Tal Rabin  Tal  Rabin photo       

contact information

RSM, Manager cryptographic research
Thomas J. Watson Research Center, Yorktown, NY USA
  +1dash914dash945dash2999

links



2013

A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness
Gilad Asharov, Yehuda Lindell, Tal Rabin
TCC 2013, pp. 243-262


2012

Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
Carmit Hazay, Gert Lsse Mikkelsen, Tal Rabin, Tomas Toft
CT-RSA 2012, pp. 313-331

On Compression of Data Encrypted With Block Ciphers
Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin
IEEE Transactions on Information Theory 58(11), 6989-7001, 2012


2011

Perfectly-Secure Multiplication for Any t < n/3.
Gilad Asharov, Yehuda Lindell, Tal Rabin
CRYPTO 2011, pp. 240-258

Secure Computation Without Authentication
B Barak, R Canetti, Y Lindell, R Pass, T Rabin
Advances in Cryptology--CRYPTO 2005, pp. 720--760, Springer, 2011


2010

Designing a side channel resistant random number generator
S Chari, V Diluoffo, P Karger, E Palmer, T Rabin, J Rao, P Rohotgi, H Scherzer, M Steiner, D Toll
Smart Card Research and Advanced Application, 49--64, Springer, 2010

On Compression of Data Encrypted with Block Ciphers
Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, and Tal Rabin
2010
\urlhttp://eprint.iacr.org/2010/477

Protecting circuits from leakage: The computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 135--156, Springer

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead"
R Gennaro, H Krawczyk, T Rabin
Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, , pp. 309

Information-Theoretically Secure Protocols and Security Under Composition
E Kushilevitz, Y Lindell, T Rabin
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing, pp. 2090--2112, Citeseer, 2010


2009

The round complexity of verifiable secret sharing revisited
A Patra, A Choudhary, T Rabin, C Rangan
Advances in Cryptology-CRYPTO 2009, 487--504, Springer

Secure Network Coding Over the Integers
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
2009
\urlhttp://eprint.iacr.org/2009/569


2008

Degradation and amplification of computational hardness
S Halevi, T Rabin
Theory of Cryptography, 626--643, Springer, 2008

Threshold RSA for Dynamic and Ad-Hoc Groups
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
2008
\urlhttp://eprint.iacr.org/2008/045

Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen
2008
\urlhttp://eprint.iacr.org/2008/308


2007

Algorithmic game theory
N Nisan
2007 - books.google.com, Cambridge Univ Pr

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Journal of Cryptology 20(1), 51--83, Springer, Heidelberg, Germany, 2007


2006

Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March …
S Halevi, T Rabin
2006 - Springer-Verlag New York Inc


2004

Protocol Initialization for the Framework of Universal Composability
B Barak, Y Lindell, T Rabin
Manuscript. Available from the ePrint archive, report, 2004 - eprint.iacr.org

Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography, 258--277, Springer, 2004

Secure Hashed Diffie-Hellman over Non-DDH Groups
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2004
\urlhttp://eprint.iacr.org/2004/099

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
Yevgeniy Dodis, Rosario Gennaro, Johan H\aastad, Hugo Krawczyk, Tal Rabin
Advances in Cryptology -- CRYPTO" " "CRYPTO 2004"2004, pp. 494--510, springer


2003

Secure Applications of Pedersen's Distributed Key Generation Protocol
R Gennaro, S Jarecki, H Krawczyk, T Rabin
LECTURE NOTES IN COMPUTER SCIENCE, 2003 - Springer

Universal composition with joint state
Ran Canetti, Tal Rabin
Advances in Cryptology-Crypto 2003, pp. 265--281, Springer

Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll
ESORICS "ESORICS 2003"2003: 8th " "European Symposium on Research in Computer Security, pp. 181--200, springer


2002

An efficient signature scheme for route aggregation
S Chari, T Rabin, R Rivest
Manuscript, available from http://theory. lcs. mit. edu/ …, 2002 - citeseer.ist.psu.edu

On the Composition of Authenticated Byzantine Agreement
A Lysyanskaya, T Rabin
Proceedings of the 34th Annual ACM Symposium on the Theory …, 2002 - Assn for Computing Machinery

On the security of joint signature and encryption
Jee Hea An, Yevgeniy Dodis, Tal Rabin
Advances in Cryptology—EUROCRYPT 2002, pp. 83--107

On 2-round secure multiparty computation
R Gennaro, Y Ishai, E Kushilevitz, T Rabin
Advances in Cryptology—Crypto 2002, 129--148, Springer

Sequential composition of protocols without simultaneous termination
Y Lindell, A Lysyanskaya, T Rabin
Proceedings of the twenty-first annual symposium on Principles of distributed computing, pp. 203--212, 2002

On the composition of authenticated byzantine agreement
Y Lindell, A Lysyanskaya, T Rabin
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, pp. 514--523, 2002


