Cryptographers' World
 

Tal Rabin


Author's Web Page Link

29 papers in database with 2741 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 19

Conference Proceedings

 
1. Shai HaleviTal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings. Springer, 2006. ISBN 3-540-32731-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Rosario Gennaro,  Tal Rabin,  Stanislaw Jarecki,  Hugo Krawczyk,  Robust and Efficient Sharing of RSA Functions, Journal of Cryptology, Volume 20(3), pp. 393 - 0, Springer, 2007.

[Cited 185 times Red StarRed Star]

2. Rosario Gennaro,  Tal Rabin,  Hugo Krawczyk,  RSA-Based Undeniable Signatures, Journal of Cryptology, Volume 20(3), pp. 394 - 0, Springer, 2007.

[Cited 114 times Red StarRed Star]

3. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, Journal of Cryptology, Volume 20(1), pp. 51 - 83, Springer, 2007.

[Cited 246 times Red StarRed Star]

4. Rosario Gennaro,  Tal Rabin,  Hugo Krawczyk,  RSA-Based Undeniable Signatures, Journal of Cryptology, Volume 13(4), pp. 397 - 416, Springer, 2000.

[Cited 114 times Red StarRed Star]

5. Rosario Gennaro,  Tal Rabin,  Stanislaw Jarecki,  Hugo Krawczyk,  Robust and Efficient Sharing of RSA Functions, Journal of Cryptology, Volume 13(2), pp. 273 - 300, Springer, 2000.

[Cited 185 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Arpita Patra,  Ashish Choudhary,  Tal Rabin,  C. Pandu Rangan,  The Round Complexity of Verifiable Secret Sharing Revisited, pp. 487 - 504, CRYPTO 2009.

[Electronic Edition][Cited 14 times ]

2. Rosario Gennaro,  Shai Halevi,  Hugo Krawczyk,  Tal Rabin,  Threshold RSA for Dynamic and Ad-Hoc Groups, pp. 88 - 107, EUROCRYPT 2008.

[Electronic Edition][Cited 13 times ]

3. Shai Halevi,  Tal Rabin,  Degradation and Amplification of Computational Hardness, pp. 626 - 643, TCC 2008.

[Electronic Edition][Cited 8 times ]

4. Eyal Kushilevitz,  Yehuda Lindell,  Tal Rabin,  Information-theoretically secure protocols and security under composition, pp. 109 - 118, STOC 2006.

[Electronic Edition][Cited 29 times ]

5. Boaz Barak,  Ran Canetti,  Yehuda Lindell,  Rafael Pass,  Tal Rabin,  Secure Computation Without Authentication, pp. 361 - 377, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

6. Yevgeniy Dodis,  Rosario Gennaro,  Johan HÃ¥stad,  Hugo Krawczyk,  Tal Rabin,  Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes, pp. 494 - 510, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 64 times Red Star]

7. Rosario Gennaro,  Hugo Krawczyk,  Tal Rabin,  Secure Hashed Diffie-Hellman over Non-DDH Groups, pp. 361 - 381, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 37 times ]

8. Rosario Gennaro,  Anna Lysyanskaya,  Tal Malkin,  Silvio Micali,  Tal Rabin,  Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering, pp. 258 - 277, TCC 2004.

[Electronic Edition][Cited 53 times Red Star]

9. Ran Canetti,  Tal Rabin,  Universal Composition with Joint State, pp. 265 - 281, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 113 times Red StarRed Star]

10. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Applications of Pedersen's Distributed Key Generation Protocol, pp. 373 - 390, CT-RSA 2003.

[Electronic Edition][Cited 20 times ]

11. Rosario Gennaro,  Yuval Ishai,  Eyal Kushilevitz,  Tal Rabin,  On 2-Round Secure Multiparty Computation, pp. 178 - 193, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

12. Jee Hea An,  Yevgeniy Dodis,  Tal Rabin,  On the Security of Joint Signature and Encryption, pp. 83 - 107, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 305 times Red StarRed StarRed Star]

13. Eyal Kushilevitz,  Tal Rabin,  Fair e-Lotteries and e-Casinos, pp. 100 - 109, CT-RSA 2001.

[Electronic Edition][Cited 19 times ]

14. Yevgeniy Dodis,  Shai Halevi,  Tal Rabin,  A Cryptographic Solution to a Game Theoretic Problem, pp. 112 - 130, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 66 times Red Star]

15. Ran Canetti,  Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Adaptive Security for Threshold Cryptosystems, pp. 98 - 115, CRYPTO 1999.

[Electronic Edition][Cited 106 times Red StarRed Star]

16. Rosario Gennaro,  Shai Halevi,  Tal Rabin,  Secure Hash-and-Sign Signatures Without the Random Oracle, pp. 123 - 139, EUROCRYPT 1999.

[Electronic Edition][Cited 219 times Red StarRed Star]

17. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, pp. 295 - 310, EUROCRYPT 1999.

[Electronic Edition][Cited 312 times Red StarRed StarRed Star]

18. Ronald Cramer,  Ivan Damgard,  Stefan Dziembowski,  Martin Hirt,  Tal Rabin,  Efficient Multiparty Computations Secure Against an Adaptive Adversary, pp. 311 - 326, EUROCRYPT 1999.

[Electronic Edition][Cited 108 times Red StarRed Star]

19. Tal Rabin,  A Simplified Approach to Threshold and Proactive RSA, pp. 89 - 104, CRYPTO 1998.

[Electronic Edition][Cited 228 times Red StarRed Star]

20. Mihir Bellare,  Juan A. Garay,  Tal Rabin,  Fast Batch Verification for Modular Exponentiation and Digital Signatures, pp. 236 - 250, EUROCRYPT 1998.

[Electronic Edition][Cited 212 times Red StarRed Star]

21. Rosario Gennaro,  Hugo Krawczyk,  Tal Rabin,  RSA-Based Undeniable Signatures, pp. 132 - 149, CRYPTO 1997.

[Electronic Edition][Cited 144 times Red StarRed Star]

22. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Robust and Efficient Sharing of RSA Functions, pp. 157 - 172, CRYPTO 1996.

[Electronic Edition][Cited 229 times Red StarRed Star]

23. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Robust Threshold DSS Signatures, pp. 354 - 371, EUROCRYPT 1996.

[Electronic Edition][Cited 373 times Red StarRed StarRed Star]

24. Silvio Micali,  Tal Rabin,  Collective Coin Tossing Without Assumptions nor Broadcasting, pp. 253 - 266, CRYPTO 1990.

[Electronic Edition][Cited 13 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...