Follow
Tal Rabin
Tal Rabin
IBM Research
Verified email at us.ibm.com
Title
Cited by
Cited by
Year
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 6,192,472, 2001
13762001
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 5,991,414, 1999
13761999
Verifiable secret sharing and multiparty protocols with honest majority
T Rabin, M Ben-Or
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
12641989
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20 (1), 51-83, 2007
984*2007
Chameleon Signatures.
H Krawczyk, T Rabin
NDSS, 2000
753*2000
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
International conference on the theory and applications of cryptographic …, 2002
7462002
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1996
6671996
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
R Gennaro, MO Rabin, T Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
6191998
Fast batch verification for modular exponentiation and digital signatures
M Bellare, JA Garay, T Rabin
International conference on the theory and applications of cryptographic …, 1998
5531998
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
4291999
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 157-172, 1996
376*1996
A simplified approach to threshold and proactive RSA
T Rabin
Annual International Cryptology Conference, 89-104, 1998
3611998
Fast asynchronous Byzantine agreement with optimal resilience
R Canetti, T Rabin
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993
3211993
Universal composition with joint state
R Canetti, T Rabin
Annual International Cryptology Conference, 265-281, 2003
3112003
Biometric authentication system with encrypted models
R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen
US Patent 6,317,834, 2001
2862001
Efficient multiparty computations secure against an adaptive adversary
R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin
International conference on the Theory and Applications of Cryptographic …, 1999
2531999
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography Conference, 258-277, 2004
2392004
Randomness extraction and key derivation using the CBC, cascade and HMAC modes
Y Dodis, R Gennaro, J Håstad, H Krawczyk, T Rabin
Annual International Cryptology Conference, 494-510, 2004
2002004
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 98-116, 1999
2001999
Asynchronous secure computations with optimal resilience
M Ben-Or, B Kelmer, T Rabin
Proceedings of the thirteenth annual ACM symposium on Principles of …, 1994
1951994
The system can't perform the operation now. Try again later.
Articles 1–20