The following pages link to Mordechai M. Yung (Q1088397):
Displaying 50 items.
- (Q271590) (redirect page) (← links)
- Concurrent knowledge extraction in public-key models (Q271592) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- The power of multimedia: Combining point-to-point and multi-access networks (Q582899) (← links)
- Efficient traceable signatures in the standard model (Q631785) (← links)
- Constant-round perfect zero-knowledge computationally convincing protocols (Q808240) (← links)
- Scalable protocols for authenticated group key exchange (Q882775) (← links)
- Distributed algorithms in synchronous broadcasting networks (Q1088398) (← links)
- Partitioned encryption and achieving simultaneity by partitioning (Q1099131) (← links)
- Perfect zero-knowledge arguments for NP using any one-way permutation (Q1126890) (← links)
- Perfectly secure key distribution for dynamic conferences (Q1273875) (← links)
- The local detection paradigm and its applications to self-stabilization (Q1389769) (← links)
- Scheduling task-trees with additive scales on parallel/distributed machines (Q1391320) (← links)
- Hard invalidation of electronic signatures (Q1631937) (← links)
- End-to-end design of a PUF-based privacy preserving authentication protocol (Q1695912) (← links)
- Efficient robust private set intersection (Q1758883) (← links)
- Correcting subverted random oracles (Q1784091) (← links)
- Proactive secure multiparty computation with a dishonest majority (Q1796790) (← links)
- Semantically secure anonymity: foundations of re-encryption (Q1796795) (← links)
- Adaptively secure distributed public-key systems. (Q1853497) (← links)
- Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation (Q1924194) (← links)
- Adaptively secure non-interactive threshold cryptosystems (Q1951560) (← links)
- Combined asynchronous/synchronous packet switching architecture: QoS guarantees for integrated parallel computing and real-time traffic (Q1974674) (← links)
- Two-sided malicious security for private intersection-sum with cardinality (Q2102051) (← links)
- Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups (Q2106634) (← links)
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved (Q2139637) (← links)
- Anamorphic encryption: private communication against a dictator (Q2170036) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes (Q2229392) (← links)
- Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog (Q2289210) (← links)
- The combinatorics of hidden diversity (Q2297852) (← links)
- Decoding interleaved Reed-Solomon codes over noisy channels (Q2373723) (← links)
- Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice (Q2384012) (← links)
- Characterization of security notions for probabilistic private-key encryption (Q2499267) (← links)
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption (Q2692378) (← links)
- (Q2707407) (← links)
- (Q2724439) (← links)
- (Q2724599) (← links)
- (Q2724602) (← links)
- (Q2762910) (← links)
- Towards a Unified Security Model for Physically Unclonable Functions (Q2799019) (← links)
- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack (Q2803633) (← links)
- How to share a function securely (Q2817644) (← links)
- On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs (Q2827722) (← links)
- Proactive Secret Sharing with a Dishonest Majority (Q2827737) (← links)
- Multi-Authority Secret-Ballot Elections with Linear Work (Q2876888) (← links)
- Fully Forward-Secure Group Signatures (Q2889761) (← links)
- Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions (Q2891477) (← links)
- Multi-location Leakage Resilient Cryptography (Q2900239) (← links)
- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games (Q2912801) (← links)