Moti Yung
#6,149
Most Influential Person Now
Israeli computer scientist
Moti Yung's AcademicInfluence.com Rankings
Moti Yungcomputer-science Degrees
Computer Science
#443
World Rank
#461
Historical Rank
#251
USA Rank
Operating Systems
#2
World Rank
#2
Historical Rank
#2
USA Rank
Database
#357
World Rank
#373
Historical Rank
#162
USA Rank
Download Badge
Computer Science
Moti Yung's Degrees
- PhD Computer Science Columbia University
- Masters Computer Science Columbia University
Similar Degrees You Can Earn
Why Is Moti Yung Influential?
(Suggest an Edit or Addition)According to Wikipedia, Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography. Career Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked at the IBM Thomas J. Watson Research Center, CertCo, RSA Laboratories, and Google. In 2016, Yung moved from Google to Snap Inc. Yung is currently a research scientist at Google.
Moti Yung's Published Works
Published Works
- Polynomial Reconstruction Based Cryptography (2001) (1345)
- Advances in Cryptology - EUROCRYPT 2004 (2004) (1238)
- Self Protecting Pirates and Black-Box Traitor Tracing (2001) (1139)
- Perfectly-Secure Key Distribution for Dynamic Conferences (1992) (1076)
- Public-key cryptosystems provably secure against chosen ciphertext attacks (1990) (1067)
- Universal one-way hash functions and their cryptographic applications (1989) (1015)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) (2009) (898)
- Proactive Secret Sharing Or: How to Cope With Perpetual Leakage (1995) (798)
- Advances in Cryptology — CRYPTO 2002 (2002) (773)
- Traitor Tracing with Constant Transmission Rate (2002) (674)
- Scalable Protocols for Authenticated Group Key Exchange (2003) (528)
- Perfectly secure message transmission (1990) (440)
- Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords (2001) (439)
- How to withstand mobile virus attacks (extended abstract) (1991) (426)
- Multi-Autority Secret-Ballot Elections with Linear Work (1996) (407)
- Key-Insulated Public Key Cryptosystems (2002) (400)
- A New Randomness Extraction Paradigm for Hybrid Encryption (2009) (379)
- On the Security of ElGamal Based Encryption (1998) (377)
- Perfectly Secure Key Distribution for Dynamic Conferences (1998) (354)
- How To Withstand Mobile Virus Attacks (1991) (349)
- How to share a function securely (1994) (335)
- Proactive public key and signature systems (1997) (290)
- Fourth-factor authentication: somebody you know (2006) (282)
- Strong Key-Insulated Signature Schemes (2003) (264)
- Public Key Cryptography - PKC 2006 (2006) (257)
- Distributing the power of a government to enhance the privacy of voters (1986) (255)
- Non-interactive cryptocomputing for NC/sup 1/ (1999) (248)
- Optimal-resilience proactive public-key cryptosystems (1997) (244)
- Traceable Signatures (2004) (220)
- Cryptovirology: extortion-based security threats and countermeasures (1996) (219)
- Communication complexity of secure computation (extended abstract) (1992) (214)
- The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? (1996) (209)
- Efficient robust private set intersection (2009) (204)
- Kleptography: Using Cryptography Against Cryptography (1997) (200)
- Self-tallying Elections and Perfect Ballot Secrecy (2002) (187)
- Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation (2000) (186)
- Maintenance of a minimum spanning forest in a dynamic planar graph (1990) (177)
- Systematic Design of Two-Party Authentication Protocols (1991) (172)
- Proactive RSA (1997) (171)
- Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation (1998) (170)
- Systematic Design of a Family of Attack-Resistant Authentication Protocols (1993) (163)
- On monotone formula closure of SZK (1994) (152)
- Memory-Efficient Self Stabilizing Protocols for General Networks (1990) (147)
- Malicious cryptography - exposing cryptovirology (2004) (145)
- Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback (1992) (144)
- "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash (1996) (142)
- Direct Minimum-Knowledge Computations (1987) (141)
- Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model (1987) (135)
- A Comparative Cost/Security Analysis of Fault Attack Countermeasures (2006) (128)
- Group Signatures with Almost-for-Free Revocation (2012) (127)
- On the Portability of Generalized Schnorr Proofs (2009) (123)
- Anonymity Control in E-Cash Systems (1997) (119)
- Leakage Resilient Cryptography in Practice (2010) (117)
- k-anonymous secret handshakes with reusable credentials (2004) (115)
- Complete characterization of security notions for probabilistic private-key encryption (2000) (112)
- Group Signatures with Efficient Concurrent Join (2005) (111)
- The Local Detection Paradigm and Its Application to Self-Stabilization (1997) (111)
- Scalable Group Signatures with Revocation (2012) (110)
- Design Validations for Discrete Logarithm Based Signature Schemes (2000) (108)
- Decoding of Interleaved Reed Solomon Codes over Noisy Data (2003) (105)
- Robust efficient distributed RSA-key generation (1998) (104)
- Efficient and secure authenticated key exchange using weak passwords (2009) (104)
- Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs (2010) (102)
- Signatures Resilient to Continual Leakage on Memory and Computation (2011) (101)
- Linearly homomorphic structure-preserving signatures and their applications (2013) (101)
- Practical leakage-resilient pseudorandom generators (2010) (100)
- The KryptoKnight family of light-weight protocols for authentication and key distribution (1995) (99)
- Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers (2005) (98)
- Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks (2006) (96)
- Secure scalable group signature with dynamic joins and separable authorities (2006) (96)
