Search

Your search keyword '"Malkin, Tal"' showing total 37 results

Search Constraints

Start Over You searched for: Author "Malkin, Tal" Remove constraint Author: "Malkin, Tal" Search Limiters Full Text Remove constraint Search Limiters: Full Text
37 results on '"Malkin, Tal"'

Search Results

1. Lower Bounds for Oblivious Near-Neighbor Search

2. Two Party Distribution Testing: Communication and Security

3. Non-Malleable Codes for Small-Depth Circuits

4. Strong Hardness of Privacy from Weak Traitor Tracing

7. A Random Server Model for Private Information Retrieval (or Information Theoretic PIR Avoiding Database Replication

8. Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time

9. Randomness Extraction from Somewhat Dependent Sources

10. Randomness Extraction from Somewhat Dependent Sources

13. Communication Complexity with Defective Randomness

15. LP decoding corrects a constant fraction of errors

17. Limits to Non-Malleability

18. Two Party Distribution Testing: Communication and Security

19. Two Party Distribution Testing: Communication and Security

20. To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures

22. A formal foundation for secure remote execution of enclaves

23. walk2friends: Inferring Social Links from Mobility Profiles

25. Applied Cryptography and Network Security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / edited by Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis.

26. Blind Seer: A Scalable Private DBMS

27. A study of secure database access and general two-party computation

28. A comparative cost/security analysis of fault attack countermeasures

29. Theory of Computing

30. Composition with Knowledge Assumptions

31. Broadcast-Optimal Two Round MPC with an Honest Majority

32. A formal foundation for secure remote execution of enclaves

33. Key Reinstallation Attacks

34. The wolf of name street: Hijacking domains through their nameservers

35. walk2friends: Inferring Social Links from Mobility Profiles

36. Improved OR-Composition of Sigma-Protocols

37. On the XOR of Multiple Random Permutations

Catalog

Books, media, physical & digital resources