Tal G. Malkin

Affiliations: 
Computer Science Columbia University, New York, NY 
Area:
Cryptography, Complexity Theory, Security, Randomized Algorithms
Website:
https://www.cs.columbia.edu/~tal/
Google:
"Tal Geula Malkin" OR "Tal G Malkin"
Bio:

Malkin, Tal Geula A study of secure database access and general two-party computation Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.

Parents

Sign in to add mentor
Shafi Goldwasser grad student 2000 MIT
 (A study of secure database access and general two-party computation)

Children

Sign in to add trainee
Ariel Elbaz grad student 2010 Columbia
Andrew Wan grad student 2010 Columbia
Dana Dachman-Soled grad student 2011 Columbia (E-Tree)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Choi SG, Dachman-Soled D, Malkin T, et al. (2018) Improved, black-box, non-malleable encryption from semantic security Designs, Codes and Cryptography. 86: 641-663
Choi SG, Dachman-Soled D, Malkin T, et al. (2018) A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption Journal of Cryptology. 31: 172-201
Chase M, Healy A, Lysyanskaya A, et al. (2013) Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279
Dachman-Soled D, Malkin T, Raykova M, et al. (2012) Efficient robust private set intersection International Journal of Applied Cryptography. 2: 289-303
Beimel A, Malkin T, Nissim K, et al. (2010) How Should We Solve Search Problems Privately Journal of Cryptology. 23: 344-371
Dachman-Soled D, Lee HK, Malkin T, et al. (2008) Optimal cryptographic hardness of learning monotone functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5125: 36-47
Feldman J, Malkin T, Servedio R, et al. (2007) LP Decoding Corrects a Constant Fraction of Errors Ieee Transactions On Information Theory. 53: 82-89
Ishai Y, Malkin T, Strauss MJ, et al. (2007) Private multiparty sampling and approximation of vector combinations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4596: 243-254
Canetti R, Damgard I, Dziembowski S, et al. (2004) Adaptive versus Non-Adaptive Security of Multi-Party Protocols Journal of Cryptology. 17: 153-207
Beimel A, Ishai Y, Malkin T. (2004) Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing Journal of Cryptology. 17: 125-151
See more...