1) 2017: 565-580 - [i29]Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin:
Privacy-Preserving Search of Similar Patients in Genomic Data. IACR Cryptol. ePrint Arch. 2017: 144 (2017) - [i28]Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion. IACR Cryptol. ePrint Arch. 2017: 555 (2017) - [i27]Yehuda Lindell, Tal Rabin:
Secure Two-Party Computation with Fairness - A Necessary Design Principle. IACR Cryptol. ePrint Arch. 2017: 952 (2017) - 2016
- [c48]Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. CCS 2016: 1451-1463 - [c47]Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin:
Secure Multiparty Computation with General Interaction Patterns. ITCS 2016: 157-168 - [i26]Lorrie Faith Cranor, Tal Rabin, Vitaly Shmatikov, Salil P. Vadhan, Daniel J. Weitzner:
Towards a Privacy Research Roadmap for the Computing Community. CoRR abs/1604.03160 (2016) - [i25]Marc Fischlin, Alexander May, David Pointcheval, Tal Rabin:
Public-Key Cryptography (Dagstuhl Seminar 16371). Dagstuhl Reports 6(9): 46-58 (2016) - [i24]Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. IACR Cryptol. ePrint Arch. 2016: 518 (2016) - 2015
- [i23]Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin:
Secure Multiparty Computation with General Interaction Patterns. IACR Cryptol. ePrint Arch. 2015: 1173 (2015) - 2014
- [j13]Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan:
Protecting Circuits from Computationally Bounded and Noisy Leakage. SIAM J. Comput. 43(5): 1564-1614 (2014) - 2013
- [c46]Gilad Asharov, Yehuda Lindell, Tal Rabin:
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. TCC 2013: 243-262 - [i22]Gilad Asharov, Yehuda Lindell, Tal Rabin:
Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. IACR Cryptol. ePrint Arch. 2013: 110 (2013) - 2012
- [j12]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted With Block Ciphers. IEEE Trans. Inf. Theory 58(11): 6989-7001 (2012) - [c45]Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft:
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. CT-RSA 2012: 313-331 - 2011
- [j11]Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin:
Secure Computation Without Authentication. J. Cryptol. 24(4): 720-760 (2011) - [c44]Gilad Asharov, Yehuda Lindell, Tal Rabin:
Perfectly-Secure Multiplication for Any t < n/3. CRYPTO 2011: 240-258 - [i21]Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft:
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. IACR Cryptol. ePrint Arch. 2011: 494 (2011) - 2010
- [j10]Eyal Kushilevitz, Yehuda Lindell, Tal Rabin:
Information-Theoretically Secure Protocols and Security under Composition. SIAM J. Comput. 39(5): 2090-2112 (2010) - [c43]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. ACNS 2010: 309-328 - [c42]Suresh Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin, Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David C. Toll:
Designing a Side Channel Resistant Random Number Generator. CARDIS 2010: 49-64 - [c41]Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan:
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. EUROCRYPT 2010: 135-156 - [c40]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding over the Integers. Public Key Cryptography 2010: 142-160 - [p1]Jee Hea An, Tal Rabin:
Security for Signcryption: The Two-User Model. Practical Signcryption 2010: 21-42 - [e2]Tal Rabin:
Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings. Lecture Notes in Computer Science 6223, Springer 2010, ISBN 978-3-642-14622-0 [contents] - [i20]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. CoRR abs/1009.1759 (2010) - [i19]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. IACR Cryptol. ePrint Arch. 2010: 68 (2010) - [i18]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. IACR Cryptol. ePrint Arch. 2010: 477 (2010)
2000 – 2009
- 2009
- [c39]Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan:
The Round Complexity of Verifiable Secret Sharing Revisited. CRYPTO 2009: 487-504 - [c38]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. DCC 2009: 213-222 - [i17]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding Over the Integers. IACR Cryptol. ePrint Arch. 2009: 569 (2009) - [i16]Eyal Kushilevitz, Yehuda Lindell, Tal Rabin:
Information-Theoretically Secure Protocols and Security Under Composition. IACR Cryptol. ePrint Arch. 2009: 630 (2009) - 2008
- [c37]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65 - [c36]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107 - [c35]Shai Halevi, Tal Rabin:
Degradation and Amplification of Computational Hardness. TCC 2008: 626-643 - [i15]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. IACR Cryptol. ePrint Arch. 2008: 45 (2008) - [i14]Shai Halevi, Tal Rabin:
Degradation and Amplification of Computational Hardness. IACR Cryptol. ePrint Arch. 2008: 102 (2008) - [i13]Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan:
The Round Complexity of Verifiable Secret Sharing Revisited. IACR Cryptol. ePrint Arch. 2008: 172 (2008) - [i12]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs. IACR Cryptol. ePrint Arch. 2008: 308 (2008) - 2007
- [j9]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptol. 20(1): 51-83 (2007) - [j8]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 20(3): 393 (2007) - [j7]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 20(3): 394 (2007) - [i11]Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin:
