Year |
Citation |
Score |
2018 |
Choi SG, Dachman-Soled D, Malkin T, Wee H. Improved, black-box, non-malleable encryption from semantic security Designs, Codes and Cryptography. 86: 641-663. DOI: 10.1007/S10623-017-0348-2 |
0.631 |
|
2018 |
Choi SG, Dachman-Soled D, Malkin T, Wee H. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption Journal of Cryptology. 31: 172-201. DOI: 10.1007/S00145-017-9254-Z |
0.635 |
|
2013 |
Chase M, Healy A, Lysyanskaya A, Malkin T, Reyzin L. Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279. DOI: 10.1007/S00145-012-9122-9 |
0.382 |
|
2012 |
Dachman-Soled D, Malkin T, Raykova M, Yung M. Efficient robust private set intersection International Journal of Applied Cryptography. 2: 289-303. DOI: 10.1504/Ijact.2012.048080 |
0.604 |
|
2010 |
Beimel A, Malkin T, Nissim K, Weinreb E. How Should We Solve Search Problems Privately Journal of Cryptology. 23: 344-371. DOI: 10.1007/S00145-008-9032-Z |
0.466 |
|
2008 |
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H. Optimal cryptographic hardness of learning monotone functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5125: 36-47. DOI: 10.4086/Toc.2009.V005A013 |
0.568 |
|
2007 |
Feldman J, Malkin T, Servedio R, Stein C, Wainwright M. LP Decoding Corrects a Constant Fraction of Errors Ieee Transactions On Information Theory. 53: 82-89. DOI: 10.1109/Tit.2006.887523 |
0.359 |
|
2007 |
Ishai Y, Malkin T, Strauss MJ, Wright RN. Private multiparty sampling and approximation of vector combinations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4596: 243-254. DOI: 10.1016/J.Tcs.2008.12.062 |
0.441 |
|
2004 |
Canetti R, Damgard I, Dziembowski S, Ishai Y, Malkin T. Adaptive versus Non-Adaptive Security of Multi-Party Protocols Journal of Cryptology. 17: 153-207. DOI: 10.1007/S00145-004-0135-X |
0.416 |
|
2004 |
Beimel A, Ishai Y, Malkin T. Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing Journal of Cryptology. 17: 125-151. DOI: 10.1007/S00145-004-0134-Y |
0.413 |
|
Show low-probability matches. |