Scott Yilek

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Targeted invertible pseudorandom functions and deterministic format-transforming encryption
Topics in Cryptology – CT-RSA 2023
2023-10-04Paper
New algorithms and analyses for sum-preserving encryption
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Targeted ciphers for format-preserving encryption2019-02-20Paper
Cycle slicer: an algorithm for building permutations on special domains2018-02-23Paper
Reverse cycle walking and its applications
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
The mix-and-cut shuffle: small-domain encryption secure against \(N\) queries
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Standard security does not imply security against selective-opening
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Identity-based encryption secure against selective opening attack
Theory of Cryptography
2011-05-19Paper
Chosen-ciphertext security from slightly lossy trapdoor functions
Public Key Cryptography – PKC 2010
2010-05-28Paper
Resettable public-key encryption: how to encrypt on a virtual machine
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Hedged public-key encryption: how to protect against bad randomness
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization
Theory of Cryptography
2008-03-05Paper
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper


Research outcomes over time


This page was built for person: Scott Yilek