dblp.uni-trier.dewww.uni-trier.de

Moti Yung

Mordechai M. Yung

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
312EEKyo-Il Chung, Kiwook Sohn, Moti Yung: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers Springer 2009
311EEMoti Yung, Peng Liu, Dongdai Lin: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers Springer 2009
310EEJung Yeon Hwang, Dong Hoon Lee, Moti Yung: Universal forgery of the identity-based sequential aggregate signature scheme. ASIACCS 2009: 157-160
309EEJan Camenisch, Aggelos Kiayias, Moti Yung: On the Portability of Generalized Schnorr Proofs. EUROCRYPT 2009: 425-442
308EEFrançois-Xavier Standaert, Tal Malkin, Moti Yung: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. EUROCRYPT 2009: 443-461
307EEEike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung: A New Randomness Extraction Paradigm for Hybrid Encryption. EUROCRYPT 2009: 590-609
2008
306 Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ACNS 2008
305 Sehun Kim, Moti Yung, Hyung-Woo Lee: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers Springer 2008
304 Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers Springer 2008
303EEDebra L. Cook, Moti Yung, Angelos D. Keromytis: Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. ACISP 2008: 187-202
302EEChristophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung: A block cipher based pseudo random number generator secure against side-channel key recovery. ASIACCS 2008: 56-65
301EEAggelos Kiayias, Moti Yung: Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. Digital Rights Management Workshop 2008: 9-18
300EEVicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung: Fair Traceable Multi-Group Signatures. Financial Cryptography 2008: 231-246
299EEJon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung: Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). Financial Cryptography 2008: 307-313
298EEFrançois-Xavier Standaert, Tal Malkin, Moti Yung: Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk). ICITS 2008: 70
297EEBenoît Libert, Jean-Jacques Quisquater, Moti Yung: Key Evolution Systems in Untrusted Update Environments. Inscrypt 2008: 12-21
296EEDebra L. Cook, Moti Yung, Angelos D. Keromytis: Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. Inscrypt 2008: 157-180
295EEYongjin Yeom, Yongkuk Cho, Moti Yung: High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units. MUE 2008: 271-275
294EEPetros Mol, Moti Yung: Recovering NTRU Secret Key from Inversion Oracles. Public Key Cryptography 2008: 18-36
293EEAggelos Kiayias, Shouhuai Xu, Moti Yung: Privacy Preserving Data Mining within Anonymous Credential Systems. SCN 2008: 57-76
292EEAggelos Kiayias, Moti Yung: Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. IEEE Transactions on Information Theory 54(6): 2752-2769 (2008)
291EEAlfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, Moti Yung: On Monotone Formula Composition of Perfect Zero-Knowledge Languages. SIAM J. Comput. 38(4): 1300-1329 (2008)
2007
290 Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007
289 Moti Yung, Aggelos Kiayias, Ahmad-Reza Sadeghi: Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007 ACM 2007
288 Jae-Kwang Lee, Okyeon Yi, Moti Yung: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers Springer 2007
287 Jonathan Katz, Moti Yung: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings Springer 2007
286 K. Srinathan, C. Pandu Rangan, Moti Yung: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings Springer 2007
285EEDonghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee: Preimage Attack on the Parallel FFT-Hashing Function. ACISP 2007: 59-67
284EEBenoît Libert, Jean-Jacques Quisquater, Moti Yung: Forward-secure signatures in untrusted update environments: efficient and generic constructions. ACM Conference on Computer and Communications Security 2007: 266-275
283EEDebra L. Cook, Angelos D. Keromytis, Moti Yung: Elastic block ciphers: the basic design. ASIACCS 2007: 350-352
282EEAggelos Kiayias, Yiannis Tsiounis, Moti Yung: Group Encryption. ASIACRYPT 2007: 181-199
281EESeung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung: Two-Party Computing with Encrypted Data. ASIACRYPT 2007: 298-314
280EEVicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung: Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. CANS 2007: 265-281
279EEMoti Yung, Yunlei Zhao: Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model. EUROCRYPT 2007: 129-147
278EEShouhuai Xu, Moti Yung: K-Anonymous Multi-party Secret Handshakes. Financial Cryptography 2007: 72-87
277EEShlomi Dolev, Limor Lahiani, Moti Yung: Secret Swarm UnitReactive k-Secret Sharing. INDOCRYPT 2007: 123-137
276EEDebra L. Cook, Moti Yung, Angelos D. Keromytis: The Security of Elastic Block Ciphers Against Key-Recovery Attacks. ISC 2007: 89-103
275EEAdam Young, Moti Yung: Space-Efficient Kleptography Without Random Oracles. Information Hiding 2007: 112-129
274EEAdam L. Young, Moti Yung: A Timing-Resistant Elliptic Curve Backdoor in RSA. Inscrypt 2007: 427-441
273EEMoti Yung: On the Evolution of User Authentication: Non-bilateral Factors. Inscrypt 2007: 5-10
272EEBenoît Libert, Jean-Jacques Quisquater, Moti Yung: Parallel Key-Insulated Public Key Encryption Without Random Oracles. Public Key Cryptography 2007: 298-314
271EEAggelos Kiayias, Moti Yung: Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. Des. Codes Cryptography 43(2-3): 61-78 (2007)
270EEMoti Yung, Yunlei Zhao: Concurrent Knowledge-Extraction in the Public-Key Model. Electronic Colloquium on Computational Complexity (ECCC) 14(002): (2007)
269EEJonathan Katz, Moti Yung: Scalable Protocols for Authenticated Group Key Exchange. J. Cryptology 20(1): 85-113 (2007)
268EEDaniel Bleichenbacher, Aggelos Kiayias, Moti Yung: Decoding interleaved Reed-Solomon codes over noisy channels. Theor. Comput. Sci. 379(3): 348-360 (2007)
