BibTeX records: Moti Yung

download as .bib file

@inproceedings{DBLP:conf/acns/LorekYZ24,
  author       = {Pawel Lorek and
                  Moti Yung and
                  Filip Zag{\'{o}}rski},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Mirrored Commitment: Fixing "Randomized Partial Checking"
                  and Applications},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {3--27},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_1},
  doi          = {10.1007/978-3-031-54776-8\_1},
  timestamp    = {Tue, 05 Mar 2024 11:55:03 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LorekYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2023-1,
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-0942-7},
  doi          = {10.1007/978-981-97-0942-7},
  isbn         = {978-981-97-0941-0},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/2023-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2023-2,
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14527},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-0945-8},
  doi          = {10.1007/978-981-97-0945-8},
  isbn         = {978-981-97-0944-1},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/2023-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LorekYZ24,
  author       = {Pawel Lorek and
                  Moti Yung and
                  Filip Zag{\'{o}}rski},
  title        = {Mirrored Commitment: Fixing "Randomized Partial Checking"
                  and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/285},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LorekYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AmjadPPYY23,
  author       = {Ghous Amjad and
                  Sarvar Patel and
                  Giuseppe Persiano and
                  Kevin Yeo and
                  Moti Yung},
  title        = {Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable
                  Encryption},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {1},
  pages        = {417--436},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0025},
  doi          = {10.56553/POPETS-2023-0025},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/AmjadPPYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KutylowskiPPYZ23,
  author       = {Miroslaw Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  title        = {The Self-Anti-Censorship Nature of Encryption: On the Prevalence of
                  Anamorphic Cryptography},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {170--183},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0104},
  doi          = {10.56553/POPETS-2023-0104},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/KutylowskiPPYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WangCHY23,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Xinyi Huang and
                  Moti Yung},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic
                  Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14443},
  pages        = {135--167},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8736-8\_5},
  doi          = {10.1007/978-981-99-8736-8\_5},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WangCHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KutylowskiPPYZ23,
  author       = {Miroslaw Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {759--790},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_25},
  doi          = {10.1007/978-3-031-38545-2\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KutylowskiPPYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/DolevYY23,
  author       = {Shlomi Dolev and
                  Avraam Yagudaev and
                  Moti Yung},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {{HBSS:} (Simple) Hash-Based Stateless Signatures - Hash All the Way
                  to the Rescue! - (Preliminary Version)},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {389--397},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_27},
  doi          = {10.1007/978-3-031-34671-2\_27},
  timestamp    = {Thu, 29 Jun 2023 08:38:21 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/DolevYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/ChangY23,
  author       = {Donghoon Chang and
                  Moti Yung},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {Midgame Attacks and Defense Against Them},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {471--492},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_33},
  doi          = {10.1007/978-3-031-34671-2\_33},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/ChangY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/KoyuncuGYY23,
  author       = {Deniz Koyuncu and
                  Alex Gittens and
                  B{\"{u}}lent Yener and
                  Moti Yung},
  editor       = {Ambuj K. Singh and
                  Yizhou Sun and
                  Leman Akoglu and
                  Dimitrios Gunopulos and
                  Xifeng Yan and
                  Ravi Kumar and
                  Fatma Ozcan and
                  Jieping Ye},
  title        = {Deception by Omission: Using Adversarial Missingness to Poison Causal
                  Structure Learning},
  booktitle    = {Proceedings of the 29th {ACM} {SIGKDD} Conference on Knowledge Discovery
                  and Data Mining, {KDD} 2023, Long Beach, CA, USA, August 6-10, 2023},
  pages        = {1164--1175},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3580305.3599297},
  doi          = {10.1145/3580305.3599297},
  timestamp    = {Mon, 25 Sep 2023 08:29:22 +0200},
  biburl       = {https://dblp.org/rec/conf/kdd/KoyuncuGYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2022,
  editor       = {Yi Deng and
                  Moti Yung},
  title        = {Information Security and Cryptology - 18th International Conference,
                  Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13837},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-26553-2},
  doi          = {10.1007/978-3-031-26553-2},
  isbn         = {978-3-031-26552-5},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2023,
  editor       = {Ding Wang and
                  Moti Yung and
                  Zheli Liu and
                  Xiaofeng Chen},
  title        = {Information and Communications Security - 25th International Conference,
                  {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14252},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7356-9},
  doi          = {10.1007/978-981-99-7356-9},
  isbn         = {978-981-99-7355-2},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scisec/2023,
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7},
  doi          = {10.1007/978-3-031-45933-7},
  isbn         = {978-3-031-45932-0},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-20043,
  author       = {Deniz Koyuncu and
                  Alex Gittens and
                  B{\"{u}}lent Yener and
                  Moti Yung},
  title        = {Deception by Omission: Using Adversarial Missingness to Poison Causal
                  Structure Learning},
  journal      = {CoRR},
  volume       = {abs/2305.20043},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.20043},
  doi          = {10.48550/ARXIV.2305.20043},
  eprinttype    = {arXiv},
  eprint       = {2305.20043},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-20043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutylowskiPPYZ23,
  author       = {Mirek Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  title        = {Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication!},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/356},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutylowskiPPYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutylowskiPPYZ23a,
  author       = {Mirek Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  title        = {The Self-Anti-Censorship Nature of Encryption: On the Prevalence of
                  Anamorphic Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/434},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutylowskiPPYZ23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EldefrawyJTY23,
  author       = {Karim Eldefrawy and
                  Sashidhar Jakkamsetti and
                  Ben Terner and
                  Moti Yung},
  title        = {Standard Model Time-Lock Puzzles: Defining Security and Constructing
                  via Composition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/439},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EldefrawyJTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmjadYY23,
  author       = {Ghous Amjad and
                  Kevin Yeo and
                  Moti Yung},
  title        = {{RSA} Blind Signatures with Public Metadata},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1199},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1199},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmjadYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCHY23,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1828},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1828},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GittensYY22,
  author       = {Alex Gittens and
                  B{\"{u}}lent Yener and
                  Moti Yung},
  title        = {An Adversarial Perspective on Accuracy, Robustness, Fairness, and
                  Privacy: Multilateral-Tradeoffs in Trustworthy {ML}},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {120850--120865},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3218715},
  doi          = {10.1109/ACCESS.2022.3218715},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GittensYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AhmedXCFYY22,
  author       = {Salman Ahmed and
                  Ya Xiao and
                  Taejoong Chung and
                  Carol J. Fung and
                  Moti Yung and
                  Danfeng Daphne Yao},
  title        = {Privacy Guarantees of Bluetooth Low Energy Contact Tracing: {A} Case
                  Study on {COVIDWISE}},
  journal      = {Computer},
  volume       = {55},
  number       = {2},
  pages        = {54--62},
  year         = {2022},
  url          = {https://doi.org/10.1109/MC.2021.3125611},
  doi          = {10.1109/MC.2021.3125611},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AhmedXCFYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DavidHMYZ22,
  author       = {Liron David and
                  Avinatan Hassidim and
                  Yossi Matias and
                  Moti Yung and
                  Alon Ziv},
  title        = {Eddystone-EID: Secure and Private Infrastructural Protocol for {BLE}
                  Beacons},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {3877--3889},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3214074},
  doi          = {10.1109/TIFS.2022.3214074},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DavidHMYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/AhmedXCFYY22,
  author       = {Salman Ahmed and
                  Ya Xiao and
                  Taejoong (Tijay) Chung and
                  Carol J. Fung and
                  Moti Yung and
                  Danfeng (Daphne) Yao},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Privacy Guarantees of {BLE} Contact Tracing for {COVID-19} and Beyond:
                  {A} Case Study on {COVIDWISE}},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1210--1212},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3527279},
  doi          = {10.1145/3488932.3527279},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/AhmedXCFYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YampolskiyY22,
  author       = {Mark Yampolskiy and
                  Moti Yung},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {AMSec'22: {ACM} {CCS} Workshop on Additive Manufacturing {(3D} Printing)
                  Security},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3557--3558},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563554},
  doi          = {10.1145/3548606.3563554},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YampolskiyY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/PihurKLSYHZ22,
  author       = {Vasyl Pihur and
                  Aleksandra Korolova and
                  Frederick Liu and
                  Subhash Sankuratripati and
                  Moti Yung and
                  Dachuan Huang and
                  Ruogu Zeng},
  editor       = {Shlomi Dolev and
                  Jonathan Katz and
                  Amnon Meisels},
  title        = {Differentially-Private "Draw and Discard" Machine Learning:
                  Training Distributed Model from Enormous Crowds},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 6th International
                  Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13301},
  pages        = {468--486},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07689-3\_33},
  doi          = {10.1007/978-3-031-07689-3\_33},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/PihurKLSYHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DavidHMY22,
  author       = {Liron David and
                  Avinatan Hassidim and
                  Yossi Matias and
                  Moti Yung},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Scaling up {GAEN} Pseudorandom Processes: Preparing for a More Extensive
                  Pandemic},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  pages        = {237--255},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_12},
  doi          = {10.1007/978-3-031-17140-6\_12},
  timestamp    = {Tue, 27 Sep 2022 21:06:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DavidHMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PersianoPY22,
  author       = {Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Anamorphic Encryption: Private Communication Against a Dictator},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {34--63},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_2},
  doi          = {10.1007/978-3-031-07085-3\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PersianoPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LibertNPY22,
  author       = {Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {One-Shot Fiat-Shamir-Based {NIZK} Arguments of Composite Residuosity
                  and Logarithmic-Size Ring Signatures in the Standard Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {488--519},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_17},
  doi          = {10.1007/978-3-031-07085-3\_17},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LibertNPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YampolskiyGGMY22,
  author       = {Mark Yampolskiy and
                  Lynne Graves and
                  Jacob Gatlin and
                  Jeffrey Todd McDonald and
                  Moti Yung},
  editor       = {Willy Susilo and
                  Xiaofeng Chen and
                  Fuchun Guo and
                  Yudi Zhang and
                  Rolly Intan},
  title        = {Crypto-Steganographic Validity for Additive Manufacturing {(3D} Printing)
                  Design Files},
  booktitle    = {Information Security - 25th International Conference, {ISC} 2022,
                  Bali, Indonesia, December 18-22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13640},
  pages        = {40--52},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22390-7\_3},
  doi          = {10.1007/978-3-031-22390-7\_3},
  timestamp    = {Mon, 06 Nov 2023 13:38:03 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/YampolskiyGGMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/001800Y22,
  author       = {Long Chen and
                  Ya{-}Nan Li and
                  Qiang Tang and
                  Moti Yung},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient,
                  Portable, and Blind Cloud Storage},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2353--2370},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-long},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/001800Y22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2022amsec,
  editor       = {Mark Yampolskiy and
                  Moti Yung},
  title        = {Proceedings of the 2022 {ACM} {CCS} Workshop on Additive Manufacturing
                  {(3D} Printing) Security, Los Angeles, CA, USA, 11 November 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560833},
  doi          = {10.1145/3560833},
  isbn         = {978-1-4503-9883-1},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2022amsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EldefrawyGKY22,
  author       = {Karim Eldefrawy and
                  Nicholas Genise and
                  Rutuja Kshirsagar and
                  Moti Yung},
  title        = {On Regenerating Codes and Proactive Secret Sharing: Relationships
                  and Implications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/096},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EldefrawyGKY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PersianoPY22,
  author       = {Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung},
  title        = {Anamorphic Encryption: Private Communication against a Dictator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {639},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/639},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PersianoPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/XuYW21,
  author       = {Shouhuai Xu and
                  Moti Yung and
                  Jingguo Wang},
  title        = {Seeking Foundations for the Science of Cyber Security},
  journal      = {Inf. Syst. Frontiers},
  volume       = {23},
  number       = {2},
  pages        = {263--267},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10796-021-10134-8},
  doi          = {10.1007/S10796-021-10134-8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/XuYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WangCHNWY21,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Xinyi Huang and
                  Jianting Ning and
                  Baosheng Wang and
                  Moti Yung},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Identity-Based Encryption for Fair Anonymity Applications: Defining,
                  Implementing, and Applying Rerandomizable RCCA-Secure {IBE}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {427--455},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_15},
  doi          = {10.1007/978-3-030-92075-3\_15},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WangCHNWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YampolskiyGY21,
  author       = {Mark Yampolskiy and
                  Jacob Gatlin and
                  Moti Yung},
  editor       = {Mark Yampolskiy and
                  Yuval Elovici and
                  Moti Yung},
  title        = {Myths and Misconceptions in Additive Manufacturing Security: Deficiencies
                  of the {CIA} Triad},
  booktitle    = {AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing
                  {(3D} Printing) Security, Virtual Event, Republic of Korea, 19 November
                  2021},
  pages        = {3--9},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3462223.3485618},
  doi          = {10.1145/3462223.3485618},
  timestamp    = {Wed, 17 Nov 2021 14:36:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YampolskiyGY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WangCYHWY21,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Guomin Yang and
                  Xinyi Huang and
                  Baosheng Wang and
                  Moti Yung},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {270--300},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_10},
  doi          = {10.1007/978-3-030-84259-8\_10},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WangCYHWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/PatelY21,
  author       = {Akif Patel and
                  Moti Yung},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Fully Dynamic Password Protected Secret Sharing: Simplifying {PPSS}
                  Operation and Maintenance},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {379--396},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_28},
  doi          = {10.1007/978-3-030-78086-9\_28},
  timestamp    = {Mon, 03 Jan 2022 22:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/PatelY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LibertNPY21,
  author       = {Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma
                  into a Single Private Signing Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  pages        = {521--552},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5\_18},
  doi          = {10.1007/978-3-030-77883-5\_18},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LibertNPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DeveveyLNPY21,
  author       = {Julien Devevey and
                  Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Juan A. Garay},
  title        = {Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive
                  Security in the Standard Model Without Pairings},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {659--690},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_24},
  doi          = {10.1007/978-3-030-75245-3\_24},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DeveveyLNPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YampolskiyGGSY21,
  author       = {Mark Yampolskiy and
                  Lynne Graves and
                  Jacob Gatlin and
                  Anthony Skjellum and
                  Moti Yung},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {What Did You Add to My Additive Manufacturing Data?: Steganographic
                  Attacks on 3D Printing Files},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {266--281},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471843},
  doi          = {10.1145/3471621.3471843},
  timestamp    = {Fri, 08 Oct 2021 09:46:25 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YampolskiyGGSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/EldefrawyGKY21,
  author       = {Karim Eldefrawy and
                  Nicholas Genise and
                  Rutuja Kshirsagar and
                  Moti Yung},
  editor       = {Colette Johnen and
                  Elad Michael Schiller and
                  Stefan Schmid},
  title        = {On Regenerating Codes and Proactive Secret Sharing: Relationships
                  and Implications},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 23rd
                  International Symposium, {SSS} 2021, Virtual Event, November 17-20,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13046},
  pages        = {350--364},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91081-5\_23},
  doi          = {10.1007/978-3-030-91081-5\_23},
  timestamp    = {Wed, 10 Nov 2021 16:15:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sss/EldefrawyGKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/21/KutylowskiSY21,
  author       = {Miroslaw Kutylowski and
                  Piotr Syga and
                  Moti Yung},
  editor       = {Gildas Avoine and
                  Julio Hernandez{-}Castro},
  title        = {Emerging Security Challenges for Ubiquitous Devices},
  booktitle    = {Security of Ubiquitous Computing Systems},
  pages        = {3--18},
  publisher    = {Springer International Publishing},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-10591-4\_1},
  doi          = {10.1007/978-3-030-10591-4\_1},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/21/KutylowskiSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiaccs/2021,
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210},
  doi          = {10.1145/3433210},
  isbn         = {978-1-4503-8287-8},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2021amsec,
  editor       = {Mark Yampolskiy and
                  Yuval Elovici and
                  Moti Yung},
  title        = {AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing
                  {(3D} Printing) Security, Virtual Event, Republic of Korea, 19 November
                  2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3462223},
  doi          = {10.1145/3462223},
  isbn         = {978-1-4503-8480-3},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2021amsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2020,
  editor       = {Yongdong Wu and
                  Moti Yung},
  title        = {Information Security and Cryptology - 16th International Conference,
                  Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12612},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-71852-7},
  doi          = {10.1007/978-3-030-71852-7},
  isbn         = {978-3-030-71851-0},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2021,
  editor       = {Yu Yu and
                  Moti Yung},
  title        = {Information Security and Cryptology - 17th International Conference,
                  Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13007},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88323-2},
  doi          = {10.1007/978-3-030-88323-2},
  isbn         = {978-3-030-88322-5},
  timestamp    = {Tue, 19 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scisec/2021,
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4},
  doi          = {10.1007/978-3-030-89137-4},
