Folgen
Tal Rabin
Tal Rabin
IBM Research
Bestätigte E-Mail-Adresse bei us.ibm.com
Titel
Zitiert von
Zitiert von
Jahr
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 5,991,414, 1999
14331999
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 6,192,472, 2001
14302001
Verifiable secret sharing and multiparty protocols with honest majority
T Rabin, M Ben-Or
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
13321989
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20, 51-83, 2007
1083*2007
Chameleon Signatures.
H Krawczyk, T Rabin
NDSS, 2000
802*2000
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
7732002
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—EUROCRYPT’96: International Conference on the Theory …, 1996
6991996
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
R Gennaro, MO Rabin, T Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
6521998
Fast batch verification for modular exponentiation and digital signatures
M Bellare, JA Garay, T Rabin
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
5831998
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
4421999
A simplified approach to threshold and proactive RSA
T Rabin
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
3771998
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
367*1996
Fast asynchronous Byzantine agreement with optimal resilience
R Canetti, T Rabin
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993
3541993
Universal composition with joint state
R Canetti, T Rabin
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
3232003
Biometric authentication system with encrypted models
R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen
US Patent 6,317,834, 2001
2902001
Efficient multiparty computations secure against an adaptive adversary
R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
2621999
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
TCC 2951, 258-277, 2004
2412004
Asynchronous secure computations with optimal resilience
M Ben-Or, B Kelmer, T Rabin
Proceedings of the thirteenth annual ACM symposium on Principles of …, 1994
2251994
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
2131999
Randomness extraction and key derivation using the CBC, cascade and HMAC modes
Y Dodis, R Gennaro, J Håstad, H Krawczyk, T Rabin
Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004
2082004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20