2006
267 Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006
266 Moti Yung, Kaoru Kurosawa, Reihaneh Safavi-Naini: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006 ACM 2006
265 Jianying Zhou, Moti Yung, Feng Bao: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings ACNS 2006
264 JooSeok Song, Taekyoung Kwon, Moti Yung: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers Springer 2006
263 Reihaneh Safavi-Naini, Moti Yung: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers Springer 2006
262 Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings Springer 2006
261 Roberto De Prisco, Moti Yung: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings Springer 2006
260 Helger Lipmaa, Moti Yung, Dongdai Lin: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings Springer 2006
259EEJohn G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung: Fourth-factor authentication: somebody you know. ACM Conference on Computer and Communications Security 2006: 168-178
258EEDonghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung: Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. ASIACRYPT 2006: 283-298
257EETal Malkin, François-Xavier Standaert, Moti Yung: A Comparative Cost/Security Analysis of Fault Attack Countermeasures. FDTC 2006: 159-172
256EEAggelos Kiayias, Moti Yung: Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. Financial Cryptography 2006: 311-325
255EESeung Geol Choi, Kunsoo Park, Moti Yung: Short Traceable Signatures Based on Bilinear Pairings. IWSEC 2006: 88-103
254EEAdam Young, Moti Yung: Hiding Information Hiding. Information Hiding 2006: 161-171
253EEAdam Young, Moti Yung: An Elliptic Curve Backdoor Algorithm for RSASSA. Information Hiding 2006: 355-374
252EEBenoît Libert, Jean-Jacques Quisquater, Moti Yung: Efficient Intrusion-Resilient Signatures Without Random Oracles. Inscrypt 2006: 27-41
251EEMoti Yung, Yunlei Zhao: Interactive Zero-Knowledge with Restricted Random Oracles. TCC 2006: 21-40
250EEYevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung: Threshold and Proactive Pseudo-Random Permutations. TCC 2006: 542-560
249EEAdam L. Young, Moti Yung: On Fundamental Limitations of Proving Data Theft. IEEE Transactions on Information Forensics and Security 1(4): 524-531 (2006)
248EEAggelos Kiayias, Moti Yung: Secure scalable group signature with dynamic joins and separable authorities. IJSN 1(1/2): 24-45 (2006)
247EEJonathan Katz, Moti Yung: Characterization of Security Notions for Probabilistic Private-Key Encryption. J. Cryptology 19(1): 67-95 (2006)
2005
246 Reihaneh Safavi-Naini, Moti Yung: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005 ACM 2005
245 John Ioannidis, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings ACNS 2005
244 Andrew S. Patrick, Moti Yung: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers Springer 2005
243 Luís Caires, Giuseppe F. Italiano, Luís Monteiro, Catuscia Palamidessi, Moti Yung: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings Springer 2005
242 Dengguo Feng, Dongdai Lin, Moti Yung: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Springer 2005
241EECheol-Min Park, Myung-Hwan Kim, Moti Yung: A Remark on Implementing the Weil Pairing. CISC 2005: 313-323
240EEAdam Young, Moti Yung: Malicious Cryptography: Kleptographic Aspects. CT-RSA 2005: 7-18
239EEAggelos Kiayias, Moti Yung: Group Signatures with Efficient Concurrent Join. EUROCRYPT 2005: 198-214
238EEElisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung: "Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience. ISC 2005: 44-58
237EEAggelos Kiayias, Moti Yung: Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. Mycrypt 2005: 151-170
236EEAdam Young, Moti Yung: Questionable Encryption and Its Applications. Mycrypt 2005: 210-221
235EEAdam Young, Moti Yung: A Space Efficient Backdoor in RSA and Its Applications. Selected Areas in Cryptography 2005: 128-143
234EEYevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable public-key tracing and revoking. Distributed Computing 17(4): 323-347 (2005)
233EEMoti Yung, Yunlei Zhao: Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model Electronic Colloquium on Computational Complexity (ECCC)(048): (2005)
2004
232 Aggelos Kiayias, Moti Yung: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004 ACM 2004
231 Kijoon Chae, Moti Yung: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers Springer 2004
230 Markus Jakobsson, Moti Yung, Jianying Zhou: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings Springer 2004
229 Chae Hoon Lim, Moti Yung: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Springer 2004
228EELuke McAven, Reihaneh Safavi-Naini, Moti Yung: Unconditionally Secure Encryption Under Strong Attacks. ACISP 2004: 427-439
227EEShouhuai Xu, Moti Yung: k-anonymous secret handshakes with reusable credentials. ACM Conference on Computer and Communications Security 2004: 158-167
226EETheodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung: The dual receiver cryptosystem and its applications. ACM Conference on Computer and Communications Security 2004: 330-343
225EEAggelos Kiayias, Moti Yung: Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. ASIACRYPT 2004: 401-416
224 Shouhuai Xu, Moti Yung: Accountable Ring Signatures: A Smart Card Approach. CARDIS 2004: 271-286
223EEAdam Young, Moti Yung: A Key Recovery System as Secure as Factoring. CT-RSA 2004: 129-142
222EEYevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: A Generic Construction for Intrusion-Resilient Public-Key Encryption. CT-RSA 2004: 81-98
221EETal Malkin, Satoshi Obana, Moti Yung: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. EUROCRYPT 2004: 306-322
220EEAggelos Kiayias, Yiannis Tsiounis, Moti Yung: Traceable Signatures. EUROCRYPT 2004: 571-589
219EEElisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung: Electronic National Lotteries. Financial Cryptography 2004: 147-163
218EEAggelos Kiayias, Moti Yung: The Vector-Ballot e-Voting Approach. Financial Cryptography 2004: 72-89
217EELuke McAven, Reihaneh Safavi-Naini, Moti Yung: Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. INDOCRYPT 2004: 148-161
216EEReihaneh Safavi-Naini, Luke McAven, Moti Yung: General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". Public Key Cryptography 2004: 231-247
215EEAdam Young, Moti Yung: Relationships Between Diffie-Hellman and "Index Oracles". SCN 2004: 16-32
214EEAdam Young, Moti Yung: A Subliminal Channel in Secret Block Ciphers. Selected Areas in Cryptography 2004: 198-211
213EEPoorvi L. Vora, Ben Adida, Ren Bucholz, David Chaum, David L. Dill, David Jefferson, Douglas W. Jones, William Lattin, Aviel D. Rubin, Michael I. Shamos, Moti Yung: Evaluation of voting systems. Commun. ACM 47(11): 144 (2004)
212EEMatthew K. Franklin, Moti Yung: Secure Hypergraphs: Privacy from Partial Broadcast. SIAM J. Discrete Math. 18(3): 437-450 (2004)
2003
211 Moti Yung: Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003 ACM 2003
210 Jianying Zhou, Moti Yung, Yongfei Han: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings Springer 2003
209EEAdam Young, Moti Yung: Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. ACISP 2003: 297-311
208EEJonathan Katz, Moti Yung: Scalable Protocols for Authenticated Group Key Exchange. CRYPTO 2003: 110-125
207EEYevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: Intrusion-Resilient Public-Key Encryption. CT-RSA 2003: 19-32
206EEMario Baldi, Yoram Ofek, Moti Yung: Idiosyncratic Signatures for Authenticated Execution of Management Code. DSOM 2003: 204-206
205EEAggelos Kiayias, Moti Yung: Extracting Group Signatures from Traitor Tracing Schemes. EUROCRYPT 2003: 630-648
204EEMoti Yung: Trusted Computing Platforms: The Good, the Bad, and the Ugly. Financial Cryptography 2003: 250-254
203EEAggelos Kiayias, Moti Yung: Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. Financial Cryptography 2003: 303-320
202EEShouhuai Xu, Moti Yung: Retrofitting Fairness on the Original RSA-Based E-cash. Financial Cryptography 2003: 51-68
201 Mario Baldi, Yoram Ofek, Moti Yung: The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution. IAW 2003: 288-291
200EEDaniel Bleichenbacher, Aggelos Kiayias, Moti Yung: Decoding of Interleaved Reed Solomon Codes over Noisy Data. ICALP 2003: 97-108
199EEYevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable public-key tracing and revoking. PODC 2003: 190-199
198EEYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Strong Key-Insulated Signature Schemes. Public Key Cryptography 2003: 130-144
2002
197 Moti Yung: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings Springer 2002
196EEHyun-Jeong Kim, Dong Hoon Lee, Moti Yung: Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. ACISP 2002: 482-496
195EEJonathan Katz, Moti Yung: Threshold Cryptosystems Based on Factoring. ASIACRYPT 2002: 192-205
194EEMoti Yung: Crypto-integrity. ASIACRYPT 2002: 567-573
193EEMarc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung: Observability Analysis - Detecting When Improved Cryptosystems Fail. CT-RSA 2002: 17-29
192EEAggelos Kiayias, Moti Yung: Breaking and Repairing Asymmetric Public-Key Traitor Tracing. Digital Rights Management Workshop 2002: 32-50
191EEAggelos Kiayias, Moti Yung: Traitor Tracing with Constant Transmission Rate. EUROCRYPT 2002: 450-465
190EEYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82
189EEShouhuai Xu, Moti Yung: The Dark Side of Threshold Cryptography. Financial Cryptography 2002: 198-219
188EEDaniel E. Geer Jr., Moti Yung: Split-and-Delegate: Threshold Cryptography for the Masses. Financial Cryptography 2002: 220-237
187EEAggelos Kiayias, Moti Yung: Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes. ICALP 2002: 232-243
186EEYevgeniy Dodis, Moti Yung: Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. IEEE Security in Storage Workshop 2002: 45-52
185EEAggelos Kiayias, Moti Yung: Self-tallying Elections and Perfect Ballot Secrecy. Public Key Cryptography 2002: 141-158
184EEJonathan Katz, Rafail Ostrovsky, Moti Yung: Forward Secrecy in Password-Only Key Exchange Protocols. SCN 2002: 29-44
183EEAggelos Kiayias, Moti Yung: Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications Electronic Colloquium on Computational Complexity (ECCC)(017): (2002)
182EEAlain J. Mayer, Rafail Ostrovsky, Yoram Ofek, Moti Yung: Self-Stabilizing Symmetry Breaking in Constant Space. SIAM J. Comput. 31(5): 1571-1595 (2002)
181 Yair Frankel, Philip D. MacKenzie, Moti Yung: Adaptively secure distributed public-key systems. Theor. Comput. Sci. 287(2): 535-561 (2002)
2001
180EEAdam Young, Moti Yung: Bandwidth-Optimal Kleptographic Attacks. CHES 2001: 235-250
179EEAggelos Kiayias, Moti Yung: Self Protecting Pirates and Black-Box Traitor Tracing. CRYPTO 2001: 63-79
178EEMarc Joye, Jean-Jacques Quisquater, Moti Yung: On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. CT-RSA 2001: 208-222
177EEAggelos Kiayias, Moti Yung: On Crafty Pirates and Foxy Tracers. Digital Rights Management Workshop 2001: 22-39
176EEJonathan Katz, Rafail Ostrovsky, Moti Yung: Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. EUROCRYPT 2001: 475-494
175EEEnrico Buonanno, Jonathan Katz, Moti Yung: Incremental Unforgeable Encryption. FSE 2001: 109-124
174EEEd Gerck, C. Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, Moti Yung: The Business of Electronic Voting. Financial Cryptography 2001: 234-259
173EEAggelos Kiayias, Moti Yung: Secure Games with Polynomial Expressions. ICALP 2001: 939-950
172EEEnriquillo Valdez, Moti Yung: DISSECT: DIStribution for SECurity Tool. ISC 2001: 125-143
