Moti Yung

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Public-key anamorphism in (CCA-secure) public-key encryption and beyond2024-12-04Paper
Sender-anamorphic encryption reformulated: achieving robust and generic constructions2024-09-13Paper
Anamorphic signatures: secrecy from a dictator who only permits authentication!
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Distributed computing in asynchronous networks with byzantine edges
Lecture Notes in Computer Science
2024-01-29Paper
Scheduling task-tree with additive scales on parallel/distributed machines
Lecture Notes in Computer Science
2023-12-12Paper
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE
Lecture Notes in Computer Science
2023-05-12Paper
Efficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversary
Lecture Notes in Computer Science
2023-05-08Paper
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications2023-04-21Paper
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption2023-03-21Paper
Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups2022-12-16Paper
Two-sided malicious security for private intersection-sum with cardinality2022-12-07Paper
Anamorphic encryption: private communication against a dictator2022-08-30Paper
Secure commitment against a powerful adversary
STACS 92
2022-08-18Paper
The combinatorics of product scanning multiplication and squaring
Lecture Notes in Computer Science
2022-06-15Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes2021-02-23Paper
Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
Journal of Cryptology
2020-11-06Paper
The combinatorics of hidden diversity
Theoretical Computer Science
2020-02-20Paper
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog2020-01-28Paper
One-message statistical Zero-Knowledge Proofs and space-bounded verifier
Automata, Languages and Programming
2019-12-04Paper
Short vertex disjoint paths and multiconnectivity in random graphs: Reliable network computing
Automata, Languages and Programming
2019-04-29Paper
Secure and efficient off-line digital money (extended abstract)
Automata, Languages and Programming
2019-03-29Paper
Stochastic graphs have short memory: Fully dynamic connectivity in poly-log expected time
Automata, Languages and Programming
2019-01-10Paper
Hard invalidation of electronic signatures2018-12-07Paper
Proactive secure multiparty computation with a dishonest majority2018-10-17Paper
Semantically secure anonymity: foundations of re-encryption2018-10-17Paper
Correcting subverted random oracles2018-09-26Paper
On characterizations of escrow encryption schemes
Automata, Languages and Programming
2018-07-04Paper
Sliding encryption: a cryptographic tool for mobile agents
Fast Software Encryption
2018-05-09Paper
Monkey: black-box symmetric ciphers designed for MON\textit{opolizing} KEY\textit{s}
Fast Software Encryption
2018-05-09Paper
End-to-end design of a PUF-based privacy preserving authentication protocol2018-02-14Paper
Functional commitment schemes: from polynomial commitments to pairing-based accumulators from simple assumptions2017-12-19Paper
Brief announcement: Secure self-stabilizing computation
Proceedings of the ACM Symposium on Principles of Distributed Computing
2017-10-11Paper
Time-optimal message-efficient work performance in the presence of faults
Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing - PODC '94
2017-09-29Paper
Coins, weights and contention in balancing networks
Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing - PODC '94
2017-09-29Paper
Brief announcement: Proactive secret sharing with a dishonest majority
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing
2017-09-29Paper
Resource-based corruptions and the combinatorics of hidden diversity
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and The Multi-Player Mental Poker Game (extended abstract)
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
2017-04-10Paper
Cliptography: clipping the power of kleptographic attacks
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Proactive Secret Sharing with a Dishonest Majority
Lecture Notes in Computer Science
2016-10-21Paper
On the implausibility of constant-round public-coin zero-knowledge proofs
Lecture Notes in Computer Science
2016-10-21Paper
How to share a function securely
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94
2016-09-01Paper
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
Theoretical Computer Science
2016-08-31Paper
Compactly hiding linear spans. Tightly secure constant-size simulation-sound QA-NIZK proofs and applications
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Cryptography as an attack technology: proving the RSA/factoring kleptographic attack
The New Codebreakers
2016-05-02Paper
Towards a Unified Security Model for Physically Unclonable Functions
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Concurrent knowledge extraction in public-key models
Journal of Cryptology
2016-04-07Paper
Efficient and secure authenticated key exchange using weak passwords
Journal of the ACM
2015-12-07Paper
Proving without knowing: on oblivious, agnostic and blindfolded provers
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
The dark side of ``black-box cryptography or: should we trust Capstone?
