2008 | ||
---|---|---|
47 | EE | Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen: Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65 |
46 | EE | Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin: Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107 |
45 | EE | Shai Halevi, Tal Rabin: Degradation and Amplification of Computational Hardness. TCC 2008: 626-643 |
2007 | ||
44 | EE | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptology 20(1): 51-83 (2007) |
43 | EE | Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 20(3): 393 (2007) |
42 | EE | Rosario Gennaro, Tal Rabin, Hugo Krawczyk: RSA-Based Undeniable Signatures. J. Cryptology 20(3): 394 (2007) |
2006 | ||
41 | Shai Halevi, Tal Rabin: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings Springer 2006 | |
40 | EE | Eyal Kushilevitz, Yehuda Lindell, Tal Rabin: Information-theoretically secure protocols and security under composition. STOC 2006: 109-118 |
39 | EE | Yehuda Lindell, Anna Lysyanskaya, Tal Rabin: On the composition of authenticated Byzantine Agreement. J. ACM 53(6): 881-917 (2006) |
2005 | ||
38 | EE | Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin: Secure Computation Without Authentication. CRYPTO 2005: 361-377 |
2004 | ||
37 | EE | Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 |
36 | EE | Rosario Gennaro, Hugo Krawczyk, Tal Rabin: Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381 |
35 | EE | Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin: Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277 |
2003 | ||
34 | EE | Ran Canetti, Tal Rabin: Universal Composition with Joint State. CRYPTO 2003: 265-281 |
33 | EE | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390 |
32 | EE | Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll: Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200 |
2002 | ||
31 | EE | Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin: On 2-Round Secure Multiparty Computation. CRYPTO 2002: 178-193 |
30 | EE | Jee Hea An, Yevgeniy Dodis, Tal Rabin: On the Security of Joint Signature and Encryption. EUROCRYPT 2002: 83-107 |
29 | EE | Yehuda Lindell, Anna Lysyanskaya, Tal Rabin: Sequential composition of protocols without simultaneous termination. PODC 2002: 203-212 |
28 | EE | Yehuda Lindell, Anna Lysyanskaya, Tal Rabin: On the composition of authenticated byzantine agreement. STOC 2002: 514-523 |
2001 | ||
27 | EE | Eyal Kushilevitz, Tal Rabin: Fair e-Lotteries and e-Casinos. CT-RSA 2001: 100-109 |
26 | EE | Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin: The round complexity of verifiable secret sharing and secure multicast. STOC 2001: 580-589 |
25 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001) | |
2000 | ||
24 | EE | Yevgeniy Dodis, Shai Halevi, Tal Rabin: A Cryptographic Solution to a Game Theoretic Problem. CRYPTO 2000: 112-130 |
23 | EE | Hugo Krawczyk, Tal Rabin: Chameleon Signatures. NDSS 2000 |
22 | EE | Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 13(2): 273-300 (2000) |
21 | EE | Rosario Gennaro, Tal Rabin, Hugo Krawczyk: RSA-Based Undeniable Signatures. J. Cryptology 13(4): 397-416 (2000) |
20 | EE | Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin: Secure distributed storage and retrieval. Theor. Comput. Sci. 243(1-2): 363-389 (2000) |
1999 | ||
19 | EE | Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 |
18 | EE | Rosario Gennaro, Shai Halevi, Tal Rabin: Secure Hash-and-Sign Signatures Without the Random Oracle. EUROCRYPT 1999: 123-139 |
17 | EE | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310 |
16 | EE | Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin: Efficient Multiparty Computations Secure Against an Adaptive Adversary. EUROCRYPT 1999: 311-326 |
1998 | ||
15 | EE | Rosario Gennaro, Daniele Micciancio, Tal Rabin: An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products. ACM Conference on Computer and Communications Security 1998: 67-72 |
14 | EE | Tal Rabin: A Simplified Approach to Threshold and Proactive RSA. CRYPTO 1998: 89-104 |
13 | EE | Mihir Bellare, Juan A. Garay, Tal Rabin: Fast Batch Verification for Modular Exponentiation and Digital Signatures. EUROCRYPT 1998: 236-250 |
12 | EE | Mihir Bellare, Juan A. Garay, Tal Rabin: Batch Verification with Applications to Cryptography and Checking. LATIN 1998: 170-191 |
11 | EE | Rosario Gennaro, Michael O. Rabin, Tal Rabin: Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography. PODC 1998: 101-111 |
1997 | ||
10 | EE | Rosario Gennaro, Hugo Krawczyk, Tal Rabin: RSA-Based Undeniable Signatures. CRYPTO 1997: 132-149 |
9 | Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin: Secure Distributed Storage and Retrieval. WDAG 1997: 275-289 | |
1996 | ||
8 | EE | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172 |
7 | EE | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371 |
6 | Mihir Bellare, Juan A. Garay, Tal Rabin: Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing. PODC 1996: 191-200 | |
1994 | ||
5 | Michael Ben-Or, Boaz Kelmer, Tal Rabin: Asynchronous Secure Computations with Optimal Resilience (Extended Abstract). PODC 1994: 183-192 | |
4 | EE | Tal Rabin: Robust Sharing of Secrets When the Dealer is Honest or Cheating. J. ACM 41(6): 1089-1109 (1994) |
1993 | ||
3 | EE | Ran Canetti, Tal Rabin: Fast asynchronous Byzantine agreement with optimal resilience. STOC 1993: 42-51 |
1990 | ||
2 | EE | Silvio Micali, Tal Rabin: Collective Coin Tossing Without Assumptions nor Broadcasting. CRYPTO 1990: 253-266 |
1989 | ||
1 | Tal Rabin, Michael Ben-Or: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract) STOC 1989: 73-85 |