171EEYair Frankel, Philip D. MacKenzie, Moti Yung: Adaptive Security for the Additive-Sharing Based Proactive RSA. Public Key Cryptography 2001: 240-263
170EEAdam Young, Moti Yung: A PVSS as Hard as Discrete Log and Shareholder Separability. Public Key Cryptography 2001: 287-299
169EEAggelos Kiayias, Moti Yung: Polynomial Reconstruction Based Cryptography. Selected Areas in Cryptography 2001: 129-133
168EEDavid M'Raïhi, Moti Yung: E-commerce applications of smart cards. Computer Networks 36(4): 453-472 (2001)
2000
167EEJohan Håstad, Jakob Jonsson, Ari Juels, Moti Yung: Funkspiel schemes: an alternative to conventional tamper resistance. ACM Conference on Computer and Communications Security 2000: 125-133
166EEAdam Young, Moti Yung: Towards Signature-Only Signature Schemes. ASIACRYPT 2000: 97-115
165 Shouhuai Xu, Moti Yung, Gendu Zhang: Friendly Observers Ease Off-Line E-Cash. CARDIS 2000: 3-18
164EEJonathan Katz, Moti Yung: Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. FSE 2000: 284-299
163EEMoti Yung: Payment Systems: The Next Generation. Financial Cryptography 2000: 136-139
162EETomas Sander, Amnon Ta-Shma, Moti Yung: Blind, Auditable Membership Proofs. Financial Cryptography 2000: 53-71
161EEAdam Young, Moti Yung: Hash to the Rescue: Space Minimization for PKI Directories. ICISC 2000: 235-245
160 Ernest F. Brickell, David Pointcheval, Serge Vaudenay, Moti Yung: Design Validations for Discrete Logarithm Based Signature Schemes. Public Key Cryptography 2000: 276-292
159 Yair Frankel, Philip D. MacKenzie, Moti Yung: "Psyeudorandom Intermixing": A Tool for Shared Cryptography. Public Key Cryptography 2000: 306-325
158 Adam Young, Moti Yung: RSA-Based Auto-recoverable Cryptosystems. Public Key Cryptography 2000: 326-341
157EEJonathan Katz, Moti Yung: Complete characterization of security notions for probabilistic private-key encryption. STOC 2000: 245-254
156EEGiovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: On zero-knowledge proofs (extended abstract): ``from membership to decision''. STOC 2000: 255-264
155EEAlain J. Mayer, Yoram Ofek, Moti Yung: Local and congestion-driven fairness algorithm in arbitrary topology networks. IEEE/ACM Trans. Netw. 8(3): 362-372 (2000)
154 Sotiris E. Nikoletseas, Krishna V. Palem, Paul G. Spirakis, Moti Yung: Connectivity Properties in Random Regular Graphs with Edge Faults. Int. J. Found. Comput. Sci. 11(2): 247-262 (2000)
153EEMatthew K. Franklin, Zvi Galil, Moti Yung: Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. J. ACM 47(2): 225-243 (2000)
152 Yoram Ofek, Moti Yung: Combined Asynchronous/Synchronous Packet Switching Architecture: QoS Guarantees for Integrated Parallel Computing and Real-Time Traffic. J. Parallel Distrib. Comput. 60(3): 275-295 (2000)
151EESpyros C. Kontogiannis, Grammati E. Pantziou, Paul G. Spirakis, Moti Yung: Robust Parallel Computations through Randomization. Theory Comput. Syst. 33(5/6): 427-464 (2000)
1999
150EEAlain J. Mayer, Moti Yung: Secure Protocol Transformation via "Expansion": From Two-Party to Groups. ACM Conference on Computer and Communications Security 1999: 83-92
149 Yair Frankel, Philip D. MacKenzie, Moti Yung: Adaptively-Secure Optimal-Resilience Proactive RSA. ASIACRYPT 1999: 180-194
148EEAdam Young, Moti Yung: Auto-recoverable Auto-certifiable Cryptosystems (A Survey). CQRE 1999: 204-218
147EEMarkus Jakobsson, David M'Raïhi, Yiannis Tsiounis, Moti Yung: Electronic Payments: Where Do We Go from Here?. CQRE 1999: 43-63
146EEMatthew K. Franklin, Juan A. Garay, Moti Yung: Self-Testing/Correcting Protocols (Extended Abstract). DISC 1999: 269-283
145EEYair Frankel, Philip D. MacKenzie, Moti Yung: Adaptively-Secure Distributed Public-Key Systems. ESA 1999: 4-27
144EETomas Sander, Adam Young, Moti Yung: Non-Interactive CryptoComputing For NC1. FOCS 1999: 554-567
143EEMarkus Jakobsson, Julien P. Stern, Moti Yung: Scramble All, Encrypt Small. FSE 1999: 95-111
142EEYair Frankel, Moti Yung: Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". Financial Cryptography 1999: 241-252
141 Shingo Miyazaki, Kouichi Sakurai, Moti Yung: On Threshold RSA-Signing with no Dealer. ICISC 1999: 197-207
140 Pascal Paillier, Moti Yung: Self-Escrowed Public-Key Infrastructures. ICISC 1999: 257-268
139EEShouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu: Money Conservation via Atomicity in Fair Off-Line E-Cash. ISW 1999: 14-31
138 Enriquillo Valdez, Moti Yung: Software DisEngineering: Program Hiding Architecture and Experiments. Information Hiding 1999: 379-394
137EEHelena Handschuh, Yiannis Tsiounis, Moti Yung: Decision Oracles are Equivalent to Matching Oracles. Public Key Cryptography 1999: 276-289
136EEAdam Young, Moti Yung: Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. Public Key Cryptography 1999: 306-314
135EEBülent Yener, Yoram Ofek, Moti Yung: Convergence routing on disjoint spanning trees. Computer Networks 31(5): 429-443 (1999)
134EEYoram Ofek, Moti Yung: Access regulation mechanism for switch-based LAN. Computer Networks 31(5): 505-518 (1999)
1998
133EEAdam Young, Moti Yung: Finding Length-3 Positive Cunningham Chains. ANTS 1998: 289-298
132EEYair Frankel, Yiannis Tsiounis, Moti Yung: Fair Off-Line e-cash Made Easy. ASIACRYPT 1998: 257-270
131 Yair Frankel, Moti Yung: How to Say "YES" with Smart Cards. CARDIS 1998: 203-212
130EEAdam Young, Moti Yung: Auto-Recoverable Auto-Certifiable Cryptosystems. EUROCRYPT 1998: 17-31
129EEAdam Young, Moti Yung: Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. FSE 1998: 122-133
128EEMarkus Jakobsson, Moti Yung: On Assurance Structures for WWW Commerce. Financial Cryptography 1998: 141-157
127EEYair Frankel, David W. Kravitz, Charles T. Montgomery, Moti Yung: Beyond Identity: Warranty-Based Digital Signature Transactions. Financial Cryptography 1998: 241-253
126EEAlfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, Moti Yung: Image Density is Complete for Non-Interactive-SZK (Extended Abstract). ICALP 1998: 784-795
125EEGiovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it. ISAAC 1998: 59-68
124EEYair Frankel, Philip D. MacKenzie, Moti Yung: Robust Efficient Distributed RSA-Key Generation. PODC 1998: 320
123EEYair Frankel, Moti Yung: Distributed Public Key Cryptosystems. Public Key Cryptography 1998: 1-13
122EEYiannis Tsiounis, Moti Yung: On the Security of ElGamal Based Encryption. Public Key Cryptography 1998: 117-134
121EETatsuaki Okamoto, Moti Yung: Lower Bounds on Term-Based Divisible Cash Systems. Public Key Cryptography 1998: 72-82
120EESpyros C. Kontogiannis, Grammati E. Pantziou, Paul G. Spirakis, Moti Yung: ``Dynamic-Fault-Prone BSP'': A Paradigm for Robust Computations in Changing Environments. SPAA 1998: 37-46
119 Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols. STACS 1998: 511-521
118EEYair Frankel, Philip D. MacKenzie, Moti Yung: Robust Efficient Distributed RSA-Key Generation. STOC 1998: 663-672
117 Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly Secure Key Distribution for Dynamic Conferences. Inf. Comput. 146(1): 1-23 (1998)
116EEMoni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation. J. Cryptology 11(2): 87-108 (1998)
1997
115EEAmir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Public Key and Signature Systems. ACM Conference on Computer and Communications Security 1997: 100-110
114EEAdam Young, Moti Yung: The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. CRYPTO 1997: 264-276
113EEGiovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung: Keeping the SZK-Verifier Honest Unconditionally. CRYPTO 1997: 31-45
112EEYair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung: Proactive RSA. CRYPTO 1997: 440-454
111EEMihir Bellare, Markus Jakobsson, Moti Yung: Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function. EUROCRYPT 1997: 280-305
110EEMarkus Jakobsson, Moti Yung: Distributed "Magic Ink" Signatures. EUROCRYPT 1997: 450-464
109EEAdam Young, Moti Yung: Kleptography: Using Cryptography Against Cryptography. EUROCRYPT 1997: 62-74
108EEYair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung: Optimal Resilience Proactive Public-Key Cryptosystems. FOCS 1997: 384-393
107EEAdam Young, Moti Yung: Sliding Encryption: A Cryptographic Tool for Mobile Agents. FSE 1997: 230-241
106 George I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung: Anonymity Control in E-Cash Systems. Financial Cryptography 1997: 1-16
105 Markus Jakobsson, Moti Yung: Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System. Financial Cryptography 1997: 217-238
104 Yair Frankel, Moti Yung: On Characterization of Escrow Encryption Schemes. ICALP 1997: 705-715
103 Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Zero-knowledge proofs of decision power: new protocols and optimal round-complexity. ICICS 1997: 17-27
102EEAdam Young, Moti Yung: Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. IEEE Symposium on Security and Privacy 1997: 224-235
101 Philippe A. Janson, Gene Tsudik, Moti Yung: Scalability and Flexibility in Authentication Services: The KryptoKnight Approach. INFOCOM 1997: 725-736
100 Yoram Ofek, Bülent Yener, Moti Yung: Concurrent Asynchronous Broadcast on the MetaNet. IEEE Trans. Computers 46(7): 737-748 (1997)
99EEBülent Yener, Yoram Ofek, Moti Yung: Combinatorial design of congestion-free networks. IEEE/ACM Trans. Netw. 5(6): 989-1000 (1997)
98 Juan A. Garay, Inder S. Gopal, Shay Kutten, Yishay Mansour, Moti Yung: Efficient On-Line Call Control Algorithms. J. Algorithms 23(1): 180-194 (1997)
97 Bülent Yener, Inderpal S. Bhandari, Yoram Ofek, Moti Yung: Fault-Tolerant Convergence Routing. J. Parallel Distrib. Comput. 42(2): 173-183 (1997)
96EEXiangdong Yu, Moti Yung: Scheduling Task-Trees with Additive Scales on Parallel/Distributed Machines. Theor. Comput. Sci. 181(2): 357-378 (1997)
95EEYehuda Afek, Shay Kutten, Moti Yung: The Local Detection Paradigm and Its Application to Self-Stabilization. Theor. Comput. Sci. 186(1-2): 199-229 (1997)
1996
94EEMarkus Jakobsson, Moti Yung: Revokable and Versatile Electronic Money (extended abstract). ACM Conference on Computer and Communications Security 1996: 76-87
93 Yair Frankel, Yiannis Tsiounis, Moti Yung: "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. ASIACRYPT 1996: 286-300
92 Vasant Shanbhogue, Moti Yung: Distributed Computing in Asynchronous Networks with Byzantine Edges. COCOON 1996: 352-360
91EEMarkus Jakobsson, Moti Yung: Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers. CRYPTO 1996: 186-200
90EEAdam Young, Moti Yung: The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? CRYPTO 1996: 89-103
89EERonald Cramer, Matthew K. Franklin, Berry Schoenmakers, Moti Yung: Multi-Autority Secret-Ballot Elections with Linear Work. EUROCRYPT 1996: 72-83
88 Xiangdong Yu, Moti Yung: Agent Rendezvous: A Dynamic Symmetry-Breaking Problem. ICALP 1996: 610-621
87EEAdam Young, Moti Yung: Cryptovirology: Extortion-Based Security Threats and Countermeasures. IEEE Symposium on Security and Privacy 1996: 129-140
86 Chung-Sheng Li, Yoram Ofek, Moti Yung: "Time-Driven Priority" Flow Control for Real-Time Heterogeneous Internetworking. INFOCOM 1996: 189-197
85 Alain J. Mayer, Yoram Ofek, Moti Yung: Approximating Max-Min Fair Rates via Distributed Local Scheduling with Partial Information. INFOCOM 1996: 928-936
84 Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung: A Progress Report on Subliminal-Free Channels. Information Hiding 1996: 157-168
83 Yair Frankel, Peter Gemmell, Moti Yung: Witness-Based Cryptographic Program Checking and Applications (an Announcement). PODC 1996: 211
82 Alain J. Mayer, Rafail Ostrovsky, Moti Yung: Self-Stabilizing Algorithms for Synchronous Unidirectional Rings. SODA 1996: 564-573
