Cryptographers' World
 

Tal Malkin


Author's Web Page Link

22 papers in database with 897 citations StarStar

Editor of 2 conference proceedings books

H-number: 13

Conference Proceedings

 
1. Tal Malkin, editor, Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings. Springer, 2008. ISBN 978-3-540-79262-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Moti YungYevgeniy DodisAggelos KiayiasTal Malkin, editors, Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Springer, 2006. ISBN 3-540-33851-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Ran Canetti,  Ivan Damgard,  Stefan Dziembowski,  Yuval Ishai,  Tal Malkin,  Adaptive versus Non-Adaptive Security of Multi-Party Protocols, Journal of Cryptology, Volume 17(3), pp. 153 - 207, Springer, 2004.

[Cited 4 times ]

2. Amos Beimel,  Yuval Ishai,  Tal Malkin,  Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing, Journal of Cryptology, Volume 17(2), pp. 125 - 151, Springer, 2004.

[Cited 60 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Seung Geol Choi,  Dana Dachman-Soled,  Tal Malkin,  Hoeteck Wee,  Improved Non-committing Encryption with Applications to Adaptively Secure Protocols, pp. 287 - 302, ASIACRYPT 2009.

[Electronic Edition][Cited 1 times ]

2. Seung Geol Choi,  Ariel Elbaz,  Tal Malkin,  Moti Yung,  Secure Multi-party Computation Minimizing Online Rounds, pp. 268 - 286, ASIACRYPT 2009.

[Electronic Edition][Cited 2 times ]

3. Dana Dachman-Soled,  Tal Malkin,  Mariana Raykova,  Moti Yung,  Efficient Robust Private Set Intersection, pp. 125 - 142, ACNS 2009.

[Electronic Edition][Cited 10 times ]

4. François-Xavier Standaert,  Tal Malkin,  Moti Yung,  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, pp. 443 - 461, EUROCRYPT 2009.

[Electronic Edition][Cited 92 times Red Star]

5. Seung Geol Choi,  Dana Dachman-Soled,  Tal Malkin,  Hoeteck Wee,  Simple, Black-Box Constructions of Adaptively Secure Protocols, pp. 387 - 402, TCC 2009.

[Electronic Edition][Cited 13 times ]

6. Seung Geol Choi,  Dana Dachman-Soled,  Tal Malkin,  Hoeteck Wee,  Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One, pp. 427 - 444, TCC 2008.

[Electronic Edition][Cited 13 times ]

7. Yael Gertner,  Tal Malkin,  Steven Myers,  Towards a Separation of Semantic and CCA Security for Public Key Encryption, pp. 434 - 455, TCC 2007.

[Electronic Edition][Cited 25 times ]

8. Seung Geol Choi,  Ariel Elbaz,  Ari Juels,  Tal Malkin,  Moti Yung,  Two-Party Computing with Encrypted Data, pp. 298 - 314, ASIACRYPT 2007.

[Electronic Edition][Cited 4 times ]

9. Amos Beimel,  Tal Malkin,  Kobbi Nissim,  Enav Weinreb,  How Should We Solve Search Problems Privately?, pp. 31 - 49, CRYPTO 2007.

[Electronic Edition][Cited 6 times ]

10. Tal Malkin,  Ryan Moriarty,  Nikolai Yakovenko,  Generalized Environmental Security from Number Theoretic Assumptions, pp. 343 - 359, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

11. Melissa Chase,  Alexander Healy,  Anna Lysyanskaya,  Tal Malkin,  Leonid Reyzin,  Mercurial Commitments with Applications to Zero-Knowledge Sets, pp. 422 - 439, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 36 times ]

12. Tal Malkin,  Satoshi Obana,  Moti Yung,  The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures, pp. 306 - 322, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 32 times ]

13. Amos Beimel,  Tal Malkin,  A Quantitative Approach to Reductions in Secure Computation, pp. 238 - 257, TCC 2004.

[Electronic Edition][Cited 8 times ]

14. Rosario Gennaro,  Anna Lysyanskaya,  Tal Malkin,  Silvio Micali,  Tal Rabin,  Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering, pp. 258 - 277, TCC 2004.

[Electronic Edition][Cited 53 times Red Star]

15. Tal Malkin,  Daniele Micciancio,  Sara K. Miner,  Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods, pp. 400 - 417, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 97 times Red Star]

16. Ran Canetti,  Ivan Damgard,  Stefan Dziembowski,  Yuval Ishai,  Tal Malkin,  On Adaptive vs. Non-adaptive Security of Multiparty Protocols, pp. 262 - 279, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

17. Amos Beimel,  Yuval Ishai,  Tal Malkin,  Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing, pp. 55 - 73, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 83 times Red Star]

18. Giovanni Di Crescenzo,  Tal Malkin,  Rafail Ostrovsky,  Single Database Private Information Retrieval Implies Oblivious Transfer, pp. 122 - 138, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 95 times Red Star]

19. Amos Beimel,  Tal Malkin,  Silvio Micali,  The All-or-Nothing Nature of Two-Party Secure Computation, pp. 80 - 97, CRYPTO 1999.

[Electronic Edition][Cited 38 times ]

20. Ran Canetti,  Tal Malkin,  Kobbi Nissim,  Efficient Communication-Storage Tradeoffs for Multicast Encryption, pp. 459 - 474, EUROCRYPT 1999.

[Electronic Edition][Cited 194 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...