Tal Moran
Orcid: 0000-0002-1456-0899
According to our database1,
Tal Moran
authored at least 42 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Financial Cryptography and Data Security, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
2021
Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Companionship Is Not a Function: The Effect of a Novel Robotic Object on Healthy Older Adults' Feelings of "Being-Seen".
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
IEEE Secur. Priv., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
2008
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware.
Proceedings of the Advances in Cryptology, 2008
2007
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
2004
Proceedings of the Advances in Cryptology, 2004