Search

Your search keyword '"Malkin, Tal"' showing total 553 results

Search Constraints

Start Over You searched for: Author "Malkin, Tal" Remove constraint Author: "Malkin, Tal"
553 results on '"Malkin, Tal"'

Search Results

51. Efficient Robust Private Set Intersection

52. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

53. Simple, Black-Box Constructions of Adaptively Secure Protocols

55. Reputation Systems for Anonymous Networks

56. Optimal Cryptographic Hardness of Learning Monotone Functions

57. Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One

58. How Should We Solve Search Problems Privately?

59. Private Multiparty Sampling and Approximation of Vector Combinations

60. Towards a Separation of Semantic and CCA Security for Public Key Encryption

61. Two-Party Computing with Encrypted Data

62. A Comparative Cost/Security Analysis of Fault Attack Countermeasures

63. Generalized Environmental Security from Number Theoretic Assumptions

64. Mercurial Commitments with Applications to Zero-Knowledge Sets : Extended Abstract

65. WAR: Wireless Anonymous Routing

66. The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures

72. Randomness Extraction from Somewhat Dependent Sources

73. Randomness Extraction from Somewhat Dependent Sources

86. Communication Complexity with Defective Randomness

87. Linear Threshold Secret-Sharing with Binary Reconstruction

89. Lower Bounds for Oblivious Near-Neighbor Search

90. Limits to Non-Malleability

91. LP decoding corrects a constant fraction of errors

93. Limits to Non-Malleability

97. Secure Computation for Big Data

Catalog

Books, media, physical & digital resources