  isbn         = {978-3-030-89136-7},
  timestamp    = {Mon, 15 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2021-1,
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Shujun Li and
                  Radha Poovendran and
                  Herv{\'{e}} Debar and
                  Moti Yung},
  title        = {Security and Privacy in Communication Networks - 17th {EAI} International
                  Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {398},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90019-9},
  doi          = {10.1007/978-3-030-90019-9},
  isbn         = {978-3-030-90018-2},
  timestamp    = {Thu, 04 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2021-2,
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Shujun Li and
                  Radha Poovendran and
                  Herv{\'{e}} Debar and
                  Moti Yung},
  title        = {Security and Privacy in Communication Networks - 17th {EAI} International
                  Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {399},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90022-9},
  doi          = {10.1007/978-3-030-90022-9},
  isbn         = {978-3-030-90021-2},
  timestamp    = {Tue, 23 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-08842,
  author       = {Salman Ahmed and
                  Ya Xiao and
                  Taejoong Chung and
                  Carol J. Fung and
                  Moti Yung and
                  Danfeng Yao},
  title        = {Privacy Guarantees of {BLE} Contact Tracing: {A} Case Study on {COVIDWISE}},
  journal      = {CoRR},
  volume       = {abs/2111.08842},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.08842},
  eprinttype    = {arXiv},
  eprint       = {2111.08842},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-08842.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RussellTYZZ21,
  author       = {Alexander Russell and
                  Qiang Tang and
                  Moti Yung and
                  Hong{-}Sheng Zhou and
                  Jiadong Zhu},
  title        = {Correcting Subverted Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/042},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RussellTYZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeveveyLNPY21,
  author       = {Julien Devevey and
                  Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  title        = {Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive
                  Security in the Standard Model Without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/630},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DeveveyLNPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmjadPPYY21,
  author       = {Ghous Amjad and
                  Sarvar Patel and
                  Giuseppe Persiano and
                  Kevin Yeo and
                  Moti Yung},
  title        = {Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/765},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmjadPPYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCYHWY21,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Guomin Yang and
                  Xinyi Huang and
                  Baosheng Wang and
                  Moti Yung},
  title        = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {862},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/862},
  timestamp    = {Mon, 15 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCYHWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCHNWY21,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Xinyi Huang and
                  Jianting Ning and
                  Baosheng Wang and
                  Moti Yung},
  title        = {Identity-Based Encryption for Fair Anonymity Applications: Defining,
                  Implementing, and Applying Rerandomizable RCCA-secure {IBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1261},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1261},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCHNWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YehSDYK20,
  author       = {Kuo{-}Hui Yeh and
                  Chunhua Su and
                  Robert H. Deng and
                  Moti Yung and
                  Miroslaw Kutylowski},
  title        = {Special issue on security and privacy of blockchain technologies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {19},
  number       = {3},
  pages        = {243--244},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10207-020-00496-6},
  doi          = {10.1007/S10207-020-00496-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/YehSDYK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LibertY20,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  title        = {Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems:
                  Generic Framework and Constructions},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1405--1441},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09350-3},
  doi          = {10.1007/S00145-020-09350-3},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LibertY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GarayJKY20,
  author       = {Juan A. Garay and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {The combinatorics of hidden diversity},
  journal      = {Theor. Comput. Sci.},
  volume       = {812},
  pages        = {80--95},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2019.07.016},
  doi          = {10.1016/J.TCS.2019.07.016},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/GarayJKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DoPY20,
  author       = {Xuan Thanh Do and
                  Duong Hieu Phan and
                  Moti Yung},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke
                  Schemes},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12147},
  pages        = {145--164},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57878-7\_8},
  doi          = {10.1007/978-3-030-57878-7\_8},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DoPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenHY20,
  author       = {Rongmao Chen and
                  Xinyi Huang and
                  Moti Yung},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Subvert {KEM} to Break {DEM:} Practical Algorithm-Substitution Attacks
                  on Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {98--128},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_4},
  doi          = {10.1007/978-3-030-64834-3\_4},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MiaoP0SY20,
  author       = {Peihan Miao and
                  Sarvar Patel and
                  Mariana Raykova and
                  Karn Seth and
                  Moti Yung},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Two-Sided Malicious Security for Private Intersection-Sum with Cardinality},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_1},
  doi          = {10.1007/978-3-030-56877-1\_1},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MiaoP0SY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/YungPJ20,
  author       = {Moti Yung and
                  Cem Paya and
                  Daniel James},
  editor       = {Shlomi Dolev and
                  Vladimir Kolesnikov and
                  Sachin Lodha and
                  Gera Weiss},
  title        = {Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys
                  Generated for Critical Financial Services},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Fourth International
                  Symposium, {CSCML} 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12161},
  pages        = {18--28},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49785-9\_2},
  doi          = {10.1007/978-3-030-49785-9\_2},
  timestamp    = {Thu, 25 Jun 2020 16:11:03 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/YungPJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KutylowskiLY20,
  author       = {Miroslaw Kutylowski and
                  Anna Lauks{-}Dutka and
                  Moti Yung},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {{GDPR} - Challenges for Reconciling Legal Rules with Technical Reality},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {736--755},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_36},
  doi          = {10.1007/978-3-030-58951-6\_36},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KutylowskiLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/IonKNPSS0SY20,
  author       = {Mihaela Ion and
                  Ben Kreuter and
                  Ahmet Erhan Nergiz and
                  Sarvar Patel and
                  Shobhit Saxena and
                  Karn Seth and
                  Mariana Raykova and
                  David Shanahan and
                  Moti Yung},
  title        = {On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {370--389},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00031},
  doi          = {10.1109/EUROSP48549.2020.00031},
  timestamp    = {Tue, 10 Nov 2020 11:45:04 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/IonKNPSS0SY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Yung20,
  author       = {Moti Yung},
  editor       = {Christian Callegari and
                  Soon Xin Ng and
                  Panagiotis G. Sarigiannidis and
                  Sebastiano Battiato and
                  {\'{A}}ngel Serrano S{\'{a}}nchez de Le{\'{o}}n and
                  Adlen Ksentini and
                  Pascal Lorenz and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {Secure Computation Protocol: {A} Technology for Our Time},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 1: DCNET, OPTICS, {SIGMAP}
                  and WINSYS, Lieusaint, Paris, France, July 8-10, 2020},
  pages        = {19},
  publisher    = {ScitePress},
  year         = {2020},
  timestamp    = {Wed, 29 Jul 2020 16:57:23 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/Yung20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/EldefrawyHOY20,
  author       = {Karim Eldefrawy and
                  Seoyeon Hwang and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {Communication-Efficient (Proactive) Secure Computation for Dynamic
                  General Adversary Structures and Dynamic Groups},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {108--129},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_6},
  doi          = {10.1007/978-3-030-57990-6\_6},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/EldefrawyHOY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2019,
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-42921-8},
  doi          = {10.1007/978-3-030-42921-8},
  isbn         = {978-3-030-42920-1},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MiaoPRSY20,
  author       = {Peihan Miao and
                  Sarvar Patel and
                  Mariana Raykova and
                  Karn Seth and
                  Moti Yung},
  title        = {Two-Sided Malicious Security for Private Intersection-Sum with Cardinality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/385},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MiaoPRSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EldefrawyHOY20,
  author       = {Karim Eldefrawy and
                  Seoyeon Hwang and
                  Rafail Ostrovsky and
                  Moti Yung},
  title        = {Communication-Efficient (Proactive) Secure Computation for Dynamic
                  General Adversary Structures and Dynamic Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {747},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/747},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EldefrawyHOY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoPY20,
  author       = {Xuan Thanh Do and
                  Duong Hieu Phan and
                  Moti Yung},
  title        = {A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {826},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/826},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenHY20,
  author       = {Rongmao Chen and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Subvert {KEM} to Break {DEM:} Practical Algorithm-Substitution Attacks
                  on Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1079},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1079},
  timestamp    = {Mon, 15 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertNPY20,
  author       = {Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  title        = {Compact Simulation-Sound {NIZK} Arguments of Composite Residuosity
                  and Applications to Logarithmic-Size Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1334},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1334},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertNPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LeeLPY19,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Jong Hwan Park and
                  Moti Yung},
  title        = {{CCA} Security for Self-Updatable Encryption: Protecting Cloud Data
                  When Clients Read/Write Ciphertexts},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {4},
  pages        = {545--562},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxy122},
  doi          = {10.1093/COMJNL/BXY122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LeeLPY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PhanY19,
  author       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Paradigm Shifts in Cryptographic Engineering},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {5},
  pages        = {729--730},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2019.2934527},
  doi          = {10.1109/TDSC.2019.2934527},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PhanY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhaoY19,
  author       = {Mingyi Zhao and
                  Moti Yung},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Thanassis Giannetsos and
                  Daniele Sgandurra},
  title        = {Secure Zero-Day Detection: Wiping Off the {VEP} Trade-Off},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Workshop on Cyber-Security
                  Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019},
  pages        = {35--45},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338511.3357350},
  doi          = {10.1145/3338511.3357350},
  timestamp    = {Sat, 28 Aug 2021 16:06:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhaoY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PatelPYY19,
  author       = {Sarvar Patel and
                  Giuseppe Persiano and
                  Kevin Yeo and
                  Moti Yung},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding
                  for Multi-Maps via Hashing},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {79--93},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354213},
  doi          = {10.1145/3319535.3354213},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PatelPYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChowRTYZZ19,
  author       = {Sherman S. M. Chow and
                  Alexander Russell and
                  Qiang Tang and
                  Moti Yung and
                  Yongjun Zhao and
                  Hong{-}Sheng Zhou},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Let a Non-barking Watchdog Bite: Cliptographic Signatures with an
                  Offline Watchdog},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {221--251},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_8},
  doi          = {10.1007/978-3-030-17253-4\_8},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChowRTYZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/DiazCAKRY19,
  author       = {Jesus Diaz and
                  Seung Geol Choi and
                  David Arroyo and
                  Angelos D. Keromytis and
                  Francisco B. Rodr{\'{\i}}guez and
                  Moti Yung},
  editor       = {Kuan{-}Ching Li and
                  Xiaofeng Chen and
                  Willy Susilo},
  title        = {A Methodology for Retrofitting Privacy and Its Application to e-Shopping
                  Transactions},
  booktitle    = {Advances in Cyber Security: Principles, Techniques, and Applications},
  pages        = {143--183},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-13-1483-4\_7},
  doi          = {10.1007/978-981-13-1483-4\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/DiazCAKRY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2019,
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2},
  doi          = {10.1007/978-3-030-21568-2},
  isbn         = {978-3-030-21567-5},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2018,
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-14234-6},
  doi          = {10.1007/978-3-030-14234-6},
  isbn         = {978-3-030-14233-9},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cscml/2019,
  editor       = {Shlomi Dolev and
                  Danny Hendler and
                  Sachin Lodha and
                  Moti Yung},
  title        = {Cyber Security Cryptography and Machine Learning - Third International
                  Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11527},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-20951-3},
  doi          = {10.1007/978-3-030-20951-3},
  isbn         = {978-3-030-20950-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scisec/2019,
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9},
  doi          = {10.1007/978-3-030-34637-9},
  isbn         = {978-3-030-34636-2},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/ArmknechtVVY19,
  author       = {Frederik Armknecht and
                  Ingrid Verbauwhede and
                  Melanie Volkamer and
                  Moti Yung},
  title        = {Biggest Failures in Security (Dagstuhl Seminar 19451)},
  journal      = {Dagstuhl Reports},
  volume       = {9},
  number       = {11},
  pages        = {1--23},
  year         = {2019},
  url          = {https://doi.org/10.4230/DagRep.9.11.1},
  doi          = {10.4230/DAGREP.9.11.1},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtVVY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonKNPRSSSY19,
  author       = {Mihaela Ion and
                  Ben Kreuter and
                  Ahmet Erhan Nergiz and
                  Sarvar Patel and
                  Mariana Raykova and
                  Shobhit Saxena and
                  Karn Seth and
                  David Shanahan and
                  Moti Yung},
  title        = {On Deploying Secure Computing Commercially: Private Intersection-Sum
                  Protocols and their Business Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonKNPRSSSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatelPYY19,
  author       = {Sarvar Patel and
                  Giuseppe Persiano and
                  Kevin Yeo and
                  Moti Yung},
  title        = {Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding
                  for Multi-Maps via Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1292},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatelPYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChenSYY18,
  author       = {Jiageng Chen and
                  Chunhua Su and
                  Kuo{-}Hui Yeh and
                  Moti Yung},
  title        = {Special Issue on Advanced Persistent Threat},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {79},
  pages        = {243--246},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.11.005},
  doi          = {10.1016/J.FUTURE.2017.11.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ChenSYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/EldefrawyOY18,
  author       = {Karim Eldefrawy and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Pierangela Samarati and
                  Indrajit Ray and
                  Indrakshi Ray},
  title        = {Theoretical Foundations for Mobile Target Defense: Proactive Secret
                  Sharing and Secure Multiparty Computation},
  booktitle    = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
                  on the Occasion of His 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {11170},
  pages        = {470--486},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04834-1\_23},
  doi          = {10.1007/978-3-030-04834-1\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/EldefrawyOY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Russell0YZ18,
  author       = {Alexander Russell and
                  Qiang Tang and
                  Moti Yung and
                  Hong{-}Sheng Zhou},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Correcting Subverted Random Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {241--271},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_9},
  doi          = {10.1007/978-3-319-96881-0\_9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Russell0YZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/DiazCAKRY18,
  author       = {Jesus Diaz and
                  Seung Geol Choi and
                  David Arroyo and
                  Angelos D. Keromytis and
                  Francisco B. Rodr{\'{\i}}guez and
                  Moti Yung},
  editor       = {Itai Dinur and
                  Shlomi Dolev and
                  Sachin Lodha},
  title        = {Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Second International
                  Symposium, {CSCML} 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10879},
  pages        = {206--226},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-94147-9\_17},
  doi          = {10.1007/978-3-319-94147-9\_17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/DiazCAKRY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/EldefrawyOPY18,
  author       = {Karim Eldefrawy and
                  Rafail Ostrovsky and
                  Sunoo Park and
                  Moti Yung},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Proactive Secure Multiparty Computation with a Dishonest Majority},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {200--215},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_11},
  doi          = {10.1007/978-3-319-98113-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/EldefrawyOPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/YoungY18,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Semantically Secure Anonymity: Foundations of Re-encryption},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {255--273},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_14},
  doi          = {10.1007/978-3-319-98113-0\_14},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/YoungY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2017,
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-75160-3},
  doi          = {10.1007/978-3-319-75160-3},
  isbn         = {978-3-319-75159-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scisec/2018,
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1},
  doi          = {10.1007/978-3-030-03026-1},
  isbn         = {978-3-030-03025-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-04369,
  author       = {Vasyl Pihur and
                  Aleksandra Korolova and
                  Frederick Liu and
                  Subhash Sankuratripati and
                  Moti Yung and
                  Dachuan Huang and
                  Ruogu Zeng},
  title        = {Differentially-Private "Draw and Discard" Machine Learning},
  journal      = {CoRR},
  volume       = {abs/1807.04369},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.04369},
  eprinttype    = {arXiv},
  eprint       = {1807.04369},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-04369.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/YoungY17,
  author       = {Adam L. Young and
                  Moti Yung},
  title        = {Cryptovirology: the birth, neglect, and explosion of ransomware},
  journal      = {Commun. {ACM}},
  volume       = {60},
  number       = {7},
  pages        = {24--26},
  year         = {2017},
  url          = {https://doi.org/10.1145/3097347},
  doi          = {10.1145/3097347},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/YoungY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/YoungY17,
  author       = {Adam L. Young and
                  Moti Yung},
  title        = {On Ransomware and Envisioning the Enemy of Tomorrow},
  journal      = {Computer},
  volume       = {50},
  number       = {11},
  pages        = {82--85},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.4041366},
  doi          = {10.1109/MC.2017.4041366},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/YoungY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/Rivero-GarciaSH17,
  author       = {Alexandra Rivero{-}Garc{\'{\i}}a and
                  Iv{\'{a}}n Santos{-}Gonz{\'{a}}lez and
                  Candelaria Hern{\'{a}}ndez{-}Goya and
                  Pino Caballero{-}Gil and
                  Moti Yung},
  title        = {Patients' Data Management System Protected by Identity-Based Authentication
                  and Key Exchange},
  journal      = {Sensors},
  volume       = {17},
  number       = {4},
  pages        = {733},
  year         = {2017},
  url          = {https://doi.org/10.3390/s17040733},
  doi          = {10.3390/S17040733},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/Rivero-GarciaSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LeeCLPY17,
  author       = {Kwangsu Lee and