81EEYair Frankel, Peter Gemmell, Moti Yung: Witness-Based Cryptographic Program Checking and Robust Function Sharing. STOC 1996: 499-508
80 Mihir Bellare, Moti Yung: Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation. J. Cryptology 9(3): 149-166 (1996)
1995
79 Xiangdong Yu, Moti Yung: Scheduling Task-Tree with Additive Scales on Parallel / Distributed Machines. COCOON 1995: 607-616
78EEYair Frankel, Moti Yung: Escrow Encryption Systems Visited: Attacks, Analysis and Designs. CRYPTO 1995: 222-235
77EEYair Frankel, Moti Yung: Cryptoanalysis of the Immunized LL Public Key Systems. CRYPTO 1995: 287-296
76EEAmir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339-352
75 Noga Alon, Zvi Galil, Moti Yung: Efficient Dynamic-Resharing "Verifiable Secret Sharing" Against Mobile Adversary. ESA 1995: 523-537
74 Zvi Galil, Alain J. Mayer, Moti Yung: Resolving Message Complexity of Byzantine Agreement and beyond. FOCS 1995: 724-733
73 Sotiris E. Nikoletseas, John H. Reif, Paul G. Spirakis, Moti Yung: Stocastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time. ICALP 1995: 159-170
72 Bülent Yener, Yoram Ofek, Moti Yung: Topological Design of Loss-Free Switch-Based LANs. INFOCOM 1995: 88-96
71 Alain J. Mayer, Yoram Ofek, Moti Yung: Local Fairness in General-Topology Networks with Convergence Routing. INFOCOM 1995: 891-899
70EEMatthew K. Franklin, Moti Yung: Secure hypergraphs: privacy from partial broadcast (Extended Abstract). STOC 1995: 36-44
69EERay Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: The KryptoKnight family of light-weight protocols for authentication and key distribution. IEEE/ACM Trans. Netw. 3(1): 31-41 (1995)
68EEYoram Ofek, Moti Yung: METANET principles of an arbitrary topology LAN. IEEE/ACM Trans. Netw. 3(2): 169-180 (1995)
1994
67 Giuseppe Parlati, Moti Yung: Non-Exploratory Self-Stabilization for Constant-Space Symmetry-Breaking. ESA 1994: 183-201
66EEMatthew K. Franklin, Moti Yung: The Blinding of Weak Signatures (Extended Abstract). EUROCRYPT 1994: 67-76
65 Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, Moti Yung: On Monotone Formula Closure of SZK FOCS 1994: 454-465
64 Sotiris E. Nikoletseas, Krishna V. Palem, Paul G. Spirakis, Moti Yung: Short Vertex Disjoint Paths and Multiconnectivity in Random Graphs: Reliable Network Computing. ICALP 1994: 508-519
63 Yoram Ofek, Moti Yung: The Integrated MetaNet Architecture: A Switch-Based Multimedia LAN for Parallel Computing and Real-Time Traffic. INFOCOM 1994: 802-811
62 Roberto De Prisco, Alain J. Mayer, Moti Yung: Time-Optimal Message-Efficient Work Performance in the Presence of Faults (Extended Summary). PODC 1994: 161-172
61 William Aiello, Ramarathnam Venkatesan, Moti Yung: Coins, Weights and Contention in Balancing Networks. PODC 1994: 193-205
60EEAlfredo De Santis, Yvo Desmedt, Yair Frankel, Moti Yung: How to share a function securely. STOC 1994: 522-533
59 Xiangdong Yu, Moti Yung: Space Lower-Bounds for Pseudorandom-Generators. Structure in Complexity Theory Conference 1994: 186-197
58 Moti Yung: Secure Distributed Computing: Theory and Practice. WDAG 1994: 53-73
57 Yoram Ofek, Moti Yung: Routing and Flow Control on the MetaNet: An Overview. Computer Networks and ISDN Systems 26(6-8): 859-872 (1994)
1993
56EERafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Interactive Hashing Simplifies Zero-Knowledge Protocol Design. EUROCRYPT 1993: 267-273
55 Matthew K. Franklin, Zvi Galil, Moti Yung: Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems FOCS 1993: 670-679
54 Matthew K. Franklin, Moti Yung: Secure and Efficient Off-Line Digital Money (Extended Abstract). ICALP 1993: 265-276
53 Juan A. Garay, Inder S. Gopal, Shay Kutten, Yishay Mansour, Moti Yung: Efficient On-Line Call Control Algorithms. ISTCS 1993: 285-293
52 Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of a Family of Attack-Resistant Authentication Protocols. IEEE Journal on Selected Areas in Communications 11(5): 679-693 (1993)
51EEDanny Dolev, Cynthia Dwork, Orli Waarts, Moti Yung: Perfectly Secure Message Transmission. J. ACM 40(1): 17-47 (1993)
50 David Eppstein, Giuseppe F. Italiano, Roberto Tamassia, Robert Endre Tarjan, Jeffery Westbrook, Moti Yung: Corrigendum: Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph. J. Algorithms 15(1): 173 (1993)
1992
49EEMoni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract). CRYPTO 1992: 196-214
48EEMihir Bellare, Moti Yung: Certifying Cryptographic Tools: The Case of Trapdoor Permutations. CRYPTO 1992: 442-460
47EECarlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. CRYPTO 1992: 471-486
46 Alfredo De Santis, Giuseppe Persiano, Moti Yung: One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier. ICALP 1992: 28-40
45 Yvo Desmedt, Yair Frankel, Moti Yung: Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback. INFOCOM 1992: 2045-2054
44 Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Secure Commitment Against A Powerful Adversary. STACS 1992: 439-448
43 Alain J. Mayer, Yoram Ofek, Rafail Ostrovsky, Moti Yung: Self-Stabilizing Symmetry Breaking in Constant-Space (Extended Abstract) STOC 1992: 667-678
42 Matthew K. Franklin, Moti Yung: Communication Complexity of Secure Computation (Extended Abstract) STOC 1992: 699-710
41EEOthar Hansson, Andrew Mayer, Moti Yung: Criticizing solutions to relaxed models yields powerful admissible heuristics. Inf. Sci. 63(3): 207-227 (1992)
40 David Eppstein, Giuseppe F. Italiano, Roberto Tamassia, Robert Endre Tarjan, Jeffery Westbrook, Moti Yung: Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph. J. Algorithms 13(1): 33-54 (1992)
1991
39EERay Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of Two-Party Authentication Protocols. CRYPTO 1991: 44-61
38EEYvo Desmedt, Moti Yung: Weakness of Undeniable Signature Schemes (Extended Abstract). EUROCRYPT 1991: 205-220