2001

The round complexity of verifiable secret sharing and secure multicast
R Gennaro, Y Ishai, E Kushilevitz, T Rabin
ACM STOC 2001, pp. 580--589

Fair e-Lotteries and e-Casinos
E Kushilevitz, T Rabin
Topics in Cryptology—CT-RSA 2001, 100--109, Springer


2000

A Cryptographic Solution to a Game Theoretic Problem
SH Yevgeniy Dodis, T Rabin
Advances in cryptology-CRYPTO 2000: 20th Annual …, 2000 - books.google.com

Secure distributed storage and retrieval
J A Garay, R Gennaro, C Jutla, T Rabin
Theoretical Computer Science 243(1-2), 363--389, Elsevier , 2000

A cryptographic solution to a game theoretic problem
Y Dodis, S Halevi, T Rabin
Advances in Cryptology—CRYPTO 2000, pp. 112--130

Chameleon Signatures
Hugo Krawczyk, Tal Rabin
ISOC Network and Distributed System Security Symposium -- NDSS" " "NDSS 2000"2000, The Internet Society


1999

Adaptive Security for Threshold Cryptosystems
RG Ran Canetti, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology-Crypto'99: 19th Annual International …, 1999 - books.google.com

Adaptive Security for Threshold Cryptosystems
Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Advances in Cryptology -- CRYPTO" "'99, pp. 98--115, springer, 1999

Undeniable certificates
R Gennaro, H Krawczyk, T Rabin
Electronics Letters 35(20), 1723--1724, IET, 1999

Efficient multiparty computations secure against an adaptive adversary
Ronald Cramer, Ivan Damg\aard, Stefan Dziembowski, Martin Hirt, Tal Rabin
Advances in Cryptology—EUROCRYPT’99, pp. 311--326, 1999

Secure hash-and-sign signatures without the random oracle
Rosario Gennaro, Shai Halevi, Tal Rabin
Advances in Cryptology—EUROCRYPT’99, pp. 123--139, 1999


1998

Chameleon Hashing and Signatures
Hugo Krawczyk, Tal Rabin
1998
\urlhttp://eprint.iacr.org/1998/010


An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products
R Gennaro, D Micciancio, T Rabin
Proceedings of the 5th ACM conference on Computer and communications security, pp. 67--72, 1998

Batch verification with applications to cryptography and checking
M Bellare, J Garay, T Rabin
LATIN'98: Theoretical Informatics, 170--191, Springer, 1998

Fast batch verification for modular exponentiation and digital signatures
Mihir Bellare, Juan A Garay, Tal Rabin
Advances in Cryptology—EUROCRYPT'98, pp. 236--250, Springer, 1998

Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
Rosario Gennaro, Michael O Rabin, Tal Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, pp. 101--111, 1998

A simplified approach to threshold and proactive RSA
Tal Rabin
Advances in Cryptology—CRYPTO'98, pp. 89--104, 1998


1996

Robust and Efficient Sharing of RSA Functions
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
CRYPTO'96, 1996

Distributed pseudo-random bit generators—a new way to speed-up shared coin tossing
M Bellare, J A Garay, T Rabin
Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing, pp. 191--200, 1996

Robust Threshold DSS Signatures
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Advances in Cryptology -- EUROCRYPT" "'96, pp. 354--371, springer, 1996


1994

Robust sharing of secrets when the dealer is honest or cheating
T Rabin
Journal of the ACM (JACM), 1994 - portal.acm.org

Asynchronous secure computations with optimal resilience (extended abstract)
M Ben
Or, B Kelmer, T Rabin - Proceedings of the thirteenth annual ACM symposium on …, 1994 - portal.acm.org


1993

Fast asynchronous Byzantine agreement with optimal resilience
Ran Canetti, Tal Rabin
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing, pp. 42--51, 1993


1989

Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract)
T Rabin, M Ben
Or - Proceedings of the Twenty First Annual Acm Symposium on …, 1989 - cse.huji.ac.il

Verifiable secret sharing and multiparty protocols with honest majority
Tal Rabin, Michael Ben-Or
Proceedings of the twenty-first annual ACM symposium on Theory of computing, pp. 73--85, 1989


Year Unknown

Batch Verification
J A Garay, M Bellare, T Rabin, M Bellare, J A Garay, T Rabin
theory.lcs.mit.edu, 0

An Efficient Signature Scheme for Route
S Chari, T Rabin, R Rivest
theory.csail.mit.edu, 0


Evaluating a New Hash Function: Thoughts and Recommendations
R Gennaro, S Halevi, C Jutla, H Krawczyk, T Rabin
csrc.nist.gov, 0

Secure Distributed Key Generation for Discrete Logarithm Cryptosystems. To appear
R Gennaro, S Jarecki, H Krawczyk, T Rabin
… of Cryptology. http://www. research. ibm. com/security/dkg03 …




Projects and Groups