                  Seung Geol Choi and
                  Dong Hoon Lee and
                  Jong Hwan Park and
                  Moti Yung},
  title        = {Self-updatable encryption: Time constrained access control with hidden
                  attributes and better efficiency},
  journal      = {Theor. Comput. Sci.},
  volume       = {667},
  pages        = {51--92},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.tcs.2016.12.027},
  doi          = {10.1016/J.TCS.2016.12.027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LeeCLPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DmitrienkoNY17,
  author       = {Alexandra Dmitrienko and
                  David Noack and
                  Moti Yung},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender
                  Revocation},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {520--531},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052980},
  doi          = {10.1145/3052973.3052980},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DmitrienkoNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Russell0YZ17,
  author       = {Alexander Russell and
                  Qiang Tang and
                  Moti Yung and
                  Hong{-}Sheng Zhou},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Generic Semantic Security against a Kleptographic Adversary},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {907--922},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133993},
  doi          = {10.1145/3133956.3133993},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Russell0YZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0005Y17,
  author       = {Qiang Tang and
                  Moti Yung},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Cliptography: Post-Snowden Cryptography},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2615--2616},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3136065},
  doi          = {10.1145/3133956.3136065},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0005Y17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/YoungY17,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Shlomi Dolev and
                  Sachin Lodha},
  title        = {The Combinatorics of Product Scanning Multiplication and Squaring},
  booktitle    = {Cyber Security Cryptography and Machine Learning - First International
                  Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10332},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60080-2\_8},
  doi          = {10.1007/978-3-319-60080-2\_8},
  timestamp    = {Sat, 19 Oct 2019 20:25:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/YoungY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/DolevEGKOY17,
  author       = {Shlomi Dolev and
                  Karim Eldefrawy and
                  Juan A. Garay and
                  Muni Venkateswarlu Kumaramangalam and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Elad Michael Schiller and
                  Alexander A. Schwarzmann},
  title        = {Brief Announcement: Secure Self-Stabilizing Computation},
  booktitle    = {Proceedings of the {ACM} Symposium on Principles of Distributed Computing,
                  {PODC} 2017, Washington, DC, USA, July 25-27, 2017},
  pages        = {415--417},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3087801.3087864},
  doi          = {10.1145/3087801.3087864},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/DolevEGKOY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2016,
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54705-3},
  doi          = {10.1007/978-3-319-54705-3},
  isbn         = {978-3-319-54704-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mycrypt/2016,
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61273-7},
  doi          = {10.1007/978-3-319-61273-7},
  isbn         = {978-3-319-61272-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonKNPSSSY17,
  author       = {Mihaela Ion and
                  Ben Kreuter and
                  Erhan Nergiz and
                  Sarvar Patel and
                  Shobhit Saxena and
                  Karn Seth and
                  David Shanahan and
                  Moti Yung},
  title        = {Private Intersection-Sum Protocol with Applications to Attributing
                  Aggregate Ad Conversions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {738},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/738},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonKNPSSSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/YaoYZ16,
  author       = {Andrew Chi{-}Chih Yao and
                  Moti Yung and
                  Yunlei Zhao},
  title        = {Concurrent Knowledge Extraction in Public-Key Models},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {1},
  pages        = {156--219},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-014-9191-z},
  doi          = {10.1007/S00145-014-9191-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/YaoYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LibertJY16,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung},
  title        = {Born and raised distributively: Fully distributed non-interactive
                  adaptively-secure threshold signatures with short shares},
  journal      = {Theor. Comput. Sci.},
  volume       = {645},
  pages        = {1--24},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.tcs.2016.02.031},
  doi          = {10.1016/J.TCS.2016.02.031},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LibertJY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Russell0YZ16,
  author       = {Alexander Russell and
                  Qiang Tang and
                  Moti Yung and
                  Hong{-}Sheng Zhou},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Cliptography: Clipping the Power of Kleptographic Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {34--64},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_2},
  doi          = {10.1007/978-3-662-53890-6\_2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Russell0YZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/YoungY16,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic
                  Attack},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {243--255},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_16},
  doi          = {10.1007/978-3-662-49301-4\_16},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/YoungY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LibertMPY16,
  author       = {Beno{\^{\i}}t Libert and
                  Fabrice Mouhartem and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Practical "Signatures with Efficient Protocols" from Simple
                  Assumptions},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {511--522},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897898},
  doi          = {10.1145/2897845.2897898},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LibertMPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ArmknechtMSY16,
  author       = {Frederik Armknecht and
                  Daisuke Moriyama and
                  Ahmad{-}Reza Sadeghi and
                  Moti Yung},
  editor       = {Kazue Sako},
  title        = {Towards a Unified Security Model for Physically Unclonable Functions},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {271--287},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_16},
  doi          = {10.1007/978-3-319-29485-8\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ArmknechtMSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/LibertRY16,
  author       = {Beno{\^{\i}}t Libert and
                  Somindu C. Ramanna and
                  Moti Yung},
  editor       = {Ioannis Chatzigiannakis and
                  Michael Mitzenmacher and
                  Yuval Rabani and
                  Davide Sangiorgi},
  title        = {Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based
                  Accumulators from Simple Assumptions},
  booktitle    = {43rd International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2016, July 11-15, 2016, Rome, Italy},
  series       = {LIPIcs},
  volume       = {55},
  pages        = {30:1--30:14},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2016},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2016.30},
  doi          = {10.4230/LIPICS.ICALP.2016.30},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/LibertRY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/DolevELOY16,
  author       = {Shlomi Dolev and
                  Karim Eldefrawy and
                  Joshua Lampkins and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {George Giakkoupis},
  title        = {Brief Announcement: Proactive Secret Sharing with a Dishonest Majority},
  booktitle    = {Proceedings of the 2016 {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2016, Chicago, IL, USA, July 25-28, 2016},
  pages        = {401--403},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2933057.2933059},
  doi          = {10.1145/2933057.2933059},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/DolevELOY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DengGLWY16,
  author       = {Yi Deng and
                  Juan A. Garay and
                  San Ling and
                  Huaxiong Wang and
                  Moti Yung},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {On the Implausibility of Constant-Round Public-Coin Zero-Knowledge
                  Proofs},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {237--253},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_13},
  doi          = {10.1007/978-3-319-44618-9\_13},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DengGLWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DolevDLOY16,
  author       = {Shlomi Dolev and
                  Karim El Defrawy and
                  Joshua Lampkins and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Proactive Secret Sharing with a Dishonest Majority},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {529--548},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_28},
  doi          = {10.1007/978-3-319-44618-9\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DolevDLOY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2015,
  editor       = {Dongdai Lin and
                  XiaoFeng Wang and
                  Moti Yung},
  title        = {Information Security and Cryptology - 11th International Conference,
                  Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9589},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-38898-4},
  doi          = {10.1007/978-3-319-38898-4},
  isbn         = {978-3-319-38897-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2015,
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31550-8},
  doi          = {10.1007/978-3-319-31550-8},
  isbn         = {978-3-319-31549-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2016,
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1},
  doi          = {10.1007/978-3-319-46298-1},
  isbn         = {978-3-319-46297-4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtMSY16,
  author       = {Frederik Armknecht and
                  Daisuke Moriyama and
                  Ahmad{-}Reza Sadeghi and
                  Moti Yung},
  title        = {Towards a Unified Security Model for Physically Unclonable Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtMSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoungY16,
  author       = {Adam L. Young and
                  Moti Yung},
  title        = {Semantically Secure Anonymity: Foundations of Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoungY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Russell0YZ16,
  author       = {Alexander Russell and
                  Qiang Tang and
                  Moti Yung and
                  Hong{-}Sheng Zhou},
  title        = {Destroying Steganography via Amalgamation: Kleptographically {CPA}
                  Secure Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/530},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Russell0YZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertRY16,
  author       = {Beno{\^{\i}}t Libert and
                  Somindu C. Ramanna and
                  Moti Yung},
  title        = {Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based
                  Accumulators from Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {766},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/766},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertRY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LibertPJY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Linearly homomorphic structure-preserving signatures and their applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {441--477},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0079-1},
  doi          = {10.1007/S10623-015-0079-1},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LibertPJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LeeLY15,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  title        = {Sequential aggregate signatures with short public keys without random
                  oracles},
  journal      = {Theor. Comput. Sci.},
  volume       = {579},
  pages        = {100--125},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.tcs.2015.02.019},
  doi          = {10.1016/J.TCS.2015.02.019},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LeeLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LibertPJY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound
                  {QA-NIZK} Proofs and Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {681--707},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_28},
  doi          = {10.1007/978-3-662-48797-6\_28},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LibertPJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Yung15,
  author       = {Moti Yung},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {From Mental Poker to Core Business: Why and How to Deploy Secure Computation
                  Protocols?},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2812701},
  doi          = {10.1145/2810103.2812701},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Yung15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SanderY15,
  author       = {Tomas Sander and
                  Moti Yung},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {WISCS'15: The 2nd {ACM} Workshop on Information Sharing and Collaborative
                  Security},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1717--1718},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2812627},
  doi          = {10.1145/2810103.2812627},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SanderY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AysuGMSY15,
  author       = {Aydin Aysu and
                  Ege Gulcan and
                  Daisuke Moriyama and
                  Patrick Schaumont and
                  Moti Yung},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {End-To-End Design of a PUF-Based Privacy Preserving Authentication
                  Protocol},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {556--576},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_28},
  doi          = {10.1007/978-3-662-48324-4\_28},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/AysuGMSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MoriyamaY15,
  author       = {Daisuke Moriyama and
                  Moti Yung},
  title        = {The bright side arguments for the coming smartphones crypto war: The
                  added value of device encryption},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {65--73},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346812},
  doi          = {10.1109/CNS.2015.7346812},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MoriyamaY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertPY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Short Group Signatures via Structure-Preserving Signatures: Standard
                  Model Security from Simple Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {296--316},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_15},
  doi          = {10.1007/978-3-662-48000-7\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DiazCAKRY15,
  author       = {Jesus Diaz and
                  Seung Geol Choi and
                  David Arroyo and
                  Angelos D. Keromytis and
                  Francisco de Borja Rodr{\'{\i}}guez and
                  Moti Yung},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Privacy Threats in E-Shopping (Position Paper)},
  booktitle    = {Data Privacy Management, and Security Assurance - 10th International
                  Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015,
                  Vienna, Austria, September 21-22, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9481},
  pages        = {217--225},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29883-2\_14},
  doi          = {10.1007/978-3-319-29883-2\_14},
  timestamp    = {Sun, 25 Oct 2020 22:34:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DiazCAKRY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HanzlikKY15,
  author       = {Lucjan Hanzlik and
                  Miroslaw Kutylowski and
                  Moti Yung},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Hard Invalidation of Electronic Signatures},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {421--436},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_29},
  doi          = {10.1007/978-3-319-17533-1\_29},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HanzlikKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertJYP15,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung and
                  Thomas Peters},
  editor       = {Jonathan Katz},
  title        = {Secure Efficient History-Hiding Append-Only Signatures in the Standard
                  Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {450--473},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_20},
  doi          = {10.1007/978-3-662-46447-2\_20},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertJYP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Yung15,
  author       = {Moti Yung},
  editor       = {Chryssis Georgiou and
                  Paul G. Spirakis},
  title        = {The "Mobile Adversary" Paradigm in Distributed Computation
                  and Systems},
  booktitle    = {Proceedings of the 2015 {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2015, Donostia-San Sebasti{\'{a}}n, Spain,
                  July 21 - 23, 2015},
  pages        = {171--172},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2767386.2767453},
  doi          = {10.1145/2767386.2767453},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/Yung15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GarayGJKY15,
  author       = {Juan A. Garay and
                  Ran Gelles and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty
                  Computation},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {134--158},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_7},
  doi          = {10.1007/978-3-662-46494-6\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GarayGJKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015wiscs,
  editor       = {Indrajit Ray and
                  Tomas Sander and
                  Moti Yung},
  title        = {Proceedings of the 2nd {ACM} Workshop on Information Sharing and Collaborative
                  Security, {WISCS} 2015, Denver, Colorado, USA, October 12, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808128},
  doi          = {10.1145/2808128},
  isbn         = {978-1-4503-3822-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2015wiscs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2014,
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16745-9},
  doi          = {10.1007/978-3-319-16745-9},
  isbn         = {978-3-319-16744-2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2014,
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27998-5},
  doi          = {10.1007/978-3-319-27998-5},
  isbn         = {978-3-319-27997-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2015,
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0},
  doi          = {10.1007/978-3-319-25645-0},
  isbn         = {978-3-319-25644-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LeeLY15,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  title        = {Sequential Aggregate Signatures with Short Public Keys without Random
                  Oracles},
  journal      = {CoRR},
  volume       = {abs/1502.06691},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.06691},
  eprinttype    = {arXiv},
  eprint       = {1502.06691},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LeeLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPJY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound
                  {QA-NIZK} Proofs and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RussellTYZ15,
  author       = {Alexander Russell and
                  Qiang Tang and
                  Moti Yung and
                  Hong{-}Sheng Zhou},
  title        = {Cliptography: Clipping the Power of Kleptographic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/695},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RussellTYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  title        = {Short Group Signatures via Structure-Preserving Signatures: Standard
                  Model Security from Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/743},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AysuGMSY15,
  author       = {Aydin Aysu and
                  Ege Gulcan and
                  Daisuke Moriyama and
                  Patrick Schaumont and
                  Moti Yung},
  title        = {End-to-end Design of a PUF-based Privacy Preserving Authentication
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {937},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/937},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AysuGMSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLPY15,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Jong Hwan Park and
                  Moti Yung},
  title        = {{CCA} Security for Self-Updatable Encryption: Protecting Cloud Data
                  When Clients Read/Write Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1202},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LibertJYP14,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung and
                  Thomas Peters},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Concise Multi-challenge CCA-Secure Encryption and Signatures with
                  Almost Tight Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_1},
  doi          = {10.1007/978-3-662-45608-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LibertJYP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/TeranishiYM14,
  author       = {Isamu Teranishi and
                  Moti Yung and
                  Tal Malkin},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Order-Preserving Encryption Secure Beyond One-Wayness},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_3},
  doi          = {10.1007/978-3-662-45608-8\_3},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/TeranishiYM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/YoungY14,
  author       = {Adam L. Young and
                  Moti Yung},
  title        = {The drunk motorcyclist protocol for anonymous communication},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {157--165},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997482},
  doi          = {10.1109/CNS.2014.6997482},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/YoungY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LibertPJY14,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive
                  {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {514--532},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_29},
  doi          = {10.1007/978-3-642-55220-5\_29},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LibertPJY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DmitrienkoNSY14,
  author       = {Alexandra Dmitrienko and
                  David Noack and
                  Ahmad{-}Reza Sadeghi and
                  Moti Yung},
  editor       = {Rainer B{\"{o}}hme and
                  Michael Brenner and
                  Tyler Moore and
                  Matthew Smith},
  title        = {On Offline Payments with Bitcoin (Poster Abstract)},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
                  and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8438},
  pages        = {159--160},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44774-1\_11},
  doi          = {10.1007/978-3-662-44774-1\_11},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DmitrienkoNSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertYJP14,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung and
                  Marc Joye and
                  Thomas Peters},
  editor       = {Hugo Krawczyk},
  title        = {Traceable Group Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {592--610},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_34},
  doi          = {10.1007/978-3-642-54631-0\_34},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertYJP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/LibertJY13,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Shlomi Dolev},