Secure Computation Without Authentication. IACR Cryptol. ePrint Arch. 2007: 464 (2007) - 2006
- [j6]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the composition of authenticated Byzantine Agreement. J. ACM 53(6): 881-917 (2006) - [c34]Eyal Kushilevitz, Yehuda Lindell, Tal Rabin:
Information-theoretically secure protocols and security under composition. STOC 2006: 109-118 - [e1]Shai Halevi, Tal Rabin:
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings. Lecture Notes in Computer Science 3876, Springer 2006, ISBN 3-540-32731-2 [contents] - 2005
- [c33]Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin:
Secure Computation Without Authentication. CRYPTO 2005: 361-377 - 2004
- [c32]Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 - [c31]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381 - [c30]Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277 - [i10]Boaz Barak, Yehuda Lindell, Tal Rabin:
Protocol Initialization for the Framework of Universal Composability. IACR Cryptol. ePrint Arch. 2004: 6 (2004) - [i9]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. IACR Cryptol. ePrint Arch. 2004: 99 (2004) - [i8]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the Composition of Authenticated Byzantine Agreement. IACR Cryptol. ePrint Arch. 2004: 181 (2004) - 2003
- [c29]Ran Canetti, Tal Rabin:
Universal Composition with Joint State. CRYPTO 2003: 265-281 - [c28]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390 - [c27]Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200 - 2002
- [c26]Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
On 2-Round Secure Multiparty Computation. CRYPTO 2002: 178-193 - [c25]Jee Hea An, Yevgeniy Dodis, Tal Rabin:
On the Security of Joint Signature and Encryption. EUROCRYPT 2002: 83-107 - [c24]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
Sequential composition of protocols without simultaneous termination. PODC 2002: 203-212 - [c23]Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the composition of authenticated byzantine agreement. STOC 2002: 514-523 - [i7]Jee Hea An, Yevgeniy Dodis, Tal Rabin:
On the Security of Joint Signature and Encryption. IACR Cryptol. ePrint Arch. 2002: 46 (2002) - [i6]Ran Canetti, Tal Rabin:
Universal Composition with Joint State. IACR Cryptol. ePrint Arch. 2002: 47 (2002) - 2001
- [j5]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001) - [c22]Eyal Kushilevitz, Tal Rabin:
Fair e-Lotteries and e-Casinos. CT-RSA 2001: 100-109 - [c21]Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:
The round complexity of verifiable secret sharing and secure multicast. STOC 2001: 580-589 - 2000
- [j4]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 13(2): 273-300 (2000) - [j3]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 13(4): 397-416 (2000) - [j2]Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin:
Secure distributed storage and retrieval. Theor. Comput. Sci. 243(1-2): 363-389 (2000) - [c20]Yevgeniy Dodis, Shai Halevi, Tal Rabin:
A Cryptographic Solution to a Game Theoretic Problem. CRYPTO 2000: 112-130 - [c19]Hugo Krawczyk, Tal Rabin:
Chameleon Signatures. NDSS 2000
1990 – 1999
- 1999
- [c18]Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 - [c17]Rosario Gennaro, Shai Halevi, Tal Rabin:
Secure Hash-and-Sign Signatures Without the Random Oracle. EUROCRYPT 1999: 123-139 - [c16]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310 - [c15]Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin:
Efficient Multiparty Computations Secure Against an Adaptive Adversary. EUROCRYPT 1999: 311-326 - [i5]Rosario Gennaro, Shai Halevi, Tal Rabin:
Secure Hash-and-Sign Signatures without the Random Oracle. IACR Cryptol. ePrint Arch. 1999: 13 (1999) - 1998
- [c14]Rosario Gennaro, Daniele Micciancio, Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. CCS 1998: 67-72 - [c13]Tal Rabin:
A Simplified Approach to Threshold and Proactive RSA. CRYPTO 1998: 89-104 - [c12]Mihir Bellare, Juan A. Garay, Tal Rabin:
Fast Batch Verification for Modular Exponentiation and Digital Signatures. EUROCRYPT 1998: 236-250 - [c11]Mihir Bellare, Juan A. Garay, Tal Rabin:
Batch Verification with Applications to Cryptography and Checking. LATIN 1998: 170-191 - [c10]Rosario Gennaro, Michael O. Rabin, Tal Rabin:
Simplified VSS and Fast-Track Multiparty Computations with Applications to Threshold Cryptography. PODC 1998: 101-111 - [i4]Mihir Bellare, Juan A. Garay, Tal Rabin:
Fast Batch Verification for Modular Exponentiation and Digital Signatures. IACR Cryptol. ePrint Arch. 1998: 7 (1998) - [i3]Rosario Gennaro, Daniele Micciancio, Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. IACR Cryptol. ePrint Arch. 1998: 8 (1998) - [i2]Hugo Krawczyk, Tal Rabin:
Chameleon Hashing and Signatures. IACR Cryptol. ePrint Arch. 1998: 10 (1998) - [i1]Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin:
Secure Distributed Storage and Retrieval. IACR Cryptol. ePrint Arch. 1998: 25 (1998) - 1997
- [c9]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
RSA-Based Undeniable Signatures. CRYPTO 1997: 132-149 - [c8]Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin:
Secure Distributed Storage and Retrieval. WDAG 1997: 275-289 - 1996
- [c7]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172 - [c6]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371 - [c5]Mihir Bellare, Juan A. Garay, Tal Rabin:
Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing. PODC 1996: 191-200 - 1994
- [b1]