Tal Moran
Tal Moran
Dirección de correo verificada de idc.ac.il - Página principal
Título
Citado por
Citado por
Año
Receipt-free universally-verifiable voting with everlasting privacy
T Moran, M Naor
Annual International Cryptology Conference, 373-392, 2006
2152006
Collaborative Networked Communication: MUDs as Systems Tools.
R Evard
LISA 7, 1-8, 1993
193*1993
Split-ballot voting: everlasting privacy with distributed trust
T Moran, M Naor
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-43, 2010
1332010
Method and system for extracting application protocol characteristics
G Raanan, T Moran, Y Galant, Y El-Hanani, E Reshef
US Patent 6,311,278, 2001
1182001
How to use bitcoin to play decentralized poker
R Kumaresan, T Moran, I Bentov
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1132015
Truthful mechanisms for agents that value privacy
Y Chen, S Chong, IA Kash, T Moran, S Vadhan
ACM Transactions on Economics and Computation (TEAC) 4 (3), 1-30, 2016
1022016
An optimally fair coin toss
T Moran, M Naor, G Segev
Journal of Cryptology 29 (3), 491-513, 2016
100*2016
David and Goliath commitments: UC computation for asymmetric parties using tamper-proof hardware
T Moran, G Segev
Annual International Conference on the Theory and Applications of …, 2008
932008
Time-lock puzzles in the random oracle model
M Mahmoody, T Moran, S Vadhan
Annual Cryptology Conference, 39-50, 2011
732011
Publicly verifiable proofs of sequential work
M Mahmoody, T Moran, S Vadhan
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
682013
One-way functions and (im) perfect obfuscation
I Komargodski, T Moran, M Naor, R Pass, A Rosen, E Yogev
2014 IEEE 55th Annual Symposium on Foundations of Computer Science, 374-383, 2014
662014
Basing cryptographic protocols on tamper-evident seals
T Moran, M Naor
Theoretical Computer Science 411 (10), 1283-1310, 2010
65*2010
Polling with physical envelopes: A rigorous analysis of a human-centric protocol
T Moran, M Naor
Annual International Conference on the Theory and Applications of …, 2006
522006
Simple proofs of space-time and rational proofs of storage
T Moran, I Orlov
Annual International Cryptology Conference, 381-409, 2019
48*2019
Method and system for verifying a client request
T Moran, Y El-Hanani, G Raanan, E Reshef
US Patent 7,293,281, 2007
462007
Tortoise and hares consensus: the meshcash framework for incentive-compatible, scalable cryptocurrencies
I Bentov, P Hubáček, T Moran, A Nadler
International Symposium on Cyber Security Cryptography and Machine Learning …, 2021
452021
Shuffle-sum: coercion-resistant verifiable tallying for STV voting
J Benaloh, T Moran, L Naish, K Ramchen, V Teague
IEEE Transactions on Information Forensics and Security 4 (4), 685-698, 2009
452009
On complete primitives for fairness
D Gordon, Y Ishai, T Moran, R Ostrovsky, A Sahai
Theory of Cryptography Conference, 91-108, 2010
412010
Non-interactive timestamping in the bounded-storage model
T Moran, R Shaltiel, A Ta-Shma
Journal of cryptology 22 (2), 189-226, 2009
38*2009
A mix-net from any CCA2 secure cryptosystem
S Khazaei, T Moran, D Wikström
International Conference on the Theory and Application of Cryptology and …, 2012
302012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20