What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tal Malkin
Google Scholar
65
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/crypto
Structural Lower Bounds on Black-Box Constructions of Pseudorandom Functions.
Amos Beimel
Tal Malkin
Noam Mazor
2023
journals/joc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2022
conf/esorics
XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWE.
Chengyu Lin
Zeyu Liu
Tal Malkin
2022
conf/eurocrypt
Unclonable Polymers and Their Cryptographic Applications.
Ghada Almashaqbeh
Ran Canetti
Yaniv Erlich
Jonathan Gershoni
Tal Malkin
Itsik Pe'er
Anna Roitburd-Berman
Eran Tromer
2022
conf/tcc
Poly Onions: Achieving Anonymity in the Presence of Churn.
Megumi Ando
Miranda Christ
Anna Lysyanskaya
Tal Malkin
2021
journals/popets
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC.
Ghada Almashaqbeh
Fabrice Benhamouda
Seungwook Han
Daniel Jaroslawicz
Tal Malkin
Alex Nicita
Tal Rabin
Abhishek Shah
Eran Tromer
2020
conf/crypto
Non-malleability Against Polynomial Tampering.
Marshall Ball
Eshan Chattopadhyay
Jyun-Jie Liao
Tal Malkin
Li-Yang Tan
2020
conf/tcc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2019
conf/eurocrypt
Non-Malleable Codes Against Bounded Polynomial Time Tampering.
Marshall Ball
Dana Dachman-Soled
Mukul Kulkarni
Huijia Lin
Tal Malkin
2019
conf/asiacrypt
Public-Key Function-Private Hidden Vector Encryption (and More).
James Bartusek
Brent Carmer
Abhishek Jain
Zhengzhong Jin
Tancrède Lepoint
Fermi Ma
Tal Malkin
Alex J. Malozemoff
Mariana Raykova
2019
conf/tcc
Is Information-Theoretic Topology-Hiding Computation Possible?
Marshall Ball
Elette Boyle
Ran Cohen
Tal Malkin
Tal Moran
2018
journals/joc
A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption.
Seung Geol Choi
Dana Dachman-Soled
Tal Malkin
Hoeteck Wee
2018
conf/crypto
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards.
Allison Bishop
Lucas Kowalczyk
Tal Malkin
Valerio Pastro
Mariana Raykova
Kevin Shi
2018
conf/crypto
Hardness of Non-interactive Differential Privacy from One-Way Functions.
Lucas Kowalczyk
Tal Malkin
Jonathan R. Ullman
Daniel Wichs
2018
conf/icisc
Mitigating the One-Use Restriction in Attribute-Based Encryption.
Lucas Kowalczyk
Jiahui Liu
Tal Malkin
Kailash Meiyappan
2018
conf/eurocrypt
Non-malleable Codes from Average-Case Hardness: $${\mathsf {A}}{\mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering.
Marshall Ball
Dana Dachman-Soled
Mukul Kulkarni
Tal Malkin
2018
conf/eurocrypt
Exploring the Boundaries of Topology-Hiding Computation.
Marshall Ball
Elette Boyle
Tal Malkin
Tal Moran
2016
conf/ccs
Garbling Gadgets for Boolean and Arithmetic Circuits.
Marshall Ball
Tal Malkin
Mike Rosulek
2016
conf/eurocrypt
Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits.
Marshall Ball
Dana Dachman-Soled
Mukul Kulkarni
Tal Malkin
2016
conf/tcc
Strong Hardness of Privacy from Weak Traitor Tracing.
Lucas Kowalczyk
Tal Malkin
Jonathan R. Ullman
Mark Zhandry
2015
conf/sp
Malicious-Client Security in Blind Seer: A Scalable Private DBMS.
Ben A. Fisch
Binh Vo
Fernando Krell
Abishek Kumarasubramanian
Vladimir Kolesnikov
Tal Malkin
Steven M. Bellovin
2015
conf/tcc
The Power of Negations in Cryptography.
Siyao Guo
Tal Malkin
Igor C. Oliveira
Alon Rosen
2014
conf/sp
Blind Seer: A Scalable Private DBMS.
Vasilis Pappas
Fernando Krell
Binh Vo
Vladimir Kolesnikov
Tal Malkin
Seung Geol Choi
Wesley George
Angelos D. Keromytis
Steven M. Bellovin
2014
conf/asiacrypt
Order-Preserving Encryption Secure Beyond One-Wayness.
Isamu Teranishi
Moti Yung
Tal Malkin
2014
conf/tcc
Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?
Dana Dachman-Soled
Mohammad Mahmoody
Tal Malkin
2013
journals/joc
Mercurial Commitments with Applications to Zero-Knowledge Sets.
Melissa Chase
Alexander Healy
Anna Lysyanskaya
Tal Malkin
Leonid Reyzin
2013
conf/eurocrypt
Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction.