  title        = {Born and raised distributively: fully distributed non-interactive
                  adaptively-secure threshold signatures with short shares},
  booktitle    = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '14,
                  Paris, France, July 15-18, 2014},
  pages        = {303--312},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611462.2611498},
  doi          = {10.1145/2611462.2611498},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/LibertJY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NaccacheSCY14,
  author       = {David Naccache and
                  Rainer Steinwandt and
                  Adriana Su{\'{a}}rez Corona and
                  Moti Yung},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {598--607},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_34},
  doi          = {10.1007/978-3-319-10879-7\_34},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NaccacheSCY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014,
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2660267},
  isbn         = {978-1-4503-2957-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2013,
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12087-4},
  doi          = {10.1007/978-3-319-12087-4},
  isbn         = {978-3-319-12086-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayGJKY14,
  author       = {Juan A. Garay and
                  Ran Gelles and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayGJKY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertJYP14,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung and
                  Thomas Peters},
  title        = {Concise Multi-Challenge CCA-Secure Encryption and Signatures with
                  Almost Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/743},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertJYP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LibertY13,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  title        = {Adaptively secure non-interactive threshold cryptosystems},
  journal      = {Theor. Comput. Sci.},
  volume       = {478},
  pages        = {76--100},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.tcs.2013.01.001},
  doi          = {10.1016/J.TCS.2013.01.001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LibertY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LeeLY13,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Sequential Aggregate Signatures Made Shorter},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {202--217},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_13},
  doi          = {10.1007/978-3-642-38980-1\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LeeLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LeeCLPY13,
  author       = {Kwangsu Lee and
                  Seung Geol Choi and
                  Dong Hoon Lee and
                  Jong Hwan Park and
                  Moti Yung},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Self-Updatable Encryption: Time Constrained Access Control with Hidden
                  Attributes and Better Efficiency},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {235--254},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_13},
  doi          = {10.1007/978-3-642-42033-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LeeCLPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertPJY13,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {289--307},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_17},
  doi          = {10.1007/978-3-642-40084-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertPJY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LeeLY13,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Aggregating CL-Signatures Revisited: Extended Functionality and Better
                  Efficiency},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {171--188},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_14},
  doi          = {10.1007/978-3-642-39884-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/LeeLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GarayJKY13,
  author       = {Juan A. Garay and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Robert D. Kleinberg},
  title        = {Resource-based corruptions and the combinatorics of hidden diversity},
  booktitle    = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
                  CA, USA, January 9-12, 2013},
  pages        = {415--428},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2422436.2422482},
  doi          = {10.1145/2422436.2422482},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/GarayJKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LeeLY13,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis
                  and Implementation Studies},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {423--442},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_26},
  doi          = {10.1007/978-3-642-36362-7\_26},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LeeLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013,
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2508859},
  isbn         = {978-1-4503-2477-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2012,
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38519-3},
  doi          = {10.1007/978-3-642-38519-3},
  isbn         = {978-3-642-38518-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPJY13,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPJY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLY13,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  title        = {Sequential Aggregate Signatures Made Shorter},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkinTY13,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Moti Yung},
  title        = {Order-Preserving Encryption Secure Beyond One-Wayness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkinTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPJY13a,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive
                  {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/691},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPJY13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoriyamaMY13,
  author       = {Daisuke Moriyama and
                  Shin'ichiro Matsuo and
                  Moti Yung},
  title        = {PUF-Based {RFID} Authentication Secure and Private under Complete
                  Memory Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {712},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/712},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoriyamaMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeCLPY13,
  author       = {Kwangsu Lee and
                  Seung Geol Choi and
                  Dong Hoon Lee and
                  Jong Hwan Park and
                  Moti Yung},
  title        = {Self-Updatable Encryption: Time Constrained Access Control with Hidden
                  Attributes and Better Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {762},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/762},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeCLPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/DolevLY12,
  author       = {Shlomi Dolev and
                  Limor Lahiani and
                  Moti Yung},
  title        = {Secret swarm unit: Reactive k-secret sharing},
  journal      = {Ad Hoc Networks},
  volume       = {10},
  number       = {7},
  pages        = {1291--1305},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.adhoc.2012.03.011},
  doi          = {10.1016/J.ADHOC.2012.03.011},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/DolevLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Dachman-SoledM0Y12,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Moti Yung},
  title        = {Efficient robust private set intersection},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {289--303},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.048080},
  doi          = {10.1504/IJACT.2012.048080},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Dachman-SoledM0Y12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Ben-DavidBMPPY12,
  author       = {Assaf Ben{-}David and
                  Omer Berkman and
                  Yossi Matias and
                  Sarvar Patel and
                  Cem Paya and
                  Moti Yung},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Contextual {OTP:} Mitigating Emerging Man-in-the-Middle Attacks with
                  Wireless Hardware Tokens},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {30--47},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_3},
  doi          = {10.1007/978-3-642-31284-7\_3},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Ben-DavidBMPPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/LibertY12,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {David Naccache},
  title        = {Fully Forward-Secure Group Signatures},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {156--184},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_13},
  doi          = {10.1007/978-3-642-28368-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/LibertY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BerkmanPY12,
  author       = {Omer Berkman and
                  Benny Pinkas and
                  Moti Yung},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Firm Grip Handshakes: {A} Tool for Bidirectional Vouching},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {142--157},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_12},
  doi          = {10.1007/978-3-642-35404-5\_12},
  timestamp    = {Sun, 02 Jun 2019 21:12:31 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BerkmanPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DodisLXY12,
  author       = {Yevgeniy Dodis and
                  Weiliang Luo and
                  Shouhuai Xu and
                  Moti Yung},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Key-insulated symmetric key cryptography and mitigating attacks against
                  cryptographic cloud software},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {57--58},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414489},
  doi          = {10.1145/2414456.2414489},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DodisLXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertPY12,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Group Signatures with Almost-for-Free Revocation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {571--589},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_34},
  doi          = {10.1007/978-3-642-32009-5\_34},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LibertPY12,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Scalable Group Signatures with Revocation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {609--627},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_36},
  doi          = {10.1007/978-3-642-29011-4\_36},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LibertPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/RabinMMY12,
  author       = {Michael O. Rabin and
                  Yishay Mansour and
                  S. Muthukrishnan and
                  Moti Yung},
  editor       = {Artur Czumaj and
                  Kurt Mehlhorn and
                  Andrew M. Pitts and
                  Roger Wattenhofer},
  title        = {Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial
                  Transactions},
  booktitle    = {Automata, Languages, and Programming - 39th International Colloquium,
                  {ICALP} 2012, Warwick, UK, July 9-13, 2012, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7391},
  pages        = {738--749},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31594-7\_62},
  doi          = {10.1007/978-3-642-31594-7\_62},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/RabinMMY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JumaVY12,
  author       = {Ali Juma and
                  Yevgeniy Vahlis and
                  Moti Yung},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Multi-location Leakage Resilient Cryptography},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {504--521},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_30},
  doi          = {10.1007/978-3-642-30057-8\_30},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/JumaVY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ChoiDY12,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Moti Yung},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {On the Centrality of Off-Line E-Cash to Concrete Partial Information
                  Games},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {264--280},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_15},
  doi          = {10.1007/978-3-642-32928-9\_15},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ChoiDY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LibertY12,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Ronald Cramer},
  title        = {Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security:
                  New Framework and Constructions},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_5},
  doi          = {10.1007/978-3-642-28914-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LibertY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2011,
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34704-7},
  doi          = {10.1007/978-3-642-34704-7},
  isbn         = {978-3-642-34703-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2012,
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1},
  doi          = {10.1007/978-3-642-33167-1},
  isbn         = {978-3-642-33166-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2011,
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32298-3},
  doi          = {10.1007/978-3-642-32298-3},
  isbn         = {978-3-642-32297-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2011,
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27890-7},
  doi          = {10.1007/978-3-642-27890-7},
  isbn         = {978-3-642-27889-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2012,
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8},
  doi          = {10.1007/978-3-642-35416-8},
  isbn         = {978-3-642-35415-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JutlaY12,
  author       = {Charanjit S. Jutla and
                  Moti Yung},
  title        = {PayTree: "Amortized Signature" for Flexible Micro-Payments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JutlaY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangY12,
  author       = {Donghoon Chang and
                  Moti Yung},
  title        = {Adaptive Preimage Resistance Analysis Revisited: {\textbackslash}{\textbackslash}
                  Requirements, Subtleties and Implications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPY12,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  title        = {Scalable Group Signatures with Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPY12a,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  title        = {Group Signatures with Almost-for-free Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPY12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SantisY12,
  author       = {Alfredo De Santis and
                  Moti Yung},
  title        = {"Metaproofs" (and their Cryptographic Applications)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/495},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SantisY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengGLWY12,
  author       = {Yi Deng and
                  Juan A. Garay and
                  San Ling and
                  Huaxiong Wang and
                  Moti Yung},
  title        = {On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable
                  Zero-Knowledge Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengGLWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLY12,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  title        = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis
                  and Implementation Studies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/518},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayJKY12,
  author       = {Juan A. Garay and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Resource-based Corruptions and the Combinatorics of Hidden Diversity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayJKY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLY12a,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  title        = {Aggregating CL-Signatures Revisited: Extended Functionality and Better
                  Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLY12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DiamentLKY11,
  author       = {Ted Diament and
                  Homin K. Lee and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {The Efficient Dual Receiver Cryptosystem and Its Applications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {135--151},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p135-151.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DiamentLKY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DengLYZ11,
  author       = {Robert H. Deng and
                  Yingjiu Li and
                  Moti Yung and
                  Yunlei Zhao},
  title        = {A zero-knowledge based framework for {RFID} privacy},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1109--1146},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2011-0440},
  doi          = {10.3233/JCS-2011-0440},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DengLYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LibertY11,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  title        = {Efficient traceable signatures in the standard model},
  journal      = {Theor. Comput. Sci.},
  volume       = {412},
  number       = {12-14},
  pages        = {1220--1242},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.tcs.2010.12.066},
  doi          = {10.1016/J.TCS.2010.12.066},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LibertY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY11,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Moti Yung},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Secure Efficient Multiparty Computing of Multivariate Polynomials
                  and Applications},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {130--146},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_8},
  doi          = {10.1007/978-3-642-21554-4\_8},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DengFGLSY11,
  author       = {Yi Deng and
                  Dengguo Feng and
                  Vipul Goyal and
                  Dongdai Lin and
                  Amit Sahai and
                  Moti Yung},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {390--406},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_21},
  doi          = {10.1007/978-3-642-25385-0\_21},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DengFGLSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LibertY11,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_1},
  doi          = {10.1007/978-3-642-34704-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LibertY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/Yung11,
  author       = {Moti Yung},
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {From Protecting a System to Protecting a Global Ecosystem},
  booktitle    = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  pages        = {255},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5\_29},
  doi          = {10.1007/978-3-642-24712-5\_29},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/Yung11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MalkinTY11,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Moti Yung},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Key dependent message security: recent results and applications},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943516},
  doi          = {10.1145/1943513.1943516},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MalkinTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MalkinTY11,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Moti Yung},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Circuit-Size Independent Public Key Encryption with {KDM}
                  Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {507--526},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_28},
  doi          = {10.1007/978-3-642-20465-4\_28},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MalkinTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Yung11,
  author       = {Moti Yung},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Cryptographic Protocols: From the Abstract to the Practical to the
                  Actual},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_1},
  doi          = {10.1007/978-3-642-29889-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Yung11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChangNY11,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Moti Yung},
  editor       = {Antoine Joux},
  title        = {On the Security of Hash Functions Employing Blockcipher Postprocessing},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {146--166},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_9},
  doi          = {10.1007/978-3-642-21702-9\_9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/ChangNY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/LibertY11,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Luca Aceto and
                  Monika Henzinger and
                  Jir{\'{\i}} Sgall},
  title        = {Adaptively Secure Non-interactive Threshold Cryptosystems},
  booktitle    = {Automata, Languages and Programming - 38th International Colloquium,
                  {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6756},
  pages        = {588--600},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22012-8\_47},
  doi          = {10.1007/978-3-642-22012-8\_47},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/LibertY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/MatsuoMY11,
  author       = {Shin'ichiro Matsuo and
                  Daisuke Moriyama and
                  Moti Yung},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Multifactor Authenticated Key Renewal},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {204--220},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_14},
  doi          = {10.1007/978-3-642-32298-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/MatsuoMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MalkinTVY11,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Yevgeniy Vahlis and
                  Moti Yung},
  editor       = {Yuval Ishai},
  title        = {Signatures Resilient to Continual Leakage on Memory and Computation},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_7},
  doi          = {10.1007/978-3-642-19571-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MalkinTVY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2009,
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-16342-5},
  doi          = {10.1007/978-3-642-16342-5},
  isbn         = {978-3-642-16341-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2010,
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21518-6},
  doi          = {10.1007/978-3-642-21518-6},
  isbn         = {978-3-642-21517-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2010,
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25283-9},
  doi          = {10.1007/978-3-642-25283-9},
  isbn         = {978-3-642-25282-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2010,
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-17955-6},
  doi          = {10.1007/978-3-642-17955-6},
  isbn         = {978-3-642-17954-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengFGLSY11,
  author       = {Yi Deng and
                  Dengguo Feng and
                  Vipul Goyal and
                  Dongdai Lin and
                  Amit Sahai and
                  Moti Yung},
  title        = {Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengFGLSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangNY11,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Moti Yung},
  title        = {Indifferentiability of the Hash Algorithm {BLAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/623},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangNY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Yung10,
  author       = {Moti Yung},
  title        = {Preface},
  journal      = {Theor. Comput. Sci.},
  volume       = {411},
  number       = {10},
  pages        = {1235},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.tcs.2009.10.019},
  doi          = {10.1016/J.TCS.2009.10.019},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Yung10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LibertQY10,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  title        = {Key Evolution Systems in Untrusted Update Environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {37:1--37:34},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880031},
