Suivre
Tal Rabin
Tal Rabin
University of Pennsylvania, Amazon Web Services
Adresse e-mail validée de seas.upenn.edu
Titre
Citée par
Citée par
Année
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 5,991,414, 1999
14851999
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 6,192,472, 2001
14772001
Verifiable secret sharing and multiparty protocols with honest majority
T Rabin, M Ben-Or
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
14001989
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20, 51-83, 2007
1206*2007
Chameleon Signatures.
H Krawczyk, T Rabin
NDSS, 2000
863*2000
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
7832002
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—EUROCRYPT’96: International Conference on the Theory …, 1996
7361996
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
R Gennaro, MO Rabin, T Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
6911998
Fast batch verification for modular exponentiation and digital signatures
M Bellare, JA Garay, T Rabin
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
6101998
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
4551999
A simplified approach to threshold and proactive RSA
T Rabin
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
3841998
Fast asynchronous Byzantine agreement with optimal resilience
R Canetti, T Rabin
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993
3821993
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
371*1996
Universal composition with joint state
R Canetti, T Rabin
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
3242003
Biometric authentication system with encrypted models
R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen
US Patent 6,317,834, 2001
2982001
Efficient multiparty computations secure against an adaptive adversary
R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin
International conference on the Theory and Applications of Cryptographic …, 1999
2701999
Asynchronous secure computations with optimal resilience
M Ben-Or, B Kelmer, T Rabin
Proceedings of the thirteenth annual ACM symposium on Principles of …, 1994
2531994
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004
2422004
Falcon: Honest-majority maliciously secure framework for private deep learning
S Wagh, S Tople, F Benhamouda, E Kushilevitz, P Mittal, T Rabin
arXiv preprint arXiv:2004.02229, 2020
2312020
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
2291999
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20