关注
Tal Malkin
Tal Malkin
Professor of Computer Science, Columbia University
在 columbia.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
11542009
Protecting data privacy in private information retrieval schemes
Y Gertner, Y Ishai, E Kushilevitz, T Malkin
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
6841998
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh, ...
US Patent 7,779,463, 2010
3652010
Blind seer: A scalable private DBMS
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
2014 IEEE Symposium on Security and Privacy, 359-374, 2014
3272014
Efficient communication-storage tradeoffs for multicast encryption
R Canetti, T Malkin, K Nissim
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
3241999
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh
US Patent 8,381,295, 2013
3102013
Efficient robust private set intersection
D Dachman-Soled, T Malkin, M Raykova, M Yung
International Journal of Applied Cryptography 2 (4), 289-303, 2012
2632012
Secure multiparty computation of approximations
J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright
ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006
261*2006
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004
2472004
Efficient generic forward-secure signatures with an unbounded number of time periods
T Malkin, D Micciancio, S Miner
International Conference on the Theory and Applications of Cryptographic …, 2002
2452002
The relationship between public key encryption and oblivious transfer
Y Gertner, S Kannan, T Malkin, O Reingold, M Viswanathan
Proceedings 41st Annual Symposium on Foundations of Computer Science, 325-335, 2000
2372000
On the capacity of secure network coding
J Feldman, T Malkin, C Stein, RA Servedio
Proc. 42nd Annual Allerton Conference on Communication, Control, and …, 2004
2332004
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2132012
Single database private information retrieval implies oblivious transfer
G Di Crescenzo, T Malkin, R Ostrovsky
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
2052000
Reputation systems for anonymous networks
E Androulaki, SG Choi, SM Bellovin, T Malkin
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
1692008
Reducing the servers computation in private information retrieval: PIR with preprocessing
A Beimel, Y Ishai, T Malkin
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
1682000
A comparative cost/security analysis of fault attack countermeasures
TG Malkin, FX Standaert, M Yung
Fault Diagnosis and Tolerance in Cryptography: Third International Workshop …, 2006
1652006
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
SG Choi, KW Hwang, J Katz, T Malkin, D Rubenstein
Cryptographers’ Track at the RSA Conference, 416-432, 2012
1432012
Secure anonymous database search
M Raykova, B Vo, SM Bellovin, T Malkin
Proceedings of the 2009 ACM workshop on Cloud computing security, 115-126, 2009
1422009
LP decoding corrects a constant fraction of errors
J Feldman, T Malkin, RA Servedio, C Stein, MJ Wainwright
IEEE Transactions on Information Theory 53 (1), 82-89, 2006
1252006
系统目前无法执行此操作,请稍后再试。
文章 1–20