Follow
Tal Rabin
Tal Rabin
University of Pennsylvania, Amazon Web Services
Verified email at seas.upenn.edu
Title
Cited by
Year
Sprint: High-throughput robust distributed schnorr signatures
F Benhamouda, S Halevi, H Krawczyk, Y Ma, T Rabin
Annual International Conference on the Theory and Applications of …, 2024
92024
Proactive Secret Sharing with Constant Communication
BH Falk, D Noble, T Rabin
Theory of Cryptography Conference, 337-373, 2023
12023
Analyzing the Real-World Security of the Algorand Blockchain
E Blum, D Leung, J Loss, J Katz, T Rabin
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
22023
Additive randomized encodings and their applications
S Halevi, Y Ishai, E Kushilevitz, T Rabin
Annual International Cryptology Conference, 203-235, 2023
32023
Flamingo: Multi-round single-server secure aggregation with applications to private federated learning
Y Ma, J Woods, S Angel, A Polychroniadou, T Rabin
2023 IEEE Symposium on Security and Privacy (SP), 477-496, 2023
302023
Analyzing the Real-World Security of the Algorand Blockchain
F Benhamouda, E Blum, J Katz, D Leung, J Loss, T Rabin
Cryptology ePrint Archive, 2023
62023
Threshold Cryptography as a Service (in the Multiserver and YOSO Models)
F Benhamouda, S Halevi, H Krawczyk, A Miao, T Rabin
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
82022
New Multiparty Computational Model: From Nakamoto to YOSO
T Rabin
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
2022
Efficient representation of numerical optimization problems for {SNARKs}
S Angel, AJ Blumberg, E Ioannidis, J Woods
31st USENIX Security Symposium (USENIX Security 22), 4273-4290, 2022
112022
Incremental {offline/online}{PIR}
Y Ma, K Zhong, T Rabin, S Angel
31st USENIX Security Symposium (USENIX Security 22), 1741-1758, 2022
212022
Yoso: You only speak once: Secure mpc with stateless ephemeral roles
C Gentry, S Halevi, H Krawczyk, B Magri, JB Nielsen, T Rabin, ...
Annual International Cryptology Conference, 64-93, 2021
682021
On the local leakage resilience of linear secret sharing schemes
F Benhamouda, A Degwekar, Y Ishai, T Rabin
Journal of Cryptology 34, 1-65, 2021
722021
Gage mpc: Bypassing residual function leakage for non-interactive mpc
G Almashaqbeh, F Benhamouda, S Han, D Jaroslawicz, T Malkin, A Nicita, ...
Cryptology ePrint Archive, 2021
142021
Cryptography for# MeToo
T Rabin
Proceedings of the 25th ACM Symposium on Access Control Models and …, 2020
2020
Falcon: Honest-majority maliciously secure framework for private deep learning
S Wagh, S Tople, F Benhamouda, E Kushilevitz, P Mittal, T Rabin
arXiv preprint arXiv:2004.02229, 2020
2572020
Can a public blockchain keep a secret?
F Benhamouda, C Gentry, S Gorbunov, S Halevi, H Krawczyk, C Lin, ...
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
1202020
Efficient RSA key generation and threshold paillier in the two-party setting
C Hazay, GL Mikkelsen, T Rabin, T Toft, AA Nicolosi
Journal of Cryptology 32, 265-323, 2019
752019
On fully secure MPC with solitary output
S Halevi, Y Ishai, E Kushilevitz, N Makriyannis, T Rabin
Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019
102019
Cryptography for# metoo
B Kuykendall, H Krawczyk, T Rabin
Proceedings on Privacy Enhancing Technologies, 2019
202019
Best possible information-theoretic MPC
S Halevi, Y Ishai, E Kushilevitz, T Rabin
Theory of cryptography conference, 255-281, 2018
202018
The system can't perform the operation now. Try again later.
Articles 1–20