What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tal Rabin
Google Scholar
62
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Gold OPRF: Post-Quantum Oblivious Power-Residue PRF.
Yibin Yang
Fabrice Benhamouda
Shai Halevi
Hugo Krawczyk
Tal Rabin
2024
conf/eurocrypt
SPRINT: High-Throughput Robust Distributed Schnorr Signatures.
Fabrice Benhamouda
Shai Halevi
Hugo Krawczyk
Yiping Ma
Tal Rabin
2023
conf/ccs
Analyzing the Real-World Security of the Algorand Blockchain.
Erica Blum
Derek Leung
Julian Loss
Jonathan Katz
Tal Rabin
2023
conf/crypto
Additive Randomized Encodings and Their Applications.
Shai Halevi
Yuval Ishai
Eyal Kushilevitz
Tal Rabin
2023
conf/sp
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.
Yiping Ma
Jess Woods
Sebastian Angel
Antigoni Polychroniadou
Tal Rabin
2023
conf/tcc
Proactive Secret Sharing with Constant Communication.
Brett Hemenway Falk
Daniel Noble
Tal Rabin
2022
conf/ccs
Threshold Cryptography as a Service (in the Multiserver and YOSO Models).
Fabrice Benhamouda
Shai Halevi
Hugo Krawczyk
Alex Miao
Tal Rabin
2022
conf/uss
Incremental Offline/Online PIR.
Yiping Ma
Ke Zhong
Tal Rabin
Sebastian Angel
2022
conf/asiaccs
New Multiparty Computational Model: From Nakamoto to YOSO.
Tal Rabin
2021
journals/popets
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC.
Ghada Almashaqbeh
Fabrice Benhamouda
Seungwook Han
Daniel Jaroslawicz
Tal Malkin
Alex Nicita
Tal Rabin
Abhishek Shah
Eran Tromer
2021
journals/popets
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning.
Sameer Wagh
Shruti Tople
Fabrice Benhamouda
Eyal Kushilevitz
Prateek Mittal
Tal Rabin
2021
journals/joc
On the Local Leakage Resilience of Linear Secret Sharing Schemes.
Fabrice Benhamouda
Akshay Degwekar
Yuval Ishai
Tal Rabin
2021
conf/crypto
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles.
Craig Gentry
Shai Halevi
Hugo Krawczyk
Bernardo Magri
Jesper Buus Nielsen
Tal Rabin
Sophia Yakoubov
2020
conf/tcc
Can a Public Blockchain Keep a Secret?
Fabrice Benhamouda
Craig Gentry
Sergey Gorbunov
Shai Halevi
Hugo Krawczyk
Chengyu Lin
Tal Rabin
Leonid Reyzin
2019
journals/popets
Cryptography for #MeToo.
Benjamin Kuykendall
Hugo Krawczyk
Tal Rabin
2019
journals/joc
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
Carmit Hazay
Gert Læssøe Mikkelsen
Tal Rabin
Tomas Toft
Angelo Agatino Nicolosi
2019
conf/tcc
On Fully Secure MPC with Solitary Output.
Shai Halevi
Yuval Ishai
Eyal Kushilevitz
Nikolaos Makriyannis
Tal Rabin
2018
journals/popets
Privacy-Preserving Search of Similar Patients in Genomic Data.
Gilad Asharov
Shai Halevi
Yehuda Lindell
Tal Rabin
2018
conf/crypto
On the Local Leakage Resilience of Linear Secret Sharing Schemes.
Fabrice Benhamouda
Akshay Degwekar
Yuval Ishai
Tal Rabin
2018
conf/tcc
Best Possible Information-Theoretic MPC.
Shai Halevi
Yuval Ishai
Eyal Kushilevitz
Tal Rabin
2017
conf/crypto
Robust Non-interactive Multiparty Computation Against Constant-Size Collusion.
Fabrice Benhamouda
Hugo Krawczyk
Tal Rabin
2017
conf/tcc
Secure Two-Party Computation with Fairness - A Necessary Design Principle.