S. Dov Gordon
Tal Malkin
Mike Rosulek
Hoeteck Wee
2013
conf/asiacrypt
Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments.
Dana Dachman-Soled
Tal Malkin
Mariana Raykova
Muthuramakrishnan Venkitasubramaniam
2013
conf/tcc
Secure Computation for Big Data.
Tal Malkin
2012
conf/ccs
Secure two-party computation in sublinear (amortized) time.
S. Dov Gordon
Jonathan Katz
Vladimir Kolesnikov
Fernando Krell
Tal Malkin
Mariana Raykova
Yevgeniy Vahlis
2012
conf/ctrsa
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces.
Seung Geol Choi
Kyung-Wook Hwang
Jonathan Katz
Tal Malkin
Dan Rubenstein
2012
conf/tcc
Computational Extractors and Pseudorandomness.
Dana Dachman-Soled
Rosario Gennaro
Hugo Krawczyk
Tal Malkin
2011
conf/acns
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications.
Dana Dachman-Soled
Tal Malkin
Mariana Raykova
Moti Yung
2011
conf/eurocrypt
Efficient Circuit-Size Independent Public Key Encryption with KDM Security.
Tal Malkin
Isamu Teranishi
Moti Yung
2011
conf/asiacrypt
BiTR: Built-in Tamper Resilience.
Seung Geol Choi
Aggelos Kiayias
Tal Malkin
2011
conf/acsac
Private search in the real world.
Vasilis Pappas
Mariana Raykova
Binh Vo
Steven M. Bellovin
Tal Malkin
2011
conf/tcc
Signatures Resilient to Continual Leakage on Memory and Computation.
Tal Malkin
Isamu Teranishi
Yevgeniy Vahlis
Moti Yung
2011
conf/tcc
On the Black-Box Complexity of Optimally-Fair Coin Tossing.
Dana Dachman-Soled
Yehuda Lindell
Mohammad Mahmoody
Tal Malkin
2010
journals/joc
How Should We Solve Search Problems Privately?
Amos Beimel
Tal Malkin
Kobbi Nissim
Enav Weinreb
2009
conf/ccs
Secure anonymous database search.
Mariana Raykova
Binh Vo
Steven M. Bellovin
Tal Malkin
2009
conf/acns
Efficient Robust Private Set Intersection.
Dana Dachman-Soled
Tal Malkin
Mariana Raykova
Moti Yung
2009
conf/eurocrypt
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
François-Xavier Standaert
Tal Malkin
Moti Yung
2009
conf/asiacrypt
Secure Multi-party Computation Minimizing Online Rounds.
Seung Geol Choi
Ariel Elbaz
Tal Malkin
Moti Yung
2009
conf/asiacrypt
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols.
Seung Geol Choi
Dana Dachman-Soled
Tal Malkin
Hoeteck Wee
2009
conf/tcc
Simple, Black-Box Constructions of Adaptively Secure Protocols.
Seung Geol Choi
Dana Dachman-Soled
Tal Malkin
Hoeteck Wee
2008
conf/ccs
A block cipher based pseudo random number generator secure against side-channel key recovery.
Christophe Petit
François-Xavier Standaert
Olivier Pereira
Tal Malkin
Moti Yung
2008
conf/tcc
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.
Seung Geol Choi
Dana Dachman-Soled
Tal Malkin
Hoeteck Wee
2007
conf/crypto
How Should We Solve Search Problems Privately?
Amos Beimel
Tal Malkin
Kobbi Nissim
Enav Weinreb
2007
conf/asiacrypt
Two-Party Computing with Encrypted Data.
Seung Geol Choi
Ariel Elbaz
Ari Juels
Tal Malkin
Moti Yung
2007
conf/tcc
Towards a Separation of Semantic and CCA Security for Public Key Encryption.
Yael Gertner
Tal Malkin
Steven A. Myers
2006
conf/fdtc
A Comparative Cost/Security Analysis of Fault Attack Countermeasures.
Tal Malkin
François-Xavier Standaert
Moti Yung
2006
conf/tcc
Generalized Environmental Security from Number Theoretic Assumptions.
Tal Malkin
Ryan Moriarty
Nikolai Yakovenko
2005
conf/eurocrypt
Mercurial Commitments with Applications to Zero-Knowledge Sets.
Melissa Chase
Alexander Healy
Anna Lysyanskaya
Tal Malkin
Leonid Reyzin
2004
journals/joc
Adaptive versus Non-Adaptive Security of Multi-Party Protocols.
Ran Canetti
Ivan Damgård
Stefan Dziembowski
Yuval Ishai
Tal Malkin
2004
journals/joc
Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing.
Amos Beimel
Yuval Ishai
Tal Malkin
2004
conf/eurocrypt
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.
Tal Malkin
Satoshi Obana
Moti Yung
2004
conf/tcc
A Quantitative Approach to Reductions in Secure Computation.
