Moti Yung

From MaRDI portal
Person:1088397

Available identifiers

zbMath Open yung.motiDBLPy/MotiYungWikidataQ6917668 ScholiaQ6917668MaRDI QIDQ1088397

List of research outcomes





PublicationDate of PublicationType
Public-key anamorphism in (CCA-secure) public-key encryption and beyond2024-12-04Paper
Sender-anamorphic encryption reformulated: achieving robust and generic constructions2024-09-13Paper
Anamorphic signatures: secrecy from a dictator who only permits authentication!2024-02-02Paper
Distributed computing in asynchronous networks with byzantine edges2024-01-29Paper
Scheduling task-tree with additive scales on parallel/distributed machines2023-12-12Paper
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE2023-05-12Paper
Efficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversary2023-05-08Paper
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications2023-04-21Paper
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption2023-03-21Paper
Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups2022-12-16Paper
Two-sided malicious security for private intersection-sum with cardinality2022-12-07Paper
Anamorphic encryption: private communication against a dictator2022-08-30Paper
Secure commitment against a powerful adversary2022-08-18Paper
The Combinatorics of Product Scanning Multiplication and Squaring2022-06-15Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes2021-02-23Paper
Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions2020-11-06Paper
The combinatorics of hidden diversity2020-02-20Paper
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog2020-01-28Paper
One-message statistical Zero-Knowledge Proofs and space-bounded verifier2019-12-04Paper
Short vertex disjoint paths and multiconnectivity in random graphs: Reliable network computing2019-04-29Paper
Secure and efficient off-line digital money (extended abstract)2019-03-29Paper
Stochastic graphs have short memory: Fully dynamic connectivity in poly-log expected time2019-01-10Paper
Hard invalidation of electronic signatures2018-12-07Paper
Proactive secure multiparty computation with a dishonest majority2018-10-17Paper
Semantically secure anonymity: foundations of re-encryption2018-10-17Paper
Correcting subverted random oracles2018-09-26Paper
On characterizations of escrow encryption schemes2018-07-04Paper
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs2018-05-09Paper
Sliding encryption: A cryptographic tool for mobile agents2018-05-09Paper
End-to-end design of a PUF-based privacy preserving authentication protocol2018-02-14Paper
https://portal.mardi4nfdi.de/entity/Q45981662017-12-19Paper
Brief Announcement2017-10-11Paper
Coins, weights and contention in balancing networks2017-09-29Paper
Brief Announcement2017-09-29Paper
Time-optimal message-efficient work performance in the presence of faults2017-09-29Paper
Resource-based corruptions and the combinatorics of hidden diversity2017-05-16Paper
Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and The Multi-Player Mental Poker Game (extended abstract)2017-04-10Paper
Cliptography: Clipping the Power of Kleptographic Attacks2017-01-06Paper
Proactive Secret Sharing with a Dishonest Majority2016-10-21Paper
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs2016-10-21Paper
How to share a function securely2016-09-01Paper
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares2016-08-31Paper
Compactly Hiding Linear Spans2016-06-10Paper
Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack2016-05-02Paper
Towards a Unified Security Model for Physically Unclonable Functions2016-04-08Paper
Concurrent knowledge extraction in public-key models2016-04-07Paper
Efficient and secure authenticated key exchange using weak passwords2015-12-07Paper
The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?2015-11-11Paper
Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers2015-11-11Paper
Scalable public-key tracing and revoking2015-09-04Paper
Born and raised distributively2015-09-03Paper
A Little Honesty Goes a Long Way2015-07-06Paper
How to withstand mobile virus attacks (extended abstract)2015-06-19Paper
CONNECTIVITY PROPERTIES IN RANDOM REGULAR GRAPHS WITH EDGE FAULTS2015-04-29Paper
Order-Preserving Encryption Secure Beyond One-Wayness2015-01-06Paper
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption2014-10-14Paper
On zero-knowledge proofs (extended abstract)2014-09-26Paper
Complete characterization of security notions for probabilistic private-key encryption2014-09-26Paper
Multi-Authority Secret-Ballot Elections with Linear Work2014-08-20Paper
Sequential Aggregate Signatures Made Shorter2014-01-24Paper
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency2013-12-10Paper
Linearly Homomorphic Structure-Preserving Signatures and Their Applications2013-09-17Paper
Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions2013-08-12Paper
Scalable public-key tracing and revoking2013-06-07Paper
Adaptively secure non-interactive threshold cryptosystems2013-06-06Paper
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems2013-01-07Paper
Efficient robust private set intersection2012-11-16Paper
On the Centrality of Off-Line E-Cash to Concrete Partial Information Games2012-09-25Paper
Group Signatures with Almost-for-Free Revocation2012-09-25Paper
Multi-location Leakage Resilient Cryptography2012-07-20Paper
Scalable Group Signatures with Revocation2012-06-29Paper
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions2012-06-15Paper