  doi          = {10.1145/1880022.1880031},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LibertQY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LibertY10,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Dynamic fully forward-secure group signatures},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {70--81},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755698},
  doi          = {10.1145/1755688.1755698},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LibertY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuSPY10,
  author       = {Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Moti Yung},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Practical leakage-resilient pseudorandom generators},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {141--151},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866324},
  doi          = {10.1145/1866307.1866324},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YuSPY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DengLYZ10,
  author       = {Robert H. Deng and
                  Yingjiu Li and
                  Moti Yung and
                  Yunlei Zhao},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {A New Framework for {RFID} Privacy},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_1},
  doi          = {10.1007/978-3-642-15497-3\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DengLYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Yung10,
  author       = {Moti Yung},
  editor       = {Henri Gilbert},
  title        = {Cryptography between Wonderland and Underland},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {320--321},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_16},
  doi          = {10.1007/978-3-642-13190-5\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Yung10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasY10,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Radu Sion},
  title        = {Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot
                  Elections},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {257--271},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_20},
  doi          = {10.1007/978-3-642-14577-3\_20},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/LibertY10,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Samson Abramsky and
                  Cyril Gavoille and
                  Claude Kirchner and
                  Friedhelm Meyer auf der Heide and
                  Paul G. Spirakis},
  title        = {Efficient Completely Non-malleable Public Key Encryption},
  booktitle    = {Automata, Languages and Programming, 37th International Colloquium,
                  {ICALP} 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6198},
  pages        = {127--139},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14165-2\_12},
  doi          = {10.1007/978-3-642-14165-2\_12},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/LibertY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/YaoYZ10,
  author       = {Andrew Chi{-}Chih Yao and
                  Moti Yung and
                  Yunlei Zhao},
  editor       = {Samson Abramsky and
                  Cyril Gavoille and
                  Claude Kirchner and
                  Friedhelm Meyer auf der Heide and
                  Paul G. Spirakis},
  title        = {Concurrent Knowledge Extraction in the Public-Key Model},
  booktitle    = {Automata, Languages and Programming, 37th International Colloquium,
                  {ICALP} 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6198},
  pages        = {702--714},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14165-2\_59},
  doi          = {10.1007/978-3-642-14165-2\_59},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/YaoYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/PhongMY10,
  author       = {Le Trieu Phong and
                  Shin'ichiro Matsuo and
                  Moti Yung},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Leakage Resilient Strong Key-Insulated Signatures in Public Channel},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {160--172},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_11},
  doi          = {10.1007/978-3-642-25283-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/PhongMY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/MatsuoPOY10,
  author       = {Shin'ichiro Matsuo and
                  Le Trieu Phong and
                  Miyako Ohkubo and
                  Moti Yung},
  editor       = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title        = {Leakage-Resilient {RFID} Authentication with Forward-Privacy},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 6th
                  International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6370},
  pages        = {176--188},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16822-2\_15},
  doi          = {10.1007/978-3-642-16822-2\_15},
  timestamp    = {Fri, 03 Sep 2021 17:40:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/MatsuoPOY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/YoungY10,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Kleptography from Standard Assumptions and Applications},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {271--290},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_18},
  doi          = {10.1007/978-3-642-15317-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/YoungY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LibertY10,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Daniele Micciancio},
  title        = {Concise Mercurial Vector Commitments and Independent Zero-Knowledge
                  Sets with Short Proofs},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {499--517},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_30},
  doi          = {10.1007/978-3-642-11799-2\_30},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LibertY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/KiayiasY10,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {The Vector-Ballot Approach for Online Voting Procedures},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {155--174},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_9},
  doi          = {10.1007/978-3-642-12980-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/KiayiasY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/StandaertPYQYO10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu and
                  Jean{-}Jacques Quisquater and
                  Moti Yung and
                  Elisabeth Oswald},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Leakage Resilient Cryptography in Practice},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {99--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_5},
  doi          = {10.1007/978-3-642-14452-3\_5},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/StandaertPYQYO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2010,
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2},
  doi          = {10.1007/978-3-642-13708-2},
  isbn         = {978-3-642-13707-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2009,
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14597-1},
  doi          = {10.1007/978-3-642-14597-1},
  isbn         = {978-3-642-14596-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sss/2010,
  editor       = {Shlomi Dolev and
                  Jorge Arturo Cobb and
                  Michael J. Fischer and
                  Moti Yung},
  title        = {Stabilization, Safety, and Security of Distributed Systems - 12th
                  International Symposium, {SSS} 2010, New York, NY, USA, September
                  20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6366},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16023-3},
  doi          = {10.1007/978-3-642-16023-3},
  isbn         = {978-3-642-16022-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengLYYZ10,
  author       = {Robert H. Deng and
                  Yingjiu Li and
                  Andrew C. Yao and
                  Moti Yung and
                  Yunlei Zhao},
  title        = {A New Framework for {RFID} Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengLYYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoYZ10,
  author       = {Andrew C. Yao and
                  Moti Yung and
                  Yunlei Zhao},
  title        = {Concurrent Knowledge Extraction in the Public-Key Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoYZ10a,
  author       = {Andrew C. Yao and
                  Moti Yung and
                  Yunlei Zhao},
  title        = {Adaptive Concurrent Non-Malleability with Bare Public-Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoYZ10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkinTVY10,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Yevgeniy Vahlis and
                  Moti Yung},
  title        = {Signatures Resilient to Continual Leakage on Memory and Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkinTVY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangNY10,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Moti Yung},
  title        = {On the Security of Hash Functions Employing Blockcipher Postprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/629},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangNY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CookYK09,
  author       = {Debra L. Cook and
                  Moti Yung and
                  Angelos D. Keromytis},
  title        = {Elastic block ciphers: method, security and instantiations},
  journal      = {Int. J. Inf. Sec.},
  volume       = {8},
  number       = {3},
  pages        = {211--231},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10207-008-0075-9},
  doi          = {10.1007/S10207-008-0075-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CookYK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ChoiHHHKLY09,
  author       = {Seung Geol Choi and
                  Javier Herranz and
                  Dennis Hofheinz and
                  Jung Yeon Hwang and
                  Eike Kiltz and
                  Dong Hoon Lee and
                  Moti Yung},
  title        = {The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure},
  journal      = {Inf. Process. Lett.},
  volume       = {109},
  number       = {16},
  pages        = {897--901},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ipl.2009.04.007},
  doi          = {10.1016/J.IPL.2009.04.007},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ChoiHHHKLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/KatzOY09,
  author       = {Jonathan Katz and
                  Rafail Ostrovsky and
                  Moti Yung},
  title        = {Efficient and secure authenticated key exchange using weak passwords},
  journal      = {J. {ACM}},
  volume       = {57},
  number       = {1},
  pages        = {3:1--3:39},
  year         = {2009},
  url          = {https://doi.org/10.1145/1613676.1613679},
  doi          = {10.1145/1613676.1613679},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/KatzOY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY09,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Moti Yung},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Efficient Robust Private Set Intersection},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {125--142},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_8},
  doi          = {10.1007/978-3-642-01957-9\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CathaloLY09,
  author       = {Julien Cathalo and
                  Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Mitsuru Matsui},
  title        = {Group Encryption: Non-interactive Realization in the Standard Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {179--196},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_11},
  doi          = {10.1007/978-3-642-10366-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CathaloLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiEMY09,
  author       = {Seung Geol Choi and
                  Ariel Elbaz and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Mitsuru Matsui},
  title        = {Secure Multi-party Computation Minimizing Online Rounds},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {268--286},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_16},
  doi          = {10.1007/978-3-642-10366-7\_16},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiEMY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/NaccacheSY09,
  author       = {David Naccache and
                  Rainer Steinwandt and
                  Moti Yung},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch and
                  Detlef H{\"{u}}hnlein},
  title        = {Reverse Public Key Encryption},
  booktitle    = {{BIOSIG} 2009 - Proceedings of the Special Interest Group on Biometrics
                  and Electronic Signatures, 17.-18. September 2009 in Darmstadt, Germany},
  series       = {{LNI}},
  volume       = {{P-155}},
  pages        = {155--169},
  publisher    = {{GI}},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/23181},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/NaccacheSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HwangLY09,
  author       = {Jung Yeon Hwang and
                  Dong Hoon Lee and
                  Moti Yung},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Universal forgery of the identity-based sequential aggregate signature
                  scheme},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {157--160},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533080},
  doi          = {10.1145/1533057.1533080},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HwangLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischKY09,
  author       = {Jan Camenisch and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Antoine Joux},
  title        = {On the Portability of Generalized Schnorr Proofs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {425--442},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_25},
  doi          = {10.1007/978-3-642-01001-9\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CamenischKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/StandaertMY09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Antoine Joux},
  title        = {A Unified Framework for the Analysis of Side-Channel Key Recovery
                  Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {443--461},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_26},
  doi          = {10.1007/978-3-642-01001-9\_26},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/StandaertMY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiltzPSY09,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Martijn Stam and
                  Moti Yung},
  editor       = {Antoine Joux},
  title        = {A New Randomness Extraction Paradigm for Hybrid Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {590--609},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_34},
  doi          = {10.1007/978-3-642-01001-9\_34},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiltzPSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasYY09,
  author       = {Aggelos Kiayias and
                  B{\"{u}}lent Yener and
                  Moti Yung},
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Privacy-Preserving Information Markets for Computing Statistical Data},
  booktitle    = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {32--50},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4\_3},
  doi          = {10.1007/978-3-642-03549-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasYY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/XuY09,
  author       = {Shouhuai Xu and
                  Moti Yung},
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Expecting the Unexpected: Towards Robust Credential Infrastructure},
  booktitle    = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {201--221},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4\_12},
  doi          = {10.1007/978-3-642-03549-4\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/XuY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fct/Yung09,
  author       = {Moti Yung},
  editor       = {Miroslaw Kutylowski and
                  Witold Charatonik and
                  Maciej Gebala},
  title        = {How to Guard the Guards Themselves},
  booktitle    = {Fundamentals of Computation Theory, 17th International Symposium,
                  {FCT} 2009, Wroclaw, Poland, September 2-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5699},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03409-1\_1},
  doi          = {10.1007/978-3-642-03409-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fct/Yung09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/IbrahimKYZ09,
  author       = {Maged H. Ibrahim and
                  Aggelos Kiayias and
                  Moti Yung and
                  Hong{-}Sheng Zhou},
  editor       = {Susanne Albers and
                  Alberto Marchetti{-}Spaccamela and
                  Yossi Matias and
                  Sotiris E. Nikoletseas and
                  Wolfgang Thomas},
  title        = {Secure Function Collection with Sublinear Storage},
  booktitle    = {Automata, Languages and Programming, 36th Internatilonal Colloquium,
                  {ICALP} 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5556},
  pages        = {534--545},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02930-1\_44},
  doi          = {10.1007/978-3-642-02930-1\_44},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/IbrahimKYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/XuY09,
  author       = {Shouhuai Xu and
                  Moti Yung},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {SocialClouds: Concept, Security Architecture and Some Mechanisms},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {104--128},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_7},
  doi          = {10.1007/978-3-642-14597-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/XuY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/LibertY09,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Hovav Shacham and
                  Brent Waters},
  title        = {Efficient Traceable Signatures in the Standard Model},
  booktitle    = {Pairing-Based Cryptography - Pairing 2009, Third International Conference,
                  Palo Alto, CA, USA, August 12-14, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5671},
  pages        = {187--205},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03298-1\_13},
  doi          = {10.1007/978-3-642-03298-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/LibertY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2008x,
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01440-6},
  doi          = {10.1007/978-3-642-01440-6},
  isbn         = {978-3-642-01439-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2008x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2009,
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8},
  doi          = {10.1007/978-3-642-04474-8},
  isbn         = {978-3-642-04473-1},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2008,
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00306-6},
  doi          = {10.1007/978-3-642-00306-6},
  isbn         = {978-3-642-00305-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2009,
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9},
  doi          = {10.1007/978-3-642-10838-9},
  isbn         = {978-3-642-10837-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0908-2476,
  author       = {Andrew Chi{-}Chih Yao and
                  Moti Yung and
                  Yunlei Zhao},
  title        = {Concurrent Knowledge-Extraction in the Public-Key Model},
  journal      = {CoRR},
  volume       = {abs/0908.2476},
  year         = {2009},
  url          = {http://arxiv.org/abs/0908.2476},
  eprinttype    = {arXiv},
  eprint       = {0908.2476},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0908-2476.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0910-3282,
  author       = {Andrew Chi{-}Chih Yao and
                  Moti Yung and
                  Yunlei Zhao},
  title        = {Adaptive Concurrent Non-Malleability with Bare Public-Keys},
  journal      = {CoRR},
  volume       = {abs/0910.3282},
  year         = {2009},
  url          = {http://arxiv.org/abs/0910.3282},
  eprinttype    = {arXiv},
  eprint       = {0910.3282},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-3282.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKY09,
  author       = {Jan Camenisch and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {On the Portability of Generalized Schnorr Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertPYQYO09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu and
                  Jean{-}Jacques Quisquater and
                  Moti Yung and
                  Elisabeth Oswald},
  title        = {Leakage Resilient Cryptography in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertPYQYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/SantisCPY08,
  author       = {Alfredo De Santis and
                  Giovanni Di Crescenzo and
                  Giuseppe Persiano and
                  Moti Yung},
  title        = {On Monotone Formula Composition of Perfect Zero-Knowledge Languages},
  journal      = {{SIAM} J. Comput.},
  volume       = {38},
  number       = {4},
  pages        = {1300--1329},
  year         = {2008},
  url          = {https://doi.org/10.1137/S0097539798346123},
  doi          = {10.1137/S0097539798346123},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/SantisCPY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KiayiasY08,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {6},
  pages        = {2752--2769},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.921876},
  doi          = {10.1109/TIT.2008.921876},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KiayiasY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CookYK08,
  author       = {Debra L. Cook and
                  Moti Yung and
                  Angelos D. Keromytis},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Methods for Linear and Differential Cryptanalysis of Elastic Block
                  Ciphers},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_14},
  doi          = {10.1007/978-3-540-70500-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CookYK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PetitSPMY08,
  author       = {Christophe Petit and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {A block cipher based pseudo random number generator secure against
                  side-channel key recovery},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {56--65},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368322},
  doi          = {10.1145/1368310.1368322},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PetitSPMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LibertQY08,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Key Evolution Systems in Untrusted Update Environments},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {12--21},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_2},
  doi          = {10.1007/978-3-642-01440-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LibertQY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CookYK08,
  author       = {Debra L. Cook and
                  Moti Yung and
                  Angelos D. Keromytis},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {157--180},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_14},
  doi          = {10.1007/978-3-642-01440-6\_14},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CookYK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KiayiasY08,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Public-key traitor tracing from efficient decoding and unbounded enrollment:
                  extended abstract},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {9--18},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456525},
  doi          = {10.1145/1456520.1456525},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KiayiasY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BenjumeaCLY08,
  author       = {Vicente Benjumea and
                  Seung Geol Choi and
                  Javier L{\'{o}}pez and
                  Moti Yung},
  editor       = {Gene Tsudik},
  title        = {Fair Traceable Multi-Group Signatures},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {231--246},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_21},
  doi          = {10.1007/978-3-540-85230-8\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BenjumeaCLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CallasDNOQY08,
  author       = {Jon Callas and
                  Yvo Desmedt and
                  Daniel Nagy and
                  Akira Otsuka and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Gene Tsudik},
  title        = {Real Electronic Cash Versus Academic Electronic Cash Versus Paper
                  Cash (Panel Report)},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {307--313},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_28},
  doi          = {10.1007/978-3-540-85230-8\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CallasDNOQY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/StandaertMY08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Does Physical Security of Cryptographic Devices Need a Formal Study?
