Tal Malkin
Tal Malkin
Associate Professor of Computer Science, Columbia University
Verified email at columbia.edu
Title
Cited by
Cited by
Year
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Annual international conference on the theory and applications of …, 2009
7832009
Protecting data privacy in private information retrieval schemes
Y Gertner, Y Ishai, E Kushilevitz, T Malkin
Journal of Computer and System Sciences 60 (3), 592-629, 2000
4982000
Efficient communication-storage tradeoffs for multicast encryption
R Canetti, T Malkin, K Nissim
International conference on the theory and applications of cryptographic …, 1999
3101999
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh, ...
US Patent 7,779,463, 2010
2472010
Secure multiparty computation of approximations
J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright
ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006
228*2006
On the capacity of secure network coding
J Feldman, T Malkin, C Stein, RA Servedio
Proc. 42nd Annual Allerton Conference on Communication, Control, and …, 2004
2152004
Blind seer: A scalable private dbms
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
2014 IEEE Symposium on Security and Privacy, 359-374, 2014
2102014
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin
Theory of Cryptography Conference, 258-277, 2004
2062004
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh
US Patent 8,381,295, 2013
2052013
Efficient robust private set intersection
D Dachman-Soled, T Malkin, M Raykova, M Yung
International Journal of Applied Cryptography 2 (4), 289-303, 2012
2052012
Efficient generic forward-secure signatures with an unbounded number of time periods
T Malkin, D Micciancio, S Miner
International Conference on the Theory and Applications of Cryptographic …, 2002
1932002
The relationship between public key encryption and oblivious transfer
Y Gertner, S Kannan, T Malkin, O Reingold, M Viswanathan
Proceedings 41st Annual Symposium on Foundations of Computer Science, 325-335, 2000
1892000
Single database private information retrieval implies oblivious transfer
G Di Crescenzo, T Malkin, R Ostrovsky
International Conference on the Theory and Applications of Cryptographic …, 2000
1782000
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1482012
Reputation systems for anonymous networks
E Androulaki, SG Choi, SM Bellovin, T Malkin
International Symposium on Privacy Enhancing Technologies Symposium, 202-218, 2008
1432008
A comparative cost/security analysis of fault attack countermeasures
TG Malkin, FX Standaert, M Yung
International Workshop on Fault Diagnosis and Tolerance in Cryptography, 159-172, 2006
1232006
A random server model for private information retrieval
Y Gertner, S Goldwasser, T Malkin
International Workshop on Randomization and Approximation Techniques in …, 1998
1161998
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
SG Choi, KW Hwang, J Katz, T Malkin, D Rubenstein
Cryptographers’ Track at the RSA Conference, 416-432, 2012
1122012
LP decoding corrects a constant fraction of errors
J Feldman, T Malkin, RA Servedio, C Stein, MJ Wainwright
IEEE Transactions on Information Theory 53 (1), 82-89, 2006
1112006
Secure anonymous database search
M Raykova, B Vo, SM Bellovin, T Malkin
Proceedings of the 2009 ACM workshop on Cloud computing security, 115-126, 2009
1052009
The system can't perform the operation now. Try again later.
Articles 1–20