Tal G. Malkin - Publications

Affiliations: 
Computer Science Columbia University, New York, NY 
Area:
Cryptography, Complexity Theory, Security, Randomized Algorithms
Website:
https://www.cs.columbia.edu/~tal/

10 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Choi SG, Dachman-Soled D, Malkin T, Wee H. Improved, black-box, non-malleable encryption from semantic security Designs, Codes and Cryptography. 86: 641-663. DOI: 10.1007/S10623-017-0348-2  0.631
2018 Choi SG, Dachman-Soled D, Malkin T, Wee H. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption Journal of Cryptology. 31: 172-201. DOI: 10.1007/S00145-017-9254-Z  0.635
2013 Chase M, Healy A, Lysyanskaya A, Malkin T, Reyzin L. Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279. DOI: 10.1007/S00145-012-9122-9  0.382
2012 Dachman-Soled D, Malkin T, Raykova M, Yung M. Efficient robust private set intersection International Journal of Applied Cryptography. 2: 289-303. DOI: 10.1504/Ijact.2012.048080  0.604
2010 Beimel A, Malkin T, Nissim K, Weinreb E. How Should We Solve Search Problems Privately Journal of Cryptology. 23: 344-371. DOI: 10.1007/S00145-008-9032-Z  0.466
2008 Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H. Optimal cryptographic hardness of learning monotone functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5125: 36-47. DOI: 10.4086/Toc.2009.V005A013  0.568
2007 Feldman J, Malkin T, Servedio R, Stein C, Wainwright M. LP Decoding Corrects a Constant Fraction of Errors Ieee Transactions On Information Theory. 53: 82-89. DOI: 10.1109/Tit.2006.887523  0.359
2007 Ishai Y, Malkin T, Strauss MJ, Wright RN. Private multiparty sampling and approximation of vector combinations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4596: 243-254. DOI: 10.1016/J.Tcs.2008.12.062  0.441
2004 Canetti R, Damgard I, Dziembowski S, Ishai Y, Malkin T. Adaptive versus Non-Adaptive Security of Multi-Party Protocols Journal of Cryptology. 17: 153-207. DOI: 10.1007/S00145-004-0135-X  0.416
2004 Beimel A, Ishai Y, Malkin T. Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing Journal of Cryptology. 17: 125-151. DOI: 10.1007/S00145-004-0134-Y  0.413
Show low-probability matches.