Tal Malkin
Tal Malkin
Associate Professor of Computer Science, Columbia University
Verifierad e-postadress på columbia.edu
Titel
Citeras av
Citeras av
År
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Annual international conference on the theory and applications of …, 2009
8202009
Protecting data privacy in private information retrieval schemes
Y Gertner, Y Ishai, E Kushilevitz, T Malkin
Journal of Computer and System Sciences 60 (3), 592-629, 2000
5212000
Efficient communication-storage tradeoffs for multicast encryption
R Canetti, T Malkin, K Nissim
International conference on the theory and applications of cryptographic …, 1999
3071999
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh, ...
US Patent 7,779,463, 2010
2652010
Secure multiparty computation of approximations
J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright
ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006
227*2006
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh
US Patent 8,381,295, 2013
2222013
Blind seer: A scalable private dbms
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
2014 IEEE Symposium on Security and Privacy, 359-374, 2014
2172014
On the capacity of secure network coding
J Feldman, T Malkin, C Stein, RA Servedio
Proc. 42nd Annual Allerton Conference on Communication, Control, and …, 2004
2162004
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography Conference, 258-277, 2004
2102004
Efficient robust private set intersection
D Dachman-Soled, T Malkin, M Raykova, M Yung
International Journal of Applied Cryptography 2 (4), 289-303, 2012
2082012
Efficient generic forward-secure signatures with an unbounded number of time periods
T Malkin, D Micciancio, S Miner
International Conference on the Theory and Applications of Cryptographic …, 2002
2022002
The relationship between public key encryption and oblivious transfer
Y Gertner, S Kannan, T Malkin, O Reingold, M Viswanathan
Proceedings 41st Annual Symposium on Foundations of Computer Science, 325-335, 2000
1962000
Single database private information retrieval implies oblivious transfer
G Di Crescenzo, T Malkin, R Ostrovsky
International Conference on the Theory and Applications of Cryptographic …, 2000
1742000
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1552012
Reputation systems for anonymous networks
E Androulaki, SG Choi, SM Bellovin, T Malkin
International Symposium on Privacy Enhancing Technologies Symposium, 202-218, 2008
1432008
A comparative cost/security analysis of fault attack countermeasures
TG Malkin, FX Standaert, M Yung
International Workshop on Fault Diagnosis and Tolerance in Cryptography, 159-172, 2006
1252006
A random server model for private information retrieval
Y Gertner, S Goldwasser, T Malkin
International Workshop on Randomization and Approximation Techniques in …, 1998
1181998
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
SG Choi, KW Hwang, J Katz, T Malkin, D Rubenstein
Cryptographers’ Track at the RSA Conference, 416-432, 2012
1162012
LP decoding corrects a constant fraction of errors
J Feldman, T Malkin, RA Servedio, C Stein, MJ Wainwright
IEEE Transactions on Information Theory 53 (1), 82-89, 2006
1112006
Secure anonymous database search
M Raykova, B Vo, SM Bellovin, T Malkin
Proceedings of the 2009 ACM workshop on Cloud computing security, 115-126, 2009
1062009
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20