Follow
Tal Malkin
Tal Malkin
Professor of Computer Science, Columbia University
Verified email at columbia.edu
Title
Cited by
Cited by
Year
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Annual international conference on the theory and applications of …, 2009
10502009
Protecting data privacy in private information retrieval schemes
Y Gertner, Y Ishai, E Kushilevitz, T Malkin
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
6251998
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh, ...
US Patent 7,779,463, 2010
3272010
Efficient communication-storage tradeoffs for multicast encryption
R Canetti, T Malkin, K Nissim
International conference on the theory and applications of cryptographic …, 1999
3141999
Blind seer: A scalable private DBMS
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
2014 IEEE Symposium on Security and Privacy, 359-374, 2014
2832014
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh
US Patent 8,381,295, 2013
2832013
Secure multiparty computation of approximations
J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright
ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006
245*2006
Efficient robust private set intersection
D Dachman-Soled, T Malkin, M Raykova, M Yung
International Journal of Applied Cryptography 2 (4), 289-303, 2012
2432012
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography Conference, 258-277, 2004
2432004
Efficient generic forward-secure signatures with an unbounded number of time periods
T Malkin, D Micciancio, S Miner
International Conference on the Theory and Applications of Cryptographic …, 2002
2322002
On the capacity of secure network coding
J Feldman, T Malkin, C Stein, RA Servedio
Proc. 42nd Annual Allerton Conference on Communication, Control, and …, 2004
2272004
The relationship between public key encryption and oblivious transfer
Y Gertner, S Kannan, T Malkin, O Reingold, M Viswanathan
Proceedings 41st Annual Symposium on Foundations of Computer Science, 325-335, 2000
2252000
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1972012
Single database private information retrieval implies oblivious transfer
GD Crescenzo, T Malkin, R Ostrovsky
International Conference on the Theory and Applications of Cryptographic …, 2000
1892000
Reputation systems for anonymous networks
E Androulaki, SG Choi, SM Bellovin, T Malkin
International Symposium on Privacy Enhancing Technologies Symposium, 202-218, 2008
1622008
A comparative cost/security analysis of fault attack countermeasures
TG Malkin, FX Standaert, M Yung
International Workshop on Fault Diagnosis and Tolerance in Cryptography, 159-172, 2006
1472006
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
SG Choi, KW Hwang, J Katz, T Malkin, D Rubenstein
Cryptographers’ Track at the RSA Conference, 416-432, 2012
1392012
Secure anonymous database search
M Raykova, B Vo, SM Bellovin, T Malkin
Proceedings of the 2009 ACM workshop on Cloud computing security, 115-126, 2009
1332009
Reducing the servers computation in private information retrieval: PIR with preprocessing
A Beimel, Y Ishai, T Malkin
Annual International Cryptology Conference, 55-73, 2000
1292000
LP decoding corrects a constant fraction of errors
J Feldman, T Malkin, RA Servedio, C Stein, MJ Wainwright
IEEE Transactions on Information Theory 53 (1), 82-89, 2006
1212006
The system can't perform the operation now. Try again later.
Articles 1–20