37 Yoram Ofek, Moti Yung: Lossless Asynchronous Broadcast-with-Feedback on the MetaNet Architecture. INFOCOM 1991: 1050-1063
36 Rafail Ostrovsky, Moti Yung: How to Withstand Mobile Virus Attacks (Extended Abstract). PODC 1991: 51-59
35 Marek Chrobak, David Eppstein, Giuseppe F. Italiano, Moti Yung: Efficient Sequential and Parallel Algorithms for Computing Recovery Points in Trees and Paths. SODA 1991: 158-167
34 Gilles Brassard, Claude Crépeau, Moti Yung: Constant-Round Perfect Zero-Knowledge Computationally Convincing Protocols. Theor. Comput. Sci. 84(1): 23-52 (1991)
1990
33EEYvo Desmedt, Moti Yung: Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract). CRYPTO 1990: 177-188
32EEAlfredo De Santis, Moti Yung: Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems. CRYPTO 1990: 366-377
31EEGilles Brassard, Moti Yung: One-Way Group Actions. CRYPTO 1990: 94-107
30EEAlfredo De Santis, Moti Yung: On the Design of Provably Secure Cryptographic Hash Functions. EUROCRYPT 1990: 412-431
29 Danny Dolev, Cynthia Dwork, Orli Waarts, Moti Yung: Perfectly Secure Message Transmission FOCS 1990: 36-45
28EEYoram Ofek, Moti Yung: Principle for High Speed Network Control: Congestion- and Deadlock-Freeness, Self-Routing, and a Single Buffer per Link. PODC 1990: 161-175
27 David Eppstein, Giuseppe F. Italiano, Roberto Tamassia, Robert Endre Tarjan, Jeffery Westbrook, Moti Yung: Maintenance of a Minimum Spanning Forest in a Dynamic Planar Graph. SODA 1990: 1-11
26 Moni Naor, Moti Yung: Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks STOC 1990: 427-437
25 Yehuda Afek, Shay Kutten, Moti Yung: Memory-Efficient Self Stabilizing Protocols for General Networks. WDAG 1990: 15-28
24 Yoram Ofek, Moti Yung: Efficient Mechanism for Fairness and Deadlock-Avoidance in High-Speed Networks. WDAG 1990: 192-212
23 Yehuda Afek, Gad M. Landau, Baruch Schieber, Moti Yung: The Power of Multimedia: Combining Point-to-Point and Multiaccess Networks Inf. Comput. 84(1): 97-118 (1990)
1989
22EEGilles Brassard, Claude Crépeau, Moti Yung: Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract). EUROCRYPT 1989: 192-195
21EEMoti Yung: Zero-Knowledge Proofs of Computational Power (Extended Summary). EUROCRYPT 1989: 196-207
20EEZvi Galil, Stuart Haber, Moti Yung: A Secure Public-key Authentication Scheme. EUROCRYPT 1989: 3-15
19 Michael Kharitonov, Andrew V. Goldberg, Moti Yung: Lower Bounds for Pseudorandom Number Generators FOCS 1989: 242-247
18 Gilles Brassard, Claude Crépeau, Moti Yung: Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds. ICALP 1989: 123-136
17 Moni Naor, Moti Yung: Universal One-Way Hash Functions and their Cryptographic Applications STOC 1989: 33-43
16 Marek Chrobak, Moti Yung: Fast Algorithms for Edge-Coloring Planar Graphs. J. Algorithms 10(1): 35-51 (1989)
15 Bruce Abramson, Moti Yung: Divide and Conquer under Global Constraints: A Solution to the N-Queens Problem. J. Parallel Distrib. Comput. 6(3): 649-662 (1989)
14 Zvi Galil, Stuart Haber, Moti Yung: Minimum-Knowledge Interactive Proofs for Decision Problems. SIAM J. Comput. 18(4): 711-739 (1989)
1988
13 Marek Chrobak, Moti Yung: Fast Parallel and Sequential Algorithms for Edge-Coloring Planar Graphs. AWOC 1988: 11-23
12EEYehuda Afek, Gad M. Landau, Baruch Schieber, Moti Yung: The Power of Multimedia: Combining Point-to Point and Multi-Access Networks. PODC 1988: 90-104
1987
11EEZvi Galil, Stuart Haber, Moti Yung: Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model. CRYPTO 1987: 135-155
10EERussell Impagliazzo, Moti Yung: Direct Minimum-Knowledge Computations. CRYPTO 1987: 40-51
9 Zvi Galil, Moti Yung: Partitioned Encryption and Achieving Simultaneity by Partitioning. Inf. Process. Lett. 26(2): 81-88 (1987)
8 Zvi Galil, Gad M. Landau, Mordechai M. Yung: Distributed Algorithms in Synchronous Broadcasting Networks. Theor. Comput. Sci. 49: 171-184 (1987)
1986
7 Bruce Abramson, Moti Yung: Construction Through Decomposition: A Divide-and-Conquer Algoithm for the N-Queens Problem. FJCC 1986: 620-628
6 Josh Cohen Benaloh, Moti Yung: Distributing the Power of a Government to Enhance the Privacy of Voters (Extended Abstract). PODC 1986: 52-62
1985
5EEZvi Galil, Stuart Haber, Moti Yung: Symmetric Public-Key Encryption. CRYPTO 1985: 128-137
4 Zvi Galil, Stuart Haber, Moti Yung: A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems (Extended Abstract) FOCS 1985: 360-371
3 Gad M. Landau, Mordechai M. Yung, Zvi Galil: Distributed Algorithms in Synchronous Broadcasting Networks (Extended Abstract). ICALP 1985: 363-372
2 Mordechai M. Yung: A Secure and Useful `Keyless Cryptosystem'. Inf. Process. Lett. 21(1): 35-38 (1985)
1984
1EEMoti Yung: Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract). CRYPTO 1984: 439-453

Coauthor Index

1Bruce Abramson [7] [15]
2Ben Adida [213]
3Yehuda Afek [12] [23] [25] [95]
4William Aiello [61]
5Noga Alon [75]
6Vijayalakshmi Atluri (Vijay Atluri) [290]
7Mario Baldi [201] [206]
8Feng Bao [265]
9Mihir Bellare [48] [80] [111]
10Steven M. Bellovin [306]
11Josh Cohen Benaloh [6]
12Vicente Benjumea [280] [300]
13Inderpal S. Bhandari [97]
14Ray Bird [39] [52] [69]
15Daniel Bleichenbacher [200] [268]
16Carlo Blundo [47] [117]
17John G. Brainard [259]
18Gilles Brassard [18] [22] [31] [34]
19Ernest F. Brickell [160]
20Ren Bucholz [213]
21Enrico Buonanno [175]
22Mike Burmester [84]
23Luís Caires [243]
24Jon Callas [299]
25Jan Camenisch [309]
26Kijoon Chae (Ki-Joon Chae) [231]
27Donghoon Chang [258] [285]
28David Chaum [213]
29Yongkuk Cho [295]
30Seung Geol Choi [255] [280] [281] [300]
31Marek Chrobak [13] [16] [35]
32Kyo-Il Chung [312]
33Debra L. Cook [276] [283] [296] [303]
34Ronald Cramer [89]
35Claude Crépeau [18] [22] [34]
36Giovanni Di Crescenzo [65] [103] [113] [119] [125] [126] [156] [291]
37George I. Davida [106]
38Yvo Desmedt [33] [38] [45] [60] [84] [299]
39Theodore Diament [226]