                  (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_7},
  doi          = {10.1007/978-3-540-85093-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/StandaertMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/YeomCY08,
  author       = {Yongjin Yeom and
                  Yongkuk Cho and
                  Moti Yung},
  title        = {High-Speed Implementations of Block Cipher {ARIA} Using Graphics Processing
                  Units},
  booktitle    = {2008 International Conference on Multimedia and Ubiquitous Engineering
                  {(MUE} 2008), 24-26 April 2008, Busan, Korea},
  pages        = {271--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MUE.2008.94},
  doi          = {10.1109/MUE.2008.94},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/YeomCY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MolY08,
  author       = {Petros Mol and
                  Moti Yung},
  editor       = {Ronald Cramer},
  title        = {Recovering {NTRU} Secret Key from Inversion Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {18--36},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_2},
  doi          = {10.1007/978-3-540-78440-1\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MolY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KiayiasXY08,
  author       = {Aggelos Kiayias and
                  Shouhuai Xu and
                  Moti Yung},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Privacy Preserving Data Mining within Anonymous Credential Systems},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_5},
  doi          = {10.1007/978-3-540-85855-3\_5},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/KiayiasXY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2008,
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0},
  doi          = {10.1007/978-3-540-68914-0},
  isbn         = {978-3-540-68913-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2008,
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79499-8},
  doi          = {10.1007/978-3-540-79499-8},
  isbn         = {978-3-540-79498-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2007,
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77535-5},
  doi          = {10.1007/978-3-540-77535-5},
  isbn         = {978-3-540-77534-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenjumeaCLY08,
  author       = {Vicente Benjumea and
                  Seung Geol Choi and
                  Javier L{\'{o}}pez and
                  Moti Yung},
  title        = {Fair Traceable Multi-Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenjumeaCLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzPSY08,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Martijn Stam and
                  Moti Yung},
  title        = {A New Randomness Extraction Paradigm for Hybrid Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzPSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CookYK08,
  author       = {Debra L. Cook and
                  Moti Yung and
                  Angelos D. Keromytis},
  title        = {Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CookYK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KiayiasY07,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptanalyzing the polynomial-reconstruction based public-key system
                  under optimal parameter choice},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {61--78},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9055-8},
  doi          = {10.1007/S10623-007-9055-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KiayiasY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KatzY07,
  author       = {Jonathan Katz and
                  Moti Yung},
  title        = {Scalable Protocols for Authenticated Group Key Exchange},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {1},
  pages        = {85--113},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-006-0361-5},
  doi          = {10.1007/S00145-006-0361-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KatzY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BleichenbacherKY07,
  author       = {Daniel Bleichenbacher and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Decoding interleaved Reed-Solomon codes over noisy channels},
  journal      = {Theor. Comput. Sci.},
  volume       = {379},
  number       = {3},
  pages        = {348--360},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.tcs.2007.02.043},
  doi          = {10.1016/J.TCS.2007.02.043},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BleichenbacherKY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChangYSHL07,
  author       = {Donghoon Chang and
                  Moti Yung and
                  Jaechul Sung and
                  Seokhie Hong and
                  Sangjin Lee},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Preimage Attack on the Parallel FFT-Hashing Function},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {59--67},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_5},
  doi          = {10.1007/978-3-540-73458-1\_5},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChangYSHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KiayiasTY07,
  author       = {Aggelos Kiayias and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Kaoru Kurosawa},
  title        = {Group Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {181--199},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_11},
  doi          = {10.1007/978-3-540-76900-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KiayiasTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiEJMY07,
  author       = {Seung Geol Choi and
                  Ariel Elbaz and
                  Ari Juels and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Kaoru Kurosawa},
  title        = {Two-Party Computing with Encrypted Data},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {298--314},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_18},
  doi          = {10.1007/978-3-540-76900-2\_18},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiEJMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BenjumeaCLY07,
  author       = {Vicente Benjumea and
                  Seung Geol Choi and
                  Javier L{\'{o}}pez and
                  Moti Yung},
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Anonymity 2.0 - {X.509} Extensions Supporting Privacy-Friendly Authentication},
  booktitle    = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  pages        = {265--281},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9\_17},
  doi          = {10.1007/978-3-540-76969-9\_17},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BenjumeaCLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LibertQY07,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Forward-secure signatures in untrusted update environments: efficient
                  and generic constructions},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {266--275},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315279},
  doi          = {10.1145/1315245.1315279},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LibertQY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CookKY07,
  author       = {Debra L. Cook and
                  Angelos D. Keromytis and
                  Moti Yung},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Elastic block ciphers: the basic design},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {350--352},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229324},
  doi          = {10.1145/1229285.1229324},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CookKY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Yung08,
  author       = {Moti Yung},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {On the Evolution of User Authentication: Non-bilateral Factors},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {5--10},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_2},
  doi          = {10.1007/978-3-540-79499-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Yung08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YoungY08,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {A Timing-Resistant Elliptic Curve Backdoor in {RSA}},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {427--441},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_33},
  doi          = {10.1007/978-3-540-79499-8\_33},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YoungY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/YungZ07,
  author       = {Moti Yung and
                  Yunlei Zhao},
  editor       = {Moni Naor},
  title        = {Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key
                  Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {129--147},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_8},
  doi          = {10.1007/978-3-540-72540-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/YungZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/XuY07,
  author       = {Shouhuai Xu and
                  Moti Yung},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {\emph{K}-Anonymous Multi-party Secret Handshakes},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_10},
  doi          = {10.1007/978-3-540-77366-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/XuY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YoungY07,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Space-Efficient Kleptography Without Random Oracles},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_8},
  doi          = {10.1007/978-3-540-77370-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YoungY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DolevLY07,
  author       = {Shlomi Dolev and
                  Limor Lahiani and
                  Moti Yung},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Secret Swarm UnitReactive k-Secret Sharing},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {123--137},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_10},
  doi          = {10.1007/978-3-540-77026-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DolevLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/CookYK07,
  author       = {Debra L. Cook and
                  Moti Yung and
                  Angelos D. Keromytis},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {The Security of Elastic Block Ciphers Against Key-Recovery Attacks},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {89--103},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_6},
  doi          = {10.1007/978-3-540-75496-1\_6},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/CookYK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertQY07,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Parallel Key-Insulated Public Key Encryption Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {298--314},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_20},
  doi          = {10.1007/978-3-540-71677-8\_20},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertQY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2007,
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5},
  doi          = {10.1007/978-3-540-72738-5},
  isbn         = {978-3-540-72737-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007stc,
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2007, Alexandria, VA, USA, November 2, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-888-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2007stc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2007,
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-884-8},
  timestamp    = {Thu, 17 Jan 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2007,
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8},
  doi          = {10.1007/978-3-540-77026-8},
  isbn         = {978-3-540-77025-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2006,
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71093-6},
  doi          = {10.1007/978-3-540-71093-6},
  isbn         = {978-3-540-71092-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/YungZ07,
  author       = {Moti Yung and
                  Yunlei Zhao},
  title        = {Concurrent Knowledge-Extraction in the Public-Key Model},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR07-002}},
  year         = {2007},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-002/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR07-002},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/YungZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasTY07,
  author       = {Aggelos Kiayias and
                  Yiannis Tsiounis and
                  Moti Yung},
  title        = {Group Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY07,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitSPMY07,
  author       = {Christophe Petit and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Tal Malkin and
                  Moti Yung},
  title        = {A Block Cipher based {PRNG} Secure Against Side-Channel Key Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/356},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitSPMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KiayiasY06,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Secure scalable group signature with dynamic joins and separable authorities},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {24--45},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010821},
  doi          = {10.1504/IJSN.2006.010821},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KiayiasY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KatzY06,
  author       = {Jonathan Katz and
                  Moti Yung},
  title        = {Characterization of Security Notions for Probabilistic Private-Key
                  Encryption},
  journal      = {J. Cryptol.},
  volume       = {19},
  number       = {1},
  pages        = {67--95},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00145-005-0310-8},
  doi          = {10.1007/S00145-005-0310-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KatzY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YoungY06,
  author       = {Adam L. Young and
                  Moti Yung},
  title        = {On Fundamental Limitations of Proving Data Theft},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {1},
  number       = {4},
  pages        = {524--531},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIFS.2006.885025},
  doi          = {10.1109/TIFS.2006.885025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YoungY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChangLNY06,
  author       = {Donghoon Chang and
                  Sangjin Lee and
                  Mridul Nandi and
                  Moti Yung},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {Indifferentiable Security Analysis of Popular Hash Functions with
                  Prefix-Free Padding},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {283--298},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_19},
  doi          = {10.1007/11935230\_19},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChangLNY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrainardJRSY06,
  author       = {John G. Brainard and
                  Ari Juels and
                  Ronald L. Rivest and
                  Michael Szydlo and
                  Moti Yung},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Fourth-factor authentication: somebody you know},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {168--178},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180427},
  doi          = {10.1145/1180405.1180427},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BrainardJRSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LibertQY06,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Efficient Intrusion-Resilient Signatures Without Random Oracles},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {27--41},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_3},
  doi          = {10.1007/11937807\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LibertQY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasY06,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {311--325},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_25},
  doi          = {10.1007/11889663\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/MalkinSY06,
  author       = {Tal Malkin and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Moti Yung},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {A Comparative Cost/Security Analysis of Fault Attack Countermeasures},
  booktitle    = {Fault Diagnosis and Tolerance in Cryptography, Third International
                  Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4236},
  pages        = {159--172},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889700\_15},
  doi          = {10.1007/11889700\_15},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/MalkinSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/CamtepeYY06,
  author       = {Seyit Ahmet {\c{C}}amtepe and
                  B{\"{u}}lent Yener and
                  Moti Yung},
  title        = {Expander Graph based Key Distribution Mechanisms in Wireless Sensor
                  Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {2262--2267},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.255107},
  doi          = {10.1109/ICC.2006.255107},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/CamtepeYY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YoungY06,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Jan Camenisch and
                  Christian S. Collberg and
                  Neil F. Johnson and
                  Phil Sallee},
  title        = {Hiding Information Hiding},
  booktitle    = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria,
                  VA, USA, July 10-12, 2006. Revised Selcted Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4437},
  pages        = {161--171},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74124-4\_11},
  doi          = {10.1007/978-3-540-74124-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YoungY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YoungY06a,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Jan Camenisch and
                  Christian S. Collberg and
                  Neil F. Johnson and
                  Phil Sallee},
  title        = {An Elliptic Curve Backdoor Algorithm for {RSASSA}},
  booktitle    = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria,
                  VA, USA, July 10-12, 2006. Revised Selcted Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4437},
  pages        = {355--374},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74124-4\_24},
  doi          = {10.1007/978-3-540-74124-4\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YoungY06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChoiPY06,
  author       = {Seung Geol Choi and
                  Kunsoo Park and
                  Moti Yung},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Short Traceable Signatures Based on Bilinear Pairings},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_7},
  doi          = {10.1007/11908739\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChoiPY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/YungZ06,
  author       = {Moti Yung and
                  Yunlei Zhao},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Interactive Zero-Knowledge with Restricted Random Oracles},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_2},
  doi          = {10.1007/11681878\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/YungZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisYY06,
  author       = {Yevgeniy Dodis and
                  Aleksandr Yampolskiy and
                  Moti Yung},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Threshold and Proactive Pseudo-Random Permutations},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {542--560},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_28},
  doi          = {10.1007/11681878\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisYY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2006,
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480},
  doi          = {10.1007/11767480},
  isbn         = {3-540-34703-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006stc,
  editor       = {Ari Juels and
                  Gene Tsudik and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Proceedings of the 1st {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2006, Alexandria, VA, USA, November 3, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-548-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2006stc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2006,
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807},
  doi          = {10.1007/11937807},
  isbn         = {3-540-49608-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2006,
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-555-X},
  timestamp    = {Thu, 17 Jan 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drmtics/2005,
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Digital Rights Management: Technologies, Issues, Challenges and Systems,
                  First International Conference, {DRMTICS} 2005, Sydney, Australia,
                  October 31 - November 2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3919},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787952},
  doi          = {10.1007/11787952},
  isbn         = {3-540-35998-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drmtics/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2006,
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853},
  doi          = {10.1007/11745853},
  isbn         = {3-540-33851-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2006,
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072},
  doi          = {10.1007/11832072},
  isbn         = {3-540-38080-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2005,
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11604938},
  doi          = {10.1007/11604938},
  isbn         = {3-540-31012-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisYY06,
  author       = {Yevgeniy Dodis and
                  Aleksandr Yampolskiy and
                  Moti Yung},
  title        = {Threshold and Proactive Pseudo-Random Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisYY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertMY06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  title        = {A Unified Framework for the Analysis of Side-Channel Key Recovery
                  Attacks (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertMY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY06,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Copyrighting Public-key Functions and Applications to Black-box Traitor
                  Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangY06,
  author       = {Donghoon Chang and
                  Moti Yung},
  title        = {Do We Need to Vary the Constants? (Methodological Investigation of
                  Block-Cipher Based Hash Functions)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/DodisFKY05,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Scalable public-key tracing and revoking},
  journal      = {Distributed Comput.},
  volume       = {17},
  number       = {4},
  pages        = {323--347},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00446-004-0120-5},
  doi          = {10.1007/S00446-004-0120-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/DodisFKY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ParkKY05,
  author       = {Cheol{-}Min Park and
                  Myung{-}Hwan Kim and
                  Moti Yung},
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {A Remark on Implementing the Weil Pairing},
  booktitle    = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  pages        = {313--323},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548\_27},
  doi          = {10.1007/11599548\_27},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ParkKY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/YoungY05,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Alfred Menezes},
  title        = {Malicious Cryptography: Kleptographic Aspects},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {7--18},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_2},
  doi          = {10.1007/978-3-540-30574-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/YoungY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Ronald Cramer},
  title        = {Group Signatures with Efficient Concurrent Join},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {198--214},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_12},
  doi          = {10.1007/11426639\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptography and decoding Reed-Solomon codes as a hard problem},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {48},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543956},
  doi          = {10.1109/ITWTPI.2005.1543956},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KonstantinouLSSY05,
  author       = {Elisavet Konstantinou and
                  Vasiliki Liagkou and
                  Paul G. Spirakis and
                  Yannis C. Stamatiou and
                  Moti Yung},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {"Trust Engineering: " From Requirements to System Design
                  and Maintenance - {A} Working National Lottery System Experience},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {44--58},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_4},
  doi          = {10.1007/11556992\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KonstantinouLSSY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity
                  Against Group Managers},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {151--170},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_11},
  doi          = {10.1007/11554868\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/YoungY05,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Questionable Encryption and Its Applications},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {210--221},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_15},
  doi          = {10.1007/11554868\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/YoungY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/YoungY05,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Bart Preneel and
                  Stafford E. Tavares},