- Robust efficient distributed RSA-key generation (1998) (94)
- Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings (2007) (94)
- A New Framework for RFID Privacy (2010) (94)
- Revokable and versatile electronic money (extended abstract) (1996) (92)
- On Crafty Pirates and Foxy Tracers (2001) (90)
- Intrusion-Resilient Public-Key Encryption (2003) (89)
- End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol (2015) (88)
- Agent Rendezvous: A Dynamic Symmetry-Breaking Problem (1996) (88)
- A block cipher based pseudo random number generator secure against side-channel key recovery (2008) (87)
- Certifying Permutations: Noninteractive zero-knowledge based on any trapdoor permutation (1996) (86)
- Efficient on-line call control algorithms (1993) (86)
- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures (2004) (81)
- Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures (2014) (81)
- The Vector-Ballot e-Voting Approach (2004) (80)
- Eavesdropping games: a graph-theoretic approach to privacy in distributed systems (1993) (80)
- Non-Interactive CryptoComputing For NC1 (1999) (79)
- Cliptography: Clipping the Power of Kleptographic Attacks (2016) (79)
- Fair Games against an All-Powerful Adversary (1990) (79)
- Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders (2004) (79)
- Secure and Efficient Off-Line Digital Money (Extended Abstract) (1993) (77)
- Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function (1997) (77)
- Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions (2015) (75)
- Secure hypergraphs: privacy from partial broadcast (1995) (75)
- Time-optimal message-efficient work performance in the presence of faults (1994) (74)
- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding (2006) (74)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (2014) (74)
- Forward Secrecy in Password-Only Key Exchange Protocols (2002) (73)
- Witness-based cryptographic program checking and robust function sharing (1996) (72)
- Fair Off-Line e-cash Made Easy (1998) (72)
- Resolving message complexity of Byzantine Agreement and beyond (1995) (70)
- Constant-Round Perfect Zero-Knowledge Computationally Convincing Protocols (1991) (70)
- Weaknesses of undeniable signature schemes (1991) (69)
- The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems (1997) (69)
- Criticizing solutions to relaxed models yields powerful admissible heuristics (1992) (68)
- Security issues in a CDPD wireless network (1995) (68)
- Group Encryption: Non-interactive Realization in the Standard Model (2009) (66)
- Escrow Encryption Systems Visited: Attacks, Analysis and Designs (1995) (65)
- Computer Security – ESORICS 2012 (2012) (65)
- A private interactive test of a boolean predicate a minimum-knowledge public-key cryptosystems (1985) (63)
- Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers (1996) (62)
- Divide and Conquer under Global Constraints: A Solution to the N-Queens Problem (1989) (62)
- Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions (2016) (61)
- Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency (2013) (60)
- Efficient Circuit-Size Independent Public Key Encryption with KDM Security (2011) (60)
- Characterization of Security Notions for Probabilistic Private-Key Encryption (2005) (60)
- Sliding Encryption: A Cryptographic Tool for Mobile Agents (1997) (60)
- Scalable public-key tracing and revoking (2003) (59)
- Breaking and Repairing Asymmetric Public-Key Traitor Tracing (2002) (59)
- Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions (2017) (58)
- Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes (2002) (58)
- A Generic Construction for Intrusion-Resilient Public-Key Encryption (2004) (58)
- On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality (2020) (55)
- Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract) (1992) (54)
- Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (1989) (52)
- "Time-driven priority" flow control for real-time heterogeneous internetworking (1996) (52)
- Group Encryption (2007) (51)
- Secure Games with Polynomial Expressions (2001) (49)
- Blind, Auditable Membership Proofs (2000) (48)
- Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing (2019) (48)
- Generic Semantic Security against a Kleptographic Adversary (2017) (48)
- Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications (2015) (47)
- Minimum-Knowledge Interactive Proofs for Decision Problems (1989) (47)
- Eecient On-line Call Control Algorithms (1993) (46)
- Threshold Cryptosystems Based on Factoring (2002) (46)
- Extracting Group Signatures from Traitor Tracing Schemes (2003) (46)
- Certifying Cryptographic Tools: The Case of Trapdoor Permutations (1992) (45)
- Scalability and flexibility in authentication services: the KryptoKnight approach (1997) (43)
- Forward-secure signatures in untrusted update environments: efficient and generic constructions (2007) (43)
- Distributed "Magic Ink" Signatures (1997) (42)
- On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC (2001) (42)
- Order-Preserving Encryption Secure Beyond One-Wayness (2014) (42)
- Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model (2007) (41)
- Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions (2012) (41)
- Adaptively-Secure Optimal-Resilience Proactive RSA (1999) (41)
- Towards a Unified Security Model for Physically Unclonable Functions (2016) (40)
- Auto-Recoverable Auto-Certifiable Cryptosystems (1998) (40)
- Scramble All, Encrypt Small (1999) (40)
- Universal forgery of the identity-based sequential aggregate signature scheme (2009) (40)
- Observability Analysis - Detecting When Improved Cryptosystems Fail (2002) (40)
- Principle for high speed network control: congestion-and deadlock-freeness, self-routing, and a single buffer per link (1990) (40)
