Tal Rabin
Tal Rabin
IBM Research
Verifierad e-postadress på us.ibm.com
Titel
Citeras av
Citeras av
År
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 6,192,472, 2001
12152001
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 5,991,414, 1999
12031999
Verifiable secret sharing and multiparty protocols with honest majority
T Rabin, M Ben-Or
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
11211989
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20 (1), 51-83, 2007
850*2007
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 2002
6892002
Chameleon Signatures.
H Krawczyk, T Rabin
NDSS, 2000
617*2000
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1996
6081996
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
R Gennaro, MO Rabin, T Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
5471998
Fast batch verification for modular exponentiation and digital signatures
M Bellare, JA Garay, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1998
5121998
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
4041999
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 157-172, 1996
355*1996
A simplified approach to threshold and proactive RSA
T Rabin
Annual International Cryptology Conference, 89-104, 1998
3281998
Universal composition with joint state
R Canetti, T Rabin
Annual International Cryptology Conference, 265-281, 2003
2852003
Biometric authentication system with encrypted models
R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen
US Patent 6,317,834, 2001
2722001
Fast asynchronous Byzantine agreement with optimal resilience
R Canetti, T Rabin
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993
2711993
Efficient multiparty computations secure against an adaptive adversary
R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
2281999
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography Conference, 258-277, 2004
2102004
Randomness extraction and key derivation using the CBC, cascade and HMAC modes
Y Dodis, R Gennaro, J Håstad, H Krawczyk, T Rabin
Annual International Cryptology Conference, 494-510, 2004
1872004
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 98-116, 1999
1761999
Secure network coding over the integers
R Gennaro, J Katz, H Krawczyk, T Rabin
International Workshop on Public Key Cryptography, 142-160, 2010
1682010
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20