Moti Yung

From MaRDI portal
Person:1088397

Available identifiers

zbMath Open yung.motiDBLPy/MotiYungWikidataQ6917668 ScholiaQ6917668MaRDI QIDQ1088397

List of research outcomes





PublicationDate of PublicationType
Public-key anamorphism in (CCA-secure) public-key encryption and beyond2024-12-04Paper
Sender-anamorphic encryption reformulated: achieving robust and generic constructions2024-09-13Paper
Anamorphic signatures: secrecy from a dictator who only permits authentication!2024-02-02Paper
Distributed computing in asynchronous networks with byzantine edges2024-01-29Paper
Scheduling task-tree with additive scales on parallel/distributed machines2023-12-12Paper
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE2023-05-12Paper
Efficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversary2023-05-08Paper
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications2023-04-21Paper
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption2023-03-21Paper
Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups2022-12-16Paper
Two-sided malicious security for private intersection-sum with cardinality2022-12-07Paper
Anamorphic encryption: private communication against a dictator2022-08-30Paper
Secure commitment against a powerful adversary2022-08-18Paper
The Combinatorics of Product Scanning Multiplication and Squaring2022-06-15Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes2021-02-23Paper
Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions2020-11-06Paper
The combinatorics of hidden diversity2020-02-20Paper
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog2020-01-28Paper
One-message statistical Zero-Knowledge Proofs and space-bounded verifier2019-12-04Paper
Short vertex disjoint paths and multiconnectivity in random graphs: Reliable network computing2019-04-29Paper
Secure and efficient off-line digital money (extended abstract)2019-03-29Paper
Stochastic graphs have short memory: Fully dynamic connectivity in poly-log expected time2019-01-10Paper
Hard invalidation of electronic signatures2018-12-07Paper
Proactive secure multiparty computation with a dishonest majority2018-10-17Paper
Semantically secure anonymity: foundations of re-encryption2018-10-17Paper
Correcting subverted random oracles2018-09-26Paper
On characterizations of escrow encryption schemes2018-07-04Paper
Sliding encryption: a cryptographic tool for mobile agents2018-05-09Paper
Monkey: black-box symmetric ciphers designed for MON\textit{opolizing} KEY\textit{s}2018-05-09Paper
End-to-end design of a PUF-based privacy preserving authentication protocol2018-02-14Paper
Functional commitment schemes: from polynomial commitments to pairing-based accumulators from simple assumptions2017-12-19Paper
Brief announcement: Secure self-stabilizing computation2017-10-11Paper
Time-optimal message-efficient work performance in the presence of faults2017-09-29Paper
Coins, weights and contention in balancing networks2017-09-29Paper
Brief announcement: Proactive secret sharing with a dishonest majority2017-09-29Paper
Resource-based corruptions and the combinatorics of hidden diversity2017-05-16Paper
Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and The Multi-Player Mental Poker Game (extended abstract)2017-04-10Paper
Cliptography: clipping the power of kleptographic attacks2017-01-06Paper
Proactive Secret Sharing with a Dishonest Majority2016-10-21Paper
On the implausibility of constant-round public-coin zero-knowledge proofs2016-10-21Paper
How to share a function securely2016-09-01Paper
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares2016-08-31Paper
Compactly hiding linear spans. Tightly secure constant-size simulation-sound QA-NIZK proofs and applications2016-06-10Paper
Cryptography as an attack technology: proving the RSA/factoring kleptographic attack2016-05-02Paper
Towards a Unified Security Model for Physically Unclonable Functions2016-04-08Paper
Concurrent knowledge extraction in public-key models2016-04-07Paper
Efficient and secure authenticated key exchange using weak passwords2015-12-07Paper
Proving without knowing: on oblivious, agnostic and blindfolded provers2015-11-11Paper
The dark side of ``black-box cryptography or: should we trust Capstone?2015-11-11Paper
Scalable public-key tracing and revoking2015-09-04Paper
Born and raised distributively2015-09-03Paper
A little honesty goes a long way. The two-tier model for secure multiparty computation2015-07-06Paper
How to withstand mobile virus attacks (extended abstract)2015-06-19Paper
Connectivity properties in random regular graphs with edge faults2015-04-29Paper
Order-Preserving Encryption Secure Beyond One-Wayness2015-01-06Paper
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption2014-10-14Paper
Complete characterization of security notions for probabilistic private-key encryption2014-09-26Paper
On zero-knowledge proofs (extended abstract)2014-09-26Paper
Multi-authority secret-ballot elections with linear work2014-08-20Paper
Sequential aggregate signatures made shorter2014-01-24Paper
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency2013-12-10Paper
Linearly Homomorphic Structure-Preserving Signatures and Their Applications2013-09-17Paper
Strictly-black-box zero-knowledge and efficient validation of financial transactions2013-08-12Paper
Scalable public-key tracing and revoking2013-06-07Paper
Adaptively secure non-interactive threshold cryptosystems2013-06-06Paper
Adaptively secure forward-secure non-interactive threshold cryptosystems2013-01-07Paper
Efficient robust private set intersection2012-11-16Paper
Group signatures with almost-for-free revocation2012-09-25Paper
On the centrality of off-line e-cash to concrete partial information games2012-09-25Paper
