Tal Malkin
Tal Malkin
Professor of Computer Science, Columbia University
Verified email at
Cited by
Cited by
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
Protecting data privacy in private information retrieval schemes
Y Gertner, Y Ishai, E Kushilevitz, T Malkin
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh, ...
US Patent 7,779,463, 2010
Efficient communication-storage tradeoffs for multicast encryption
R Canetti, T Malkin, K Nissim
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
Blind seer: A scalable private DBMS
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
2014 IEEE Symposium on Security and Privacy, 359-374, 2014
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh
US Patent 8,381,295, 2013
Secure multiparty computation of approximations
J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright
ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006
Efficient robust private set intersection
D Dachman-Soled, T Malkin, M Raykova, M Yung
International Journal of Applied Cryptography 2 (4), 289-303, 2012
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
TCC 2951, 258-277, 2004
Efficient generic forward-secure signatures with an unbounded number of time periods
T Malkin, D Micciancio, S Miner
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
On the capacity of secure network coding
J Feldman, T Malkin, C Stein, RA Servedio
Proc. 42nd Annual Allerton Conference on Communication, Control, and …, 2004
The relationship between public key encryption and oblivious transfer
Y Gertner, S Kannan, T Malkin, O Reingold, M Viswanathan
Proceedings 41st Annual Symposium on Foundations of Computer Science, 325-335, 2000
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Single database private information retrieval implies oblivious transfer
G Di Crescenzo, T Malkin, R Ostrovsky
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
Reputation systems for anonymous networks
E Androulaki, SG Choi, SM Bellovin, T Malkin
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
A comparative cost/security analysis of fault attack countermeasures
TG Malkin, FX Standaert, M Yung
Fault Diagnosis and Tolerance in Cryptography: Third International Workshop …, 2006
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
SG Choi, KW Hwang, J Katz, T Malkin, D Rubenstein
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
Secure anonymous database search
M Raykova, B Vo, SM Bellovin, T Malkin
Proceedings of the 2009 ACM workshop on Cloud computing security, 115-126, 2009
Reducing the servers computation in private information retrieval: PIR with preprocessing
A Beimel, Y Ishai, T Malkin
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
A Random Server Model for Private Information Retrieval: How to Achieve Information Theoretic PIR Avoiding Database Replication
Y Gertner, S Goldwasser, T Malkin
Randomization and Approximation Techniques in Computer Science: Second …, 1998
The system can't perform the operation now. Try again later.
Articles 1–20