- The dual receiver cryptosystem and its applications (2004) (39)
- Parallel Key-Insulated Public Key Encryption Without Random Oracles (2007) (39)
- Interactive Hashing Simplifies Zero-Knowledge Protocol Design (1994) (38)
- \indirect Discourse Proofs": Achieving Eecient Fair Oo-line E-cash (1996) (38)
- On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications (2019) (37)
- Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security (2014) (37)
- Theory of Cryptography: 12th Theory of Cryptography Conference (2015) (37)
- Coins, weights and contention in balancing networks (1994) (36)
- Approximating max-min fair rates via distributed local scheduling with partial information (1996) (36)
- Accountable Ring Signatures: A Smart Card Approach (2004) (35)
- Perfect zero-knowledge ar-guments for NP can be based on general complexity assumptions (1998) (35)
- Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract) (1990) (35)
- On the Design of Provably Secure Cryptographic Hash Functions (1991) (35)
- A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks (2006) (34)
- Adaptively secure non-interactive threshold cryptosystems (2011) (34)
- Adaptive Security for the Additive-Sharing Based Proactive RSA (2001) (33)
- Short Traceable Signatures Based on Bilinear Pairings (2006) (32)
- Symmetric Public-Key Encryption (1985) (31)
- A Space Efficient Backdoor in RSA and Its Applications (2005) (31)
- Malicious Cryptography: Kleptographic Aspects (2005) (31)
- Image Density is Complete for Non-Interactive-SZK (Extended Abstract) (1998) (30)
- Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication (2007) (30)
- Differentially-Private "Draw and Discard" Machine Learning (2018) (30)
- Self-stabilizing symmetry breaking in constant-space (extended abstract) (1992) (30)
- The Business of Electronic Voting (2002) (30)
- Incremental Unforgeable Encryption (2001) (30)
- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making (2003) (29)
- Fair Traceable Multi-Group Signatures (2008) (29)
- Efficient Dynamic-Resharing "Verifiable Secret Sharing" Against Mobile Adversary (1995) (29)
- Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation (2017) (29)
- VarietyCash: A Multi-Purpose Electronic Payment System (1998) (29)
- Deniable password snatching: on the possibility of evasive electronic espionage (1997) (28)
- Exposure-resilience for free: the hierarchical ID-based encryption case (2002) (28)
- Cryptovirology: the birth, neglect, and explosion of ransomware (2017) (28)
- ARBITRATED UNCONDITIONALLY SECURE AUTHENTICATION CAN BE UNCONDITIONALLY PROTECTED AGAINST ARBITER ATTACKS (1991) (28)
- Short Vertex Disjoint Paths and Multiconnectivity in Random Graphs: Reliable Network Computing (1994) (28)
- Secure protocol transformation via “expansion”: from two-party to groups (1999) (27)
- Two-Sided Malicious Security for Private Intersection-Sum with Cardinality (2020) (27)
- From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols? (2015) (27)
- Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract) (1989) (27)
- A Progress Report on Subliminal-Free Channels (1996) (27)
- Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems (1990) (26)
- Decoding interleaved Reed-Solomon codes over noisy channels (2007) (26)
- Combinatorial design of congestion-free networks (1997) (26)
- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies (2013) (26)
- Cryptovirology (2017) (25)
- Indifferentiability of the Hash Algorithm BLAKE (2011) (25)
- Adaptively-Secure Distributed Public-Key Systems (1999) (24)
- An Overview of Secure Distributed Computing (1992) (24)
- Elastic Block Ciphers (2004) (24)
- Efficient traceable signatures in the standard model (2009) (24)
- Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications (2011) (24)
- Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System (1997) (24)
- Correcting Subverted Random Oracles (2018) (23)
- Self-Stabilizing Symmetry Breaking in Constant Space (2002) (23)
- Fast Algorithms for Edge-Coloring Planar Graphs (1989) (23)
- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency (2013) (23)
- Special Issue on Advanced Persistent Threat (2018) (23)
- Adaptively secure distributed public-key systems (2002) (23)
- METANET: principles of an arbitrary topology LAN (1995) (22)
- A PVSS as Hard as Discrete Log and Shareholder Separability (2001) (22)
- Practical "Signatures with Efficient Protocols" from Simple Assumptions (2016) (22)
- Two-Party Computing with Encrypted Data (2007) (22)
- The integrated MetaNet architecture: a switch-based multimedia LAN for parallel computing and real-time traffic (1994) (22)
- Weakness of Undeniable Signature Schemes (Extended Abstract) (1991) (21)
- Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract) (1984) (21)
- Routing and Flow Control on the MetaNet: An Overview (1994) (21)
- Non-Exploratory Self-Stabilization for Constant-Space Symmetry-Breaking (1994) (21)
- Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software (2012) (21)
- Secret swarm unit: Reactive k-secret sharing (2012) (21)
- Towards Hardware-Intrinsic Security (2010) (20)
- Corrigendum: Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph. (1993) (20)
- General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" (2004) (20)
- A Block Cipher based PRNG Secure Against Side-Channel Key Recovery (2007) (20)
- Funkspiel schemes: an alternative to conventional tamper resistance (2000) (20)
- Secure Commitment Against A Powerful Adversary (1992) (20)
- Evaluation of voting systems (2004) (19)
- Kleptography from Standard Assumptions and Applications (2010) (19)
- Distributed Public Key Cryptosystems (1998) (19)
- On the Security of ElGamal based (1998) (19)
