Follow
Tal Malkin
Tal Malkin
Professor of Computer Science, Columbia University
Verified email at columbia.edu
Title
Cited by
Cited by
Year
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
10982009
Protecting data privacy in private information retrieval schemes
Y Gertner, Y Ishai, E Kushilevitz, T Malkin
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
6481998
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh, ...
US Patent 7,779,463, 2010
3382010
Efficient communication-storage tradeoffs for multicast encryption
R Canetti, T Malkin, K Nissim
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
3161999
Blind seer: A scalable private DBMS
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
2014 IEEE Symposium on Security and Privacy, 359-374, 2014
2972014
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh
US Patent 8,381,295, 2013
2932013
Secure multiparty computation of approximations
J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright
ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006
251*2006
Efficient robust private set intersection
D Dachman-Soled, T Malkin, M Raykova, M Yung
International Journal of Applied Cryptography 2 (4), 289-303, 2012
2502012
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
TCC 2951, 258-277, 2004
2412004
Efficient generic forward-secure signatures with an unbounded number of time periods
T Malkin, D Micciancio, S Miner
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
2402002
On the capacity of secure network coding
J Feldman, T Malkin, C Stein, RA Servedio
Proc. 42nd Annual Allerton Conference on Communication, Control, and …, 2004
2302004
The relationship between public key encryption and oblivious transfer
Y Gertner, S Kannan, T Malkin, O Reingold, M Viswanathan
Proceedings 41st Annual Symposium on Foundations of Computer Science, 325-335, 2000
2232000
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1992012
Single database private information retrieval implies oblivious transfer
G Di Crescenzo, T Malkin, R Ostrovsky
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
1972000
Reputation systems for anonymous networks
E Androulaki, SG Choi, SM Bellovin, T Malkin
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
1602008
A comparative cost/security analysis of fault attack countermeasures
TG Malkin, FX Standaert, M Yung
Fault Diagnosis and Tolerance in Cryptography: Third International Workshop …, 2006
1552006
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
SG Choi, KW Hwang, J Katz, T Malkin, D Rubenstein
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
1392012
Secure anonymous database search
M Raykova, B Vo, SM Bellovin, T Malkin
Proceedings of the 2009 ACM workshop on Cloud computing security, 115-126, 2009
1362009
Reducing the servers computation in private information retrieval: PIR with preprocessing
A Beimel, Y Ishai, T Malkin
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
1352000
A Random Server Model for Private Information Retrieval: How to Achieve Information Theoretic PIR Avoiding Database Replication
Y Gertner, S Goldwasser, T Malkin
Randomization and Approximation Techniques in Computer Science: Second …, 1998
1231998
The system can't perform the operation now. Try again later.
Articles 1–20