dblp.uni-trier.dewww.uni-trier.de

Tal Malkin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
42EEFrançois-Xavier Standaert, Tal Malkin, Moti Yung: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. EUROCRYPT 2009: 443-461
41EESeung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee: Simple, Black-Box Constructions of Adaptively Secure Protocols. TCC 2009: 387-402
40EEYuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright: Private multiparty sampling and approximation of vector combinations. Theor. Comput. Sci. 410(18): 1730-1745 (2009)
2008
39 Tal Malkin: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings Springer 2008
38EEChristophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung: A block cipher based pseudo random number generator secure against side-channel key recovery. ASIACCS 2008: 56-65
37EEDana Dachman-Soled, Homin K. Lee, Tal Malkin, Rocco A. Servedio, Andrew Wan, Hoeteck Wee: Optimal Cryptographic Hardness of Learning Monotone Functions. ICALP (1) 2008: 36-47
36EEShai Avidan, Ariel Elbaz, Tal Malkin: Privacy Preserving Pattern Classification. ICIP 2008: 1684-1687
35EEFrançois-Xavier Standaert, Tal Malkin, Moti Yung: Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk). ICITS 2008: 70
34EEElli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin: Reputation Systems for Anonymous Networks. Privacy Enhancing Technologies 2008: 202-218
33EESeung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee: Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. TCC 2008: 427-444
2007
32EESeung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung: Two-Party Computing with Encrypted Data. ASIACRYPT 2007: 298-314
31EEAmos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb: How Should We Solve Search Problems Privately? CRYPTO 2007: 31-49
30EEYuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright: Private Multiparty Sampling and Approximation of Vector Combinations. ICALP 2007: 243-254
29EEHomin K. Lee, Tal Malkin, Erich M. Nahum: Cryptographic strength of ssl/tls servers: current and recent practices. Internet Measurement Comference 2007: 83-92
28EEYael Gertner, Tal Malkin, Steven Myers: Towards a Separation of Semantic and CCA Security for Public Key Encryption. TCC 2007: 434-455
27EEJon Feldman, Tal Malkin, Rocco A. Servedio, Clifford Stein, Martin J. Wainwright: LP Decoding Corrects a Constant Fraction of Errors. IEEE Transactions on Information Theory 53(1): 82-89 (2007)
2006
26 Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings Springer 2006
25EETal Malkin, François-Xavier Standaert, Moti Yung: A Comparative Cost/Security Analysis of Fault Attack Countermeasures. FDTC 2006: 159-172
24EETal Malkin, Ryan Moriarty, Nikolai Yakovenko: Generalized Environmental Security from Number Theoretic Assumptions. TCC 2006: 343-359
23EEJoan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright: Secure multiparty computation of approximations. ACM Transactions on Algorithms 2(3): 435-472 (2006)
2005
22EEMelissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin: Mercurial Commitments with Applications to Zero-Knowledge Sets. EUROCRYPT 2005: 422-439
2004
21EETal Malkin, Satoshi Obana, Moti Yung: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. EUROCRYPT 2004: 306-322
20EEAmos Beimel, Tal Malkin: A Quantitative Approach to Reductions in Secure Computation. TCC 2004: 238-257
19EERosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin: Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277
18EEAmos Beimel, Yuval Ishai, Tal Malkin: Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing. J. Cryptology 17(2): 125-151 (2004)
17EERan Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: Adaptive versus Non-Adaptive Security of Multi-Party Protocols. J. Cryptology 17(3): 153-207 (2004)
2003
16EEEric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew McDaniel: On the performance, feasibility, and use of forward-secure signatures. ACM Conference on Computer and Communications Security 2003: 131-144
15EEMatt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232
14EEAmos Beimel, Tal Malkin: A Quantitative Approach to Reductions in Secure Computation Electronic Colloquium on Computational Complexity (ECCC)(086): (2003)
2002
13EETal Malkin, Daniele Micciancio, Sara K. Miner: Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods. EUROCRYPT 2002: 400-417
2001
12EERan Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: On Adaptive vs. Non-adaptive Security of Multiparty Protocols. EUROCRYPT 2001: 262-279
11 Yael Gertner, Tal Malkin, Omer Reingold: On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates. FOCS 2001: 126-135
10EEJoan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright: Secure Multiparty Computation of Approximations. ICALP 2001: 927-938
2000
9EEAmos Beimel, Yuval Ishai, Tal Malkin: Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. CRYPTO 2000: 55-73
8EEGiovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsky: Single Database Private Information Retrieval Implies Oblivious Transfer. EUROCRYPT 2000: 122-138
7 Yael Gertner, Sampath Kannan, Tal Malkin, Omer Reingold, Mahesh Viswanathan: The Relationship between Public Key Encryption and Oblivious Transfer. FOCS 2000: 325-335
6 Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin: Protecting Data Privacy in Private Information Retrieval Schemes. J. Comput. Syst. Sci. 60(3): 592-629 (2000)
1999
5EEAmos Beimel, Tal Malkin, Silvio Micali: The All-or-Nothing Nature of Two-Party Secure Computation. CRYPTO 1999: 80-97
4EERan Canetti, Tal Malkin, Kobbi Nissim: Efficient Communication-Storage Tradeoffs for Multicast Encryption. EUROCRYPT 1999: 459-474
3EEAmos Beimel, Yuval Ishai, Eyal Kushilevitz, Tal Malkin: One-Way Functions Are Essential for Single-Server Private Information Retrieval. STOC 1999: 89-98
1998
2EEYael Gertner, Shafi Goldwasser, Tal Malkin: A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication. RANDOM 1998: 200-217
1EEYael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin: Protecting Data Privacy in Private Information Retrieval Schemes. STOC 1998: 151-160

