2009 |
42 | EE | François-Xavier Standaert,
Tal Malkin,
Moti Yung:
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
EUROCRYPT 2009: 443-461 |
41 | EE | Seung Geol Choi,
Dana Dachman-Soled,
Tal Malkin,
Hoeteck Wee:
Simple, Black-Box Constructions of Adaptively Secure Protocols.
TCC 2009: 387-402 |
40 | EE | Yuval Ishai,
Tal Malkin,
Martin J. Strauss,
Rebecca N. Wright:
Private multiparty sampling and approximation of vector combinations.
Theor. Comput. Sci. 410(18): 1730-1745 (2009) |
2008 |
39 | | Tal Malkin:
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings
Springer 2008 |
38 | EE | Christophe Petit,
François-Xavier Standaert,
Olivier Pereira,
Tal Malkin,
Moti Yung:
A block cipher based pseudo random number generator secure against side-channel key recovery.
ASIACCS 2008: 56-65 |
37 | EE | Dana Dachman-Soled,
Homin K. Lee,
Tal Malkin,
Rocco A. Servedio,
Andrew Wan,
Hoeteck Wee:
Optimal Cryptographic Hardness of Learning Monotone Functions.
ICALP (1) 2008: 36-47 |
36 | EE | Shai Avidan,
Ariel Elbaz,
Tal Malkin:
Privacy Preserving Pattern Classification.
ICIP 2008: 1684-1687 |
35 | EE | François-Xavier Standaert,
Tal Malkin,
Moti Yung:
Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk).
ICITS 2008: 70 |
34 | EE | Elli Androulaki,
Seung Geol Choi,
Steven M. Bellovin,
Tal Malkin:
Reputation Systems for Anonymous Networks.
Privacy Enhancing Technologies 2008: 202-218 |
33 | EE | Seung Geol Choi,
Dana Dachman-Soled,
Tal Malkin,
Hoeteck Wee:
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.
TCC 2008: 427-444 |
2007 |
32 | EE | Seung Geol Choi,
Ariel Elbaz,
Ari Juels,
Tal Malkin,
Moti Yung:
Two-Party Computing with Encrypted Data.
ASIACRYPT 2007: 298-314 |
31 | EE | Amos Beimel,
Tal Malkin,
Kobbi Nissim,
Enav Weinreb:
How Should We Solve Search Problems Privately?
CRYPTO 2007: 31-49 |
30 | EE | Yuval Ishai,
Tal Malkin,
Martin J. Strauss,
Rebecca N. Wright:
Private Multiparty Sampling and Approximation of Vector Combinations.
ICALP 2007: 243-254 |
29 | EE | Homin K. Lee,
Tal Malkin,
Erich M. Nahum:
Cryptographic strength of ssl/tls servers: current and recent practices.
Internet Measurement Comference 2007: 83-92 |
28 | EE | Yael Gertner,
Tal Malkin,
Steven Myers:
Towards a Separation of Semantic and CCA Security for Public Key Encryption.
TCC 2007: 434-455 |
27 | EE | Jon Feldman,
Tal Malkin,
Rocco A. Servedio,
Clifford Stein,
Martin J. Wainwright:
LP Decoding Corrects a Constant Fraction of Errors.
IEEE Transactions on Information Theory 53(1): 82-89 (2007) |
2006 |
26 | | Moti Yung,
Yevgeniy Dodis,
Aggelos Kiayias,
Tal Malkin:
Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings
Springer 2006 |
25 | EE | Tal Malkin,
François-Xavier Standaert,
Moti Yung:
A Comparative Cost/Security Analysis of Fault Attack Countermeasures.
FDTC 2006: 159-172 |
24 | EE | Tal Malkin,
Ryan Moriarty,
Nikolai Yakovenko:
Generalized Environmental Security from Number Theoretic Assumptions.
TCC 2006: 343-359 |
23 | EE | Joan Feigenbaum,
Yuval Ishai,
Tal Malkin,
Kobbi Nissim,
Martin J. Strauss,
Rebecca N. Wright:
Secure multiparty computation of approximations.