Fully Forward-Secure Group Signatures2012-06-08Paper
Leakage Resilient Strong Key-Insulated Signatures in Public Channel2011-12-07Paper
Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge2011-12-02Paper
Adaptively Secure Non-interactive Threshold Cryptosystems2011-07-07Paper
On the Security of Hash Functions Employing Blockcipher Postprocessing2011-07-07Paper
Efficient Circuit-Size Independent Public Key Encryption with KDM Security2011-05-27Paper
Signatures Resilient to Continual Leakage on Memory and Computation2011-05-19Paper
The Dark Side of Threshold Cryptography2011-04-20Paper
Breaking and Repairing Asymmetric Public-Key Traitor Tracing2011-03-18Paper
Efficient traceable signatures in the standard model2011-03-14Paper
Leakage-Resilient RFID Authentication with Forward-Privacy2011-01-14Paper
A New Framework for RFID Privacy2010-09-20Paper
Kleptography from Standard Assumptions and Applications2010-09-10Paper
Efficient Completely Non-malleable Public Key Encryption2010-09-07Paper
Concurrent Knowledge Extraction in the Public-Key Model2010-09-07Paper
The Vector-Ballot Approach for Online Voting Procedures2010-06-17Paper
Cryptography between Wonderland and Underland2010-06-01Paper
Computer Aided Verification2010-03-31Paper
Computer Aided Verification2010-03-31Paper
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs2010-02-24Paper
Secure Multi-party Computation Minimizing Online Rounds2009-12-15Paper
Group Encryption: Non-interactive Realization in the Standard Model2009-12-15Paper
On Monotone Formula Composition of Perfect Zero-Knowledge Languages2009-08-20Paper
Efficient Traceable Signatures in the Standard Model2009-08-18Paper
Secure Function Collection with Sublinear Storage2009-07-14Paper
Public Key Cryptography – PKC 20042009-05-14Paper
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks2009-05-12Paper
A New Randomness Extraction Paradigm for Hybrid Encryption2009-05-12Paper
On the Portability of Generalized Schnorr Proofs2009-05-12Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Key Evolution Systems in Untrusted Update Environments2009-04-29Paper
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs2009-04-29Paper
Preimage Attack on the Parallel FFT-Hashing Function2009-03-06Paper
Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes2009-02-24Paper
Fair Traceable Multi-Group Signatures2009-02-12Paper
A Timing-Resistant Elliptic Curve Backdoor in RSA2009-02-10Paper
Efficient Intrusion-Resilient Signatures Without Random Oracles2009-01-15Paper
Privacy Preserving Data Mining within Anonymous Credential Systems2008-11-20Paper
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination2008-09-09Paper
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers2008-07-08Paper
The Security of Elastic Block Ciphers Against Key-Recovery Attacks2008-06-24Paper
Group Encryption2008-05-15Paper
Two-Party Computing with Encrypted Data2008-05-15Paper
Group Signatures with Efficient Concurrent Join2008-05-06Paper
Eavesdropping games2008-05-05Paper
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding2008-04-24Paper
Secret Swarm Unit Reactive k −Secret Sharing2008-04-11Paper
K-Anonymous Multi-party Secret Handshakes2008-03-07Paper
Recovering NTRU Secret Key from Inversion Oracles2008-03-05Paper
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
A Space Efficient Backdoor in RSA and Its Applications2007-11-15Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice2007-09-20Paper
Parallel Key-Insulated Public Key Encryption Without Random Oracles2007-09-04Paper
Decoding interleaved Reed-Solomon codes over noisy channels2007-07-16Paper
Scalable protocols for authenticated group key exchange2007-05-24Paper
https://portal.mardi4nfdi.de/entity/Q34339102007-04-23Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2007-02-12Paper
Information Security and Cryptology2006-11-14Paper
Information Security2006-10-20Paper
Security in Communication Networks2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Characterization of security notions for probabilistic private-key encryption2006-08-14Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Secure Hypergraphs: Privacy from Partial Broadcast2005-09-16Paper
Information Security and Privacy2005-09-07Paper
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice2005-08-12Paper
Financial Cryptography2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q48175242004-09-24Paper
https://portal.mardi4nfdi.de/entity/Q48188702004-09-24Paper
Incremental Unforgeable Encryption2004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47395212004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47389362004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47371602004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372362004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372632004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439332004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q47364272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44720612004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44525762004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44525852004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44483922004-02-18Paper
https://portal.mardi4nfdi.de/entity/Q44507572004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44491672004-02-08Paper
https://portal.mardi4nfdi.de/entity/Q44349032003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44185242003-08-10Paper
