Method and apparatus for the secure distributed storage and retrieval of information JA Garay, R Gennaro, CS Jutla, TD Rabin US Patent 5,991,414, 1999 | 1490 | 1999 |
Method and apparatus for the secure distributed storage and retrieval of information JA Garay, R Gennaro, CS Jutla, TD Rabin US Patent 6,192,472, 2001 | 1482 | 2001 |
Verifiable secret sharing and multiparty protocols with honest majority T Rabin, M Ben-Or Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989 | 1404 | 1989 |
Secure distributed key generation for discrete-log based cryptosystems R Gennaro, S Jarecki, H Krawczyk, T Rabin Journal of Cryptology 20, 51-83, 2007 | 1214* | 2007 |
Chameleon Signatures. H Krawczyk, T Rabin NDSS, 2000 | 864* | 2000 |
On the security of joint signature and encryption JH An, Y Dodis, T Rabin Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002 | 789 | 2002 |
Robust threshold DSS signatures R Gennaro, S Jarecki, H Krawczyk, T Rabin Advances in Cryptology—EUROCRYPT’96: International Conference on the Theory …, 1996 | 738 | 1996 |
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography R Gennaro, MO Rabin, T Rabin Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998 | 691 | 1998 |
Fast batch verification for modular exponentiation and digital signatures M Bellare, JA Garay, T Rabin Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998 | 612 | 1998 |
Secure hash-and-sign signatures without the random oracle R Gennaro, S Halevi, T Rabin Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999 | 458 | 1999 |
A simplified approach to threshold and proactive RSA T Rabin Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998 | 387 | 1998 |
Fast asynchronous Byzantine agreement with optimal resilience R Canetti, T Rabin Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993 | 387 | 1993 |
Robust and efficient sharing of RSA functions R Gennaro, S Jarecki, H Krawczyk, T Rabin Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996 | 371* | 1996 |
Universal composition with joint state R Canetti, T Rabin Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003 | 324 | 2003 |
Biometric authentication system with encrypted models R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen US Patent 6,317,834, 2001 | 298 | 2001 |
Efficient multiparty computations secure against an adaptive adversary R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin International conference on the Theory and Applications of Cryptographic …, 1999 | 274 | 1999 |
Asynchronous secure computations with optimal resilience M Ben-Or, B Kelmer, T Rabin Proceedings of the thirteenth annual ACM symposium on Principles of …, 1994 | 260 | 1994 |
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004 | 243 | 2004 |
Falcon: Honest-majority maliciously secure framework for private deep learning S Wagh, S Tople, F Benhamouda, E Kushilevitz, P Mittal, T Rabin arXiv preprint arXiv:2004.02229, 2020 | 236 | 2020 |
Adaptive security for threshold cryptosystems R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999 | 231 | 1999 |