ACM Transactions on Algorithms 2(3): 435-472 (2006) |
2005 |
22 | EE | Melissa Chase,
Alexander Healy,
Anna Lysyanskaya,
Tal Malkin,
Leonid Reyzin:
Mercurial Commitments with Applications to Zero-Knowledge Sets.
EUROCRYPT 2005: 422-439 |
2004 |
21 | EE | Tal Malkin,
Satoshi Obana,
Moti Yung:
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.
EUROCRYPT 2004: 306-322 |
20 | EE | Amos Beimel,
Tal Malkin:
A Quantitative Approach to Reductions in Secure Computation.
TCC 2004: 238-257 |
19 | EE | Rosario Gennaro,
Anna Lysyanskaya,
Tal Malkin,
Silvio Micali,
Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
TCC 2004: 258-277 |
18 | EE | Amos Beimel,
Yuval Ishai,
Tal Malkin:
Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing.
J. Cryptology 17(2): 125-151 (2004) |
17 | EE | Ran Canetti,
Ivan Damgård,
Stefan Dziembowski,
Yuval Ishai,
Tal Malkin:
Adaptive versus Non-Adaptive Security of Multi-Party Protocols.
J. Cryptology 17(3): 153-207 (2004) |
2003 |
16 | EE | Eric Cronin,
Sugih Jamin,
Tal Malkin,
Patrick Drew McDaniel:
On the performance, feasibility, and use of forward-secure signatures.
ACM Conference on Computer and Communications Security 2003: 131-144 |
15 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis,
Tal Malkin,
Aviel D. Rubin:
WAR: Wireless Anonymous Routing.
Security Protocols Workshop 2003: 218-232 |
14 | EE | Amos Beimel,
Tal Malkin:
A Quantitative Approach to Reductions in Secure Computation
Electronic Colloquium on Computational Complexity (ECCC)(086): (2003) |
2002 |
13 | EE | Tal Malkin,
Daniele Micciancio,
Sara K. Miner:
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods.
EUROCRYPT 2002: 400-417 |
2001 |
12 | EE | Ran Canetti,
Ivan Damgård,
Stefan Dziembowski,
Yuval Ishai,
Tal Malkin:
On Adaptive vs. Non-adaptive Security of Multiparty Protocols.
EUROCRYPT 2001: 262-279 |
11 | | Yael Gertner,
Tal Malkin,
Omer Reingold:
On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates.
FOCS 2001: 126-135 |
10 | EE | Joan Feigenbaum,
Yuval Ishai,
Tal Malkin,
Kobbi Nissim,
Martin Strauss,
Rebecca N. Wright:
Secure Multiparty Computation of Approximations.
ICALP 2001: 927-938 |
2000 |
9 | EE | Amos Beimel,
Yuval Ishai,
Tal Malkin:
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing.
CRYPTO 2000: 55-73 |
8 | EE | Giovanni Di Crescenzo,
Tal Malkin,
Rafail Ostrovsky:
Single Database Private Information Retrieval Implies Oblivious Transfer.
EUROCRYPT 2000: 122-138 |
7 | | Yael Gertner,
Sampath Kannan,
Tal Malkin,
Omer Reingold,
Mahesh Viswanathan:
The Relationship between Public Key Encryption and Oblivious Transfer.
FOCS 2000: 325-335 |
6 | | Yael Gertner,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
Protecting Data Privacy in Private Information Retrieval Schemes.
J. Comput. Syst. Sci. 60(3): 592-629 (2000) |
1999 |
5 | EE | Amos Beimel,
Tal Malkin,
Silvio Micali:
The All-or-Nothing Nature of Two-Party Secure Computation.
CRYPTO 1999: 80-97 |
4 | EE | Ran Canetti,
Tal Malkin,
Kobbi Nissim:
Efficient Communication-Storage Tradeoffs for Multicast Encryption.
EUROCRYPT 1999: 459-474 |
3 | EE | Amos Beimel,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
One-Way Functions Are Essential for Single-Server Private Information Retrieval.
STOC 1999: 89-98 |
1998 |
2 | EE | Yael Gertner,
Shafi Goldwasser,
Tal Malkin:
A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication.
RANDOM 1998: 200-217 |
1 | EE | Yael Gertner,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
Protecting Data Privacy in Private Information Retrieval Schemes.
STOC 1998: 151-160 |