  title        = {A Space Efficient Backdoor in {RSA} and Its Applications},
  booktitle    = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
                  2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3897},
  pages        = {128--143},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11693383\_9},
  doi          = {10.1007/11693383\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/YoungY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2005,
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137093},
  doi          = {10.1007/B137093},
  isbn         = {3-540-26223-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2005,
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548},
  doi          = {10.1007/11599548},
  isbn         = {3-540-30855-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2005,
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-230-5},
  timestamp    = {Wed, 22 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2005,
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137875},
  doi          = {10.1007/B137875},
  isbn         = {3-540-26656-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2005,
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468},
  doi          = {10.1007/11523468},
  isbn         = {3-540-27580-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-048,
  author       = {Moti Yung and
                  Yunlei Zhao},
  title        = {Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key
                  Model},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR05-048}},
  year         = {2005},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-048/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR05-048},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR05-048.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Group Signatures with Efficient Concurrent Join},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0020579,
  author       = {Adam L. Young and
                  Moti Yung},
  title        = {Malicious cryptography - exposing cryptovirology},
  publisher    = {Wiley},
  year         = {2004},
  isbn         = {978-0-7645-4975-5},
  timestamp    = {Thu, 14 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0020579.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/VoraABCDJJLRSY04,
  author       = {Poorvi L. Vora and
                  Ben Adida and
                  Ren Bucholz and
                  David Chaum and
                  David L. Dill and
                  David R. Jefferson and
                  Douglas W. Jones and
                  William Lattin and
                  Aviel D. Rubin and
                  Michael Ian Shamos and
                  Moti Yung},
  title        = {Evaluation of voting systems},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {11},
  pages        = {144},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029496.1029520},
  doi          = {10.1145/1029496.1029520},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/VoraABCDJJLRSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/FranklinY04,
  author       = {Matthew K. Franklin and
                  Moti Yung},
  title        = {Secure Hypergraphs: Privacy from Partial Broadcast},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {18},
  number       = {3},
  pages        = {437--450},
  year         = {2004},
  url          = {https://doi.org/10.1137/S0895480198335215},
  doi          = {10.1137/S0895480198335215},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/FranklinY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/McAvenSY04,
  author       = {Luke McAven and
                  Reihaneh Safavi{-}Naini and
                  Moti Yung},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Unconditionally Secure Encryption Under Strong Attacks},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {427--439},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_37},
  doi          = {10.1007/978-3-540-27800-9\_37},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/McAvenSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KiayiasY04,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Pil Joong Lee},
  title        = {Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System
                  Under Optimal Parameter Choice},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3329},
  pages        = {401--416},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30539-2\_28},
  doi          = {10.1007/978-3-540-30539-2\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KiayiasY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/XuY04,
  author       = {Shouhuai Xu and
                  Moti Yung},
  editor       = {Jean{-}Jacques Quisquater and
                  Pierre Paradinas and
                  Yves Deswarte and
                  Anas Abou El Kalam},
  title        = {Accountable Ring Signatures: {A} Smart Card Approach},
  booktitle    = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World
                  Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International
                  Conference on Smart Card Research and Advanced Applications (CARDIS),
                  22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {153},
  pages        = {271--286},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8147-2\_18},
  doi          = {10.1007/1-4020-8147-2\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/XuY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuY04,
  author       = {Shouhuai Xu and
                  Moti Yung},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {k-anonymous secret handshakes with reusable credentials},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {158--167},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030105},
  doi          = {10.1145/1030083.1030105},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DiamentLKY04,
  author       = {Theodore Diament and
                  Homin K. Lee and
                  Angelos D. Keromytis and
                  Moti Yung},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {The dual receiver cryptosystem and its applications},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {330--343},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030128},
  doi          = {10.1145/1030083.1030128},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DiamentLKY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DodisFKMY04,
  author       = {Yevgeniy Dodis and
                  Matthew K. Franklin and
                  Jonathan Katz and
                  Atsuko Miyaji and
                  Moti Yung},
  editor       = {Tatsuaki Okamoto},
  title        = {A Generic Construction for Intrusion-Resilient Public-Key Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {81--98},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_7},
  doi          = {10.1007/978-3-540-24660-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DodisFKMY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/YoungY04,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Tatsuaki Okamoto},
  title        = {A Key Recovery System as Secure as Factoring},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_11},
  doi          = {10.1007/978-3-540-24660-2\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/YoungY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MalkinOY04,
  author       = {Tal Malkin and
                  Satoshi Obana and
                  Moti Yung},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {The Hierarchy of Key Evolving Signatures and a Characterization of
                  Proxy Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {306--322},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_19},
  doi          = {10.1007/978-3-540-24676-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MalkinOY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasTY04,
  author       = {Aggelos Kiayias and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Traceable Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {571--589},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_34},
  doi          = {10.1007/978-3-540-24676-3\_34},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasTY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasY04,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Ari Juels},
  title        = {The Vector-Ballot e-Voting Approach},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {72--89},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_9},
  doi          = {10.1007/978-3-540-27809-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KonstantinouLSSY04,
  author       = {Elisavet Konstantinou and
                  Vasiliki Liagkou and
                  Paul G. Spirakis and
                  Yannis C. Stamatiou and
                  Moti Yung},
  editor       = {Ari Juels},
  title        = {Electronic National Lotteries},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_18},
  doi          = {10.1007/978-3-540-27809-2\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KonstantinouLSSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/McAvenSY04,
  author       = {Luke McAven and
                  Reihaneh Safavi{-}Naini and
                  Moti Yung},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {Symmetric Authentication Codes with Secrecy and Unconditionally Secure
                  Authenticated Encryption},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {148--161},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_13},
  doi          = {10.1007/978-3-540-30556-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/McAvenSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Safavi-NainiMY04,
  author       = {Reihaneh Safavi{-}Naini and
                  Luke McAven and
                  Moti Yung},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {General Group Authentication Codes and Their Relation to "Unconditionally-Secure
                  Signatures"},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {231--247},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_17},
  doi          = {10.1007/978-3-540-24632-9\_17},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Safavi-NainiMY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/YoungY04,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {A Subliminal Channel in Secret Block Ciphers},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {198--211},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_14},
  doi          = {10.1007/978-3-540-30564-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/YoungY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/YoungY04,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Relationships Between Diffie-Hellman and "Index Oracles"},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_2},
  doi          = {10.1007/978-3-540-30598-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/YoungY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2004,
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98360},
  doi          = {10.1007/B98360},
  isbn         = {3-540-22217-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2004,
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  isbn         = {1-58113-969-1},
  timestamp    = {Wed, 15 Dec 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2003,
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b95188},
  doi          = {10.1007/B95188},
  isbn         = {3-540-20827-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2004,
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b103174},
  doi          = {10.1007/B103174},
  isbn         = {3-540-24015-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasTY04,
  author       = {Aggelos Kiayias and
                  Yiannis Tsiounis and
                  Moti Yung},
  title        = {Traceable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasTY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkinOY04,
  author       = {Tal Malkin and
                  Satoshi Obana and
                  Moti Yung},
  title        = {The Hierarchy of Key Evolving Signatures and a Characterization of
                  Proxy Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkinOY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY04,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Group Signatures: Provable Security, Efficient Constructions and Anonymity
                  from Trapdoor-Holders},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CookYK04,
  author       = {Debra L. Cook and
                  Moti Yung and
                  Angelos D. Keromytis},
  title        = {Elastic Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CookYK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CookYK04a,
  author       = {Debra L. Cook and
                  Moti Yung and
                  Angelos D. Keromytis},
  title        = {Elastic {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CookYK04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisFKY04,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Scalable Public-Key Tracing and Revoking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisFKY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY04a,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptanalyzing the Polynomial-Reconstruction based Public-Key System
                  Under Optimal Parameter Choice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YoungY03,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {297--311},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_26},
  doi          = {10.1007/3-540-45067-X\_26},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YoungY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KatzY03,
  author       = {Jonathan Katz and
                  Moti Yung},
  editor       = {Dan Boneh},
  title        = {Scalable Protocols for Authenticated Group Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {110--125},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_7},
  doi          = {10.1007/978-3-540-45146-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KatzY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DodisFKMY03,
  author       = {Yevgeniy Dodis and
                  Matthew K. Franklin and
                  Jonathan Katz and
                  Atsuko Miyaji and
                  Moti Yung},
  editor       = {Marc Joye},
  title        = {Intrusion-Resilient Public-Key Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_2},
  doi          = {10.1007/3-540-36563-X\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DodisFKMY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsom/BaldiOY03,
  author       = {Mario Baldi and
                  Yoram Ofek and
                  Moti Yung},
  editor       = {Marcus Brunner and
                  Alexander Keller},
  title        = {Idiosyncratic Signatures for Authenticated Execution of Management
                  Code},
  booktitle    = {Self-Managing Distributed Systems, 14th {IFIP/IEEE} International
                  Workshop on Distributed Systems: Operations and Management, {DSOM}
                  2003, Heidelberg, Germany, October 20-22, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2867},
  pages        = {204--206},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39671-0\_21},
  doi          = {10.1007/978-3-540-39671-0\_21},
  timestamp    = {Tue, 20 Aug 2019 14:59:26 +0200},
  biburl       = {https://dblp.org/rec/conf/dsom/BaldiOY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasY03,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Eli Biham},
  title        = {Extracting Group Signatures from Traitor Tracing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {630--648},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_39},
  doi          = {10.1007/3-540-39200-9\_39},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/XuY03,
  author       = {Shouhuai Xu and
                  Moti Yung},
  editor       = {Rebecca N. Wright},
  title        = {Retrofitting Fairness on the Original RSA-Based E-cash},
  booktitle    = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
                  French West Indies, January 27-30, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45126-6\_4},
  doi          = {10.1007/978-3-540-45126-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/XuY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Yung03,
  author       = {Moti Yung},
  editor       = {Rebecca N. Wright},
  title        = {Trusted Computing Platforms: The Good, the Bad, and the Ugly},
  booktitle    = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
                  French West Indies, January 27-30, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  pages        = {250--254},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45126-6\_18},
  doi          = {10.1007/978-3-540-45126-6\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Yung03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasY03,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Rebecca N. Wright},
  title        = {Non-interactive Zero-Sharing with Applications to Private Distributed
                  Decision Making},
  booktitle    = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
                  French West Indies, January 27-30, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  pages        = {303--320},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45126-6\_22},
  doi          = {10.1007/978-3-540-45126-6\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/BaldiOY03,
  author       = {Mario Baldi and
                  Yoram Ofek and
                  Moti Yung},
  title        = {The TrustedFlow {(TM)} Protocol-Idiosyncratic Signatures for Authenticated
                  Execution},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {288--291},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 16:23:26 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/BaldiOY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BleichenbacherKY03,
  author       = {Daniel Bleichenbacher and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Jos C. M. Baeten and
                  Jan Karel Lenstra and
                  Joachim Parrow and
                  Gerhard J. Woeginger},
  title        = {Decoding of Interleaved Reed Solomon Codes over Noisy Data},
  booktitle    = {Automata, Languages and Programming, 30th International Colloquium,
                  {ICALP} 2003, Eindhoven, The Netherlands, June 30 - July 4, 2003.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2719},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45061-0\_9},
  doi          = {10.1007/3-540-45061-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BleichenbacherKY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DodisKXY03,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Shouhuai Xu and
                  Moti Yung},
  editor       = {Yvo Desmedt},
  title        = {Strong Key-Insulated Signature Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_10},
  doi          = {10.1007/3-540-36288-6\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DodisKXY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/DodisFKY03,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Elizabeth Borowsky and
                  Sergio Rajsbaum},
  title        = {Scalable public-key tracing and revoking},
  booktitle    = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
                  Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
                  13-16, 2003},
  pages        = {190--199},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/872035.872062},
  doi          = {10.1145/872035.872062},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/DodisFKY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KiayiasY03,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Dimitris Gritzalis},
  title        = {Robust Verifiable non-Interactive Zero-Sharing - {A} Plug-in Utility
                  for Enhanced Voters' Privacy},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {139--151},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_9},
  doi          = {10.1007/978-1-4615-0239-5\_9},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KiayiasY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2003,
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b13996},
  doi          = {10.1007/B13996},
  isbn         = {3-540-20208-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2003w,
  editor       = {Moti Yung},
  title        = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  publisher    = {{ACM}},
  year         = {2003},
  isbn         = {1-58113-786-9},
  timestamp    = {Thu, 23 Jun 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/2003w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzY03,
  author       = {Jonathan Katz and
                  Moti Yung},
  title        = {Scalable Protocols for Authenticated Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/MayerOOY02,
  author       = {Alain J. Mayer and
                  Rafail Ostrovsky and
                  Yoram Ofek and
                  Moti Yung},
  title        = {Self-Stabilizing Symmetry Breaking in Constant Space},
  journal      = {{SIAM} J. Comput.},
  volume       = {31},
  number       = {5},
  pages        = {1571--1595},
  year         = {2002},
  url          = {https://doi.org/10.1137/S0097539798285997},
  doi          = {10.1137/S0097539798285997},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/MayerOOY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/FrankelMY02,
  author       = {Yair Frankel and
                  Philip D. MacKenzie and
                  Moti Yung},
  title        = {Adaptively secure distributed public-key systems},
  journal      = {Theor. Comput. Sci.},
  volume       = {287},
  number       = {2},
  pages        = {535--561},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0304-3975(01)00260-2},
  doi          = {10.1016/S0304-3975(01)00260-2},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/FrankelMY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimLY02,
  author       = {Hyun{-}Jeong Kim and
                  Dong Hoon Lee and
                  Moti Yung},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Privacy against Piracy: Protecting Two-Level Revocable {P-K} Traitor
                  Tracing},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {482--496},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_36},
  doi          = {10.1007/3-540-45450-0\_36},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimLY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KatzY02,
  author       = {Jonathan Katz and
                  Moti Yung},
  editor       = {Yuliang Zheng},
  title        = {Threshold Cryptosystems Based on Factoring},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {192--205},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_12},
  doi          = {10.1007/3-540-36178-2\_12},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KatzY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Yung02,
  author       = {Moti Yung},
  editor       = {Yuliang Zheng},
  title        = {Crypto-integrity},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {567--573},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_35},
  doi          = {10.1007/3-540-36178-2\_35},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Yung02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Joan Feigenbaum},
  title        = {Breaking and Repairing Asymmetric Public-Key Traitor Tracing},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {32--50},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_3},
  doi          = {10.1007/978-3-540-44993-5\_3},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JoyeQYY02,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Sung{-}Ming Yen and
                  Moti Yung},
  editor       = {Bart Preneel},
  title        = {Observability Analysis - Detecting When Improved Cryptosystems Fail},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {17--29},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_2},
  doi          = {10.1007/3-540-45760-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JoyeQYY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisKXY02,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Shouhuai Xu and
                  Moti Yung},
  editor       = {Lars R. Knudsen},
  title        = {Key-Insulated Public Key Cryptosystems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {65--82},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_5},
  doi          = {10.1007/3-540-46035-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisKXY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Lars R. Knudsen},
  title        = {Traitor Tracing with Constant Transmission Rate},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {450--465},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_30},
  doi          = {10.1007/3-540-46035-7\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/XuY02,
  author       = {Shouhuai Xu and
                  Moti Yung},
  editor       = {Matt Blaze},
  title        = {The Dark Side of Threshold Cryptography},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {198--219},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_15},
  doi          = {10.1007/3-540-36504-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/XuY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GeerY02,
  author       = {Daniel E. Geer Jr. and
                  Moti Yung},
  editor       = {Matt Blaze},
  title        = {Split-and-Delegate: Threshold Cryptography for the Masses},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {220--237},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_16},
  doi          = {10.1007/3-540-36504-4\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GeerY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Peter Widmayer and
                  Francisco Triguero Ruiz and
                  Rafael Morales Bueno and
                  Matthew Hennessy and
                  Stephan J. Eidenbenz and
                  Ricardo Conejo},
  title        = {Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes},
  booktitle    = {Automata, Languages and Programming, 29th International Colloquium,
                  {ICALP} 2002, Malaga, Spain, July 8-13, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2380},
  pages        = {232--243},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45465-9\_21},
  doi          = {10.1007/3-540-45465-9\_21},
