Follow
Tal Rabin
Tal Rabin
IBM Research
Verified email at us.ibm.com
Title
Cited by
Cited by
Year
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 6,192,472, 2001
13712001
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 5,991,414, 1999
13701999
Verifiable secret sharing and multiparty protocols with honest majority
T Rabin, M Ben-Or
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
12551989
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20 (1), 51-83, 2007
975*2007
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
International conference on the theory and applications of cryptographic …, 2002
7442002
Chameleon Signatures.
H Krawczyk, T Rabin
NDSS, 2000
744*2000
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1996
6591996
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
R Gennaro, MO Rabin, T Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
6151998
Fast batch verification for modular exponentiation and digital signatures
M Bellare, JA Garay, T Rabin
International conference on the theory and applications of cryptographic …, 1998
5521998
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
4281999
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 157-172, 1996
375*1996
A simplified approach to threshold and proactive RSA
T Rabin
Annual International Cryptology Conference, 89-104, 1998
3581998
Fast asynchronous Byzantine agreement with optimal resilience
R Canetti, T Rabin
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993
3151993
Universal composition with joint state
R Canetti, T Rabin
Annual International Cryptology Conference, 265-281, 2003
3112003
Biometric authentication system with encrypted models
R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen
US Patent 6,317,834, 2001
2852001
Efficient multiparty computations secure against an adaptive adversary
R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin
International conference on the Theory and Applications of Cryptographic …, 1999
2481999
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography Conference, 258-277, 2004
2372004
Randomness extraction and key derivation using the CBC, cascade and HMAC modes
Y Dodis, R Gennaro, J Håstad, H Krawczyk, T Rabin
Annual International Cryptology Conference, 494-510, 2004
1992004
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Annual International Cryptology Conference, 98-116, 1999
1991999
Secure network coding over the integers
R Gennaro, J Katz, H Krawczyk, T Rabin
International Workshop on Public Key Cryptography, 142-160, 2010
1932010
The system can't perform the operation now. Try again later.
Articles 1–20