2008 |
47 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin,
Steffen Reidt,
Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
ESORICS 2008: 49-65 |
46 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups.
EUROCRYPT 2008: 88-107 |
45 | EE | Shai Halevi,
Tal Rabin:
Degradation and Amplification of Computational Hardness.
TCC 2008: 626-643 |
2007 |
44 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
J. Cryptology 20(1): 51-83 (2007) |
43 | EE | Rosario Gennaro,
Tal Rabin,
Stanislaw Jarecki,
Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions.
J. Cryptology 20(3): 393 (2007) |
42 | EE | Rosario Gennaro,
Tal Rabin,
Hugo Krawczyk:
RSA-Based Undeniable Signatures.
J. Cryptology 20(3): 394 (2007) |
2006 |
41 | | Shai Halevi,
Tal Rabin:
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings
Springer 2006 |
40 | EE | Eyal Kushilevitz,
Yehuda Lindell,
Tal Rabin:
Information-theoretically secure protocols and security under composition.
STOC 2006: 109-118 |
39 | EE | Yehuda Lindell,
Anna Lysyanskaya,
Tal Rabin:
On the composition of authenticated Byzantine Agreement.
J. ACM 53(6): 881-917 (2006) |
2005 |
38 | EE | Boaz Barak,
Ran Canetti,
Yehuda Lindell,
Rafael Pass,
Tal Rabin:
Secure Computation Without Authentication.
CRYPTO 2005: 361-377 |
2004 |
37 | EE | Yevgeniy Dodis,
Rosario Gennaro,
Johan Håstad,
Hugo Krawczyk,
Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
CRYPTO 2004: 494-510 |
36 | EE | Rosario Gennaro,
Hugo Krawczyk,
Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups.
EUROCRYPT 2004: 361-381 |
35 | EE | Rosario Gennaro,
Anna Lysyanskaya,
Tal Malkin,
Silvio Micali,
Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
TCC 2004: 258-277 |
2003 |
34 | EE | Ran Canetti,
Tal Rabin:
Universal Composition with Joint State.
CRYPTO 2003: 265-281 |
33 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol.
CT-RSA 2003: 373-390 |
32 | EE | Helmut Scherzer,
Ran Canetti,
Paul A. Karger,
Hugo Krawczyk,
Tal Rabin,
David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
ESORICS 2003: 181-200 |
2002 |
31 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
On 2-Round Secure Multiparty Computation.
CRYPTO 2002: 178-193 |
30 | EE | Jee Hea An,
Yevgeniy Dodis,
Tal Rabin:
On the Security of Joint Signature and Encryption.
EUROCRYPT 2002: 83-107 |
29 | EE | Yehuda Lindell,
Anna Lysyanskaya,
Tal Rabin:
Sequential composition of protocols without simultaneous termination.
PODC 2002: 203-212 |
28 | EE | Yehuda Lindell,
Anna Lysyanskaya,
Tal Rabin:
On the composition of authenticated byzantine agreement.
STOC 2002: 514-523 |
2001 |
27 | EE | Eyal Kushilevitz,
Tal Rabin:
Fair e-Lotteries and e-Casinos.
CT-RSA 2001: 100-109 |
26 | EE | Rosario Gennaro,
Yuval Ishai,
Eyal Kushilevitz,
Tal Rabin:
The round complexity of verifiable secret sharing and secure multicast.
STOC 2001: 580-589 |
25 | | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust Threshold DSS Signatures.
Inf. Comput. 164(1): 54-84 (2001) |
2000 |
24 | EE | Yevgeniy Dodis,
Shai Halevi,
Tal Rabin:
A Cryptographic Solution to a Game Theoretic Problem.
CRYPTO 2000: 112-130 |
23 | EE | Hugo Krawczyk,
Tal Rabin:
Chameleon Signatures.
NDSS 2000 |
22 | EE | Rosario Gennaro,
Tal Rabin,
Stanislaw Jarecki,
Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions.
J. Cryptology 13(2): 273-300 (2000) |
21 | EE | Rosario Gennaro,
Tal Rabin,
Hugo Krawczyk:
RSA-Based Undeniable Signatures.
J. Cryptology 13(4): 397-416 (2000) |
20 | EE | Juan A. Garay,
Rosario Gennaro,
Charanjit S. Jutla,
Tal Rabin:
Secure distributed storage and retrieval.
Theor. Comput. Sci. 243(1-2): 363-389 (2000) |
1999 |
19 | EE | Ran Canetti,
Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Adaptive Security for Threshold Cryptosystems.
CRYPTO 1999: 98-115 |
18 | EE | Rosario Gennaro,
Shai Halevi,
Tal Rabin:
Secure Hash-and-Sign Signatures Without the Random Oracle.
EUROCRYPT 1999: 123-139 |
17 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
EUROCRYPT 1999: 295-310 |
16 | EE | Ronald Cramer,
Ivan Damgård,
Stefan Dziembowski,
Martin Hirt,
Tal Rabin:
Efficient Multiparty Computations Secure Against an Adaptive Adversary.
EUROCRYPT 1999: 311-326 |
1998 |
15 | EE | Rosario Gennaro,
Daniele Micciancio,
Tal Rabin:
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
ACM Conference on Computer and Communications Security 1998: 67-72 |
14 | EE | Tal Rabin:
A Simplified Approach to Threshold and Proactive RSA.
CRYPTO 1998: 89-104 |
13 | EE | Mihir Bellare,
Juan A. Garay,
Tal Rabin:
Fast Batch Verification for Modular Exponentiation and Digital Signatures.
EUROCRYPT 1998: 236-250 |
12 | EE | Mihir Bellare,
Juan A. Garay,
Tal Rabin:
Batch Verification with Applications to Cryptography and Checking.
LATIN 1998: 170-191 |
11 | EE | Rosario Gennaro,
Michael O. Rabin,
Tal Rabin:
Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography.
PODC 1998: 101-111 |
1997 |
10 | EE | Rosario Gennaro,
Hugo Krawczyk,
Tal Rabin:
RSA-Based Undeniable Signatures.
CRYPTO 1997: 132-149 |
9 | | Juan A. Garay,
Rosario Gennaro,
Charanjit S. Jutla,
Tal Rabin:
Secure Distributed Storage and Retrieval.
WDAG 1997: 275-289 |
1996 |
8 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust and Efficient Sharing of RSA Functions.
CRYPTO 1996: 157-172 |
7 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust Threshold DSS Signatures.
EUROCRYPT 1996: 354-371 |
6 | | Mihir Bellare,
Juan A. Garay,
Tal Rabin:
Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing.
PODC 1996: 191-200 |
1994 |
5 | | Michael Ben-Or,
Boaz Kelmer,
Tal Rabin:
Asynchronous Secure Computations with Optimal Resilience (Extended Abstract).
PODC 1994: 183-192 |
4 | EE | Tal Rabin:
Robust Sharing of Secrets When the Dealer is Honest or Cheating.
J. ACM 41(6): 1089-1109 (1994) |
1993 |
3 | EE | Ran Canetti,
Tal Rabin:
Fast asynchronous Byzantine agreement with optimal resilience.
STOC 1993: 42-51 |
1990 |
2 | EE | Silvio Micali,
Tal Rabin:
Collective Coin Tossing Without Assumptions nor Broadcasting.
CRYPTO 1990: 253-266 |
1989 |
1 | | Tal Rabin,
Michael Ben-Or:
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract)
STOC 1989: 73-85 |