What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Moti Yung
Google Scholar
226
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
Liron David
Avinatan Hassidim
Yossi Matias
Moti Yung
2025
journals/popets
RSA Blind Signatures with Public Metadata.
Ghous Amjad
Kevin Yeo
Moti Yung
2025
conf/sp
Extended Diffie-Hellman Encryption for Secure and Efficient Real-Time Beacon Notifications.
Liron David
Omer Berkman
Avinatan Hassidim
David Lazarov
Yossi Matias
Moti Yung
2025
conf/eurocrypt
Anamorphism Beyond One-to-One Messaging: Public-Key with Anamorphic Broadcast Mode.
Xuan Thanh Do
Giuseppe Persiano
Duong Hieu Phan
Moti Yung
2024
conf/uss
SpotProxy: Rediscovering the Cloud for Censorship Circumvention.
Patrick Tser Jern Kon
Sina Kamali
Jinyu Pei
Diogo Barradas
Ang Chen
Micah Sherr
Moti Yung
2024
conf/crypto
Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond.
Giuseppe Persiano
Duong Hieu Phan
Moti Yung
2024
conf/acns
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications.
Pawel Lorek
Moti Yung
Filip Zagórski
2023
journals/popets
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography.
Miroslaw Kutylowski
Giuseppe Persiano
Duong Hieu Phan
Moti Yung
Marcin Zawada
2023
journals/popets
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption.
Ghous Amjad
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
Moti Yung
2023
conf/crypto
Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!
Miroslaw Kutylowski
Giuseppe Persiano
Duong Hieu Phan
Moti Yung
Marcin Zawada
2023
conf/asiacrypt
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
Yi Wang
Rongmao Chen
Xinyi Huang
Moti Yung
2022
journals/tifs
Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons.
Liron David
Avinatan Hassidim
Yossi Matias
Moti Yung
Alon Ziv
2022
conf/ccs
AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) Security.
Mark Yampolskiy
Moti Yung
2022
conf/uss
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.
Long Chen
Ya-Nan Li
Qiang Tang
Moti Yung
2022
conf/esorics
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic.
Liron David
Avinatan Hassidim
Yossi Matias
Moti Yung
2022
conf/asiaccs
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Salman Ahmed
Ya Xiao
Taejoong (Tijay) Chung
Carol J. Fung
Moti Yung
Danfeng (Daphne) Yao
2022
conf/eurocrypt
One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model.
Benoît Libert
Khoa Nguyen
Thomas Peters
Moti Yung
2022
conf/eurocrypt
Anamorphic Encryption: Private Communication Against a Dictator.
Giuseppe Persiano
Duong Hieu Phan
Moti Yung
2021
conf/ccs
Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad.
Mark Yampolskiy
Jacob Gatlin
Moti Yung
2021
conf/crypto
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved.
Yi Wang
Rongmao Chen
Guomin Yang
Xinyi Huang
Baosheng Wang
Moti Yung
2021
conf/pkc
Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings.
Julien Devevey
Benoît Libert
Khoa Nguyen
Thomas Peters
Moti Yung
2021
conf/eurocrypt
Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme.
Benoît Libert
Khoa Nguyen
Thomas Peters
Moti Yung
2021
conf/asiacrypt
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE.
Yi Wang
Rongmao Chen
Xinyi Huang
Jianting Ning
Baosheng Wang
Moti Yung
2020
journals/joc
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions.
Benoît Libert
Moti Yung
2020
conf/crypto
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.
Peihan Miao
Sarvar Patel
Mariana Raykova
Karn Seth
Moti Yung
2020
conf/acns
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes.
Xuan Thanh Do
Duong Hieu Phan
Moti Yung
2020
conf/eurosp
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality.
Mihaela Ion
Ben Kreuter
Ahmet Erhan Nergiz
Sarvar Patel
Shobhit Saxena
Karn Seth
Mariana Raykova
David Shanahan
Moti Yung
2020
conf/esorics
GDPR - Challenges for Reconciling Legal Rules with Technical Reality.
Miroslaw Kutylowski
Anna Lauks-Dutka
Moti Yung
2020
conf/asiacrypt
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
Rongmao Chen
Xinyi Huang
Moti Yung
2019
conf/ccs
Secure Zero-Day Detection: Wiping Off the VEP Trade-Off.
Mingyi Zhao
Moti Yung
2019
conf/ccs
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
Moti Yung
2019
conf/pkc
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Sherman S. M. Chow
Alexander Russell
Qiang Tang
Moti Yung
Yongjun Zhao
Hong-Sheng Zhou
2018
conf/crypto
Correcting Subverted Random Oracles.
Alexander Russell
Qiang Tang
Moti Yung
Hong-Sheng Zhou
2017
conf/ccs
Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation.
Alexandra Dmitrienko
David Noack
Moti Yung
2017
conf/ccs
Generic Semantic Security against a Kleptographic Adversary.
Alexander Russell
Qiang Tang
Moti Yung
Hong-Sheng Zhou
2017
conf/ccs
Cliptography: Post-Snowden Cryptography.
Qiang Tang
Moti Yung
2016
journals/joc
Concurrent Knowledge Extraction in Public-Key Models.
Andrew Chi-Chih Yao
Moti Yung
Yunlei Zhao
2016
conf/ccs
Practical "Signatures with Efficient Protocols" from Simple Assumptions.
Benoît Libert
Fabrice Mouhartem
Thomas Peters
Moti Yung
2016
conf/ctrsa
Towards a Unified Security Model for Physically Unclonable Functions.
Frederik Armknecht
Daisuke Moriyama
Ahmad-Reza Sadeghi
Moti Yung
2016
conf/asiacrypt
Cliptography: Clipping the Power of Kleptographic Attacks.
Alexander Russell
Qiang Tang
Moti Yung
Hong-Sheng Zhou
2015
conf/ccs
From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?
Moti Yung
2015
conf/ccs
WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security.
Tomas Sander
Moti Yung
2015
conf/crypto
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
Benoît Libert
Thomas Peters
Moti Yung
2015
conf/esorics
Privacy Threats in E-Shopping (Position Paper).
Jesus Diaz
Seung Geol Choi
David Arroyo
Angelos D. Keromytis
Francisco de Borja Rodríguez
Moti Yung
2015
conf/ches
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol.
Aydin Aysu
Ege Gulcan
Daisuke Moriyama
Patrick Schaumont
Moti Yung
2015
conf/cns
The bright side arguments for the coming smartphones crypto war: The added value of device encryption.
Daisuke Moriyama
Moti Yung
2015
conf/pkc
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.
Benoît Libert
Marc Joye
Moti Yung
Thomas Peters
2015
conf/asiacrypt
Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
Benoît Libert
Thomas Peters
Marc Joye
Moti Yung
2015
conf/tcc
A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation.
Juan A. Garay
Ran Gelles
David S. Johnson
Aggelos Kiayias
Moti Yung
2014
conf/fc
On Offline Payments with Bitcoin (Poster Abstract).
Alexandra Dmitrienko
David Noack
Ahmad-Reza Sadeghi
Moti Yung
2014
conf/cns
The drunk motorcyclist protocol for anonymous communication.
Adam L. Young
Moti Yung
2014
conf/pkc
Traceable Group Encryption.
Benoît Libert
Moti Yung
Marc Joye
Thomas Peters
2014
conf/eurocrypt
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
Benoît Libert
Thomas Peters
Marc Joye
Moti Yung
2014
conf/asiacrypt
Order-Preserving Encryption Secure Beyond One-Wayness.
Isamu Teranishi
Moti Yung
Tal Malkin
2014
conf/asiacrypt
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
Benoît Libert
Marc Joye
Moti Yung
Thomas Peters
2013
conf/crypto
Linearly Homomorphic Structure-Preserving Signatures and Their Applications.
Benoît Libert
Thomas Peters
Marc Joye
Moti Yung
2013
conf/fc
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.
Kwangsu Lee
Dong Hoon Lee
Moti Yung
2013
conf/acns
Sequential Aggregate Signatures Made Shorter.
Kwangsu Lee
Dong Hoon Lee
Moti Yung
2013
conf/pkc
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.
Kwangsu Lee
Dong Hoon Lee
Moti Yung
2013
conf/asiacrypt
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency.
Kwangsu Lee
Seung Geol Choi
Dong Hoon Lee
Jong Hwan Park
Moti Yung
2012
conf/ccs
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Yevgeniy Dodis
Weiliang Luo
Shouhuai Xu
Moti Yung
2012
conf/crypto
Group Signatures with Almost-for-Free Revocation.
Benoît Libert
Thomas Peters
Moti Yung
2012
conf/acns
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens.
Assaf Ben-David
Omer Berkman
Yossi Matias
Sarvar Patel
Cem Paya
Moti Yung
2012
conf/pkc
Multi-location Leakage Resilient Cryptography.
Ali Juma
Yevgeniy Vahlis
Moti Yung
2012
conf/eurocrypt
Scalable Group Signatures with Revocation.
Benoît Libert
Thomas Peters
Moti Yung
2012
conf/tcc
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions.
Benoît Libert
Moti Yung
2012
conf/cans
Firm Grip Handshakes: A Tool for Bidirectional Vouching.
Omer Berkman
Benny Pinkas
Moti Yung
2011
conf/fse
On the Security of Hash Functions Employing Blockcipher Postprocessing.
Donghoon Chang
Mridul Nandi
Moti Yung
2011
conf/fc
Cryptographic Protocols: From the Abstract to the Practical to the Actual.
Moti Yung
2011
conf/acns
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications.
Dana Dachman-Soled
Tal Malkin
Mariana Raykova
Moti Yung
2011
conf/eurocrypt
Efficient Circuit-Size Independent Public Key Encryption with KDM Security.
Tal Malkin
Isamu Teranishi
Moti Yung
2011
conf/asiacrypt
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge.
Yi Deng
Dengguo Feng
Vipul Goyal
Dongdai Lin
Amit Sahai
Moti Yung
2011
conf/tcc
Signatures Resilient to Continual Leakage on Memory and Computation.
Tal Malkin
Isamu Teranishi
Yevgeniy Vahlis
Moti Yung
2010
conf/ccs
Dynamic fully forward-secure group signatures.
Benoît Libert
Moti Yung
2010
conf/ccs
Practical leakage-resilient pseudorandom generators.
Yu Yu
François-Xavier Standaert
Olivier Pereira
Moti Yung
2010
conf/fc
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections.
Aggelos Kiayias
Moti Yung
2010
conf/esorics
A New Framework for RFID Privacy.
Robert H. Deng
Yingjiu Li
Moti Yung
Yunlei Zhao
2010
conf/eurocrypt
Cryptography between Wonderland and Underland.
Moti Yung
2010
conf/tcc
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs.
Benoît Libert
Moti Yung
2009
conf/ccs
Universal forgery of the identity-based sequential aggregate signature scheme.
Jung Yeon Hwang
Dong Hoon Lee
Moti Yung
2009
conf/fc
Privacy-Preserving Information Markets for Computing Statistical Data.
Aggelos Kiayias
Bülent Yener
Moti Yung
2009
conf/fc
Expecting the Unexpected: Towards Robust Credential Infrastructure.
Shouhuai Xu
Moti Yung
2009
conf/acns
Efficient Robust Private Set Intersection.
Dana Dachman-Soled
Tal Malkin
Mariana Raykova
Moti Yung
2009
conf/eurocrypt
A New Randomness Extraction Paradigm for Hybrid Encryption.
Eike Kiltz
Krzysztof Pietrzak
Martijn Stam
Moti Yung
2009
conf/eurocrypt
On the Portability of Generalized Schnorr Proofs.
Jan Camenisch
Aggelos Kiayias
Moti Yung
2009
conf/eurocrypt
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
François-Xavier Standaert
Tal Malkin
Moti Yung
2009
conf/asiacrypt
Secure Multi-party Computation Minimizing Online Rounds.
Seung Geol Choi
Ariel Elbaz
Tal Malkin
Moti Yung
2009
conf/asiacrypt
Group Encryption: Non-interactive Realization in the Standard Model.
Julien Cathalo
Benoît Libert
Moti Yung
2008
conf/ccs
A block cipher based pseudo random number generator secure against side-channel key recovery.
Christophe Petit
François-Xavier Standaert
Olivier Pereira
Tal Malkin
Moti Yung
2008
conf/acisp
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
Debra L. Cook
Moti Yung
Angelos D. Keromytis
2008
conf/fc
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Jon Callas
Yvo Desmedt
Daniel Nagy
Akira Otsuka
Jean-Jacques Quisquater
Moti Yung
2008
conf/fc
Fair Traceable Multi-Group Signatures.
Vicente Benjumea
Seung Geol Choi
Javier López
Moti Yung
2008
conf/pkc
Recovering NTRU Secret Key from Inversion Oracles.
Petros Mol
Moti Yung
2007
journals/joc
Scalable Protocols for Authenticated Group Key Exchange.
Jonathan Katz
Moti Yung
2007
conf/ccs
Forward-secure signatures in untrusted update environments: efficient and generic constructions.
Benoît Libert
Jean-Jacques Quisquater
Moti Yung
2007
conf/ccs
Elastic block ciphers: the basic design.
Debra L. Cook
Angelos D. Keromytis
Moti Yung
2007
conf/acisp
Preimage Attack on the Parallel FFT-Hashing Function.
Donghoon Chang
Moti Yung
Jaechul Sung
Seokhie Hong
Sangjin Lee
2007
conf/fc
-Anonymous Multi-party Secret Handshakes.
Shouhuai Xu
Moti Yung
2007
conf/ih
Space-Efficient Kleptography Without Random Oracles.
Adam L. Young
Moti Yung
2007
conf/pkc
Parallel Key-Insulated Public Key Encryption Without Random Oracles.
Benoît Libert
Jean-Jacques Quisquater
Moti Yung
2007
conf/eurocrypt
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model.
Moti Yung
Yunlei Zhao
2007
conf/asiacrypt
Group Encryption.
Aggelos Kiayias
Yiannis Tsiounis
Moti Yung
2007
conf/asiacrypt
Two-Party Computing with Encrypted Data.
Seung Geol Choi
Ariel Elbaz
Ari Juels
Tal Malkin
Moti Yung
2007
conf/cans
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.
Vicente Benjumea
Seung Geol Choi
Javier López
Moti Yung
2006
journals/tifs
On Fundamental Limitations of Proving Data Theft.
Adam L. Young
Moti Yung
2006
journals/joc
Characterization of Security Notions for Probabilistic Private-Key Encryption.
Jonathan Katz
Moti Yung
2006
conf/ccs
Fourth-factor authentication: somebody you know.
John G. Brainard
Ari Juels
Ronald L. Rivest
Michael Szydlo
Moti Yung
2006
conf/fc
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.
Aggelos Kiayias
Moti Yung
2006
conf/ih
Hiding Information Hiding.
Adam L. Young
Moti Yung
2006
conf/ih
An Elliptic Curve Backdoor Algorithm for RSASSA.
Adam L. Young
Moti Yung
2006
conf/fdtc
A Comparative Cost/Security Analysis of Fault Attack Countermeasures.
Tal Malkin
François-Xavier Standaert
Moti Yung
2006
conf/iwsec
Short Traceable Signatures Based on Bilinear Pairings.
Seung Geol Choi
Kunsoo Park
Moti Yung
2006
conf/asiacrypt
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.
Donghoon Chang
Sangjin Lee
Mridul Nandi
Moti Yung
2006
conf/tcc
Interactive Zero-Knowledge with Restricted Random Oracles.
Moti Yung
Yunlei Zhao
2006
conf/tcc
Threshold and Proactive Pseudo-Random Permutations.
Yevgeniy Dodis
Aleksandr Yampolskiy
Moti Yung
2005
conf/ctrsa
Malicious Cryptography: Kleptographic Aspects.
Adam L. Young
Moti Yung
2005
conf/eurocrypt
Group Signatures with Efficient Concurrent Join.
Aggelos Kiayias
Moti Yung
2005
conf/sacrypt
A Space Efficient Backdoor in RSA and Its Applications.
Adam L. Young
Moti Yung
2004
conf/ccs
The dual receiver cryptosystem and its applications.
Theodore Diament
Homin K. Lee
Angelos D. Keromytis
Moti Yung
2004
conf/ccs
k-anonymous secret handshakes with reusable credentials.
Shouhuai Xu
Moti Yung
2004
conf/acisp
Unconditionally Secure Encryption Under Strong Attacks.
Luke McAven
Reihaneh Safavi-Naini
Moti Yung
2004
conf/fc
Electronic National Lotteries.
Elisavet Konstantinou
Vasiliki Liagkou
Paul G. Spirakis
Yannis C. Stamatiou
Moti Yung
2004
conf/fc
The Vector-Ballot e-Voting Approach.
Aggelos Kiayias
Moti Yung
2004
conf/pkc
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures".
Reihaneh Safavi-Naini
Luke McAven
Moti Yung
2004
conf/ctrsa
A Generic Construction for Intrusion-Resilient Public-Key Encryption.
Yevgeniy Dodis
Matthew K. Franklin
Jonathan Katz
Atsuko Miyaji
Moti Yung
2004
conf/ctrsa
A Key Recovery System as Secure as Factoring.
Adam L. Young
Moti Yung
2004
conf/eurocrypt
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.
Tal Malkin
Satoshi Obana
Moti Yung
2004
conf/eurocrypt
Traceable Signatures.
Aggelos Kiayias
Yiannis Tsiounis
Moti Yung
2004
conf/asiacrypt
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice.
Aggelos Kiayias
Moti Yung
2004
conf/sacrypt
A Subliminal Channel in Secret Block Ciphers.
Adam L. Young
Moti Yung
2003
conf/acisp
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts.
Adam L. Young
Moti Yung
2003
conf/crypto
Scalable Protocols for Authenticated Group Key Exchange.
Jonathan Katz
Moti Yung
2003
conf/fc
Retrofitting Fairness on the Original RSA-Based E-cash.
Shouhuai Xu
Moti Yung
2003
conf/fc
Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Aggelos Kiayias
Moti Yung
2003
conf/fc
Trusted Computing Platforms: The Good, the Bad, and the Ugly.
Moti Yung
2003
conf/pkc
Strong Key-Insulated Signature Schemes.
Yevgeniy Dodis
Jonathan Katz
Shouhuai Xu
Moti Yung
2003
conf/ctrsa
Intrusion-Resilient Public-Key Encryption.
Yevgeniy Dodis
Matthew K. Franklin
Jonathan Katz
Atsuko Miyaji
Moti Yung
2003
conf/eurocrypt
Extracting Group Signatures from Traitor Tracing Schemes.
Aggelos Kiayias
Moti Yung
2002
conf/ccs
Breaking and Repairing Asymmetric Public-Key Traitor Tracing.
Aggelos Kiayias
Moti Yung
2002
conf/acisp
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing.
Hyun-Jeong Kim
Dong Hoon Lee
Moti Yung
2002
conf/fc
Split-and-Delegate: Threshold Cryptography for the Masses.
Daniel E. Geer Jr.
Moti Yung
2002
conf/fc
The Dark Side of Threshold Cryptography.
Shouhuai Xu
Moti Yung
2002
conf/pkc
Self-tallying Elections and Perfect Ballot Secrecy.
Aggelos Kiayias
Moti Yung
2002
conf/ctrsa
Observability Analysis - Detecting When Improved Cryptosystems Fail.
Marc Joye
Jean-Jacques Quisquater
Sung-Ming Yen
Moti Yung
2002
conf/eurocrypt
Traitor Tracing with Constant Transmission Rate.
Aggelos Kiayias
Moti Yung
2002
conf/eurocrypt
Key-Insulated Public Key Cryptosystems.
Yevgeniy Dodis
Jonathan Katz
Shouhuai Xu
Moti Yung
2002
conf/asiacrypt
Crypto-integrity.
Moti Yung
2002
conf/asiacrypt
Threshold Cryptosystems Based on Factoring.
Jonathan Katz
Moti Yung
2001
conf/fse
Incremental Unforgeable Encryption.
Enrico Buonanno
Jonathan Katz
Moti Yung
2001
conf/ccs
On Crafty Pirates and Foxy Tracers.
Aggelos Kiayias
Moti Yung
2001
conf/crypto
Self Protecting Pirates and Black-Box Traitor Tracing.
Aggelos Kiayias
Moti Yung
2001
conf/fc
The Business of Electronic Voting.
Ed Gerck
C. Andrew Neff
Ronald L. Rivest
Aviel D. Rubin
Moti Yung
2001
conf/ches
Bandwidth-Optimal Kleptographic Attacks.
Adam L. Young
Moti Yung
2001
conf/pkc
A PVSS as Hard as Discrete Log and Shareholder Separability.
Adam L. Young
Moti Yung
2001
conf/pkc
Adaptive Security for the Additive-Sharing Based Proactive RSA.
Yair Frankel
Philip D. MacKenzie
Moti Yung
2001
conf/ctrsa
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC.
Marc Joye
Jean-Jacques Quisquater
Moti Yung
2001
conf/eurocrypt
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords.
Jonathan Katz
Rafail Ostrovsky
Moti Yung
2001
conf/sacrypt
Polynomial Reconstruction Based Cryptography.
Aggelos Kiayias
Moti Yung
2000
conf/fse
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation.
Jonathan Katz
Moti Yung
2000
conf/ccs
Funkspiel schemes: an alternative to conventional tamper resistance.
Johan Håstad
Jakob Jonsson
Ari Juels
Moti Yung
2000
conf/fc
Blind, Auditable Membership Proofs.
Tomas Sander
Amnon Ta-Shma
Moti Yung
2000
conf/fc
Payment Systems: The Next Generation.
Moti Yung
2000
conf/icisc
Hash to the Rescue: Space Minimization for PKI Directories.
Adam L. Young
Moti Yung
2000
conf/pkc
RSA-Based Auto-recoverable Cryptosystems.
Adam L. Young
Moti Yung
2000
conf/pkc
Design Validations for Discrete Logarithm Based Signature Schemes.
Ernest F. Brickell
David Pointcheval
Serge Vaudenay
Moti Yung
2000
conf/pkc
"Psyeudorandom Intermixing": A Tool for Shared Cryptography.
Yair Frankel
Philip D. MacKenzie
Moti Yung
2000
conf/asiacrypt
Towards Signature-Only Signature Schemes.
Adam L. Young
Moti Yung
1999
conf/fse
Scramble All, Encrypt Small.
Markus Jakobsson
Julien P. Stern
Moti Yung
1999
conf/ccs
Secure Protocol Transformation via "Expansion": From Two-Party to Groups.
Alain J. Mayer
Moti Yung
1999
conf/fc
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control".
Yair Frankel
Moti Yung
1999
conf/icisc
Self-Escrowed Public-Key Infrastructures.
Pascal Paillier
Moti Yung
1999
conf/icisc
On Threshold RSA-Signing with no Dealer.
Shingo Miyazaki
Kouichi Sakurai
Moti Yung
1999
conf/ih
Software DisEngineering: Program Hiding Architecture and Experiments.
Enriquillo Valdez
Moti Yung
1999
conf/pkc
Decision Oracles are Equivalent to Matching Oracles.
Helena Handschuh
Yiannis Tsiounis
Moti Yung
1999
conf/pkc
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy.
Adam L. Young
Moti Yung
1999
conf/asiacrypt
Adaptively-Secure Optimal-Resilience Proactive RSA.
Yair Frankel
Philip D. MacKenzie
Moti Yung
1998
journals/joc
Using Any One-Way Permutation.
Moni Naor
Rafail Ostrovsky
Ramarathnam Venkatesan
Moti Yung
1998
conf/fse
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs.
Adam L. Young
Moti Yung
1998
conf/fc
On Assurance Structures for WWW Commerce.
Markus Jakobsson
Moti Yung
1998
conf/fc
Beyond Identity: Warranty-Based Digital Signature Transactions.
Yair Frankel
David W. Kravitz
Charles T. Montgomery
Moti Yung
1998
conf/pkc
On the Security of ElGamal Based Encryption.
Yiannis Tsiounis
Moti Yung
1998
conf/pkc
Lower Bounds on Term-Based Divisible Cash Systems.
Tatsuaki Okamoto
Moti Yung
1998
conf/pkc
Distributed Public Key Cryptosystems.
Yair Frankel
Moti Yung
1998
conf/eurocrypt
Auto-Recoverable Auto-Certifiable Cryptosystems.
Adam L. Young
Moti Yung
1998
conf/asiacrypt
Fair Off-Line e-cash Made Easy.
Yair Frankel
Yiannis Tsiounis
Moti Yung
1997
conf/fse
Sliding Encryption: A Cryptographic Tool for Mobile Agents.
Adam L. Young
Moti Yung
1997
conf/ccs
Proactive Public Key and Signature Systems.
Amir Herzberg
Markus Jakobsson
Stanislaw Jarecki
Hugo Krawczyk
Moti Yung
1997
conf/crypto
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems.
Adam L. Young
Moti Yung
1997
conf/crypto
Proactive RSA.
Yair Frankel
Peter Gemmell
Philip D. MacKenzie
Moti Yung
1997
conf/crypto
Keeping the SZK-Verifier Honest Unconditionally.
Giovanni Di Crescenzo
Tatsuaki Okamoto
Moti Yung
1997
conf/fc
Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System.
Markus Jakobsson
Moti Yung
1997
conf/fc
Anonymity Control in E-Cash Systems.
George I. Davida
Yair Frankel
Yiannis Tsiounis
Moti Yung
1997
conf/sp
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage.
Adam L. Young
Moti Yung
1997
conf/icics
Zero-knowledge proofs of decision power: new protocols and optimal round-complexity.
Giovanni Di Crescenzo
Kouichi Sakurai
Moti Yung
1997
conf/eurocrypt
Kleptography: Using Cryptography Against Cryptography.
Adam L. Young
Moti Yung
1997
conf/eurocrypt
Distributed "Magic Ink" Signatures.
Markus Jakobsson
Moti Yung
1997
conf/eurocrypt
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function.
Mihir Bellare
Markus Jakobsson
Moti Yung
1996
journals/joc
Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation.
Mihir Bellare
Moti Yung
1996
conf/ccs
Revokable and Versatile Electronic Money (extended abstract).
Markus Jakobsson
Moti Yung
1996
conf/crypto
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
Adam L. Young
Moti Yung
1996
conf/crypto
Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers.
Markus Jakobsson
Moti Yung
1996
conf/sp
Cryptovirology: Extortion-Based Security Threats and Countermeasures.
Adam L. Young
Moti Yung
1996
conf/ih
A Progress Report on Subliminal-Free Channels.
Mike Burmester
Yvo Desmedt
Toshiya Itoh
Kouichi Sakurai
Hiroki Shizuya
Moti Yung
1996
conf/eurocrypt
Multi-Autority Secret-Ballot Elections with Linear Work.
Ronald Cramer
Matthew K. Franklin
Berry Schoenmakers
Moti Yung
1996
conf/asiacrypt
"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash.
Yair Frankel
Yiannis Tsiounis
Moti Yung
1995
conf/crypto
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Amir Herzberg
Stanislaw Jarecki
Hugo Krawczyk
Moti Yung
1995
conf/crypto
Cryptanalysis of the Immunized LL Public Key Systems.
Yair Frankel
Moti Yung
1995
conf/crypto
Escrow Encryption Systems Visited: Attacks, Analysis and Designs.
Yair Frankel
Moti Yung
1994
conf/eurocrypt
The Blinding of Weak Signatures (Extended Abstract).
Matthew K. Franklin
Moti Yung
1993
conf/eurocrypt
Interactive Hashing Simplifies Zero-Knowledge Protocol Design.
Rafail Ostrovsky
Ramarathnam Venkatesan
Moti Yung
1992
conf/crypto
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
Moni Naor
Rafail Ostrovsky
Ramarathnam Venkatesan
Moti Yung
1992
conf/crypto
Certifying Cryptographic Tools: The Case of Trapdoor Permutations.
Mihir Bellare
Moti Yung
1992
conf/crypto
Perfectly-Secure Key Distribution for Dynamic Conferences.
Carlo Blundo
Alfredo De Santis
Amir Herzberg
Shay Kutten
Ugo Vaccaro
Moti Yung
1991
conf/crypto
Systematic Design of Two-Party Authentication Protocols.
Ray Bird
Inder S. Gopal
Amir Herzberg
Philippe A. Janson
Shay Kutten
Refik Molva
Moti Yung
1991
conf/eurocrypt
Weakness of Undeniable Signature Schemes (Extended Abstract).
Yvo Desmedt
Moti Yung
1990
conf/crypto
Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems.
Alfredo De Santis
Moti Yung
1990
conf/crypto
One-Way Group Actions.
Gilles Brassard
Moti Yung
1990
conf/crypto
Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract).
Yvo Desmedt
Moti Yung
1990
conf/eurocrypt
On the Design of Provably Secure Cryptographic Hash Functions.
Alfredo De Santis
Moti Yung
1989
conf/eurocrypt
A Secure Public-key Authentication Scheme.
Zvi Galil
Stuart Haber
Moti Yung
1989
conf/eurocrypt
Number of Rounds (Extended Abstract).
Gilles Brassard
Claude Crépeau
Moti Yung
1989
conf/eurocrypt
Zero-Knowledge Proofs of Computational Power (Extended Summary).
Moti Yung
1987
conf/crypto
Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model.
Zvi Galil
Stuart Haber
Moti Yung
1987
conf/crypto
Direct Minimum-Knowledge Computations.
Russell Impagliazzo
Moti Yung
1985
conf/crypto
Symmetric Public-Key Encryption.
Zvi Galil
Stuart Haber
Moti Yung
1984
conf/crypto
Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract).
Moti Yung
Coauthors
Adam L. Young
(24)
Aggelos Kiayias
(18)
Ahmad-Reza Sadeghi
(2)
Ahmet Erhan Nergiz
(1)
Akira Otsuka
(1)
Alain J. Mayer
(1)
Aleksandr Yampolskiy
(1)
Alexander Russell
(4)
Alexandra Dmitrienko
(2)
Alfredo De Santis
(3)
Ali Juma
(1)
Alon Ziv
(1)
Amir Herzberg
(4)
Amit Sahai
(1)
Amnon Ta-Shma
(1)
Andrew Chi-Chih Yao
(1)
Ang Chen
(1)
Angelos D. Keromytis
(4)
Anna Lauks-Dutka
(1)
Ari Juels
(3)
Ariel Elbaz
(2)
Assaf Ben-David
(1)
Atsuko Miyaji
(2)
Aviel D. Rubin
(1)
Avinatan Hassidim
(4)
Aydin Aysu
(1)
Baosheng Wang
(2)
Ben Kreuter
(1)
Benny Pinkas
(1)
Benoît Libert
(20)
Berry Schoenmakers
(1)
Bülent Yener
(1)
C. Andrew Neff
(1)
Carlo Blundo
(1)
Carol J. Fung
(1)
Cem Paya
(1)
Charles T. Montgomery
(1)
Christophe Petit
(1)
Claude Crépeau
(1)
Daisuke Moriyama
(3)
Dana Dachman-Soled
(2)
Danfeng (Daphne) Yao
(1)
Daniel E. Geer Jr.
(1)
Daniel Nagy
(1)
David Arroyo
(1)
David Lazarov
(1)
David Noack
(2)
David Pointcheval
(1)
David S. Johnson
(1)
David Shanahan
(1)
David W. Kravitz
(1)
Debra L. Cook
(2)
Dengguo Feng
(1)
Diogo Barradas
(1)
Dong Hoon Lee
(6)
Dongdai Lin
(1)
Donghoon Chang
(3)
Duong Hieu Phan
(6)
Ed Gerck
(1)
Ege Gulcan
(1)
Eike Kiltz
(1)
Elisavet Konstantinou
(1)
Enrico Buonanno
(1)
Enriquillo Valdez
(1)
Ernest F. Brickell
(1)
Fabrice Mouhartem
(1)
Filip Zagórski
(1)
Francisco de Borja Rodríguez
(1)
François-Xavier Standaert
(4)
Frederik Armknecht
(1)
George I. Davida
(1)
Ghous Amjad
(2)
Gilles Brassard
(2)
Giovanni Di Crescenzo
(2)
Giuseppe Persiano
(7)
Guomin Yang
(1)
Helena Handschuh
(1)
Hiroki Shizuya
(1)
Homin K. Lee
(1)
Hong-Sheng Zhou
(4)
Hugo Krawczyk
(2)
Hyun-Jeong Kim
(1)
Inder S. Gopal
(1)
Isamu Teranishi
(3)
Jacob Gatlin
(1)
Jaechul Sung
(1)
Jakob Jonsson
(1)
Jan Camenisch
(1)
Javier López
(2)
Jean-Jacques Quisquater
(5)
Jesus Diaz
(1)
Jianting Ning
(1)
Jinyu Pei
(1)
Johan Håstad
(1)
John G. Brainard
(1)
Jon Callas
(1)
Jonathan Katz
(11)
Jong Hwan Park
(1)
Juan A. Garay
(1)
Julien Cathalo
(1)
Julien Devevey
(1)
Julien P. Stern
(1)
Jung Yeon Hwang
(1)
Karn Seth
(2)
Kevin Yeo
(3)
Khoa Nguyen
(3)
Kouichi Sakurai
(3)
Krzysztof Pietrzak
(1)
Kunsoo Park
(1)
Kwangsu Lee
(4)
Liron David
(4)
Long Chen
(1)
Luke McAven
(2)
Marc Joye
(8)
Marcin Zawada
(2)
Mariana Raykova
(4)
Mark Yampolskiy
(2)
Markus Jakobsson
(8)
Martijn Stam
(1)
Matthew K. Franklin
(4)
Micah Sherr
(1)
Michael Szydlo
(1)
Mihaela Ion
(1)
Mihir Bellare
(3)
Mike Burmester
(1)
Mingyi Zhao
(1)
Miroslaw Kutylowski
(3)
Moni Naor
(2)
Moti Yung
(226)
Mridul Nandi
(2)
Olivier Pereira
(2)
Omer Berkman
(3)
Pascal Paillier
(1)
Patrick Schaumont
(1)
Patrick Tser Jern Kon
(1)
Paul G. Spirakis
(1)
Pawel Lorek
(1)
Peihan Miao
(1)
Peter Gemmell
(1)
Petros Mol
(1)
Philip D. MacKenzie
(4)
Philippe A. Janson
(1)
Qiang Tang
(6)
Rafail Ostrovsky
(4)
Ramarathnam Venkatesan
(3)
Ran Gelles
(1)
Ray Bird
(1)
Refik Molva
(1)
Reihaneh Safavi-Naini
(2)
Robert H. Deng
(1)
Ronald Cramer
(1)
Ronald L. Rivest
(2)
Rongmao Chen
(4)
Russell Impagliazzo
(1)
Salman Ahmed
(1)
Sangjin Lee
(2)
Sarvar Patel
(5)
Satoshi Obana
(1)
Seokhie Hong
(1)
Serge Vaudenay
(1)
Seung Geol Choi
(7)
Shay Kutten
(2)
Sherman S. M. Chow
(1)
Shingo Miyazaki
(1)
Shobhit Saxena
(1)
Shouhuai Xu
(8)
Sina Kamali
(1)
Stanislaw Jarecki
(2)
Stuart Haber
(3)
Sung-Ming Yen
(1)
Taejoong (Tijay) Chung
(1)
Tal Malkin
(11)
Tatsuaki Okamoto
(2)
Theodore Diament
(1)
Thomas Peters
(13)
Tomas Sander
(2)
Toshiya Itoh
(1)
Ugo Vaccaro
(1)
Vasiliki Liagkou
(1)
Vicente Benjumea
(2)
Vipul Goyal
(1)
Weiliang Luo
(1)
Xinyi Huang
(4)
Xuan Thanh Do
(2)
Ya Xiao
(1)
Ya-Nan Li
(1)
Yair Frankel
(12)
Yannis C. Stamatiou
(1)
Yevgeniy Dodis
(6)
Yevgeniy Vahlis
(2)
Yi Deng
(1)
Yi Wang
(3)
Yiannis Tsiounis
(7)
Yingjiu Li
(1)
Yongjun Zhao
(1)
Yossi Matias
(5)
Yu Yu
(1)
Yunlei Zhao
(4)
Yvo Desmedt
(4)
Zvi Galil
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to