Follow
Tal Rabin
Tal Rabin
University of Pennsylvania, Amazon Web Services
Verified email at seas.upenn.edu
Title
Cited by
Year
5. Project 3: Security for Distributed Services
H Wee, CG Bent, J Ibbotson, S Calo, D Vyyan, H Krawczyk, R Gennaro, ...
A cryptographic solution to a game theoretic problem
Y Dodis, S Halevi, T Rabin
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
1762000
A full characterization of functions that imply fair coin tossing and ramifications to fairness
G Asharov, Y Lindell, T Rabin
Theory of Cryptography Conference, 243-262, 2013
262013
A simplified approach to threshold and proactive RSA
T Rabin
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
3921998
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
2291999
Additive randomized encodings and their applications
S Halevi, Y Ishai, E Kushilevitz, T Rabin
Annual International Cryptology Conference, 203-235, 2023
32023
Advances in Cryptology-CRYPTO 2010
T Rabin
Lecture Notes in Computer Science 6223, 2010
432010
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004
2482004
An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products
R Gennaro, D Micciancio, T Rabin
Proceedings of the 5th ACM Conference on Computer and Communications …, 1998
971998
An Efficient Signature Scheme for Route
S Chari, T Rabin, R Rivest
An efficient signature scheme for route aggregation
S Chari, T Rabin, R Rivest
Feb, 2002
122002
Analyzing the Real-World Security of the Algorand Blockchain
E Blum, D Leung, J Loss, J Katz, T Rabin
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
22023
Analyzing the Real-World Security of the Algorand Blockchain
F Benhamouda, E Blum, J Katz, D Leung, J Loss, T Rabin
Cryptology ePrint Archive, 2023
62023
Asynchronous secure computations with optimal resilience
M Ben-Or, B Kelmer, T Rabin
Proceedings of the thirteenth annual ACM symposium on Principles of …, 1994
2681994
Attribute-based key exchange with general policies
V Kolesnikov, H Krawczyk, Y Lindell, A Malozemoff, T Rabin
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
202016
Authenticating mandatory access controls and preserving privacy for a high-assurance smart card
H Scherzer, R Canetti, PA Karger, H Krawczyk, T Rabin, DC Toll
Computer Security–ESORICS 2003: 8th European Symposium on Research in …, 2003
262003
Batch Ver cat on w th Appl cat ons to Cryptography and Check ng
M Bellare, JA Garay, T Rabin
LATIN'9 8: Theoretical Informatics, 170, 0
Batch Verification
JA Garay, M Bellare, T Rabin, M Bellare, JA Garay, T Rabin
Batch Verification with Applications to Cryptography and
M Bellare¹, JA Garay, T Rabin
LATIN...: Theoretical Informatics:... Latin American Symposium: Proceedings, 170, 1998
1998
Batch verification with applications to cryptography and checking
M Bellare, JA Garay, T Rabin
LATIN'98: Theoretical Informatics: Third Latin American Symposium Campinas …, 1998
521998
The system can't perform the operation now. Try again later.
Articles 1–20