- E-commerce applications of smart cards (2001) (18)
- Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge (2011) (18)
- Self-stabilizing algorithms for synchronous unidirectional rings (1996) (18)
- Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions (2012) (18)
- Proactive Secret Sharing with a Dishonest Majority (2016) (18)
- Design and performance of convergence routing on multiple spanning trees (1994) (18)
- Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption (2016) (18)
- Lower bounds for pseudorandom number generators (1989) (18)
- Traceable Group Encryption (2014) (17)
- Decision Oracles are Equivalent to Matching Oracles (1999) (17)
- High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units (2008) (17)
- Expecting the Unexpected: Towards Robust Credential Infrastructure (2009) (17)
- Ephemeral Identifiers: Mitigating Tracking & Spoofing Threats to BLE Beacons (2016) (17)
- Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog (2019) (17)
- Cryptanalysis of the Immunized LL Public Key Systems (1995) (17)
- Threshold and Proactive Pseudo-Random Permutations (2006) (17)
- Zero-Knowledge Proofs of Computational Power (Extended Summary) (1989) (17)
- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs (1998) (17)
- Electronic Payments: Where Do We Go from Here? (1999) (17)
- The Varieties of Secure Distributed Computation (1993) (17)
- Recovering NTRU Secret Key from Inversion Oracles (2008) (17)
- Elastic block ciphers: the basic design (2007) (16)
- The Power of Multimedia: Combining Point-to-Point and Multiaccess Networks (2018) (16)
- Secure and E cient O-line Digital Money (1993) (16)
- Dynamic fully forward-secure group signatures (2010) (16)
- SocialClouds: Concept, Security Architecture and Some Mechanisms (2009) (16)
- Resource-based corruptions and the combinatorics of hidden diversity (2013) (15)
- One-Way Group Actions (1990) (15)
- Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts (2003) (15)
- Directions in Polynomial Reconstruction Based Cryptography (2004) (15)
- The drunk motorcyclist protocol for anonymous communication (2014) (15)
- Space-Efficient Kleptography Without Random Oracles (2007) (14)
- Efficient Mechanism for Fairness and Deadlock-Avoidance in High-Speed Networks (1990) (14)
- Secret Swarm UnitReactive k-Secret Sharing (2007) (14)
- PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage (2013) (14)
- Money Conservation via Atomicity in Fair Off-Line E-Cash (1999) (14)
- Sequential Aggregate Signatures Made Shorter (2013) (14)
- PUF-Based RFID Authentication Secure and Private under Memory Leakage (2014) (14)
- Unconditionally Secure Encryption Under Strong Attacks (2004) (13)
- Cryptography: Malicious Cryptography – Exposing Cryptovirology (2004) (13)
- Key Evolution Systems in Untrusted Update Environments (2009) (13)
- PayTree: "Amortized Signature" for Flexible Micro-Payments (2012) (13)
- Local fairness in general-topology networks with convergence routing (1995) (13)
- Interactive Zero-Knowledge with Restricted Random Oracles (2006) (13)
- Secure Multi-party Computation Minimizing Online Rounds (2009) (13)
- On Assurance Structures for WWW Commerce (1998) (12)
- Stochastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time (1995) (12)
- Trusted Computing Platforms: The Good, the Bad, and the Ugly (2003) (12)
- Proactive Secure Multiparty Computation with a Dishonest Majority (2018) (12)
- Connectivity Properties in Random Regular Graphs with Edge Faults (2000) (12)
- Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy (1999) (12)
- The "Mobile Adversary" Paradigm in Distributed Computation and Systems (2015) (12)
- Electronic National Lotteries (2004) (12)
- A Secure and Useful 'Keyless Cryptosystem' (1985) (11)
- Partitioned Encryption and Achieving Simultaneity by Partitioning (1987) (11)
- One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier (1992) (11)
- Security and Privacy in Digital Rights Management (2002) (11)
- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption (2020) (11)
- An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API (2006) (11)
- A Subliminal Channel in Secret Block Ciphers (2004) (11)
- Idiosyncratic Signatures for Authenticated Execution of Management Code (2003) (11)
- Bandwidth-Optimal Kleptographic Attacks (2001) (11)
- Space lower-bounds for pseudorandom-generators (1994) (11)
- Self-Escrowed Public-Key Infrastructures (1999) (11)
- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections (2010) (11)
- Fully Forward-Secure Group Signatures (2012) (10)
- Efficient Completely Non-malleable Public Key Encryption (2010) (10)
- Topological design of loss-free switch-based LANs (1995) (10)
- Efficient Intrusion-Resilient Signatures Without Random Oracles (2006) (10)
- Keeping the SZK-Verifier Honest Unconditionally (1997) (10)
- Elastic block ciphers: method, security and instantiations (2009) (10)
- Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice (2004) (10)
- Proceedings of the 4th ACM workshop on Digital rights management (2004) (10)
- GDPR - Challenges for Reconciling Legal Rules with Technical Reality (2020) (10)
- Privacy-Preserving Information Markets for Computing Statistical Data (2009) (9)
- Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. ... (Lecture Notes in Computer Science) (2006) (9)
- Split-and-Delegate: Threshold Cryptography for the Masses (2002) (9)
- Concurrent Asynchronous Broadcast on the MetaNet (1997) (9)
- Secure hypergraphs: privacy from partial broadcast (Extended Abstract). (1995) (9)
- A Remark on Implementing the Weil Pairing (2005) (9)
- Finding Length-3 Positive Cunningham Chains (1998) (9)
- Lossless asynchronous broadcast-with-feedback on the MetaNet architecture (1991) (9)