Multi-location leakage resilient cryptography2012-07-20Paper
Scalable group signatures with revocation2012-06-29Paper
Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions2012-06-15Paper
Fully forward-secure group signatures2012-06-08Paper
Leakage resilient strong key-insulated signatures in public channel2011-12-07Paper
Resettable cryptography in constant rounds -- the case of zero knowledge2011-12-02Paper
Adaptively secure non-interactive threshold cryptosystems2011-07-07Paper
On the Security of Hash Functions Employing Blockcipher Postprocessing2011-07-07Paper
Efficient circuit-size independent public key encryption with KDM security2011-05-27Paper
Signatures resilient to continual leakage on memory and computation2011-05-19Paper
The dark side of threshold cryptography2011-04-20Paper
Breaking and repairing asymmetric public-key traitor tracing2011-03-18Paper
Efficient traceable signatures in the standard model2011-03-14Paper
Leakage-resilient RFID authentication with forward-privacy2011-01-14Paper
A new framework for RFID privacy2010-09-20Paper
Kleptography from standard assumptions and applications2010-09-10Paper
Concurrent knowledge extraction in the public-key model2010-09-07Paper
Efficient completely non-malleable public key encryption2010-09-07Paper
The vector-ballot approach for online voting procedures2010-06-17Paper
Cryptography between wonderland and underland2010-06-01Paper
Retrofitting fairness on the original RSA-based e-cash2010-03-31Paper
Non-interactive zero-sharing with applications to private distributed decision making2010-03-31Paper
Concise mercurial vector commitments and independent zero-knowledge sets with short proofs2010-02-24Paper
Group encryption: non-interactive realization in the standard model2009-12-15Paper
Secure multi-party computation minimizing online rounds2009-12-15Paper
On Monotone Formula Composition of Perfect Zero-Knowledge Languages2009-08-20Paper
Efficient Traceable Signatures in the Standard Model2009-08-18Paper
Secure Function Collection with Sublinear Storage2009-07-14Paper
Public Key Cryptography – PKC 20042009-05-14Paper
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks2009-05-12Paper
A New Randomness Extraction Paradigm for Hybrid Encryption2009-05-12Paper
On the Portability of Generalized Schnorr Proofs2009-05-12Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Key Evolution Systems in Untrusted Update Environments2009-04-29Paper
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs2009-04-29Paper
Preimage Attack on the Parallel FFT-Hashing Function2009-03-06Paper
Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes2009-02-24Paper
Fair Traceable Multi-Group Signatures2009-02-12Paper
A Timing-Resistant Elliptic Curve Backdoor in RSA2009-02-10Paper
Efficient Intrusion-Resilient Signatures Without Random Oracles2009-01-15Paper
Privacy Preserving Data Mining within Anonymous Credential Systems2008-11-20Paper
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination2008-09-09Paper
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers2008-07-08Paper
The Security of Elastic Block Ciphers Against Key-Recovery Attacks2008-06-24Paper
Group Encryption2008-05-15Paper
Two-Party Computing with Encrypted Data2008-05-15Paper
Group Signatures with Efficient Concurrent Join2008-05-06Paper
Eavesdropping games2008-05-05Paper
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding2008-04-24Paper
Secret Swarm Unit Reactive k −Secret Sharing2008-04-11Paper
K-Anonymous Multi-party Secret Handshakes2008-03-07Paper
Recovering NTRU Secret Key from Inversion Oracles2008-03-05Paper
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
A Space Efficient Backdoor in RSA and Its Applications2007-11-15Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice2007-09-20Paper
Parallel Key-Insulated Public Key Encryption Without Random Oracles2007-09-04Paper
Decoding interleaved Reed-Solomon codes over noisy channels2007-07-16Paper
Scalable protocols for authenticated group key exchange2007-05-24Paper
https://portal.mardi4nfdi.de/entity/Q34339102007-04-23Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2007-02-12Paper
Information Security and Cryptology2006-11-14Paper
Information Security2006-10-20Paper
Selected Areas in Cryptography2006-10-10Paper
Security in Communication Networks2006-10-10Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Characterization of security notions for probabilistic private-key encryption2006-08-14Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Secure Hypergraphs: Privacy from Partial Broadcast2005-09-16Paper
Information Security and Privacy2005-09-07Paper
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice2005-08-12Paper
Financial Cryptography2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q48188702004-09-24Paper
https://portal.mardi4nfdi.de/entity/Q48175242004-09-24Paper
https://portal.mardi4nfdi.de/entity/Q47395212004-08-12Paper
Incremental Unforgeable Encryption2004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47372362004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372632004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47389362004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47371602004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439332004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q47364272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44720612004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44525852004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44525762004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44483922004-02-18Paper
