Follow
Tal Rabin
Tal Rabin
IBM Research
Verified email at us.ibm.com
Title
Cited by
Cited by
Year
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 5,991,414, 1999
14331999
Method and apparatus for the secure distributed storage and retrieval of information
JA Garay, R Gennaro, CS Jutla, TD Rabin
US Patent 6,192,472, 2001
14302001
Verifiable secret sharing and multiparty protocols with honest majority
T Rabin, M Ben-Or
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
13321989
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20, 51-83, 2007
1083*2007
Chameleon Signatures.
H Krawczyk, T Rabin
NDSS, 2000
802*2000
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
7732002
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—EUROCRYPT’96: International Conference on the Theory …, 1996
6991996
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
R Gennaro, MO Rabin, T Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998
6521998
Fast batch verification for modular exponentiation and digital signatures
M Bellare, JA Garay, T Rabin
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
5831998
Secure hash-and-sign signatures without the random oracle
R Gennaro, S Halevi, T Rabin
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
4421999
A simplified approach to threshold and proactive RSA
T Rabin
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
3771998
Robust and efficient sharing of RSA functions
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
367*1996
Fast asynchronous Byzantine agreement with optimal resilience
R Canetti, T Rabin
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993
3541993
Universal composition with joint state
R Canetti, T Rabin
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
3232003
Biometric authentication system with encrypted models
R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen
US Patent 6,317,834, 2001
2902001
Efficient multiparty computations secure against an adaptive adversary
R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
2621999
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
TCC 2951, 258-277, 2004
2412004
Asynchronous secure computations with optimal resilience
M Ben-Or, B Kelmer, T Rabin
Proceedings of the thirteenth annual ACM symposium on Principles of …, 1994
2251994
Adaptive security for threshold cryptosystems
R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
2131999
Randomness extraction and key derivation using the CBC, cascade and HMAC modes
Y Dodis, R Gennaro, J Håstad, H Krawczyk, T Rabin
Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004
2082004
The system can't perform the operation now. Try again later.
Articles 1–20