- On Threshold RSA-Signing with no Dealer (1999) (8)
- On zero-knowledge proofs (extended abstract): “from membership to decision” (2000) (8)
- Adaptive Concurrent Non-Malleability with Bare Public-Keys (2009) (8)
- The Dark Side of Threshold Cryptography (2002) (8)
- Generalized secret sharing and group-key distribution using short keys (1997) (8)
- Brief Announcement: Secure Self-Stabilizing Computation (2017) (8)
- Software DisEngineering: Program Hiding Architecture and Experiments (1999) (8)
- Convergence routing on disjoint spanning trees (1999) (8)
- Financial Cryptography and Data Security (2008) (8)
- "Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience (2005) (8)
- On Ransomware and Envisioning the Enemy of Tomorrow (2017) (8)
- A zero-knowledge based framework for RFID privacy (2011) (8)
- Construction Through Decomposition: A Divide-and-Conquer Algoithm for the N-Queens Problem (1986) (8)
- Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems (2005) (8)
- Seeking Foundations for the Science of Cyber Security (2021) (7)
- Public key cryptography - PKC 2006 : 9th International Conference on Theory and Practice in Public Key Cryptography, New York, NY, USA, April 24-26, 2006 : proceedings (2006) (7)
- The Blinding of Weak Signatures (Extended Abstract) (1994) (7)
- Chapter 10: An Elliptic Curve Asymmetric Backdoor in OpenSSL RSA Key Generation (2006) (7)
- Zero-knowledge proofs of decision power: new protocols and optimal round-complexity (1997) (7)
- Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange (2017) (7)
- Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology (2002) (7)
- The Vector-Ballot Approach for Online Voting Procedures (2010) (6)
- A Timing-Resistant Elliptic Curve Backdoor in RSA (2007) (6)
- Cliptography: Post-Snowden Cryptography (2017) (6)
- Fully scalable public-key traitor tracing (2003) (6)
- Minimal cryptosystems and defining subliminal-freeness (1994) (6)
- Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings (2007) (6)
- On Necessary Conditions for Secure Distributed Computation (1989) (6)
- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing (2002) (6)
- Polynomial Reconstruction Based Cryptography (A Short Survey) (2001) (6)
- The Efficient Dual Receiver Cryptosystem and Its Applications (2011) (6)
- Questionable Encryption and Its Applications (2005) (6)
- Output Privacy in Secure Multiparty Computation (2006) (6)
- Concurrent Knowledge Extraction in the Public-Key Model (2009) (6)
- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack (2015) (6)
- Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control" (1999) (5)
- Hard Invalidation of Electronic Signatures (2015) (5)
- The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution (2003) (5)
- Concurrent Knowledge Extraction in Public-Key Models (2010) (5)
- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption (2004) (5)
- Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings (2005) (5)
- A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation (2015) (5)
- Efficient sequential and parallel algorithms for computing recovery points in trees and paths (1991) (5)
- A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems Extended Abstract (1985) (5)
- The Security of Elastic Block Ciphers Against Key-Recovery Attacks (2007) (5)
- The power of multimedia: combining point-to point and multi-access networks (1988) (5)
- An Elliptic Curve Backdoor Algorithm for RSASSA (2006) (5)
- Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems (2011) (5)
- Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption (2023) (5)
- Privacy Preserving Data Mining within Anonymous Credential Systems (2008) (5)
- Elastic AES (2004) (5)
- Auto-recoverable Auto-certifiable Cryptosystems (A Survey) (1999) (5)
- Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers (2005) (5)
- “Dynamic-fault-prone BSP”: a paradigm for robust computations in changing environments (1998) (5)
- Sequential aggregate signatures with short public keys without random oracles (2015) (5)
- Local and congestion-driven fairness algorithm in arbitrary topology networks (2000) (5)
- Distributed Algorithms in Synchronous Broadcasting Networks (Extended Abstract) (1985) (5)
- Key dependent message security: recent results and applications (2011) (5)
- Information Security and Cryptology (2013) (4)
- Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups (2020) (4)
- Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE (2021) (4)
- Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens (2012) (4)
- Proceedings of the 2007 ACM workshop on Digital Rights Management (2007) (4)
- Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing (2006) (4)
- One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity in the Standard Model (2021) (4)
- Risk management using threshold RSA cryptosystems (1998) (4)
- Applied cryptography and network security : 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings (2006) (4)
- The Integrated MetaNet Architecture: A Switch-based Multimedia LAN for Parallel Computing and Real-time Trafiic (1993) (4)
- Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings (2006) (4)
- Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers (2005) (4)
- Self-Testing/Correcting Protocols (Extended Abstract) (1999) (4)
- Stabilization, Safety, and Security of Distributed Systems: 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010. Proceedings (2010) (4)
- Privacy Threats in E-Shopping (Position Paper) (2015) (4)
- Network and System Security (2016) (4)
- Generating Admissible Heuristics by Criticizing Solutions to Relaxed Models (1985) (4)
- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption (2009) (4)
- Fault-tolerant convergence routing (1994) (4)