https://portal.mardi4nfdi.de/entity/Q44507572004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44491672004-02-08Paper
https://portal.mardi4nfdi.de/entity/Q44349032003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44185242003-08-10Paper
Strong Key-Insulated Signature Schemes2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44142662003-07-24Paper
Threshold Cryptosystems Based on Factoring2003-07-16Paper
Crypto-integrity2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q47977972003-03-09Paper
https://portal.mardi4nfdi.de/entity/Q45362722003-03-07Paper
Adaptively secure distributed public-key systems.2003-01-21Paper
https://portal.mardi4nfdi.de/entity/Q47837202002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45362872002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q45362922002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q27245992002-10-21Paper
https://portal.mardi4nfdi.de/entity/Q31496752002-09-30Paper
Self-Stabilizing Symmetry Breaking in Constant Space2002-09-29Paper
https://portal.mardi4nfdi.de/entity/Q45425902002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q27244392002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q44960642002-07-10Paper
https://portal.mardi4nfdi.de/entity/Q45361982002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q45350742002-06-12Paper
https://portal.mardi4nfdi.de/entity/Q49412012002-04-21Paper
https://portal.mardi4nfdi.de/entity/Q27074072002-03-06Paper
https://portal.mardi4nfdi.de/entity/Q27629102002-01-13Paper
https://portal.mardi4nfdi.de/entity/Q27246022001-07-12Paper
Perfect zero-knowledge arguments for NP using any one-way permutation2001-05-20Paper
Robust parallel computations through randomization2001-04-17Paper
https://portal.mardi4nfdi.de/entity/Q49387692001-01-29Paper
https://portal.mardi4nfdi.de/entity/Q45024972000-09-12Paper
https://portal.mardi4nfdi.de/entity/Q49500532000-08-28Paper
https://portal.mardi4nfdi.de/entity/Q49418062000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q42492712000-06-29Paper
https://portal.mardi4nfdi.de/entity/Q49500512000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q49500542000-05-07Paper
Combined asynchronous/synchronous packet switching architecture: QoS guarantees for integrated parallel computing and real-time traffic2000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q42527582000-04-26Paper
https://portal.mardi4nfdi.de/entity/Q42634442000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q42634422000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q49347112000-01-31Paper
Auto-recoverable auto-certifiable cryptosystems1999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q43186941999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q42340491999-07-22Paper
https://portal.mardi4nfdi.de/entity/Q42285051999-05-18Paper
Perfectly secure key distribution for dynamic conferences1999-03-30Paper
https://portal.mardi4nfdi.de/entity/Q43813991999-01-10Paper
https://portal.mardi4nfdi.de/entity/Q38400801998-12-14Paper
Scheduling task-trees with additive scales on parallel/distributed machines1998-07-22Paper
The local detection paradigm and its applications to self-stabilization1998-06-30Paper
https://portal.mardi4nfdi.de/entity/Q43736081998-06-11Paper
https://portal.mardi4nfdi.de/entity/Q43645411998-02-10Paper
https://portal.mardi4nfdi.de/entity/Q38400861998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38400731998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38401711998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43434421997-12-01Paper
https://portal.mardi4nfdi.de/entity/Q43657291997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43645691997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43645571997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43434461997-07-06Paper
https://portal.mardi4nfdi.de/entity/Q43434371997-07-06Paper
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation1997-05-19Paper
Efficient On-Line Call Control Algorithms1997-04-27Paper
https://portal.mardi4nfdi.de/entity/Q48752311996-10-07Paper
https://portal.mardi4nfdi.de/entity/Q48584561996-05-27Paper
https://portal.mardi4nfdi.de/entity/Q48584571996-05-21Paper
https://portal.mardi4nfdi.de/entity/Q43187141995-08-08Paper
https://portal.mardi4nfdi.de/entity/Q43187161995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q42795661994-09-20Paper
https://portal.mardi4nfdi.de/entity/Q42873621994-04-12Paper
https://portal.mardi4nfdi.de/entity/Q42795731994-03-07Paper
Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems1994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q31388711994-01-02Paper
https://portal.mardi4nfdi.de/entity/Q31389501993-10-20Paper
Weaknesses of Undeniable Signature Schemes1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40368971993-05-18Paper
Perfectly secure message transmission1993-05-16Paper
Maintenance of a minimum spanning forest in a dynamic plane graph1992-06-28Paper
Constant-round perfect zero-knowledge computationally convincing protocols1991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101441991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q57519361991-01-01Paper
The power of multimedia: Combining point-to-point and multi-access networks1990-01-01Paper
Fast algorithms for edge-coloring planar graphs1989-01-01Paper
Minimum-Knowledge Interactive Proofs for Decision Problems1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38068311988-01-01Paper
Partitioned encryption and achieving simultaneity by partitioning1987-01-01Paper
Distributed algorithms in synchronous broadcasting networks1987-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37534601985-01-01Paper

Research outcomes over time

This page was built for person: Moti Yung