Below are all my publications up to 2011.
I've stopped updating this page because you can find my
publications on
my group's
webpage.
Specifically, check out the Crypto Lab
publications
page for papers that have already appeared, and the
news
page for recent papers in preprint form (typically available on
ePrint).
If those pages don't look updated either, or if you really
want only papers including me rather than anyone from my group,
you can check out my
dblp
and Google
Scholar pages.
Amortized Sublinear Secure Multi Party Computation
Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,
Tal Malkin, Mariana Raykova, Yevgeniy Vahlis
Workshop on Cryptography and Security in the Clouds, 2011.
[eprint version]
Efficient Robust Private Set Intersection
Dana Dachman-Soled and Tal Malkin and Mariana Raykova and Moti Yung
ACNS, Lecture Notes in Computer Science, Vol. 5536, pp. 125-142, 2009.
Anonymity in Wireless Broadcast Networks
Matt Blaze and John Ioannidis and Angelos D. Keromytis and Tal Malkin and Aviel D. Rubin
International Journal of Network Security, 8(1), pp. 37-51, 2009.
Oblivious Image Matching
Shai Avidan and Ariel Elbaz and Tal Malkin and Ryan Moriarty
Invited book chapter to "Protecting Privacy in Video Surveillance", Andrew Senior (editor)
Springer, 2009, ISBN: 978-1-84882-300-6 2009.
Topics in Cryptology - CT-RSA 2008
Tal Malkin (editor)
Proceedings of the Cryptographers' Track at the RSA Conference
(CT-RSA)
Lecture Notes in Computer Science (LNCS) Vol 4964, Springer, 2008.
Public Key Cryptography - PKC 2006
Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin (editors)
Proceedings of the 9th International Conference on Theory and Practice
of Public Key Cryptography (PKC)
Lecture
Notes in Computer Science (LNCS) Vol 3958, Springer, 2006.
Secure Multiparty Computation of Approximations.
Joan Feigenbauma and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca Wright
ACM Transactions an Algorithms, Volume 2, Issue 3, July 2006.
PSST! Are You Using a Secure SSL/TLS Server?
Homin K. Lee and Tal Malkin and Erich Nahum and Noel Codella
Appeared at the 2005 IBM Security and Privacy Technology Symposium, Sponsored by IBM Research and the IBM Academy of Technology
LP Decoding Corrects a Constant Fraction of Error
(an expanded version).
Jon Feldman, Tal Malkin, Cliff Stein, Rocco Servedio, Martin Wainwright. Proc. IEEE International Symposium on Information Theory
(ISIT'04).
Algorithmic Tamper-Proof Security.
Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin.
In Proceedings of the First Theory of Cryptography
Conference (TCC '04).
Protocols for Anonymity in Wireless Networks.
Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Avi Rubin. Proceedings of the 11th International Workshop on Security Protocols.
April 2003, Cambridge, England.
Secure Multiparty Computation of Approximations.
Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss,
Rebecca Wright. Proc. of the 28th International Colloquium on Automata, Languages
and Programming (ICALP '01).
Protecting Data Privacy in Private Information
Retrieval Schemes.
Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin. Journal of Computer and System Sciences (JCSS) vol. 60(3),
pp. 592-629.
An extended abstract has appeared in
Proc. of the 30th ACM Symp. on the Theory of Computing
(STOC '98).
Efficient Distributed 1 out of n Oblivious Transfer.
Technical Report MIT-LCS-TR-714, MIT Lab for Computer Science.
Yael Gertner, Tal Malkin.
Deductive Tableaux for Temporal Logic.
Tal Malkin.
M.Sc. Thesis, Weizmann Institute of Science.