Coauthor Index

1Elli Androulaki [34]
2Shai Avidan [36]
3Amos Beimel [3] [5] [9] [14] [18] [20] [31]
4Steven M. Bellovin [34]
5Matt Blaze [15]
6Ran Canetti [4] [12] [17]
7Melissa Chase [22]
8Seung Geol Choi [32] [33] [34] [41]
9Giovanni Di Crescenzo [8]
10Eric Cronin [16]
11Dana Dachman-Soled [33] [37] [41]
12Ivan Damgård [12] [17]
13Yevgeniy Dodis [26]
14Stefan Dziembowski [12] [17]
15Ariel Elbaz [32] [36]
16Joan Feigenbaum [10] [23]
17Jon Feldman [27]
18Rosario Gennaro [19]
19Yael Gertner [1] [2] [6] [7] [11] [28]
20Shafi Goldwasser [2]
21Alexander Healy [22]
22John Ioannidis [15]
23Yuval Ishai [1] [3] [6] [9] [10] [12] [17] [18] [23] [30] [40]
24Sugih Jamin [16]
25Ari Juels [32]
26Sampath Kannan [7]
27Angelos D. Keromytis [15]
28Aggelos Kiayias [26]
29Eyal Kushilevitz [1] [3] [6]
30Homin K. Lee [29] [37]
31Anna Lysyanskaya [19] [22]
32Patrick Drew McDaniel (Patrick McDaniel) [16]
33Silvio Micali [5] [19]
34Daniele Micciancio [13]
35Sara K. Miner [13]
36Ryan Moriarty [24]
37Steven Myers [28]
38Erich M. Nahum [29]
39Kobbi Nissim [4] [10] [23] [31]
40Satoshi Obana [21]
41Rafail Ostrovsky [8]
42Olivier Pereira [38]
43Christophe Petit [38]
44Tal Rabin [19]
45Omer Reingold [7] [11]
46Leonid Reyzin [22]
47Aviel D. Rubin [15]
48Rocco A. Servedio [27] [37]
49François-Xavier Standaert [25] [35] [38] [42]
50Clifford Stein [27]
51Martin Strauss (Martin J. Strauss) [10] [23] [30] [40]
52Mahesh Viswanathan [7]
53Martin J. Wainwright [27]
54Andrew Wan [37]
55Hoeteck Wee [33] [37] [41]
56Enav Weinreb [31]
57Rebecca N. Wright [10] [23] [30] [40]
58Nikolai Yakovenko [24]
59Moti Yung (Mordechai M. Yung) [21] [25] [26] [32] [35] [38] [42]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)