Tal Malkin

From MaRDI portal
Person:776016


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Structural lower bounds on black-box constructions of pseudorandom functions
 
2024-12-13Paper
scientific article; zbMATH DE number 7829244 (Why is no real title available?)
 
2024-04-09Paper
Correction to: ``Topology-hiding communication from minimal assumptions
Journal of Cryptology
2023-10-25Paper
Poly onions: achieving anonymity in the presence of churn
Theory of Cryptography
2023-08-14Paper
Communication complexity with defective randomness
 
2023-07-12Paper
Linear Threshold Secret-Sharing with Binary Reconstruction
 
2023-07-03Paper
scientific article; zbMATH DE number 7650434 (Why is no real title available?)
 
2023-02-03Paper
scientific article; zbMATH DE number 7650428 (Why is no real title available?)
 
2023-02-03Paper
Non-malleability against polynomial tampering
 
2022-12-07Paper
Unclonable polymers and their cryptographic applications
 
2022-08-30Paper
Two Party Distribution Testing: Communication and Security
 
2022-07-21Paper
Topology-hiding communication from minimal assumptions
 
2022-03-23Paper
Lower Bounds for Oblivious Near-Neighbor Search
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms
2021-02-02Paper
A simple obfuscation scheme for pattern-matching with wildcards
 
2020-06-30Paper
Public-key function-private hidden vector encryption (and more)
 
2020-05-11Paper
Is information-theoretic topology-hiding computation possible?
 
2020-04-30Paper
Non-malleable codes against bounded polynomial time tampering
 
2020-02-04Paper
Mitigating the one-use restriction in attribute-based encryption
 
2019-03-29Paper
Obfuscation from polynomial hardness: beyond decomposable obfuscation
 
2018-10-17Paper
Hardness of non-interactive differential privacy from one-way functions
 
2018-09-12Paper
Exploring the boundaries of topology-hiding computation
 
2018-07-17Paper
Non-malleable codes from average-case hardness: \({\mathsf{A}}{\mathsf{C}}^0\), decision trees, and streaming space-bounded tampering
 
2018-07-17Paper
A black-box construction of non-malleable encryption from semantically secure encryption
Journal of Cryptology
2018-04-26Paper
Improved, black-box, non-malleable encryption from semantic security
Designs, Codes and Cryptography
2018-04-06Paper
Strong hardness of privacy from weak traitor tracing
Theory of Cryptography
2016-12-21Paper
One-way functions are essential for single-server private information retrieval
Proceedings of the thirty-first annual ACM symposium on Theory of Computing
2016-09-29Paper
Non-malleable codes for bounded depth, bounded fan-in circuits
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Secure multiparty computation of approximations
ACM Transactions on Algorithms
2015-09-02Paper
The power of negations in cryptography
Theory of Cryptography
2015-07-06Paper
Order-Preserving Encryption Secure Beyond One-Wayness
Lecture Notes in Computer Science
2015-01-06Paper
Can optimally-fair coin tossing be based on one-way functions?
Theory of Cryptography
2014-02-18Paper
Mercurial commitments with applications to zero-knowledge sets
Journal of Cryptology
2013-06-27Paper
Multi-party computation of polynomials and branching programs without simultaneous interaction
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Secure computation for big data
Theory of Cryptography
2013-03-18Paper
Efficient robust private set intersection
International Journal of Applied Cryptography
2012-11-16Paper
Computational extractors and pseudorandomness
Theory of Cryptography
2012-06-15Paper
Secure multi-party computation of Boolean circuits with applications to privacy in on-line marketplaces
Lecture Notes in Computer Science
2012-06-08Paper
BiTR: built-in tamper resilience
Lecture Notes in Computer Science
2011-12-02Paper
Efficient circuit-size independent public key encryption with KDM security
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Optimal cryptographic hardness of learning monotone functions
Theory of Computing
2011-05-24Paper
Signatures resilient to continual leakage on memory and computation
Theory of Cryptography
2011-05-19Paper
On the Black-Box Complexity of Optimally-Fair Coin Tossing
Theory of Cryptography
2011-05-19Paper
How should we solve search problems privately?
Journal of Cryptology
2010-03-01Paper
Improved non-committing encryption with applications to adaptively secure protocols
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Secure multi-party computation minimizing online rounds
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Private multiparty sampling and approximation of vector combinations
Theoretical Computer Science
2009-04-29Paper
How Should We Solve Search Problems Privately?
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Simple, Black-Box Constructions of Adaptively Secure Protocols
Theory of Cryptography
2009-03-03Paper
LP Decoding Corrects a Constant Fraction of Errors
IEEE Transactions on Information Theory
2008-12-21Paper
Optimal Cryptographic Hardness of Learning Monotone Functions
Automata, Languages and Programming
2008-08-28Paper
Two-Party Computing with Encrypted Data
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Mercurial Commitments with Applications to Zero-Knowledge Sets
Lecture Notes in Computer Science
2008-05-06Paper
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
Theory of Cryptography
2008-03-05Paper
Private Multiparty Sampling and Approximation of Vector Combinations
Automata, Languages and Programming
2007-11-28Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Towards a Separation of Semantic and CCA Security for Public Key Encryption
Theory of Cryptography
2007-08-30Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
scientific article; zbMATH DE number 5009196 (Why is no real title available?)
 
2006-03-01Paper
Adaptive versus non-adaptive security of multi-party protocols
Journal of Cryptology
2004-10-01Paper
Reducing the servers' computation in private information retrieval: PIR with preprocessing
Journal of Cryptology
2004-09-27Paper
scientific article; zbMATH DE number 2086721 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 1775399 (Why is no real title available?)
 
2002-09-17Paper
scientific article; zbMATH DE number 1759771 (Why is no real title available?)
 
2002-07-28Paper
scientific article; zbMATH DE number 1754645 (Why is no real title available?)
 
2002-06-12Paper
scientific article; zbMATH DE number 1722683 (Why is no real title available?)
 
2002-03-21Paper
Protecting data privacy in private information retrieval schemes
Journal of Computer and System Sciences
2000-08-27Paper
scientific article; zbMATH DE number 1418289 (Why is no real title available?)
 
2000-07-26Paper
scientific article; zbMATH DE number 1304090 (Why is no real title available?)
 
1999-06-17Paper


Research outcomes over time


This page was built for person: Tal Malkin