- Configuration and performance issues in the MetaNet design (1993) (4)
- On Fundamental Limitations of Proving Data Theft (2006) (4)
- Digital Rights Management: Technologies, Issues, Challenges and Systems (Lecture Notes in Computer Science) (2006) (4)
- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers (2008) (4)
- K-Anonymous Multi-party Secret Handshakes (2007) (4)
- Cryptanalysis of the the Polynomial Reconstruction Based Public-Key Cryptosystem of Eurocrypt’03 in the Optimal Parameter Setting (2003) (4)
- Applied cryptography and network security : second International Conference, ACNS 2004, Yellow Mountain, China, June, 8-11, 2004 : proceedings (2004) (4)
- Semantically Secure Anonymity: Foundations of Re-encryption (2018) (4)
- Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings (2002) (3)
- Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers (2009) (3)
- Proceedings of the 2007 ACM workshop on Scalable trusted computing (2007) (3)
- On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs (2016) (3)
- Proceedings of the 3rd ACM workshop on Digital rights management (2003) (3)
- CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts (2018) (3)
- RSA-Based Auto-recoverable Cryptosystems (2000) (3)
- On Characterization of Escrow Encryption Schemes (1997) (3)
- A Secure Public-key Authentication Scheme (1989) (3)
- Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy (2003) (3)
- Fully Distributed Non-Interactive Adaptively-Secure Threshold Signature Scheme with Short Shares : Efficiency Considerations and Implementation ? (2019) (3)
- Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk) (2008) (3)
- Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers (2006) (3)
- Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols (1998) (3)
- Special issue on security and privacy of blockchain technologies (2020) (3)
- On the Evolution of User Authentication: Non-bilateral Factors (2007) (3)
- On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications (2021) (3)
- "Psyeudorandom Intermixing": A Tool for Shared Cryptography (2000) (3)
- Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved (2021) (3)
- Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers (2009) (3)
- Distributed Computing in Asynchronous Networks with Byzantine Edges (1996) (3)
- Secure Efficient History-Hiding Append-Only Signatures in the Standard Model (2015) (3)
- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination (2006) (3)
- Retrofitting Fairness on the Original RSA-Based E-cash (2003) (3)
- Cryptography and decoding Reed-Solomon codes as a hard problem (2005) (3)
- Digital Signatures (Advances in Information Security) (2005) (2)
- Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems (2010) (2)
- Towards Signature-Only Signature Schemes (2000) (2)
- Relationships Between Diffie-Hellman and "Index Oracles" (2004) (2)
- Proceedings of the 5th ACM workshop on Digital rights management (2005) (2)
- Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers (2017) (2)
- Security against Replay Chosen-Ciphertext Attack (1989) (2)
- Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (2009) (2)
- On Offline Payments with Bitcoin (Poster Abstract) (2014) (2)
- Concurrently Knowledge-Extractable Resettable-ZK in the Bare Public-Key Model (2006) (2)
- On Monotone Formula Composition of Perfect Zero-Knowledge Languages (2008) (2)
- A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions (2018) (2)
- Multi-location Leakage Resilient Cryptography (2012) (2)
- Information Security Applications (2013) (2)
- Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report) (2008) (2)
- Privacy from partial broadcast (1994) (2)
- Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance (2021) (2)
- What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files (2021) (2)
- The bright side arguments for the coming smartphones crypto war: The added value of device encryption (2015) (2)
- Proceedings of the 6th international conference on Information security and cryptology (2002) (2)
- Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad (2021) (2)
- A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes (2020) (2)
- Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs (2018) (2)
- Fast Parallel and Sequential Algorithms for Edge-Coloring Planar Graphs (1988) (2)
- Varietycash: a Multi-purpose Electronic Payment System Extended Abstract (1998) (2)
- Proceedings of the 32nd international conference on Automata, Languages and Programming (2005) (2)
- Information security and cryptology : 10th international conference, Inscrypt 2014 Beijing, China, December 13-15, 2014 : revised selected papers (2015) (2)
- Hash to the Rescue: Space Minimization for PKI Directories (2000) (2)
- Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions) (2006) (2)
- Beyond Identity: Warranty-Based Digital Signature Transactions (1998) (2)
- Witness-based cryptographic program checking and applications (an announcement) (1996) (1)
- Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic (2022) (1)
- Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings (2005) (1)
- Adaptive Preimage Resistance Analysis Revisited: \\ Requirements, Subtleties and Implications (2012) (1)
- Biggest Failures in Security (Dagstuhl Seminar 19451) (2019) (1)
- Chapter 8: An Implementation of Tagged Private Information Retrieval (2006) (1)
- Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings (Lecture Notes in Computer Science) (2006) (1)
- Network and System Security (2015) (1)
- Constant-Round Concurrently-Secure rZK with ( Real ) Bare Public-Keys (1)
- Lower Bounds on Term-Based Divisible Cash Systems (1998) (1)
- Information Security and Cryptology (2011) (1)
- Fair Oo-line E-cash Made Easy (1998) (1)