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Scalable public-key tracing and revoking
Proceedings of the twenty-second annual symposium on Principles of distributed computing
2015-09-04Paper
Born and raised distributively
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
A little honesty goes a long way. The two-tier model for secure multiparty computation
Theory of Cryptography
2015-07-06Paper
How to withstand mobile virus attacks (extended abstract)
Proceedings of the tenth annual ACM symposium on Principles of distributed computing - PODC '91
2015-06-19Paper
Connectivity properties in random regular graphs with edge faults
International Journal of Foundations of Computer Science
2015-04-29Paper
Order-Preserving Encryption Secure Beyond One-Wayness
Lecture Notes in Computer Science
2015-01-06Paper
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
Lecture Notes in Computer Science
2014-10-14Paper
Complete characterization of security notions for probabilistic private-key encryption
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
On zero-knowledge proofs (extended abstract)
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
Multi-authority secret-ballot elections with linear work
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Sequential aggregate signatures made shorter
Applied Cryptography and Network Security
2014-01-24Paper
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Strictly-black-box zero-knowledge and efficient validation of financial transactions
Automata, Languages, and Programming
2013-08-12Paper
Scalable public-key tracing and revoking
Distributed Computing
2013-06-07Paper
Adaptively secure non-interactive threshold cryptosystems
Theoretical Computer Science
2013-06-06Paper
Adaptively secure forward-secure non-interactive threshold cryptosystems
Information Security and Cryptology
2013-01-07Paper
Efficient robust private set intersection
International Journal of Applied Cryptography
2012-11-16Paper
Group signatures with almost-for-free revocation
Lecture Notes in Computer Science
2012-09-25Paper
On the centrality of off-line e-cash to concrete partial information games
Lecture Notes in Computer Science
2012-09-25Paper
Multi-location leakage resilient cryptography
Public Key Cryptography – PKC 2012
2012-07-20Paper
Scalable group signatures with revocation
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions
Theory of Cryptography
2012-06-15Paper
Fully forward-secure group signatures
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Leakage resilient strong key-insulated signatures in public channel
Trusted Systems
2011-12-07Paper
Resettable cryptography in constant rounds -- the case of zero knowledge
Lecture Notes in Computer Science
2011-12-02Paper
Adaptively secure non-interactive threshold cryptosystems
Automata, Languages and Programming
2011-07-07Paper
On the Security of Hash Functions Employing Blockcipher Postprocessing
Fast Software Encryption
2011-07-07Paper
Efficient circuit-size independent public key encryption with KDM security
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Signatures resilient to continual leakage on memory and computation
Theory of Cryptography
2011-05-19Paper
The dark side of threshold cryptography
Financial Cryptography
2011-04-20Paper
Breaking and repairing asymmetric public-key traitor tracing
Lecture Notes in Computer Science
2011-03-18Paper
Efficient traceable signatures in the standard model
Theoretical Computer Science
2011-03-14Paper
Leakage-resilient RFID authentication with forward-privacy
Radio Frequency Identification: Security and Privacy Issues
2011-01-14Paper
A new framework for RFID privacy
Computer Security – ESORICS 2010
2010-09-20Paper
Kleptography from standard assumptions and applications
Lecture Notes in Computer Science
2010-09-10Paper
Concurrent knowledge extraction in the public-key model
Automata, Languages and Programming
2010-09-07Paper
Efficient completely non-malleable public key encryption
Automata, Languages and Programming
2010-09-07Paper
The vector-ballot approach for online voting procedures
Towards Trustworthy Elections
2010-06-17Paper
Cryptography between wonderland and underland
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Retrofitting fairness on the original RSA-based e-cash
Lecture Notes in Computer Science
2010-03-31Paper
Non-interactive zero-sharing with applications to private distributed decision making
Lecture Notes in Computer Science
2010-03-31Paper
Concise mercurial vector commitments and independent zero-knowledge sets with short proofs
Theory of Cryptography
2010-02-24Paper
Group encryption: non-interactive realization in the standard model
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Secure multi-party computation minimizing online rounds
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
On Monotone Formula Composition of Perfect Zero-Knowledge Languages
SIAM Journal on Computing
2009-08-20Paper
Efficient Traceable Signatures in the Standard Model
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Secure Function Collection with Sublinear Storage
