Tal G. Malkin
Affiliations: | Computer Science | Columbia University, New York, NY |
Area:
Cryptography, Complexity Theory, Security, Randomized AlgorithmsWebsite:
https://www.cs.columbia.edu/~tal/Google:
"Tal Geula Malkin" OR "Tal G Malkin"Bio:
Malkin, Tal Geula A study of secure database access and general two-party computation Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.
Parents
Sign in to add mentorShafi Goldwasser | grad student | 2000 | MIT | |
(A study of secure database access and general two-party computation) |
Children
Sign in to add traineeAriel Elbaz | grad student | 2010 | Columbia |
Andrew Wan | grad student | 2010 | Columbia |
Dana Dachman-Soled | grad student | 2011 | Columbia (E-Tree) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Choi SG, Dachman-Soled D, Malkin T, et al. (2018) Improved, black-box, non-malleable encryption from semantic security Designs, Codes and Cryptography. 86: 641-663 |
Choi SG, Dachman-Soled D, Malkin T, et al. (2018) A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption Journal of Cryptology. 31: 172-201 |
Chase M, Healy A, Lysyanskaya A, et al. (2013) Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279 |
Dachman-Soled D, Malkin T, Raykova M, et al. (2012) Efficient robust private set intersection International Journal of Applied Cryptography. 2: 289-303 |
Beimel A, Malkin T, Nissim K, et al. (2010) How Should We Solve Search Problems Privately Journal of Cryptology. 23: 344-371 |
Dachman-Soled D, Lee HK, Malkin T, et al. (2008) Optimal cryptographic hardness of learning monotone functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5125: 36-47 |
Feldman J, Malkin T, Servedio R, et al. (2007) LP Decoding Corrects a Constant Fraction of Errors Ieee Transactions On Information Theory. 53: 82-89 |
Ishai Y, Malkin T, Strauss MJ, et al. (2007) Private multiparty sampling and approximation of vector combinations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4596: 243-254 |
Canetti R, Damgard I, Dziembowski S, et al. (2004) Adaptive versus Non-Adaptive Security of Multi-Party Protocols Journal of Cryptology. 17: 153-207 |
Beimel A, Ishai Y, Malkin T. (2004) Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing Journal of Cryptology. 17: 125-151 |