Method and apparatus for the secure distributed storage and retrieval of information JA Garay, R Gennaro, CS Jutla, TD Rabin US Patent 6,192,472, 2001 | 1246 | 2001 |
Method and apparatus for the secure distributed storage and retrieval of information JA Garay, R Gennaro, CS Jutla, TD Rabin US Patent 5,991,414, 1999 | 1236 | 1999 |
Verifiable secret sharing and multiparty protocols with honest majority T Rabin, M Ben-Or Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989 | 1146 | 1989 |
Secure distributed key generation for discrete-log based cryptosystems R Gennaro, S Jarecki, H Krawczyk, T Rabin Journal of Cryptology 20 (1), 51-83, 2007 | 861* | 2007 |
On the security of joint signature and encryption JH An, Y Dodis, T Rabin International Conference on the Theory and Applications of Cryptographic …, 2002 | 698 | 2002 |
Chameleon Signatures. H Krawczyk, T Rabin NDSS, 2000 | 631* | 2000 |
Robust threshold DSS signatures R Gennaro, S Jarecki, H Krawczyk, T Rabin International Conference on the Theory and Applications of Cryptographic …, 1996 | 616 | 1996 |
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography R Gennaro, MO Rabin, T Rabin Proceedings of the seventeenth annual ACM symposium on Principles of …, 1998 | 558 | 1998 |
Fast batch verification for modular exponentiation and digital signatures M Bellare, JA Garay, T Rabin International Conference on the Theory and Applications of Cryptographic …, 1998 | 516 | 1998 |
Secure hash-and-sign signatures without the random oracle R Gennaro, S Halevi, T Rabin International Conference on the Theory and Applications of Cryptographic …, 1999 | 407 | 1999 |
Robust and efficient sharing of RSA functions R Gennaro, S Jarecki, H Krawczyk, T Rabin Annual International Cryptology Conference, 157-172, 1996 | 358* | 1996 |
A simplified approach to threshold and proactive RSA T Rabin Annual International Cryptology Conference, 89-104, 1998 | 331 | 1998 |
Universal composition with joint state R Canetti, T Rabin Annual International Cryptology Conference, 265-281, 2003 | 291 | 2003 |
Fast asynchronous Byzantine agreement with optimal resilience R Canetti, T Rabin Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993 | 279 | 1993 |
Biometric authentication system with encrypted models R Gennaro, S Halevi, S Maes, T Rabin, J Sorensen US Patent 6,317,834, 2001 | 273 | 2001 |
Efficient multiparty computations secure against an adaptive adversary R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin International Conference on the Theory and Applications of Cryptographic …, 1999 | 234 | 1999 |
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin Theory of Cryptography Conference, 258-277, 2004 | 213 | 2004 |
Randomness extraction and key derivation using the CBC, cascade and HMAC modes Y Dodis, R Gennaro, J Håstad, H Krawczyk, T Rabin Annual International Cryptology Conference, 494-510, 2004 | 190 | 2004 |
Adaptive security for threshold cryptosystems R Canetti, R Gennaro, S Jarecki, H Krawczyk, T Rabin Annual International Cryptology Conference, 98-116, 1999 | 179 | 1999 |
Secure network coding over the integers R Gennaro, J Katz, H Krawczyk, T Rabin International Workshop on Public Key Cryptography, 142-160, 2010 | 176 | 2010 |