- YYGen: A Backdoor-Resistant RSA Key Generator (2007) (1)
- Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006 (2006) (1)
- Secure Function Collection with Sublinear Storage (2009) (1)
- DISSECT: DIStribution for SECurity Tool (2001) (1)
- Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures (2020) (1)
- Proceedings of the 12th International Conference on Information Security (2009) (1)
- Leakage Resilient Strong Key-Insulated Signatures in Public Channel (2010) (1)
- Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model (2005) (1)
- Brief Announcement: Proactive Secret Sharing with a Dishonest Majority (2016) (1)
- Concurrent Knowledge Extraction in Public-Key Models (2014) (1)
- Distributed Algorithms in Synchronous Broadcasting Networks (1987) (1)
- Anamorphic Encryption: Private Communication Against a Dictator (2022) (1)
- Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it (1998) (1)
- The Pseudorandomness of Elastic Block Ciphers (2005) (1)
- Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology (2016) (1)
- Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions (2020) (1)
- Science of Cyber Security: Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected Papers (2019) (1)
- Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings (2021) (1)
- Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons (2022) (1)
- Elastic Block Ciphers: The Feistel Cipher Case (2004) (1)
- Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE (2021) (1)
- Secure Distributed Computing: Theory and Practice (1994) (1)
- Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme (2021) (1)
- Proceedings of the cryptology 8th international conference on Progress in cryptology (2007) (1)
- On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses (2005) (1)
- On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer (2001) (1)
- Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings (2005) (1)
- On the Security of Hash Functions Employing Blockcipher Postprocessing (2011) (1)
- Secure Commitment against a Powerful Adversary a Security Primitive Based on Average Intractability Extended Abstract (1999) (1)
- Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE (2021) (1)
- Leakage-Resilient RFID Authentication with Forward-Privacy (2010) (1)
- Robust Parallel Computations through Randomization (2000) (1)
- Proceedings of the Third international conference on Applied Cryptography and Network Security (2005) (1)
- Proceedings of the 9th international conference on Financial Cryptography and Data Security (2005) (1)
- Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003 (2003) (1)
- Linearly homomorphic structure-preserving signatures and their applications (2015) (1)
- Cryptographic Protocols: From the Abstract to the Practical to the Actual (2011) (1)
- Hiding Information Hiding (2006) (1)
- Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings (2010) (1)
- A General Analysis of the Security of Elastic Block Ciphers (2005) (1)
- "Metaproofs" (and their Cryptographic Applications) (2012) (1)
- A Tribute to David Kahn (2009) (1)
- On Offline Payments with Bitcoin (2014) (0)
- Kurosawa-Desmedt KEM is not CCA 2-secure (2008) (0)
- Combined Asynchronous/Synchronous Packet Switching Architecture: QoS Guarantees for Integrated Parallel Computing and Real-Time Traffic (2000) (0)
- M M , with an Amount of Flow Equal to the Requirement of 4 the Np-completeness of Fairest Allocation (1999) (0)
- Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous Crowds (2022) (0)
- Revised Selected Papers of the 11th International Conference on Information Security and Cryptology - Volume 9589 (2015) (0)
- Trusted Systems (2011) (0)
- Secure Computation Protocol: A Technology for Our Time (2020) (0)
- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services (2020) (0)
- POSTER. Bitcoin2Go: Secure Offline and Fast Payments with Bitcoins (2014) (0)
- Scheduling Task-Tree with Additive Scales on Parallel / Distributed Machines (1995) (0)
- Preimage Attack on the Parallel FFT-Hashing Function (2007) (0)
- How to Say "YES" with Smart Cards (1998) (0)
- Friendly Observers Ease Off-Line E-Cash (2001) (0)
- YYPKS: A Simple Public Key Stegosystem (2007) (0)
- Applied Cryptography and Network Security (2006) (0)
- Multifactor Authenticated Key Renewal (2011) (0)
- Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security (2015) (0)
- Protected against Arbiter ' s Attacks ( Extended Abstract ) (2001) (0)
- On Limitations of Universal Simulation : Constant-Round Public-Coin Zero-Knowledge Proofs Imply Understanding Programs (2013) (0)
- Secure Zero-Day Detection: Wiping Off the VEP Trade-Off (2019) (0)
- The Combinatorics of Product Scanning Multiplication and Squaring (2017) (0)
- Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition (2023) (0)
- Design of logical and virtual embeddings for combined routing and flow control (1994) (0)
- Scheduling Task-Trees with Additive Scales on Parallel/Distributed Machines (1997) (0)
- Access regulation mechanism for switch-based LAN (1999) (0)
- Information Security and Cryptology: 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers ... Computer Science / Security and Cryptology) (2011) (0)
- One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model (2022) (0)
- A Key Recovery System as Secure as Factoring (2004) (0)
- Improvised Version: Fully Homomorphic Encryption (2017) (0)
- Firm Grip Handshakes: A Tool for Bidirectional Vouching (2012) (0)
- DRM 2003 : proceedings of the Third ACM Workshop on Digital Rights Management, Washington, DC, USA, October 27, 2003, co-located with CCS 2003 (2003) (0)
- A Cryptocounter Based on the Paillier PKCS (2006) (0)
- Systematic 0 esign of a Family of Attack-Resistant Authentication Protocols September 1992 (1992) (0)