Automata, Languages and Programming
2009-07-14Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
A New Randomness Extraction Paradigm for Hybrid Encryption
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
On the Portability of Generalized Schnorr Proofs
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Key Evolution Systems in Untrusted Update Environments
Information Security and Cryptology
2009-04-29Paper
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
Information Security and Cryptology
2009-04-29Paper
Preimage Attack on the Parallel FFT-Hashing Function
Information Security and Privacy
2009-03-06Paper
Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes
IEEE Transactions on Information Theory
2009-02-24Paper
Fair Traceable Multi-Group Signatures
Financial Cryptography and Data Security
2009-02-12Paper
A Timing-Resistant Elliptic Curve Backdoor in RSA
Information Security and Cryptology
2009-02-10Paper
Efficient Intrusion-Resilient Signatures Without Random Oracles
Information Security and Cryptology
2009-01-15Paper
Privacy Preserving Data Mining within Anonymous Credential Systems
Lecture Notes in Computer Science
2008-11-20Paper
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination
Financial Cryptography and Data Security
2008-09-09Paper
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
Information Security and Privacy
2008-07-08Paper
The Security of Elastic Block Ciphers Against Key-Recovery Attacks
Lecture Notes in Computer Science
2008-06-24Paper
Group Encryption
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Two-Party Computing with Encrypted Data
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Group Signatures with Efficient Concurrent Join
Lecture Notes in Computer Science
2008-05-06Paper
Eavesdropping games
Journal of the ACM
2008-05-05Paper
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Secret Swarm Unit Reactive k −Secret Sharing
Lecture Notes in Computer Science
2008-04-11Paper
K-Anonymous Multi-party Secret Handshakes
Financial Cryptography and Data Security
2008-03-07Paper
Recovering NTRU Secret Key from Inversion Oracles
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
A Space Efficient Backdoor in RSA and Its Applications
Selected Areas in Cryptography
2007-11-15Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice
Designs, Codes and Cryptography
2007-09-20Paper
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Public Key Cryptography – PKC 2007
2007-09-04Paper
Decoding interleaved Reed-Solomon codes over noisy channels
Theoretical Computer Science
2007-07-16Paper
Scalable protocols for authenticated group key exchange
Journal of Cryptology
2007-05-24Paper
scientific article; zbMATH DE number 5145345 (Why is no real title available?)2007-04-23Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Characterization of security notions for probabilistic private-key encryption
Journal of Cryptology
2006-08-14Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Secure Hypergraphs: Privacy from Partial Broadcast
SIAM Journal on Discrete Mathematics
2005-09-16Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice2005-08-12Paper
Financial Cryptography
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2102782 (Why is no real title available?)2004-09-24Paper
scientific article; zbMATH DE number 2102686 (Why is no real title available?)2004-09-24Paper
scientific article; zbMATH DE number 2088327 (Why is no real title available?)2004-08-12Paper
Incremental Unforgeable Encryption
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2086699 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2086724 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2087909 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2086625 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2085427 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2085200 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2079917 (Why is no real title available?)2004-08-03Paper
scientific article; zbMATH DE number 2048544 (Why is no real title available?)2004-03-01Paper
scientific article; zbMATH DE number 2048540 (Why is no real title available?)2004-03-01Paper
scientific article; zbMATH DE number 2044528 (Why is no real title available?)2004-02-18Paper
scientific article; zbMATH DE number 2043330 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 2038702 (Why is no real title available?)2004-02-08Paper
scientific article; zbMATH DE number 2009984 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1962140 (Why is no real title available?)2003-08-10Paper
Strong Key-Insulated Signature Schemes
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1952887 (Why is no real title available?)2003-07-24Paper
Threshold Cryptosystems Based on Factoring
Lecture Notes in Computer Science
2003-07-16Paper
Crypto-integrity
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1878335 (Why is no real title available?)2003-03-09Paper
scientific article; zbMATH DE number 1759334 (Why is no real title available?)2003-03-07Paper
Adaptively secure distributed public-key systems.
