| 2008 |
| 47 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin,
Steffen Reidt,
Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
ESORICS 2008: 49-65 |
| 46 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups.
EUROCRYPT 2008: 88-107 |
| 45 | EE | Shai Halevi,
Tal Rabin:
Degradation and Amplification of Computational Hardness.
TCC 2008: 626-643 |
| 2007 |
| 44 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
J. Cryptology 20(1): 51-83 (2007) |
| 43 | EE | Rosario Gennaro,
Tal Rabin,
Stanislaw Jarecki,
Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions.
J. Cryptology 20(3): 393 (2007) |
| 42 | EE | Rosario Gennaro,
Tal Rabin,
Hugo Krawczyk:
RSA-Based Undeniable Signatures.
J. Cryptology 20(3): 394 (2007) |
| 2006 |
| 41 | | Shai Halevi,
Tal Rabin:
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings
Springer 2006 |
| 40 | EE | Eyal Kushilevitz,
Yehuda Lindell,
Tal Rabin:
Information-theoretically secure protocols and security under composition.
STOC 2006: 109-118 |
| 39 | EE | Yehuda Lindell,
Anna Lysyanskaya,
Tal Rabin:
On the composition of authenticated Byzantine Agreement.
J. ACM 53(6): 881-917 (2006) |
| 2005 |
| 38 | EE | Boaz Barak,
Ran Canetti,
Yehuda Lindell,
Rafael Pass,
Tal Rabin:
Secure Computation Without Authentication.
CRYPTO 2005: 361-377 |
| 2004 |
| 37 | EE | Yevgeniy Dodis,
Rosario Gennaro,
Johan Håstad,
Hugo Krawczyk,
Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
CRYPTO 2004: 494-510 |
| 36 | EE | Rosario Gennaro,
Hugo Krawczyk,
Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups.
EUROCRYPT 2004: 361-381 |
| 35 | EE | Rosario Gennaro,
Anna Lysyanskaya,
Tal Malkin,
Silvio Micali,
Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
TCC 2004: 258-277 |
| 2003 |
| 34 | EE | Ran Canetti,
Tal Rabin:
Universal Composition with Joint State.
CRYPTO 2003: 265-281 |
| 33 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol.
CT-RSA 2003: 373-390 |
| 32 | EE | Helmut Scherzer,
Ran Canetti,
Paul A. Karger,
Hugo Krawczyk,
Tal Rabin,
David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
ESORICS 2003: 181-200 |
| 2002 |
| 31 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
On 2-Round Secure Multiparty Computation.
CRYPTO 2002: 178-193 |
| 30 | EE | Jee Hea An,
Yevgeniy Dodis,
Tal Rabin:
On the Security of Joint Signature and Encryption.
EUROCRYPT 2002: 83-107 |
| 29 | EE | Yehuda Lindell,
Anna Lysyanskaya,
Tal Rabin:
Sequential composition of protocols without simultaneous termination.
PODC 2002: 203-212 |
| 28 | EE | Yehuda Lindell,
Anna Lysyanskaya,
Tal Rabin:
On the composition of authenticated byzantine agreement.
STOC 2002: 514-523 |
| 2001 |
| 27 | EE | Eyal Kushilevitz,
Tal Rabin:
Fair e-Lotteries and e-Casinos.
CT-RSA 2001: 100-109 |
| 26 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
The round complexity of verifiable secret sharing and secure multicast.
STOC 2001: 580-589 |
| 25 | | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust Threshold DSS Signatures.
Inf. Comput. 164(1): 54-84 (2001) |
| 2000 |
| 24 | EE | Yevgeniy Dodis,
Shai Halevi,
Tal Rabin:
A Cryptographic Solution to a Game Theoretic Problem.
CRYPTO 2000: 112-130 |
| 23 | EE | Hugo Krawczyk,
Tal Rabin:
Chameleon Signatures.
NDSS 2000 |
| 22 | EE | Rosario Gennaro,
Tal Rabin,
Stanislaw Jarecki,
Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions.
J. Cryptology 13(2): 273-300 (2000) |
| 21 | EE | Rosario Gennaro,
Tal Rabin,
Hugo Krawczyk:
RSA-Based Undeniable Signatures.
J. Cryptology 13(4): 397-416 (2000) |
| 20 | EE | Juan A. Garay,
Rosario Gennaro,
Charanjit S. Jutla,
Tal Rabin:
Secure distributed storage and retrieval.
Theor. Comput. Sci. 243(1-2): 363-389 (2000) |
| 1999 |
| 19 | EE | Ran Canetti,
Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Adaptive Security for Threshold Cryptosystems.
CRYPTO 1999: 98-115 |
| 18 | EE | Rosario Gennaro,
Shai Halevi,
Tal Rabin:
Secure Hash-and-Sign Signatures Without the Random Oracle.
EUROCRYPT 1999: 123-139 |
| 17 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
EUROCRYPT 1999: 295-310 |
| 16 | EE | Ronald Cramer,
Ivan Damgård,
Stefan Dziembowski,
Martin Hirt,
Tal Rabin:
Efficient Multiparty Computations Secure Against an Adaptive Adversary.
EUROCRYPT 1999: 311-326 |
| 1998 |
| 15 | EE | Rosario Gennaro,
Daniele Micciancio,
Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
ACM Conference on Computer and Communications Security 1998: 67-72 |
| 14 | EE | Tal Rabin:
A Simplified Approach to Threshold and Proactive RSA.
CRYPTO 1998: 89-104 |
| 13 | EE | Mihir Bellare,
Juan A. Garay,
Tal Rabin:
Fast Batch Verification for Modular Exponentiation and Digital Signatures.
EUROCRYPT 1998: 236-250 |
| 12 | EE | Mihir Bellare,
Juan A. Garay,
Tal Rabin:
Batch Verification with Applications to Cryptography and Checking.
LATIN 1998: 170-191 |
| 11 | EE | Rosario Gennaro,
Michael O. Rabin,
Tal Rabin:
Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography.
PODC 1998: 101-111 |
| 1997 |
| 10 | EE | Rosario Gennaro,
Hugo Krawczyk,
Tal Rabin:
RSA-Based Undeniable Signatures.
CRYPTO 1997: 132-149 |
| 9 | | Juan A. Garay,
Rosario Gennaro,
Charanjit S. Jutla,
Tal Rabin:
Secure Distributed Storage and Retrieval.
WDAG 1997: 275-289 |
| 1996 |
| 8 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust and Efficient Sharing of RSA Functions.
CRYPTO 1996: 157-172 |
| 7 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust Threshold DSS Signatures.
EUROCRYPT 1996: 354-371 |
| 6 | | Mihir Bellare,
Juan A. Garay,
Tal Rabin:
Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing.
PODC 1996: 191-200 |
| 1994 |
| 5 | | Michael Ben-Or,
Boaz Kelmer,
Tal Rabin:
Asynchronous Secure Computations with Optimal Resilience (Extended Abstract).
PODC 1994: 183-192 |
| 4 | EE | Tal Rabin:
Robust Sharing of Secrets When the Dealer is Honest or Cheating.
J. ACM 41(6): 1089-1109 (1994) |
| 1993 |
| 3 | EE | Ran Canetti,
Tal Rabin:
Fast asynchronous Byzantine agreement with optimal resilience.
STOC 1993: 42-51 |
| 1990 |
| 2 | EE | Silvio Micali,
Tal Rabin:
Collective Coin Tossing Without Assumptions nor Broadcasting.
CRYPTO 1990: 253-266 |
| 1989 |
| 1 | | Tal Rabin,
Michael Ben-Or:
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract)
STOC 1989: 73-85 |