Follow
Tal Moran
Tal Moran
Verified email at idc.ac.il - Homepage
Title
Cited by
Cited by
Year
Receipt-free universally-verifiable voting with everlasting privacy
T Moran, M Naor
Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology …, 2006
2562006
How to use bitcoin to play decentralized poker
R Kumaresan, T Moran, I Bentov
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
163*2015
Split-ballot voting: everlasting privacy with distributed trust
T Moran, M Naor
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-43, 2010
1492010
Method and system for extracting application protocol characteristics
G Raanan, T Moran, Y Galant, Y El-Hanani, E Reshef
US Patent 6,311,278, 2001
1212001
Publicly verifiable proofs of sequential work
M Mahmoody, T Moran, S Vadhan
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
1202013
An optimally fair coin toss
T Moran, M Naor, G Segev
Journal of Cryptology 29 (3), 491-513, 2016
117*2016
Truthful mechanisms for agents that value privacy
Y Chen, S Chong, IA Kash, T Moran, S Vadhan
ACM Transactions on Economics and Computation (TEAC) 4 (3), 1-30, 2016
1162016
Time-lock puzzles in the random oracle model
M Mahmoody, T Moran, S Vadhan
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
1132011
David and Goliath commitments: UC computation for asymmetric parties using tamper-proof hardware
T Moran, G Segev
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
982008
Simple proofs of space-time and rational proofs of storage
T Moran, I Orlov
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
93*2019
One-way functions and (im) perfect obfuscation
I Komargodski, T Moran, M Naor, R Pass, A Rosen, E Yogev
2014 IEEE 55th Annual Symposium on Foundations of Computer Science, 374-383, 2014
772014
Basing cryptographic protocols on tamper-evident seals
T Moran, M Naor
Theoretical Computer Science 411 (10), 1283-1310, 2010
76*2010
Tortoise and hares consensus: the meshcash framework for incentive-compatible, scalable cryptocurrencies
I Bentov, P Hubáček, T Moran, A Nadler
Cyber Security Cryptography and Machine Learning: 5th International …, 2021
702021
Polling with physical envelopes: A rigorous analysis of a human-centric protocol
T Moran, M Naor
Annual International Conference on the Theory and Applications of …, 2006
612006
On complete primitives for fairness
D Gordon, Y Ishai, T Moran, R Ostrovsky, A Sahai
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
542010
Shuffle-sum: coercion-resistant verifiable tallying for STV voting
J Benaloh, T Moran, L Naish, K Ramchen, V Teague
IEEE Transactions on Information Forensics and Security 4 (4), 685-698, 2009
532009
Method and system for verifying a client request
T Moran, Y El-Hanani, G Raanan, E Reshef
US Patent 7,293,281, 2007
472007
Non-interactive timestamping in the bounded-storage model
T Moran, R Shaltiel, A Ta-Shma
Journal of cryptology 22 (2), 189-226, 2009
44*2009
Combining asynchronous and synchronous byzantine agreement: The best of both worlds
J Loss, T Moran
Cryptology ePrint Archive, 2018
392018
Attacking paper-based E2E voting systems
J Kelsey, A Regenscheid, T Moran, D Chaum
Towards Trustworthy Elections: New Directions in Electronic Voting, 370-387, 2010
352010
The system can't perform the operation now. Try again later.
Articles 1–20