Tal Rabin
Tal Rabin
IBM Research
Verified email at us.ibm.com
Title
Cited by
Cited by
Year
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 6,192,472, 2001
12582001
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 5,991,414, 1999
12531999
Verifiable secret sharing and multiparty protocols with honest majority
T Rabin, M Ben-Or
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
11671989
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20 (1), 51-83, 2007
872*2007
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
International conference on the theory and applications of cryptographic …, 2002
7102002
Chameleon Signatures.
H Krawczyk, T Rabin
NDSS, 2000
653*2000
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1996
6201996
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
R Gennaro, MO Rabin, T Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
5621998
Fast batch verification for modular exponentiation and digital signatures
M Bellare, JA Garay, T Rabin
International conference on the theory and applications of cryptographic …, 1998
5231998
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
4091999
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 157-172, 1996
359*1996
A simplified approach to threshold and proactive RSA
T Rabin
Annual International Cryptology Conference, 89-104, 1998
3321998
Universal composition with joint state
R Canetti, T Rabin
Annual International Cryptology Conference, 265-281, 2003
2952003
Fast asynchronous Byzantine agreement with optimal resilience
R Canetti, T Rabin
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993
2751993
Biometric authentication system with encrypted models
R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen
US Patent 6,317,834, 2001
2742001
Efficient multiparty computations secure against an adaptive adversary
R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
2291999
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography Conference, 258-277, 2004
2202004
Randomness extraction and key derivation using the CBC, cascade and HMAC modes
Y Dodis, R Gennaro, J Håstad, H Krawczyk, T Rabin
Annual International Cryptology Conference, 494-510, 2004
1872004
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 98-116, 1999
1841999
Secure network coding over the integers
R Gennaro, J Katz, H Krawczyk, T Rabin
International Workshop on Public Key Cryptography, 142-160, 2010
1792010
The system can't perform the operation now. Try again later.
Articles 1–20