Yehuda Lindell
Tal Rabin
2016
conf/ccs
Attribute-based Key Exchange with General Policies.
Vladimir Kolesnikov
Hugo Krawczyk
Yehuda Lindell
Alex J. Malozemoff
Tal Rabin
2013
conf/tcc
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness.
Gilad Asharov
Yehuda Lindell
Tal Rabin
2012
conf/ctrsa
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
Carmit Hazay
Gert Læssøe Mikkelsen
Tal Rabin
Tomas Toft
2011
journals/joc
Secure Computation Without Authentication.
Boaz Barak
Ran Canetti
Yehuda Lindell
Rafael Pass
Tal Rabin
2011
conf/crypto
/3.
Gilad Asharov
Yehuda Lindell
Tal Rabin
2010
conf/acns
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.
Rosario Gennaro
Hugo Krawczyk
Tal Rabin
2010
conf/pkc
Secure Network Coding over the Integers.
Rosario Gennaro
Jonathan Katz
Hugo Krawczyk
Tal Rabin
2010
conf/eurocrypt
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Sebastian Faust
Tal Rabin
Leonid Reyzin
Eran Tromer
Vinod Vaikuntanathan
2009
conf/crypto
The Round Complexity of Verifiable Secret Sharing Revisited.
Arpita Patra
Ashish Choudhary
Tal Rabin
C. Pandu Rangan
2008
conf/esorics
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
Rosario Gennaro
Shai Halevi
Hugo Krawczyk
Tal Rabin
Steffen Reidt
Stephen D. Wolthusen
2008
conf/eurocrypt
Threshold RSA for Dynamic and Ad-Hoc Groups.
Rosario Gennaro
Shai Halevi
Hugo Krawczyk
Tal Rabin
2008
conf/tcc
Degradation and Amplification of Computational Hardness.
Shai Halevi
Tal Rabin
2007
journals/joc
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Tal Rabin
Stanislaw Jarecki
Hugo Krawczyk
2007
journals/joc
RSA-Based Undeniable Signatures.
Rosario Gennaro
Tal Rabin
Hugo Krawczyk
2007
journals/joc
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
2005
conf/crypto
Secure Computation Without Authentication.
Boaz Barak
Ran Canetti
Yehuda Lindell
Rafael Pass
Tal Rabin
2004
conf/crypto
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
Yevgeniy Dodis
Rosario Gennaro
Johan Håstad
Hugo Krawczyk
Tal Rabin
2004
conf/eurocrypt
Secure Hashed Diffie-Hellman over Non-DDH Groups.
Rosario Gennaro
Hugo Krawczyk
Tal Rabin
2004
conf/tcc
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
Rosario Gennaro
Anna Lysyanskaya
Tal Malkin
Silvio Micali
Tal Rabin
2003
conf/crypto
Universal Composition with Joint State.
Ran Canetti
Tal Rabin
2003
conf/esorics
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Helmut Scherzer
Ran Canetti
Paul A. Karger
Hugo Krawczyk
Tal Rabin
David C. Toll
2003
conf/ctrsa
Secure Applications of Pedersen's Distributed Key Generation Protocol.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
2002
conf/crypto
On 2-Round Secure Multiparty Computation.
Rosario Gennaro
Yuval Ishai
Eyal Kushilevitz
Tal Rabin
2002
conf/eurocrypt
On the Security of Joint Signature and Encryption.
Jee Hea An
Yevgeniy Dodis
Tal Rabin
2001
conf/ctrsa
Fair e-Lotteries and e-Casinos.
Eyal Kushilevitz
Tal Rabin
2000
journals/joc
RSA-Based Undeniable Signatures.
Rosario Gennaro
Tal Rabin
Hugo Krawczyk
2000
journals/joc
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Tal Rabin
Stanislaw Jarecki
Hugo Krawczyk
2000
conf/crypto
A Cryptographic Solution to a Game Theoretic Problem.
