Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
[1]
Hilfe
Suche: Author="Rabin, Tal"
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Protecting circuits from computationally bounded and noisy leakage
Sebastian Faust
,
Tal Rabin
,
Leonid Reyzin
,
Eran Tromer
,
Vinod Vaikuntanathan
SIAM Journal on Computing
43
(5), 2014, pp. 1564-1614
Information-theoretically secure protocols and security under composition
Eyal Kushilevitz
,
Yehuda Lindell
,
Tal Rabin
SIAM Journal on Computing
39
(5), 2010, pp. 2090-2112
Information-theoretically secure protocols and security under composition
Eyal Kushilevitz
,
Yehuda Lindell
,
Tal Rabin
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, STOC'2006 (Seattle, Washington, USA, May 21-23, 2006)
, 2006, pp. 109-118
On the composition of authenticated Byzantine agreement
Yehuda Lindell
,
Anna Lysyanskaya
,
Tal Rabin
Journal of the ACM
53
(6), 2006, pp. 881-917
On the composition of authenticated Byzantine agreement
Yehuda Lindell
,
Anna Lysyanskaya
,
Tal Rabin
Proceedings of the 34th Annual ACM Symposium on Theory of Computing, STOC'2002 (Montreal, Quebec, Canada, May 19-21, 2002)
, 2002, pp. 514-523
The round complexity of verifiable secret sharing and secure multicast
Rosario Gennaro
,
Yuval Ishai
,
Eyal Kushilevitz
,
Tal Rabin
Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, STOC'2001 (Hersonissos, Crete, Greece, July 6-8, 2001)
, 2001, pp. 580-589
Robust threshold DSS signatures
Rosario Gennaro
,
StanisÆaw Jarecki
,
Hugo Krawczyk
,
Tal Rabin
Information and Computation
164
(1), 2001, pp. 54-84
Secure distributed storage and retrieval
Juan A. Garay
,
Rosario Gennaro
,
Charanjit Jutla
,
Tal Rabin
Theoretical Computer Science
243
(1-2), 2000, pp. 363-389
Batch verification with applications to cryptography and checking
Mihir Bellare
,
Juan A. Garay
,
Tal Rabin
Lecture Notes in Computer Science
1380
, 1998, pp. 170-191
Secure distributed storage and retrieval
Juan A. Garay
,
Rosario Gennaro
,
Charanjit Jutla
,
Tal Rabin
Lecture Notes in Computer Science
1320
, 1997, pp. 275-289
Robust sharing of secrets when the dealer is honest or cheating
Tal Rabin
Journal of the ACM
41
(6), 1994, November, pp. 1089-1109
Fast asynchronous Byzantine agreement with optimal resilience (extended abstract)
Ran Canetti
,
Tal Rabin
Proceedings of the 25th Annual ACM Symposium on Theory of Computing, STOC'93 (San Diego, California, May 16--18, 1993)
, 1993, pp. 42-51
Verifiable secret sharing and multiparty protocols with honest majority
Tal Rabin
,
Michael Ben-Or
Proceedings of the 21st Annual ACM Symposium on Theory of Computing, STOC'89 (Seattle, Washington, May 15-17, 1989)
, 1989, pp. 73-85
Robust sharing of secrets when the dealer in honest or cheating
Tal Rabin
Technical Report (1988-1), 1988