- Varieties of Secure Distributed ComputingMatthew FranklinColumbia (1996) (0)
- Cyber Security Cryptography and Machine Learning (2019) (0)
- Reactive k−Secret Sharing (Extended Abstract) (2007) (0)
- The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography (2023) (0)
- Information Security and Cryptology: 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers (2020) (0)
- Emerging Security Challenges for Ubiquitous Devices (2021) (0)
- Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 (2006) (0)
- Rithms for Nding a Sparse K-connected Spanning Subgraph of a K-connected Graph", Tenance of a Minimum Spanning Forest in a Dy- Namic Planar Graph". 3.2 a Dynamic 2-edge Connectivity Algorithm (1995) (0)
- Revised Selected Papers of the 7th International Conference on Trusted Systems - Volume 9565 (2015) (0)
- Preface (1985) (0)
- Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007 (2005) (0)
- roximating Max-Min Fair Rates via Distributed Local $che~~ing with Partial Info n (1996) (0)
- Information security and cryptology : 9th international conference, Inscrypt 2013 Guangzhou, China, November 27-30, 2013 : revised selected papers (2014) (0)
- Trusted Systems, First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers (2010) (0)
- Chapter 6 : A Cryptocounter Based on the Paillier PKCS ∗ (2006) (0)
- From Protecting a System to Protecting a Global Ecosystem (2011) (0)
- Preliminary Version - to Be Improved Soon (2007) (0)
- The combinatorics of hidden diversity (2020) (0)
- An Adversarial Perspective on Accuracy, Robustness, Fairness, and Privacy: Multilateral-Tradeoffs in Trustworthy ML (2022) (0)
- Chapter 12 : YYGen : A Backdoor-Resistant RSA Key Generator ∗ (2007) (0)
- Information security and cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24 2010 : revised selected papers (2011) (0)
- Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings (2006) (0)
- Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption (2014) (0)
- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation (2018) (0)
- Revised Selected Papers of the 6th International Conference on Trusted Systems - Volume 9473 (2014) (0)
- Chapter 4: Implementing Perfect Questionable Encryptions (2006) (0)
- Proceedings of the 7th international conference on Information security applications: PartI (2004) (0)
- How to Guard the Guards Themselves (2009) (0)
- Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers (2011) (0)
- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs (2009) (0)
- Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE (2022) (0)
- Cryptography between Wonderland and Underland (2010) (0)
- Crypto at the Time of Surveillance: Sharing with the Cloud (2014) (0)
- Crypto-integrity (2002) (0)
- On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs (2012) (0)
- Payment Systems: The Next Generation (2000) (0)
- Information security and cryptology : 8th international conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, revised selected papers (2013) (0)
- Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract (2008) (0)
- Bidirectionally-Secure Cryptosystems (0)
- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games (2012) (0)
- WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security (2015) (0)
- Information Security and Cryptology : 7th International Conference, Inscrypt 2011, Beijing, China, November 30 December 3, 2011. Revised Selected Papers (2012) (0)
- Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004 (2004) (0)
- Progress in Cryptology - INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings (2001) (0)
- POSTER: On Offline Payments with Bitcoin (2014) (0)
- Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers (2004) (0)
- Proceedings of the Second international conference on Trusted Systems (2009) (0)
- Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers (2007) (0)
- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files (2022) (0)
- Chapter 14 : YYPKS : A Simple Public Key Stegosystem ∗ (2007) (0)
- PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES (2021) (0)
- End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage (2022) (0)
- Virtual Topology Embedding On A Network Of Workstations For High-Performance Computing (1995) (0)
- Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography (2006) (0)
- Proceedings of the Second SKLOIS conference on Information Security and Cryptology (2005) (0)
- Information Security and Cryptology (2018) (0)
- Proceedings of the ACM workshop on Digital rights management (2006) (0)
- Paradigm Shifts in Cryptographic Engineering (2019) (0)
- Special issue on security and privacy of blockchain technologies (2020) (0)
- Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (2007) (0)
- Protecting executable software (2000) (0)
- Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings (2003) (0)
- DRM '05 : proceedings of the fifth ACM workshop on digital rights management : November 7, 2005, Alexandria, Virginia, USA : co-located with CCS 2005 (2005) (0)
- Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006Beijing, China, November 29 - December 1, 2006Proceedings (Lecture Notes in Computer Science) (2006) (0)
- Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings (2009) (0)
- METANET: Principles of an (1995) (0)
- Trusted Systems (2014) (0)
- [041] Forum "Math-for-Industry" 2012 "Information Recovery and Discovery" (2012) (0)
- Firness for Deflection Networks (1993) (0)
- Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication! (2023) (0)
This paper list is powered by the following services:
Other Resources About Moti Yung
What Schools Are Affiliated With Moti Yung?
Moti Yung is affiliated with the following schools: