Moti Yung
Moti Yung
Research Scientist Google; Adjunct Research Prof. Columbia U.
Bestätigte E-Mail-Adresse bei cs.columbia.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Annual international cryptology conference, 471-486, 1992
13771992
Universal one-way hash functions and their cryptographic applications
M Naor, M Yung
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
11701989
Public-key cryptosystems provably secure against chosen ciphertext attacks
M Naor, M Yung
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
11321990
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
Annual International Cryptology Conference, 339-352, 1995
9591995
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Annual international conference on the theory and applications of …, 2009
8322009
How to withstand mobile virus attacks
R Ostrovsky, M Yung
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
6701991
Efficient password-authenticated key exchange using human-memorable passwords
J Katz, R Ostrovsky, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2001
4992001
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2002
4922002
Multi-authority secret-ballot elections with linear work
R Cramer, M Franklin, B Schoenmakers, M Yung
International Conference on the Theory and Applications of Cryptographic …, 1996
4821996
Perfectly secure message transmission
D Dolev, C Dwork, O Waarts, M Yung
Journal of the ACM (JACM) 40 (1), 17-47, 1993
4761993
Scalable protocols for authenticated group key exchange
J Katz, M Yung
Annual international cryptology conference, 110-125, 2003
4612003
On the security of ElGamal based encryption
Y Tsiounis, M Yung
International Workshop on Public Key Cryptography, 117-134, 1998
4441998
Proactive public key and signature systems
A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung
Proceedings of the 4th ACM conference on Computer and communications …, 1997
3661997
How to share a function securely
A De Santis, Y Desmedt, Y Frankel, M Yung
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing …, 1994
3621994
Non-interactive cryptocomputing for nc/sup 1
T Sander, A Young, M Yung
40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039 …, 1999
3561999
Fourth-factor authentication: somebody you know
J Brainard, A Juels, RL Rivest, M Szydlo, M Yung
Proceedings of the 13th ACM conference on Computer and communications …, 2006
3232006
Two-phase cryptographic key recovery system
R Gennaro, DB Johnson, PA Karger, SM Matyas Jr., MPD Safford, ...
US Patent 5,937,066, 1998
3031998
Traceable signatures
A Kiayias, Y Tsiounis, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2004
3012004
Strong key-insulated signature schemes
Y Dodis, J Katz, S Xu, M Yung
International Workshop on Public Key Cryptography, 130-144, 2003
2992003
Distributing the power of a government to enhance the privacy of voters
JC Benaloh, M Yung
Proceedings of the fifth annual ACM symposium on Principles of distributed …, 1986
2991986
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20