Strong Key-Insulated Signature Schemes2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44142662003-07-24Paper
Crypto-integrity2003-07-16Paper
Threshold Cryptosystems Based on Factoring2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q47977972003-03-09Paper
https://portal.mardi4nfdi.de/entity/Q45362722003-03-07Paper
Adaptively secure distributed public-key systems.2003-01-21Paper
https://portal.mardi4nfdi.de/entity/Q47837202002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45362922002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q45362872002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q27245992002-10-21Paper
https://portal.mardi4nfdi.de/entity/Q31496752002-09-30Paper
Self-Stabilizing Symmetry Breaking in Constant Space2002-09-29Paper
https://portal.mardi4nfdi.de/entity/Q45425902002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q27244392002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q44960642002-07-10Paper
https://portal.mardi4nfdi.de/entity/Q45361982002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q45350742002-06-12Paper
https://portal.mardi4nfdi.de/entity/Q49412012002-04-21Paper
https://portal.mardi4nfdi.de/entity/Q27074072002-03-06Paper
https://portal.mardi4nfdi.de/entity/Q27629102002-01-13Paper
https://portal.mardi4nfdi.de/entity/Q27246022001-07-12Paper
Perfect zero-knowledge arguments for NP using any one-way permutation2001-05-20Paper
Robust parallel computations through randomization2001-04-17Paper
https://portal.mardi4nfdi.de/entity/Q49387692001-01-29Paper
https://portal.mardi4nfdi.de/entity/Q45024972000-09-12Paper
https://portal.mardi4nfdi.de/entity/Q49500532000-08-28Paper
https://portal.mardi4nfdi.de/entity/Q49418062000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q42492712000-06-29Paper
Combined asynchronous/synchronous packet switching architecture: QoS guarantees for integrated parallel computing and real-time traffic2000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q49500542000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q49500512000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q42527582000-04-26Paper
https://portal.mardi4nfdi.de/entity/Q42634422000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q42634442000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q49347112000-01-31Paper
Auto-recoverable auto-certifiable cryptosystems1999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q43186941999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q42340491999-07-22Paper
https://portal.mardi4nfdi.de/entity/Q42285051999-05-18Paper
Perfectly secure key distribution for dynamic conferences1999-03-30Paper
https://portal.mardi4nfdi.de/entity/Q43813991999-01-10Paper
https://portal.mardi4nfdi.de/entity/Q38400801998-12-14Paper
Scheduling task-trees with additive scales on parallel/distributed machines1998-07-22Paper
The local detection paradigm and its applications to self-stabilization1998-06-30Paper
https://portal.mardi4nfdi.de/entity/Q43736081998-06-11Paper
https://portal.mardi4nfdi.de/entity/Q43645411998-02-10Paper
https://portal.mardi4nfdi.de/entity/Q38400731998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38401711998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38400861998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43434421997-12-01Paper
https://portal.mardi4nfdi.de/entity/Q43657291997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43645571997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43645691997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43434371997-07-06Paper
https://portal.mardi4nfdi.de/entity/Q43434461997-07-06Paper
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation1997-05-19Paper
Efficient On-Line Call Control Algorithms1997-04-27Paper
https://portal.mardi4nfdi.de/entity/Q48752311996-10-07Paper
https://portal.mardi4nfdi.de/entity/Q48584561996-05-27Paper
https://portal.mardi4nfdi.de/entity/Q48584571996-05-21Paper
https://portal.mardi4nfdi.de/entity/Q43187141995-08-08Paper
https://portal.mardi4nfdi.de/entity/Q43187161995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q42795661994-09-20Paper
https://portal.mardi4nfdi.de/entity/Q42873621994-04-12Paper
Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems1994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42795731994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q31388711994-01-02Paper
https://portal.mardi4nfdi.de/entity/Q31389501993-10-20Paper
https://portal.mardi4nfdi.de/entity/Q40368971993-05-18Paper
Weaknesses of Undeniable Signature Schemes1993-05-18Paper
Perfectly secure message transmission1993-05-16Paper
Maintenance of a minimum spanning forest in a dynamic plane graph1992-06-28Paper
https://portal.mardi4nfdi.de/entity/Q57519361991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101441991-01-01Paper
Constant-round perfect zero-knowledge computationally convincing protocols1991-01-01Paper
The power of multimedia: Combining point-to-point and multi-access networks1990-01-01Paper
Fast algorithms for edge-coloring planar graphs1989-01-01Paper
Minimum-Knowledge Interactive Proofs for Decision Problems1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38068311988-01-01Paper
Distributed algorithms in synchronous broadcasting networks1987-01-01Paper
Partitioned encryption and achieving simultaneity by partitioning1987-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37534601985-01-01Paper

Research outcomes over time

This page was built for person: Moti Yung