Tal Malkin

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Non-malleable codes for small-depth circuits2025-08-12Paper
Structural lower bounds on black-box constructions of pseudorandom functions2024-12-13Paper
scientific article; zbMATH DE number 7829244 (Why is no real title available?)2024-04-09Paper
Correction to: ``Topology-hiding communication from minimal assumptions
Journal of Cryptology
2023-10-25Paper
Poly onions: achieving anonymity in the presence of churn
Theory of Cryptography
2023-08-14Paper
Communication complexity with defective randomness2023-07-12Paper
Linear Threshold Secret-Sharing with Binary Reconstruction2023-07-03Paper
scientific article; zbMATH DE number 7650434 (Why is no real title available?)2023-02-03Paper
scientific article; zbMATH DE number 7650428 (Why is no real title available?)2023-02-03Paper
Non-malleability against polynomial tampering2022-12-07Paper
Unclonable polymers and their cryptographic applications2022-08-30Paper
Two Party Distribution Testing: Communication and Security
(available as arXiv preprint)
2022-07-21Paper
Topology-hiding communication from minimal assumptions2022-03-23Paper
Lower Bounds for Oblivious Near-Neighbor Search
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms
2021-02-02Paper
A simple obfuscation scheme for pattern-matching with wildcards2020-06-30Paper
Public-key function-private hidden vector encryption (and more)2020-05-11Paper
Is information-theoretic topology-hiding computation possible?2020-04-30Paper
Non-malleable codes against bounded polynomial time tampering2020-02-04Paper
Mitigating the one-use restriction in attribute-based encryption2019-03-29Paper
Obfuscation from polynomial hardness: beyond decomposable obfuscation2018-10-17Paper
Hardness of non-interactive differential privacy from one-way functions2018-09-12Paper
Exploring the boundaries of topology-hiding computation2018-07-17Paper
Non-malleable codes from average-case hardness: \({\mathsf{A}}{\mathsf{C}}^0\), decision trees, and streaming space-bounded tampering2018-07-17Paper
A black-box construction of non-malleable encryption from semantically secure encryption
Journal of Cryptology
2018-04-26Paper
Improved, black-box, non-malleable encryption from semantic security
Designs, Codes and Cryptography
2018-04-06Paper
Strong hardness of privacy from weak traitor tracing
Theory of Cryptography
2016-12-21Paper
One-way functions are essential for single-server private information retrieval
Proceedings of the thirty-first annual ACM symposium on Theory of Computing
2016-09-29Paper
Non-malleable codes for bounded depth, bounded fan-in circuits
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Secure multiparty computation of approximations
ACM Transactions on Algorithms
2015-09-02Paper
The power of negations in cryptography
Theory of Cryptography
2015-07-06Paper
Order-Preserving Encryption Secure Beyond One-Wayness
Lecture Notes in Computer Science
2015-01-06Paper
Can optimally-fair coin tossing be based on one-way functions?
Theory of Cryptography
2014-02-18Paper
Mercurial commitments with applications to zero-knowledge sets
Journal of Cryptology
2013-06-27Paper
Multi-party computation of polynomials and branching programs without simultaneous interaction
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Secure computation for big data
Theory of Cryptography
2013-03-18Paper
Efficient robust private set intersection
International Journal of Applied Cryptography
2012-11-16Paper
Computational extractors and pseudorandomness
Theory of Cryptography
2012-06-15Paper
Secure multi-party computation of Boolean circuits with applications to privacy in on-line marketplaces
Lecture Notes in Computer Science
2012-06-08Paper
BiTR: built-in tamper resilience
Lecture Notes in Computer Science
2011-12-02Paper
Efficient circuit-size independent public key encryption with KDM security
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Optimal cryptographic hardness of learning monotone functions
Theory of Computing
2011-05-24Paper
Signatures resilient to continual leakage on memory and computation
Theory of Cryptography
2011-05-19Paper
On the Black-Box Complexity of Optimally-Fair Coin Tossing
Theory of Cryptography
2011-05-19Paper
How should we solve search problems privately?
Journal of Cryptology
2010-03-01Paper
Improved non-committing encryption with applications to adaptively secure protocols
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Secure multi-party computation minimizing online rounds
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Private multiparty sampling and approximation of vector combinations
Theoretical Computer Science
2009-04-29Paper
How Should We Solve Search Problems Privately?
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Simple, Black-Box Constructions of Adaptively Secure Protocols
Theory of Cryptography
2009-03-03Paper
LP Decoding Corrects a Constant Fraction of Errors
IEEE Transactions on Information Theory
2008-12-21Paper
Optimal Cryptographic Hardness of Learning Monotone Functions
Automata, Languages and Programming
2008-08-28Paper
Two-Party Computing with Encrypted Data
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Mercurial Commitments with Applications to Zero-Knowledge Sets
Lecture Notes in Computer Science
2008-05-06Paper
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
Theory of Cryptography
2008-03-05Paper
Private Multiparty Sampling and Approximation of Vector Combinations
Automata, Languages and Programming
2007-11-28Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Towards a Separation of Semantic and CCA Security for Public Key Encryption
Theory of Cryptography
2007-08-30Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
scientific article; zbMATH DE number 5009196 (Why is no real title available?)2006-03-01Paper
Adaptive versus non-adaptive security of multi-party protocols
Journal of Cryptology
2004-10-01Paper
Reducing the servers' computation in private information retrieval: PIR with preprocessing
Journal of Cryptology
2004-09-27Paper
scientific article; zbMATH DE number 2086721 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 1775399 (Why is no real title available?)2002-09-17Paper
scientific article; zbMATH DE number 1759771 (Why is no real title available?)2002-07-28Paper
scientific article; zbMATH DE number 1754645 (Why is no real title available?)2002-06-12Paper
scientific article; zbMATH DE number 1722683 (Why is no real title available?)2002-03-21Paper
Protecting data privacy in private information retrieval schemes
Journal of Computer and System Sciences
2000-08-27Paper
scientific article; zbMATH DE number 1418289 (Why is no real title available?)2000-07-26Paper
scientific article; zbMATH DE number 1304090 (Why is no real title available?)1999-06-17Paper


Research outcomes over time


This page was built for person: Tal Malkin