dblp.uni-trier.dewww.uni-trier.de

Tal Rabin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
47EERosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen: Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65
46EERosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin: Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107
45EEShai Halevi, Tal Rabin: Degradation and Amplification of Computational Hardness. TCC 2008: 626-643
2007
44EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptology 20(1): 51-83 (2007)
43EERosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 20(3): 393 (2007)
42EERosario Gennaro, Tal Rabin, Hugo Krawczyk: RSA-Based Undeniable Signatures. J. Cryptology 20(3): 394 (2007)
2006
41 Shai Halevi, Tal Rabin: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings Springer 2006
40EEEyal Kushilevitz, Yehuda Lindell, Tal Rabin: Information-theoretically secure protocols and security under composition. STOC 2006: 109-118
39EEYehuda Lindell, Anna Lysyanskaya, Tal Rabin: On the composition of authenticated Byzantine Agreement. J. ACM 53(6): 881-917 (2006)
2005
38EEBoaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin: Secure Computation Without Authentication. CRYPTO 2005: 361-377
2004
37EEYevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510
36EERosario Gennaro, Hugo Krawczyk, Tal Rabin: Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381
35EERosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin: Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277
2003
34EERan Canetti, Tal Rabin: Universal Composition with Joint State. CRYPTO 2003: 265-281
33EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390
32EEHelmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll: Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200
2002
31EERosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin: On 2-Round Secure Multiparty Computation. CRYPTO 2002: 178-193
30EEJee Hea An, Yevgeniy Dodis, Tal Rabin: On the Security of Joint Signature and Encryption. EUROCRYPT 2002: 83-107
29EEYehuda Lindell, Anna Lysyanskaya, Tal Rabin: Sequential composition of protocols without simultaneous termination. PODC 2002: 203-212
28EEYehuda Lindell, Anna Lysyanskaya, Tal Rabin: On the composition of authenticated byzantine agreement. STOC 2002: 514-523
2001
27EEEyal Kushilevitz, Tal Rabin: Fair e-Lotteries and e-Casinos. CT-RSA 2001: 100-109
26EERosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin: The round complexity of verifiable secret sharing and secure multicast. STOC 2001: 580-589
25 Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001)
2000
24EEYevgeniy Dodis, Shai Halevi, Tal Rabin: A Cryptographic Solution to a Game Theoretic Problem. CRYPTO 2000: 112-130
23EEHugo Krawczyk, Tal Rabin: Chameleon Signatures. NDSS 2000
22EERosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 13(2): 273-300 (2000)
21EERosario Gennaro, Tal Rabin, Hugo Krawczyk: RSA-Based Undeniable Signatures. J. Cryptology 13(4): 397-416 (2000)
20EEJuan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin: Secure distributed storage and retrieval. Theor. Comput. Sci. 243(1-2): 363-389 (2000)
1999
19EERan Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115
18EERosario Gennaro, Shai Halevi, Tal Rabin: Secure Hash-and-Sign Signatures Without the Random Oracle. EUROCRYPT 1999: 123-139
17EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310
16EERonald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin: Efficient Multiparty Computations Secure Against an Adaptive Adversary. EUROCRYPT 1999: 311-326
1998
15EERosario Gennaro, Daniele Micciancio, Tal Rabin: An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. ACM Conference on Computer and Communications Security 1998: 67-72
14EETal Rabin: A Simplified Approach to Threshold and Proactive RSA. CRYPTO 1998: 89-104
13EEMihir Bellare, Juan A. Garay, Tal Rabin: Fast Batch Verification for Modular Exponentiation and Digital Signatures. EUROCRYPT 1998: 236-250
12EEMihir Bellare, Juan A. Garay, Tal Rabin: Batch Verification with Applications to Cryptography and Checking. LATIN 1998: 170-191
11EERosario Gennaro, Michael O. Rabin, Tal Rabin: Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography. PODC 1998: 101-111
1997
10EERosario Gennaro, Hugo Krawczyk, Tal Rabin: RSA-Based Undeniable Signatures. CRYPTO 1997: 132-149
9 Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin: Secure Distributed Storage and Retrieval. WDAG 1997: 275-289
1996
8EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172
7EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371
6 Mihir Bellare, Juan A. Garay, Tal Rabin: Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing. PODC 1996: 191-200
1994
5 Michael Ben-Or, Boaz Kelmer, Tal Rabin: Asynchronous Secure Computations with Optimal Resilience (Extended Abstract). PODC 1994: 183-192
4EETal Rabin: Robust Sharing of Secrets When the Dealer is Honest or Cheating. J. ACM 41(6): 1089-1109 (1994)
1993
3EERan Canetti, Tal Rabin: Fast asynchronous Byzantine agreement with optimal resilience. STOC 1993: 42-51
1990
2EESilvio Micali, Tal Rabin: Collective Coin Tossing Without Assumptions nor Broadcasting. CRYPTO 1990: 253-266
1989
1 Tal Rabin, Michael Ben-Or: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract) STOC 1989: 73-85

Coauthor Index

1Jee Hea An [30]
2Boaz Barak [38]
3Mihir Bellare [6] [12] [13]
4Michael Ben-Or [1] [5]
5Ran Canetti [3] [19] [32] [34] [38]
6Ronald Cramer [16]
7Ivan Damgård [16]
8Yevgeniy Dodis [24] [30] [37]
9Stefan Dziembowski [16]
10Juan A. Garay [6] [9] [12] [13] [20]
11Rosario Gennaro [7] [8] [9] [10] [11] [15] [17] [18] [19] [20] [21] [22] [25] [26] [31] [33] [35] [36] [37] [42] [43] [44] [46] [47]
12Shai Halevi [18] [24] [41] [45] [46] [47]
13Johan Håstad [37]
14Martin Hirt [16]
15Yuval Ishai [26] [31]
16Stanislaw Jarecki [7] [8] [17] [19] [22] [25] [33] [43] [44]
17Charanjit S. Jutla [9] [20]
18Paul A. Karger [32]
19Boaz Kelmer [5]
20Hugo Krawczyk [7] [8] [10] [17] [19] [21] [22] [23] [25] [32] [33] [36] [37] [42] [43] [44] [46] [47]
21Eyal Kushilevitz [26] [27] [31] [40]
22Yehuda Lindell (Andrew Y. Lindell) [28] [29] [38] [39] [40]
23Anna Lysyanskaya [28] [29] [35] [39]
24Tal Malkin [35]
25Silvio Micali [2] [35]
26Daniele Micciancio [15]
27Rafael Pass [38]
28Michael O. Rabin [11]
29Steffen Reidt [47]
30Helmut Scherzer [32]
31David C. Toll [32]
32Stephen D. Wolthusen [47]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)