Theoretical Computer Science
2003-01-21Paper
scientific article; zbMATH DE number 1842486 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1759347 (Why is no real title available?)2002-11-28Paper
scientific article; zbMATH DE number 1759352 (Why is no real title available?)2002-11-28Paper
scientific article; zbMATH DE number 1618053 (Why is no real title available?)2002-10-21Paper
scientific article; zbMATH DE number 1808213 (Why is no real title available?)2002-09-30Paper
Self-Stabilizing Symmetry Breaking in Constant Space
SIAM Journal on Computing
2002-09-29Paper
scientific article; zbMATH DE number 1775456 (Why is no real title available?)2002-08-01Paper
scientific article; zbMATH DE number 1617928 (Why is no real title available?)2002-07-22Paper
scientific article; zbMATH DE number 1489844 (Why is no real title available?)2002-07-10Paper
scientific article; zbMATH DE number 1759277 (Why is no real title available?)2002-06-25Paper
scientific article; zbMATH DE number 1754646 (Why is no real title available?)2002-06-12Paper
scientific article; zbMATH DE number 1408386 (Why is no real title available?)2002-04-21Paper
scientific article; zbMATH DE number 1583773 (Why is no real title available?)2002-03-06Paper
scientific article; zbMATH DE number 1689608 (Why is no real title available?)2002-01-13Paper
scientific article; zbMATH DE number 1618056 (Why is no real title available?)2001-07-12Paper
Perfect zero-knowledge arguments for NP using any one-way permutation
Journal of Cryptology
2001-05-20Paper
Robust parallel computations through randomization
Theory of Computing Systems
2001-04-17Paper
scientific article; zbMATH DE number 1405784 (Why is no real title available?)2001-01-29Paper
scientific article; zbMATH DE number 1504548 (Why is no real title available?)2000-09-12Paper
scientific article; zbMATH DE number 1440065 (Why is no real title available?)2000-08-28Paper
scientific article; zbMATH DE number 1418247 (Why is no real title available?)2000-08-27Paper
scientific article; zbMATH DE number 1302799 (Why is no real title available?)2000-06-29Paper
scientific article; zbMATH DE number 1440063 (Why is no real title available?)2000-05-07Paper
scientific article; zbMATH DE number 1440066 (Why is no real title available?)2000-05-07Paper
Combined asynchronous/synchronous packet switching architecture: QoS guarantees for integrated parallel computing and real-time traffic
Journal of Parallel and Distributed Computing
2000-05-07Paper
scientific article; zbMATH DE number 1306905 (Why is no real title available?)2000-04-26Paper
scientific article; zbMATH DE number 1341884 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1341882 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1394298 (Why is no real title available?)2000-01-31Paper
Auto-recoverable auto-certifiable cryptosystems
Lecture Notes in Computer Science
1999-09-09Paper
scientific article; zbMATH DE number 708806 (Why is no real title available?)1999-08-30Paper
scientific article; zbMATH DE number 1263179 (Why is no real title available?)1999-07-22Paper
scientific article; zbMATH DE number 1256769 (Why is no real title available?)1999-05-18Paper
Perfectly secure key distribution for dynamic conferences
Information and Computation
1999-03-30Paper
scientific article; zbMATH DE number 1136088 (Why is no real title available?)1999-01-10Paper
scientific article; zbMATH DE number 1186870 (Why is no real title available?)1998-12-14Paper
Scheduling task-trees with additive scales on parallel/distributed machines
Theoretical Computer Science
1998-07-22Paper
The local detection paradigm and its applications to self-stabilization