40David L. Dill [213]
41Yevgeniy Dodis [186] [190] [198] [199] [207] [222] [234] [250] [262]
42Danny Dolev [29] [51]
43Shlomi Dolev [277]
44Cynthia Dwork [29] [51]
45Ariel Elbaz [281]
46David Eppstein [27] [35] [40] [50]
47Nelly Fazio [199] [234]
48Dengguo Feng [242]
49Yair Frankel [45] [60] [77] [78] [81] [83] [93] [104] [106] [108] [112] [118] [123] [124] [127] [131] [132] [142] [145] [149] [159] [171] [181]
50Matthew K. Franklin [42] [54] [55] [66] [70] [89] [146] [153] [207] [212] [222]
51Zvi Galil [3] [4] [5] [8] [9] [11] [14] [20] [55] [74] [75] [153]
52Juan A. Garay [53] [98] [146]
53Daniel E. Geer Jr. [188]
54Peter Gemmell [81] [83] [108] [112]
55Rosario Gennaro [306]
56Ed Gerck [174]
57Andrew V. Goldberg [19]
58Inder S. Gopal [39] [52] [53] [69] [98]
59Stuart Haber [4] [5] [11] [14] [20]
60Yongfei Han [210]
61Helena Handschuh [137]
62Othar Hansson [41]
63Johan Håstad [167]
64Amir Herzberg [39] [47] [52] [69] [76] [115] [117]
65Seokhie Hong [285]
66Jung Yeon Hwang [310]
67Russell Impagliazzo [10]
68John Ioannidis [245]
69Giuseppe F. Italiano [27] [35] [40] [50] [243]
70Toshiya Itoh [84]
71Markus Jakobsson [91] [94] [105] [110] [111] [115] [128] [143] [147] [230]
72Philippe A. Janson [39] [52] [69] [101]
73Stanislaw Jarecki [76] [115]
74David Jefferson [213]
75Douglas W. Jones [213]
76Jakob Jonsson [167]
77Marc Joye [178] [193]
78Ari Juels [167] [259] [267] [281]
79Jonathan Katz [157] [164] [175] [176] [184] [190] [195] [198] [207] [208] [222] [247] [269] [287]
80Angelos D. Keromytis [226] [245] [276] [283] [296] [303] [306]
81Michael Kharitonov [19]
82Aggelos Kiayias [169] [173] [177] [179] [183] [185] [187] [191] [192] [199] [200] [203] [205] [218] [220] [225] [232] [234] [237] [239] [248] [256] [262] [268] [271] [282] [289] [292] [293] [301] [309]
83Eike Kiltz [307]
84Hyun-Jeong Kim [196]
85Myung-Hwan Kim [241]
86Sehun Kim [305]
87Elisavet Konstantinou [219] [238]
88Spyros C. Kontogiannis [120] [151]
89David W. Kravitz [127]
90Hugo Krawczyk [76] [115]
91Kaoru Kurosawa [266]
92Shay Kutten [25] [39] [47] [52] [53] [69] [95] [98] [117]
93Taekyoung Kwon [264]
94Limor Lahiani [277]
95Gad M. Landau [3] [8] [12] [23]
96William Lattin [213]
97Dong Hoon Lee [196] [310]
98Homin K. Lee [226]
99Hyung-Woo Lee [305]
100Jae-Kwang Lee [288]
101Sangjin Lee [258] [285]
102Chung-Sheng Li [86]
103Vasiliki Liagkou [219] [238]
104Benoît Libert [252] [272] [284] [297]
105Chae Hoon Lim [229]
106Dongdai Lin [242] [260] [304] [311]
107Helger Lipmaa [260]
108Peng Liu [311]
109Javier Lopez [280] [300]
110David M'Raïhi [147] [168]
111Philip D. MacKenzie [108] [112] [118] [124] [145] [149] [159] [171] [181]
112Tal Malkin [221] [257] [262] [281] [298] [302] [308]
113Yishay Mansour [53] [98]
114Alain J. Mayer [43] [62] [71] [74] [82] [85] [150] [155] [182]
115Andrew Mayer [41]
116Luke McAven [216] [217] [228]
117Atsuko Miyaji [207] [222]
118Shingo Miyazaki [141]
119Petros Mol [294]
120Refik Molva [39] [52] [69]
121Luís Monteiro [243]
122Charles T. Montgomery [127]
123Daniel Nagy [299]
124Mridul Nandi [258]
125Moni Naor [17] [26] [49] [116]
126C. Andrew Neff [174]
127Sotiris E. Nikoletseas [64] [73] [154]
128Peng Ning [290]
129Satoshi Obana [221]
130Yoram Ofek [24] [28] [37] [43] [57] [63] [68] [71] [72] [85] [86] [97] [99] [100] [134] [135] [152] [155] [182] [201] [206]
131Tatsuaki Okamoto [113] [121]
132Rafail Ostrovsky [36] [43] [44] [49] [56] [82] [116] [176] [182] [184]
133Akira Otsuka [299]
134Pascal Paillier [140]
135Catuscia Palamidessi [243]
136Krishna V. Palem [64] [154]
137Grammati E. Pantziou [120] [151]
138Cheol-Min Park [241]
139Kunsoo Park [255]
140Giuseppe Parlati [67]
141Andrew S. Patrick [244]
142Dingyi Pei [304]
143Olivier Pereira [302]
144Giuseppe Persiano (Pino Persiano) [46] [65] [126] [291]
145Christophe Petit [302]
146Krzysztof Pietrzak [307]
147David Pointcheval [160]
148Roberto De Prisco [62] [261]
149Jean-Jacques Quisquater [178] [193] [252] [272] [284] [297] [299]
150C. Pandu Rangan (Chanrasekharan Pandu Rangan) [286]
151John H. Reif [73]
152Ronald L. Rivest [174] [259]
153Aviel D. Rubin [174] [213]
154Ahmad-Reza Sadeghi [289]
155Reihaneh Safavi-Naini [216] [217] [228] [246] [263] [266]
156Kouichi Sakurai [84] [103] [119] [125] [141] [156]
157Tomas Sander [144] [162]
158Alfredo De Santis [30] [32] [46] [47] [60] [65] [117] [126] [291]
159Baruch Schieber [12] [23]
160Berry Schoenmakers [89]
161Michael I. Shamos [213]
162Vasant Shanbhogue [92]
163Hiroki Shizuya [84]
164Kiwook Sohn [312]
165JooSeok Song [264]
166Paul G. Spirakis [64] [73] [120] [151] [154] [219] [238]
167K. Srinathan (Kannan Srinathan) [286]
168Martijn Stam [307]
169Yannis C. Stamatiou [219] [238]
170François-Xavier Standaert [257] [298] [302] [308]
171Julien P. Stern [143]
172Jaechul Sung [285]
173Michael Szydlo [259]
174Amnon Ta-Shma [162]
175Roberto Tamassia [27] [40] [50]
176Robert Endre Tarjan [27] [40] [50]
177Yiannis Tsiounis [93] [106] [122] [132] [137] [147] [220] [282]
178Gene Tsudik [101] [267]
179Ugo Vaccaro [47] [117]
180Enriquillo Valdez [138] [172]
181Serge Vaudenay [160]
182Ramarathnam Venkatesan [44] [49] [56] [61] [116]
183Poorvi L. Vora [213]
184Orli Waarts [29] [51]
185Jeffery Westbrook [27] [40] [50]
186Chuankun Wu [304]
187Shouhuai Xu [139] [165] [189] [190] [198] [202] [224] [227] [267] [278] [290] [293]
188Aleksandr Yampolskiy [250]
189Sung-Ming Yen [193]
190Bülent Yener [72] [97] [99] [100] [135]
191Yongjin Yeom [295]
192Okyeon Yi [288]
193Adam L. Young (Adam Young) [87] [90] [102] [107] [109] [114] [129] [130] [133] [136] [144] [148] [158] [161] [166] [170] [180] [209] [214] [215] [223] [235] [236] [240] [249] [253] [254] [274] [275]
194Xiangdong Yu [59] [79] [88] [96]
195Gendu Zhang [139] [165]
196Yunlei Zhao [233] [251] [270] [279]
197Jianying Zhou [210] [230] [265]
198Hong Zhu [139]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)