Tal Rabin
Tal Rabin
IBM Research
Verified email at us.ibm.com
Title
Cited by
Cited by
Year
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 6,192,472, 2001
12022001
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 5,991,414, 1999
11881999
Verifiable secret sharing and multiparty protocols with honest majority
T Rabin, M Ben-Or
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
11021989
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20 (1), 51-83, 2007
834*2007
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 2002
6832002
Chameleon Signatures.
H Krawczyk, T Rabin
NDSS, 2000
607*2000
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1996
6011996
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
R Gennaro, MO Rabin, T Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
5411998
Fast batch verification for modular exponentiation and digital signatures
M Bellare, JA Garay, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1998
5071998
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
4041999
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 157-172, 1996
354*1996
A simplified approach to threshold and proactive RSA
T Rabin
Annual International Cryptology Conference, 89-104, 1998
3271998
Universal composition with joint state
R Canetti, T Rabin
Annual International Cryptology Conference, 265-281, 2003
2802003
Biometric authentication system with encrypted models
R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen
US Patent 6,317,834, 2001
2702001
Fast asynchronous Byzantine agreement with optimal resilience
R Canetti, T Rabin
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993
2681993
Efficient multiparty computations secure against an adaptive adversary
R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
2261999
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography Conference, 258-277, 2004
2082004
Randomness extraction and key derivation using the CBC, cascade and HMAC modes
Y Dodis, R Gennaro, J Håstad, H Krawczyk, T Rabin
Annual International Cryptology Conference, 494-510, 2004
1852004
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 98-116, 1999
1761999
Secure network coding over the integers
R Gennaro, J Katz, H Krawczyk, T Rabin
International Workshop on Public Key Cryptography, 142-160, 2010
1672010
The system can't perform the operation now. Try again later.
Articles 1–20