Tal Moran

Orcid: 0000-0002-1456-0899

According to our database1, Tal Moran authored at least 42 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Agreement Over Byzantine Gossip.
Proceedings of the Financial Cryptography and Data Security, 2024

2023
Locally Verifiable Distributed SNARGs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

2021
Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
Topology-Hiding Communication from Minimal Assumptions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Topology-Hiding Computation for Networks with Unknown Delays.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Incompressible Encodings.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Companionship Is Not a Function: The Effect of a Novel Robotic Object on Healthy Older Adults' Feelings of "Being-Seen".
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

MPC with Synchronous Security and Asynchronous Responsiveness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Robust MPC: Asynchronous Responsiveness yet Synchronous Security.
IACR Cryptol. ePrint Arch., 2019

Is Information-Theoretic Topology-Hiding Computation Possible?
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Simple Proofs of Space-Time and Rational Proofs of Storage.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds.
IACR Cryptol. ePrint Arch., 2018

Topology-Hiding Computation Beyond Semi-Honest Adversaries.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Exploring the Boundaries of Topology-Hiding Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Topology-Hiding Computation Beyond Logarithmic Diameter.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Topology-Hiding Computation on All Graphs.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Proofs of Space-Time and Rational Proofs of Storage.
IACR Cryptol. ePrint Arch., 2016

2015
Topology-Hiding Computation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Public Verification of Private Effort.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

How to Use Bitcoin to Play Decentralized Poker.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
One-Way Functions and (Im)Perfect Obfuscation.
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014

2013
Review of Surveillance or Security? by Susan Landau.
SIGACT News, 2013

There is no Indistinguishability Obfuscation in Pessiland.
IACR Cryptol. ePrint Arch., 2013

Truthful mechanisms for agents that value privacy.
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013

Publicly verifiable proofs of sequential work.
Proceedings of the Innovations in Theoretical Computer Science, 2013

2012
Counterexamples to Hardness Amplification beyond Negligible.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

A Mix-Net from Any CCA2 Secure Cryptosystem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2011

Time-Lock Puzzles in the Random Oracle Model.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
The Phish-Market Protocol: Secure Sharing Between Competitors.
IEEE Secur. Priv., 2010

Attacking Paper-Based E2E Voting Systems.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

On Complete Primitives for Fairness.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

The Phish-Market Protocol: Securely Sharing Attack Data between Competitors.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Shuffle-sum: coercion-resistant verifiable tallying for STV voting.
IEEE Trans. Inf. Forensics Secur., 2009

An Optimally Fair Coin Toss.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

2008
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware.
Proceedings of the Advances in Cryptology, 2008

2007
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Split-ballot voting: everlasting privacy with distributed trust.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Receipt-Free Universally-Verifiable Voting with Everlasting Privacy.
Proceedings of the Advances in Cryptology, 2006

2005
Basing Cryptographic Protocols on Tamper-Evident Seals.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

2004
Non-interactive Timestamping in the Bounded Storage Model.
Proceedings of the Advances in Cryptology, 2004


  Loading...