Theoretical Computer Science
1998-06-30Paper
scientific article; zbMATH DE number 1107670 (Why is no real title available?)1998-06-11Paper
scientific article; zbMATH DE number 1088225 (Why is no real title available?)1998-02-10Paper
scientific article; zbMATH DE number 1186873 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1186864 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1186949 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1030999 (Why is no real title available?)1997-12-01Paper
scientific article; zbMATH DE number 1088904 (Why is no real title available?)1997-11-18Paper
scientific article; zbMATH DE number 1088252 (Why is no real title available?)1997-11-17Paper
scientific article; zbMATH DE number 1088240 (Why is no real title available?)1997-11-17Paper
scientific article; zbMATH DE number 1031003 (Why is no real title available?)1997-07-06Paper
scientific article; zbMATH DE number 1030994 (Why is no real title available?)1997-07-06Paper
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation
Journal of Cryptology
1997-05-19Paper
Efficient On-Line Call Control Algorithms
Journal of Algorithms
1997-04-27Paper
scientific article; zbMATH DE number 871956 (Why is no real title available?)1996-10-07Paper
scientific article; zbMATH DE number 826070 (Why is no real title available?)1996-05-27Paper
scientific article; zbMATH DE number 826071 (Why is no real title available?)1996-05-21Paper
scientific article; zbMATH DE number 708823 (Why is no real title available?)1995-08-08Paper
scientific article; zbMATH DE number 708825 (Why is no real title available?)1995-07-16Paper
scientific article; zbMATH DE number 503244 (Why is no real title available?)1994-09-20Paper
scientific article; zbMATH DE number 549858 (Why is no real title available?)1994-04-12Paper
scientific article; zbMATH DE number 503250 (Why is no real title available?)1994-03-07Paper
Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems
Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings
1994-03-07Paper
scientific article; zbMATH DE number 432745 (Why is no real title available?)1994-01-02Paper
scientific article; zbMATH DE number 432816 (Why is no real title available?)1993-10-20Paper
Weaknesses of Undeniable Signature Schemes
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 177052 (Why is no real title available?)1993-05-18Paper
Perfectly secure message transmission
Journal of the ACM
1993-05-16Paper
Maintenance of a minimum spanning forest in a dynamic plane graph
Journal of Algorithms
1992-06-28Paper
Constant-round perfect zero-knowledge computationally convincing protocols
Theoretical Computer Science
1991-01-01Paper
scientific article; zbMATH DE number 4191080 (Why is no real title available?)1991-01-01Paper
scientific article; zbMATH DE number 4187095 (Why is no real title available?)1991-01-01Paper
The power of multimedia: Combining point-to-point and multi-access networks
Information and Computation
1990-01-01Paper
Fast algorithms for edge-coloring planar graphs
Journal of Algorithms
1989-01-01Paper
Minimum-Knowledge Interactive Proofs for Decision Problems
SIAM Journal on Computing
1989-01-01Paper
scientific article; zbMATH DE number 4076639 (Why is no real title available?)1988-01-01Paper
Partitioned encryption and achieving simultaneity by partitioning
Information Processing Letters
1987-01-01Paper
Distributed algorithms in synchronous broadcasting networks
Theoretical Computer Science
1987-01-01Paper
scientific article; zbMATH DE number 3990833 (Why is no real title available?)1985-01-01Paper


Research outcomes over time


This page was built for person: Moti Yung