What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tal Moran
Google Scholar
31
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/fc
Efficient Agreement Over Byzantine Gossip.
Ran Cohen
Julian Loss
Tal Moran
2023
journals/joc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2023
conf/tcc
Locally Verifiable Distributed SNARGs.
Eden Aldema Tshuva
Elette Boyle
Ran Cohen
Tal Moran
Rotem Oshman
2020
journals/joc
Topology-Hiding Computation on All Graphs.
Adi Akavia
Rio LaVigne
Tal Moran
2020
conf/crypto
Incompressible Encodings.
Tal Moran
Daniel Wichs
2020
conf/pkc
Topology-Hiding Computation for Networks with Unknown Delays.
Rio LaVigne
Chen-Da Liu Zhang
Ueli Maurer
Tal Moran
Marta Mularczyk
Daniel Tschudi
2020
conf/asiacrypt
MPC with Synchronous Security and Asynchronous Responsiveness.
Chen-Da Liu-Zhang
Julian Loss
Ueli Maurer
Tal Moran
Daniel Tschudi
2020
conf/tcc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2019
conf/crypto
Simple Proofs of Space-Time and Rational Proofs of Storage.
Tal Moran
Ilan Orlov
2019
conf/tcc
Is Information-Theoretic Topology-Hiding Computation Possible?
Marshall Ball
Elette Boyle
Ran Cohen
Tal Malkin
Tal Moran
2018
conf/eurocrypt
Exploring the Boundaries of Topology-Hiding Computation.
Marshall Ball
Elette Boyle
Tal Malkin
Tal Moran
2018
conf/tcc
Topology-Hiding Computation Beyond Semi-Honest Adversaries.
Rio LaVigne
Chen-Da Liu Zhang
Ueli Maurer
Tal Moran
Marta Mularczyk
Daniel Tschudi
2017
conf/crypto
Topology-Hiding Computation on All Graphs.
Adi Akavia
Rio LaVigne
Tal Moran
2017
conf/eurocrypt
Topology-Hiding Computation Beyond Logarithmic Diameter.
Adi Akavia
Tal Moran
2016
journals/joc
An Optimally Fair Coin Toss.
Tal Moran
Moni Naor
Gil Segev
2015
conf/ccs
How to Use Bitcoin to Play Decentralized Poker.
Ranjit Kumaresan
Tal Moran
Iddo Bentov
2015
conf/tcc
Topology-Hiding Computation.
Tal Moran
Ilan Orlov
Silas Richelson
2015
conf/tcc
Public Verification of Private Effort.
Giulia Alberini
Tal Moran
Alon Rosen
2012
conf/asiacrypt
A Mix-Net from Any CCA2 Secure Cryptosystem.
Shahram Khazaei
Tal Moran
Douglas Wikström
2012
conf/tcc
Counterexamples to Hardness Amplification beyond Negligible.
Yevgeniy Dodis
Abhishek Jain
Tal Moran
Daniel Wichs
2011
conf/crypto
Time-Lock Puzzles in the Random Oracle Model.
Mohammad Mahmoody
Tal Moran
Salil P. Vadhan
2010
conf/fc
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors.
Tal Moran
Tyler Moore
2010
conf/tcc
On Complete Primitives for Fairness.
S. Dov Gordon
Yuval Ishai
Tal Moran
Rafail Ostrovsky
Amit Sahai
2009
journals/tifs
Shuffle-sum: coercion-resistant verifiable tallying for STV voting.
Josh Benaloh
Tal Moran
Lee Naish
Kim Ramchen
Vanessa Teague
2009
journals/joc
Non-interactive Timestamping in the Bounded-Storage Model.
Tal Moran
Ronen Shaltiel
Amnon Ta-Shma
2009
conf/tcc
An Optimally Fair Coin Toss.
Tal Moran
Moni Naor
Gil Segev
2008
conf/eurocrypt
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware.
Tal Moran
Gil Segev
2007
conf/ccs
Split-ballot voting: everlasting privacy with distributed trust.
Tal Moran
Moni Naor
2006
conf/crypto
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy.
Tal Moran
Moni Naor
2006
conf/eurocrypt
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol.
Tal Moran
Moni Naor
2004
conf/crypto
Non-interactive Timestamping in the Bounded Storage Model.
Tal Moran
Ronen Shaltiel
Amnon Ta-Shma
Coauthors
Abhishek Jain
(1)
Adi Akavia
(3)
Alon Rosen
(1)
Amit Sahai
(1)
Amnon Ta-Shma
(2)
Chen-Da Liu Zhang
(2)
Chen-Da Liu-Zhang
(1)
Daniel Tschudi
(3)
Daniel Wichs
(2)
Douglas Wikström
(1)
Eden Aldema Tshuva
(1)
Elette Boyle
(5)
Gil Segev
(3)
Giulia Alberini
(1)
Iddo Bentov
(1)
Ilan Orlov
(2)
Josh Benaloh
(1)
Julian Loss
(2)
Kim Ramchen
(1)
Lee Naish
(1)
Lisa Kohl
(2)
Marshall Ball
(4)
Marta Mularczyk
(2)
Mohammad Mahmoody
(1)
Moni Naor
(5)
Pierre Meyer
(2)
Rafail Ostrovsky
(1)
Ran Cohen
(5)
Ranjit Kumaresan
(1)
Rio LaVigne
(4)
Ronen Shaltiel
(2)
Rotem Oshman
(1)
S. Dov Gordon
(1)
Salil P. Vadhan
(1)
Shahram Khazaei
(1)
Silas Richelson
(1)
Tal Malkin
(4)
Tal Moran
(31)
Tyler Moore
(1)
Ueli Maurer
(3)
Vanessa Teague
(1)
Yevgeniy Dodis
(1)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to