A unified framework for the analysis of side-channel key recovery attacks FX Standaert, TG Malkin, M Yung Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 1177 | 2009 |
Protecting data privacy in private information retrieval schemes Y Gertner, Y Ishai, E Kushilevitz, T Malkin Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 695 | 1998 |
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh, ... US Patent 7,779,463, 2010 | 369 | 2010 |
Blind seer: A scalable private DBMS V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ... 2014 IEEE Symposium on Security and Privacy, 359-374, 2014 | 334 | 2014 |
Efficient communication-storage tradeoffs for multicast encryption R Canetti, T Malkin, K Nissim Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999 | 325 | 1999 |
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems SJ Stolfo, T Malkin, AD Keromytis, V Misra, M Locasto, J Parekh US Patent 8,381,295, 2013 | 314 | 2013 |
Efficient robust private set intersection D Dachman-Soled, T Malkin, M Raykova, M Yung International Journal of Applied Cryptography 2 (4), 289-303, 2012 | 269 | 2012 |
Secure multiparty computation of approximations J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright ACM transactions on Algorithms (TALG) 2 (3), 435-472, 2006 | 261* | 2006 |
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004 | 249 | 2004 |
Efficient generic forward-secure signatures with an unbounded number of time periods T Malkin, D Micciancio, S Miner International Conference on the Theory and Applications of Cryptographic …, 2002 | 247 | 2002 |
The relationship between public key encryption and oblivious transfer Y Gertner, S Kannan, T Malkin, O Reingold, M Viswanathan Proceedings 41st Annual Symposium on Foundations of Computer Science, 325-335, 2000 | 243 | 2000 |
On the capacity of secure network coding J Feldman, T Malkin, C Stein, RA Servedio Proc. 42nd Annual Allerton Conference on Communication, Control, and …, 2004 | 234 | 2004 |
Secure two-party computation in sublinear (amortized) time SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 215 | 2012 |
Single database private information retrieval implies oblivious transfer G Di Crescenzo, T Malkin, R Ostrovsky Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000 | 209 | 2000 |
Reducing the servers computation in private information retrieval: PIR with preprocessing A Beimel, Y Ishai, T Malkin Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000 | 178 | 2000 |
Reputation systems for anonymous networks E Androulaki, SG Choi, SM Bellovin, T Malkin Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008 | 171 | 2008 |
A comparative cost/security analysis of fault attack countermeasures TG Malkin, FX Standaert, M Yung Fault Diagnosis and Tolerance in Cryptography: Third International Workshop …, 2006 | 171 | 2006 |
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces SG Choi, KW Hwang, J Katz, T Malkin, D Rubenstein Cryptographers’ Track at the RSA Conference, 416-432, 2012 | 147 | 2012 |
Secure anonymous database search M Raykova, B Vo, SM Bellovin, T Malkin Proceedings of the 2009 ACM workshop on Cloud computing security, 115-126, 2009 | 144 | 2009 |
LP decoding corrects a constant fraction of errors J Feldman, T Malkin, RA Servedio, C Stein, MJ Wainwright IEEE Transactions on Information Theory 53 (1), 82-89, 2006 | 127 | 2006 |