2009 | ||
---|---|---|
42 | EE | François-Xavier Standaert, Tal Malkin, Moti Yung: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. EUROCRYPT 2009: 443-461 |
41 | EE | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee: Simple, Black-Box Constructions of Adaptively Secure Protocols. TCC 2009: 387-402 |
40 | EE | Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright: Private multiparty sampling and approximation of vector combinations. Theor. Comput. Sci. 410(18): 1730-1745 (2009) |
2008 | ||
39 | Tal Malkin: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings Springer 2008 | |
38 | EE | Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung: A block cipher based pseudo random number generator secure against side-channel key recovery. ASIACCS 2008: 56-65 |
37 | EE | Dana Dachman-Soled, Homin K. Lee, Tal Malkin, Rocco A. Servedio, Andrew Wan, Hoeteck Wee: Optimal Cryptographic Hardness of Learning Monotone Functions. ICALP (1) 2008: 36-47 |
36 | EE | Shai Avidan, Ariel Elbaz, Tal Malkin: Privacy Preserving Pattern Classification. ICIP 2008: 1684-1687 |
35 | EE | François-Xavier Standaert, Tal Malkin, Moti Yung: Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk). ICITS 2008: 70 |
34 | EE | Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin: Reputation Systems for Anonymous Networks. Privacy Enhancing Technologies 2008: 202-218 |
33 | EE | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee: Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. TCC 2008: 427-444 |
2007 | ||
32 | EE | Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung: Two-Party Computing with Encrypted Data. ASIACRYPT 2007: 298-314 |
31 | EE | Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb: How Should We Solve Search Problems Privately? CRYPTO 2007: 31-49 |
30 | EE | Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright: Private Multiparty Sampling and Approximation of Vector Combinations. ICALP 2007: 243-254 |
29 | EE | Homin K. Lee, Tal Malkin, Erich M. Nahum: Cryptographic strength of ssl/tls servers: current and recent practices. Internet Measurement Comference 2007: 83-92 |
28 | EE | Yael Gertner, Tal Malkin, Steven Myers: Towards a Separation of Semantic and CCA Security for Public Key Encryption. TCC 2007: 434-455 |
27 | EE | Jon Feldman, Tal Malkin, Rocco A. Servedio, Clifford Stein, Martin J. Wainwright: LP Decoding Corrects a Constant Fraction of Errors. IEEE Transactions on Information Theory 53(1): 82-89 (2007) |
2006 | ||
26 | Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings Springer 2006 | |
25 | EE | Tal Malkin, François-Xavier Standaert, Moti Yung: A Comparative Cost/Security Analysis of Fault Attack Countermeasures. FDTC 2006: 159-172 |
24 | EE | Tal Malkin, Ryan Moriarty, Nikolai Yakovenko: Generalized Environmental Security from Number Theoretic Assumptions. TCC 2006: 343-359 |
23 | EE | Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright: Secure multiparty computation of approximations. ACM Transactions on Algorithms 2(3): 435-472 (2006) |
2005 | ||
22 | EE | Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin: Mercurial Commitments with Applications to Zero-Knowledge Sets. EUROCRYPT 2005: 422-439 |
2004 | ||
21 | EE | Tal Malkin, Satoshi Obana, Moti Yung: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. EUROCRYPT 2004: 306-322 |
20 | EE | Amos Beimel, Tal Malkin: A Quantitative Approach to Reductions in Secure Computation. TCC 2004: 238-257 |
19 | EE | Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin: Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277 |
18 | EE | Amos Beimel, Yuval Ishai, Tal Malkin: Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing. J. Cryptology 17(2): 125-151 (2004) |
17 | EE | Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: Adaptive versus Non-Adaptive Security of Multi-Party Protocols. J. Cryptology 17(3): 153-207 (2004) |
2003 | ||
16 | EE | Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew McDaniel: On the performance, feasibility, and use of forward-secure signatures. ACM Conference on Computer and Communications Security 2003: 131-144 |
15 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232 |
14 | EE | Amos Beimel, Tal Malkin: A Quantitative Approach to Reductions in Secure Computation Electronic Colloquium on Computational Complexity (ECCC)(086): (2003) |
2002 | ||
13 | EE | Tal Malkin, Daniele Micciancio, Sara K. Miner: Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods. EUROCRYPT 2002: 400-417 |
2001 | ||
12 | EE | Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: On Adaptive vs. Non-adaptive Security of Multiparty Protocols. EUROCRYPT 2001: 262-279 |
11 | Yael Gertner, Tal Malkin, Omer Reingold: On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates. FOCS 2001: 126-135 | |
10 | EE | Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright: Secure Multiparty Computation of Approximations. ICALP 2001: 927-938 |
2000 | ||
9 | EE | Amos Beimel, Yuval Ishai, Tal Malkin: Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. CRYPTO 2000: 55-73 |
8 | EE | Giovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsky: Single Database Private Information Retrieval Implies Oblivious Transfer. EUROCRYPT 2000: 122-138 |
7 | Yael Gertner, Sampath Kannan, Tal Malkin, Omer Reingold, Mahesh Viswanathan: The Relationship between Public Key Encryption and Oblivious Transfer. FOCS 2000: 325-335 | |
6 | Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin: Protecting Data Privacy in Private Information Retrieval Schemes. J. Comput. Syst. Sci. 60(3): 592-629 (2000) | |
1999 | ||
5 | EE | Amos Beimel, Tal Malkin, Silvio Micali: The All-or-Nothing Nature of Two-Party Secure Computation. CRYPTO 1999: 80-97 |
4 | EE | Ran Canetti, Tal Malkin, Kobbi Nissim: Efficient Communication-Storage Tradeoffs for Multicast Encryption. EUROCRYPT 1999: 459-474 |
3 | EE | Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tal Malkin: One-Way Functions Are Essential for Single-Server Private Information Retrieval. STOC 1999: 89-98 |
1998 | ||
2 | EE | Yael Gertner, Shafi Goldwasser, Tal Malkin: A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication. RANDOM 1998: 200-217 |
1 | EE | Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin: Protecting Data Privacy in Private Information Retrieval Schemes. STOC 1998: 151-160 |