Yevgeniy Dodis
Shai Halevi
Tal Rabin
2000
conf/ndss
Chameleon Signatures.
Hugo Krawczyk
Tal Rabin
1999
conf/crypto
Adaptive Security for Threshold Cryptosystems.
Ran Canetti
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1999
conf/eurocrypt
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1999
conf/eurocrypt
Secure Hash-and-Sign Signatures Without the Random Oracle.
Rosario Gennaro
Shai Halevi
Tal Rabin
1999
conf/eurocrypt
Efficient Multiparty Computations Secure Against an Adaptive Adversary.
Ronald Cramer
Ivan Damgård
Stefan Dziembowski
Martin Hirt
Tal Rabin
1998
conf/ccs
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
Rosario Gennaro
Daniele Micciancio
Tal Rabin
1998
conf/crypto
A Simplified Approach to Threshold and Proactive RSA.
Tal Rabin
1998
conf/eurocrypt
Fast Batch Verification for Modular Exponentiation and Digital Signatures.
Mihir Bellare
Juan A. Garay
Tal Rabin
1997
conf/crypto
RSA-Based Undeniable Signatures.
Rosario Gennaro
Hugo Krawczyk
Tal Rabin
1996
conf/crypto
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1996
conf/eurocrypt
Robust Threshold DSS Signatures.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1990
conf/crypto
Collective Coin Tossing Without Assumptions nor Broadcasting.
Silvio Micali
Tal Rabin
Coauthors
Abhishek Shah
(1)
Akshay Degwekar
(2)
Alex J. Malozemoff
(1)
Alex Miao
(1)
Alex Nicita
(1)
Angelo Agatino Nicolosi
(1)
Anna Lysyanskaya
(1)
Antigoni Polychroniadou
(1)
Arpita Patra
(1)
Ashish Choudhary
(1)
Benjamin Kuykendall
(1)
Bernardo Magri
(1)
Boaz Barak
(2)
Brett Hemenway Falk
(1)
C. Pandu Rangan
(1)
Carmit Hazay
(2)
Chengyu Lin
(1)
Craig Gentry
(2)
Daniel Jaroslawicz
(1)
Daniel Noble
(1)
Daniele Micciancio
(1)
David C. Toll
(1)
Derek Leung
(1)
Eran Tromer
(2)
Erica Blum
(1)
Eyal Kushilevitz
(6)
Fabrice Benhamouda
(9)
Gert Læssøe Mikkelsen
(2)
Ghada Almashaqbeh
(1)
Gilad Asharov
(3)
Helmut Scherzer
(1)
Hugo Krawczyk
(27)
Ivan Damgård
(1)
Jee Hea An
(1)
Jesper Buus Nielsen
(1)
Jess Woods
(1)
Johan Håstad
(1)
Jonathan Katz
(2)
Juan A. Garay
(1)
Julian Loss
(1)
Ke Zhong
(1)
Leonid Reyzin
(2)
Martin Hirt
(1)
Mihir Bellare
(1)
Nikolaos Makriyannis
(1)
Paul A. Karger
(1)
Prateek Mittal
(1)
Rafael Pass
(2)
Ran Canetti
(5)
Ronald Cramer
(1)
Rosario Gennaro
(21)
Sameer Wagh
(1)
Sebastian Angel
(2)
Sebastian Faust
(1)
Sergey Gorbunov
(1)
Seungwook Han
(1)
Shai Halevi
(14)
Shruti Tople
(1)
Silvio Micali
(2)
Sophia Yakoubov
(1)
Stanislaw Jarecki
(8)
Stefan Dziembowski
(1)
Steffen Reidt
(1)
Stephen D. Wolthusen
(1)
Tal Malkin
(2)
Tal Rabin
(62)
Tomas Toft
(2)
Vinod Vaikuntanathan
(1)
Vladimir Kolesnikov
(1)
Yehuda Lindell
(7)
Yevgeniy Dodis
(3)
Yibin Yang
(1)
Yiping Ma
(3)
Yuval Ishai
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to