Amos Beimel
Tal Malkin
2004
conf/tcc
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
Rosario Gennaro
Anna Lysyanskaya
Tal Malkin
Silvio Micali
Tal Rabin
2003
conf/ccs
On the performance, feasibility, and use of forward-secure signatures.
Eric Cronin
Sugih Jamin
Tal Malkin
Patrick D. McDaniel
2002
conf/eurocrypt
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods.
Tal Malkin
Daniele Micciancio
Sara K. Miner
2001
conf/eurocrypt
On Adaptive vs. Non-adaptive Security of Multiparty Protocols.
Ran Canetti
Ivan Damgård
Stefan Dziembowski
Yuval Ishai
Tal Malkin
2000
conf/crypto
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing.
Amos Beimel
Yuval Ishai
Tal Malkin
2000
conf/eurocrypt
Single Database Private Information Retrieval Implies Oblivious Transfer.
Giovanni Di Crescenzo
Tal Malkin
Rafail Ostrovsky
1999
conf/crypto
The All-or-Nothing Nature of Two-Party Secure Computation.
Amos Beimel
Tal Malkin
Silvio Micali
1999
conf/eurocrypt
Efficient Communication-Storage Tradeoffs for Multicast Encryption.
Ran Canetti
Tal Malkin
Kobbi Nissim
Coauthors
Abhishek Jain
(1)
Abhishek Shah
(1)
Abishek Kumarasubramanian
(1)
Aggelos Kiayias
(1)
Alex J. Malozemoff
(1)
Alex Nicita
(1)
Alexander Healy
(2)
Allison Bishop
(1)
Alon Rosen
(1)
Amos Beimel
(7)
Angelos D. Keromytis
(1)
Anna Lysyanskaya
(4)
Anna Roitburd-Berman
(1)
Ari Juels
(1)
Ariel Elbaz
(2)
Ben A. Fisch
(1)
Binh Vo
(4)
Brent Carmer
(1)
Chengyu Lin
(1)
Christophe Petit
(1)
Dan Rubenstein
(1)
Dana Dachman-Soled
(13)
Daniel Jaroslawicz
(1)
Daniel Wichs
(1)
Daniele Micciancio
(1)
Elette Boyle
(4)
Enav Weinreb
(2)
Eran Tromer
(2)
Eric Cronin
(1)
Eshan Chattopadhyay
(1)
Fabrice Benhamouda
(1)
Fermi Ma
(1)
Fernando Krell
(3)
François-Xavier Standaert
(3)
Ghada Almashaqbeh
(2)
Giovanni Di Crescenzo
(1)
Hoeteck Wee
(5)
Hugo Krawczyk
(1)
Huijia Lin
(1)
Igor C. Oliveira
(1)
Isamu Teranishi
(3)
Itsik Pe'er
(1)
Ivan Damgård
(2)
James Bartusek
(1)
Jiahui Liu
(1)
Jonathan Gershoni
(1)
Jonathan Katz
(2)
Jonathan R. Ullman
(2)
Jyun-Jie Liao
(1)
Kailash Meiyappan
(1)
Kevin Shi
(1)
Kobbi Nissim
(3)
Kyung-Wook Hwang
(1)
Leonid Reyzin
(2)
Li-Yang Tan
(1)
Lisa Kohl
(2)
Lucas Kowalczyk
(4)
Mariana Raykova
(8)
Mark Zhandry
(1)
Marshall Ball
(9)
Megumi Ando
(1)
Melissa Chase
(2)
Mike Rosulek
(2)
Miranda Christ
(1)
Mohammad Mahmoody
(2)
Moti Yung
(11)
Mukul Kulkarni
(3)
Muthuramakrishnan Venkitasubramaniam
(1)
Nikolai Yakovenko
(1)
Noam Mazor
(1)
Olivier Pereira
(1)
Patrick D. McDaniel
(1)
Pierre Meyer
(2)
Rafail Ostrovsky
(1)
Ran Canetti
(4)
Ran Cohen
(3)
Rosario Gennaro
(2)
Ryan Moriarty
(1)
S. Dov Gordon
(2)
Sara K. Miner
(1)
Satoshi Obana
(1)
Seung Geol Choi
(9)
Seungwook Han
(1)
Silvio Micali
(2)
Siyao Guo
(1)
Stefan Dziembowski
(2)
Steven A. Myers
(1)
Steven M. Bellovin
(4)
Sugih Jamin
(1)
Tal Malkin
(65)
Tal Moran
(4)
Tal Rabin
(2)
Tancrède Lepoint
(1)
Valerio Pastro
(1)
Vasilis Pappas
(2)
Vladimir Kolesnikov
(3)
Wesley George
(1)
Yael Gertner
(1)
Yaniv Erlich
(1)
Yehuda Lindell
(1)
Yevgeniy Vahlis
(2)
Yuval Ishai
(4)
Zeyu Liu
(1)
Zhengzhong Jin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to