  timestamp    = {Wed, 11 Sep 2019 13:15:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Self-tallying Elections and Perfect Ballot Secrecy},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {141--158},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_10},
  doi          = {10.1007/3-540-45664-3\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KatzOY02,
  author       = {Jonathan Katz and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Forward Secrecy in Password-Only Key Exchange Protocols},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_3},
  doi          = {10.1007/3-540-36413-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KatzOY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sisw/DodisY02,
  author       = {Yevgeniy Dodis and
                  Moti Yung},
  title        = {Exposure-Resilience for Free: The Hierarchical ID-based Encryption
                  Case},
  booktitle    = {Proceedings of the First International {IEEE} Security in Storage
                  Workshop, {SISW} 2002, Greenbelt, Maryland, USA, December 11, 2002},
  pages        = {45--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SISW.2002.1183509},
  doi          = {10.1109/SISW.2002.1183509},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sisw/DodisY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2002,
  editor       = {Moti Yung},
  title        = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9},
  doi          = {10.1007/3-540-45708-9},
  isbn         = {3-540-44050-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR02-017,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes
                  with Applications},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR02-017}},
  year         = {2002},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2002/TR02-017/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR02-017},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR02-017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKXY02,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Key-Insulated Public-Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKXY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MRaihiY01,
  author       = {David M'Ra{\"{\i}}hi and
                  Moti Yung},
  title        = {E-commerce applications of smart cards},
  journal      = {Comput. Networks},
  volume       = {36},
  number       = {4},
  pages        = {453--472},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1389-1286(01)00166-9},
  doi          = {10.1016/S1389-1286(01)00166-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MRaihiY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasY01,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Tomas Sander},
  title        = {On Crafty Pirates and Foxy Tracers},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {22--39},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_3},
  doi          = {10.1007/3-540-47870-1\_3},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YoungY01,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Bandwidth-Optimal Kleptographic Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {235--250},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_20},
  doi          = {10.1007/3-540-44709-1\_20},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/YoungY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiayiasY01,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Joe Kilian},
  title        = {Self Protecting Pirates and Black-Box Traitor Tracing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {63--79},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_4},
  doi          = {10.1007/3-540-44647-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiayiasY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JoyeQY01,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {David Naccache},
  title        = {On the Power of Misbehaving Adversaries and Security Analysis of the
                  Original {EPOC}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {208--222},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_16},
  doi          = {10.1007/3-540-45353-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JoyeQY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KatzOY01,
  author       = {Jonathan Katz and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Birgit Pfitzmann},
  title        = {Efficient Password-Authenticated Key Exchange Using Human-Memorable
                  Passwords},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {475--494},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_29},
  doi          = {10.1007/3-540-44987-6\_29},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KatzOY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GerckNRRY01,
  author       = {Ed Gerck and
                  C. Andrew Neff and
                  Ronald L. Rivest and
                  Aviel D. Rubin and
                  Moti Yung},
  editor       = {Paul F. Syverson},
  title        = {The Business of Electronic Voting},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {234--259},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_21},
  doi          = {10.1007/3-540-46088-8\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GerckNRRY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BuonannoKY01,
  author       = {Enrico Buonanno and
                  Jonathan Katz and
                  Moti Yung},
  editor       = {Mitsuru Matsui},
  title        = {Incremental Unforgeable Encryption},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_9},
  doi          = {10.1007/3-540-45473-X\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BuonannoKY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/KiayiasY01,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Fernando Orejas and
                  Paul G. Spirakis and
                  Jan van Leeuwen},
  title        = {Secure Games with Polynomial Expressions},
  booktitle    = {Automata, Languages and Programming, 28th International Colloquium,
                  {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2076},
  pages        = {939--950},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-48224-5\_76},
  doi          = {10.1007/3-540-48224-5\_76},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/KiayiasY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ValdezY01,
  author       = {Enriquillo Valdez and
                  Moti Yung},
  editor       = {George I. Davida and
                  Yair Frankel},
  title        = {{DISSECT:} DIStribution for SECurity Tool},
  booktitle    = {Information Security, 4th International Conference, {ISC} 2001, Malaga,
                  Spain, October 1-3, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2200},
  pages        = {125--143},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45439-X\_9},
  doi          = {10.1007/3-540-45439-X\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ValdezY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FrankelMY01,
  author       = {Yair Frankel and
                  Philip D. MacKenzie and
                  Moti Yung},
  editor       = {Kwangjo Kim},
  title        = {Adaptive Security for the Additive-Sharing Based Proactive {RSA}},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {240--263},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_18},
  doi          = {10.1007/3-540-44586-2\_18},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FrankelMY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Young01,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Kwangjo Kim},
  title        = {A {PVSS} as Hard as Discrete Log and Shareholder Separability},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {287--299},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_21},
  doi          = {10.1007/3-540-44586-2\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Young01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KiayiasY01,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Serge Vaudenay and
                  Amr M. Youssef},
  title        = {Polynomial Reconstruction Based Cryptography},
  booktitle    = {Selected Areas in Cryptography, 8th Annual International Workshop,
                  {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {129--133},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45537-X\_10},
  doi          = {10.1007/3-540-45537-X\_10},
  timestamp    = {Tue, 01 Jun 2021 15:22:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KiayiasY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzOY01,
  author       = {Jonathan Katz and
                  Rafail Ostrovsky and
                  Moti Yung},
  title        = {Efficient Password-Authenticated Key Exchange Using Human-Memorable
                  Passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzOY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzY01,
  author       = {Jonathan Katz and
                  Moti Yung},
  title        = {Threshold Cryptosystems Based on Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/NikoletseasPSY00,
  author       = {Sotiris E. Nikoletseas and
                  Krishna V. Palem and
                  Paul G. Spirakis and
                  Moti Yung},
  title        = {Connectivity Properties in Random Regular Graphs with Edge Faults},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {11},
  number       = {2},
  pages        = {247--262},
  year         = {2000},
  url          = {https://doi.org/10.1142/S0129054100000156},
  doi          = {10.1142/S0129054100000156},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/NikoletseasPSY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/FranklinGY00,
  author       = {Matthew K. Franklin and
                  Zvi Galil and
                  Moti Yung},
  title        = {Eavesdropping games: a graph-theoretic approach to privacy in distributed
                  systems},
  journal      = {J. {ACM}},
  volume       = {47},
  number       = {2},
  pages        = {225--243},
  year         = {2000},
  url          = {https://doi.org/10.1145/333979.333980},
  doi          = {10.1145/333979.333980},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/FranklinGY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/OfekY00,
  author       = {Yoram Ofek and
                  Moti Yung},
  title        = {Combined Asynchronous/Synchronous Packet Switching Architecture: QoS
                  Guarantees for Integrated Parallel Computing and Real-Time Traffic},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {60},
  number       = {3},
  pages        = {275--295},
  year         = {2000},
  url          = {https://doi.org/10.1006/jpdc.1999.1607},
  doi          = {10.1006/JPDC.1999.1607},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/OfekY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/KontogiannisPSY00,
  author       = {Spyros C. Kontogiannis and
                  Grammati E. Pantziou and
                  Paul G. Spirakis and
                  Moti Yung},
  title        = {Robust Parallel Computations through Randomization},
  journal      = {Theory Comput. Syst.},
  volume       = {33},
  number       = {5/6},
  pages        = {427--464},
  year         = {2000},
  url          = {https://doi.org/10.1007/s002240010009},
  doi          = {10.1007/S002240010009},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mst/KontogiannisPSY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/MayerOY00,
  author       = {Alain J. Mayer and
                  Yoram Ofek and
                  Moti Yung},
  title        = {Local and congestion-driven fairness algorithm in arbitrary topology
                  networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {8},
  number       = {3},
  pages        = {362--372},
  year         = {2000},
  url          = {https://doi.org/10.1109/90.851982},
  doi          = {10.1109/90.851982},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/MayerOY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YoungY00,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Tatsuaki Okamoto},
  title        = {Towards Signature-Only Signature Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {97--115},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_9},
  doi          = {10.1007/3-540-44448-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YoungY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/XuYZ00,
  author       = {Shouhuai Xu and
                  Moti Yung and
                  Gendu Zhang},
  editor       = {Josep Domingo{-}Ferrer and
                  David Chan and
                  Anthony Watson},
  title        = {Friendly Observers Ease Off-Line E-Cash},
  booktitle    = {Smart Card Research and Advanced Applications, Proceedings of the
                  Fourth Working Conference on Smart Card Research and Advanced Applications,
                  {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {180},
  pages        = {3--18},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Thu, 01 Aug 2002 11:36:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/XuYZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HastadJJY00,
  author       = {Johan H{\aa}stad and
                  Jakob Jonsson and
                  Ari Juels and
                  Moti Yung},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Funkspiel schemes: an alternative to conventional tamper resistance},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {125--133},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352619},
  doi          = {10.1145/352600.352619},
  timestamp    = {Tue, 10 Nov 2020 20:00:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HastadJJY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SanderTY00,
  author       = {Tomas Sander and
                  Amnon Ta{-}Shma and
                  Moti Yung},
  editor       = {Yair Frankel},
  title        = {Blind, Auditable Membership Proofs},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {53--71},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_5},
  doi          = {10.1007/3-540-45472-1\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SanderTY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Yung00,
  author       = {Moti Yung},
  editor       = {Yair Frankel},
  title        = {Payment Systems: The Next Generation},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {136--139},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_10},
  doi          = {10.1007/3-540-45472-1\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Yung00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KatzY00,
  author       = {Jonathan Katz and
                  Moti Yung},
  editor       = {Bruce Schneier},
  title        = {Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {284--299},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_20},
  doi          = {10.1007/3-540-44706-7\_20},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KatzY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YoungY00,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Dongho Won},
  title        = {Hash to the Rescue: Space Minimization for {PKI} Directories},
  booktitle    = {Information Security and Cryptology - {ICISC} 2000, Third International
                  Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2015},
  pages        = {235--245},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45247-8\_19},
  doi          = {10.1007/3-540-45247-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YoungY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrickellPVY00,
  author       = {Ernest F. Brickell and
                  David Pointcheval and
                  Serge Vaudenay and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Design Validations for Discrete Logarithm Based Signature Schemes},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {276--292},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_19},
  doi          = {10.1007/978-3-540-46588-1\_19},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrickellPVY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FrankelMY00,
  author       = {Yair Frankel and
                  Philip D. MacKenzie and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {"Psyeudorandom Intermixing": {A} Tool for Shared Cryptography},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {306--325},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_21},
  doi          = {10.1007/978-3-540-46588-1\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FrankelMY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YoungY00,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {RSA-Based Auto-recoverable Cryptosystems},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {326--341},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_22},
  doi          = {10.1007/978-3-540-46588-1\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YoungY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KatzY00,
  author       = {Jonathan Katz and
                  Moti Yung},
  editor       = {F. Frances Yao and
                  Eugene M. Luks},
  title        = {Complete characterization of security notions for probabilistic private-key
                  encryption},
  booktitle    = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
                  of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/335305.335335},
  doi          = {10.1145/335305.335335},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/KatzY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CrescenzoSY00,
  author       = {Giovanni Di Crescenzo and
                  Kouichi Sakurai and
                  Moti Yung},
  editor       = {F. Frances Yao and
                  Eugene M. Luks},
  title        = {On zero-knowledge proofs (extended abstract): "from membership
                  to decision"},
  booktitle    = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
                  of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages        = {255--264},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/335305.335336},
  doi          = {10.1145/335305.335336},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CrescenzoSY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YenerOY99,
  author       = {B{\"{u}}lent Yener and
                  Yoram Ofek and
                  Moti Yung},
  title        = {Convergence routing on disjoint spanning trees},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {5},
  pages        = {429--443},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0169-7552(98)00259-1},
  doi          = {10.1016/S0169-7552(98)00259-1},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/YenerOY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/OfekY99,
  author       = {Yoram Ofek and
                  Moti Yung},
  title        = {Access regulation mechanism for switch-based {LAN}},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {5},
  pages        = {505--518},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0169-7552(98)00291-8},
  doi          = {10.1016/S0169-7552(98)00291-8},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/OfekY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FrankelMY99,
  author       = {Yair Frankel and
                  Philip D. MacKenzie and
                  Moti Yung},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Adaptively-Secure Optimal-Resilience Proactive {RSA}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {180--194},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_15},
  doi          = {10.1007/978-3-540-48000-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FrankelMY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MayerY99,
  author       = {Alain J. Mayer and
                  Moti Yung},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Secure Protocol Transformation via "Expansion": From Two-Party
                  to Groups},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319721},
  doi          = {10.1145/319709.319721},
  timestamp    = {Tue, 10 Nov 2020 20:00:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MayerY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cqre/JakobssonMTY99,
  author       = {Markus Jakobsson and
                  David M'Ra{\"{\i}}hi and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Rainer Baumgart},
  title        = {Electronic Payments: Where Do We Go from Here?},
  booktitle    = {Secure Networking - {CQRE} (Secure) '99, International Exhibition
                  and Congress D{\"{u}}sseldorf, Germany, November 30 - December
                  2, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1740},
  pages        = {43--63},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46701-7\_4},
  doi          = {10.1007/3-540-46701-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cqre/JakobssonMTY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cqre/YoungY99,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Rainer Baumgart},
  title        = {Auto-recoverable Auto-certifiable Cryptosystems {(A} Survey)},
  booktitle    = {Secure Networking - {CQRE} (Secure) '99, International Exhibition
                  and Congress D{\"{u}}sseldorf, Germany, November 30 - December
                  2, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1740},
  pages        = {204--218},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46701-7\_18},
  doi          = {10.1007/3-540-46701-7\_18},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cqre/YoungY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esa/FrankelMY99,
  author       = {Yair Frankel and
                  Philip D. MacKenzie and
                  Moti Yung},
  editor       = {Jaroslav Nesetril},
  title        = {Adaptively-Secure Distributed Public-Key Systems},
  booktitle    = {Algorithms - {ESA} '99, 7th Annual European Symposium, Prague, Czech
                  Republic, July 16-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1643},
  pages        = {4--27},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48481-7\_2},
  doi          = {10.1007/3-540-48481-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esa/FrankelMY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FrankelY99,
  author       = {Yair Frankel and
                  Moti Yung},
  editor       = {Matthew K. Franklin},
  title        = {Cryptosystems Robust against "Dynamic Faults" Meet Enterprise
                  Needs for Organizational "Change Control"},
  booktitle    = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
                  British West Indies, February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  pages        = {241--252},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48390-X\_18},
  doi          = {10.1007/3-540-48390-X\_18},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FrankelY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/SanderYY99,
  author       = {Tomas Sander and
                  Adam L. Young and
                  Moti Yung},
  title        = {Non-Interactive CryptoComputing For NC\({}^{\mbox{1}}\)},
  booktitle    = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99,
                  17-18 October, 1999, New York, NY, {USA}},
  pages        = {554--567},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/SFFCS.1999.814630},
  doi          = {10.1109/SFFCS.1999.814630},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/SanderYY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JakobssonSY99,
  author       = {Markus Jakobsson and
                  Julien P. Stern and
                  Moti Yung},
  editor       = {Lars R. Knudsen},
  title        = {Scramble All, Encrypt Small},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {95--111},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_8},
  doi          = {10.1007/3-540-48519-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JakobssonSY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MiyazakiSY99,
  author       = {Shingo Miyazaki and
                  Kouichi Sakurai and
                  Moti Yung},
  editor       = {JooSeok Song},
  title        = {On Threshold RSA-Signing with no Dealer},
  booktitle    = {Information Security and Cryptology - ICISC'99, Second International
                  Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1787},
  pages        = {197--207},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719994\_16},
  doi          = {10.1007/10719994\_16},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MiyazakiSY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PaillierY99,
  author       = {Pascal Paillier and
                  Moti Yung},
  editor       = {JooSeok Song},
  title        = {Self-Escrowed Public-Key Infrastructures},
  booktitle    = {Information Security and Cryptology - ICISC'99, Second International
                  Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1787},
  pages        = {257--268},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719994\_20},
  doi          = {10.1007/10719994\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PaillierY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ValdezY99,
  author       = {Enriquillo Valdez and
                  Moti Yung},
  editor       = {Andreas Pfitzmann},
  title        = {Software DisEngineering: Program Hiding Architecture and Experiments},
  booktitle    = {Information Hiding, Third International Workshop, IH'99, Dresden,
                  Germany, September 29 - October 1, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1768},
  pages        = {379--394},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719724\_26},
  doi          = {10.1007/10719724\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ValdezY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/XuYZZ99,
  author       = {Shouhuai Xu and
                  Moti Yung and
                  Gendu Zhang and
                  Hong Zhu},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {Money Conservation via Atomicity in Fair Off-Line E-Cash},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {14--31},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_2},
  doi          = {10.1007/3-540-47790-X\_2},
  timestamp    = {Thu, 02 Dec 2021 11:46:17 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/XuYZZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HandschuhTY99,
  author       = {Helena Handschuh and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Decision Oracles are Equivalent to Matching Oracles},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {276--289},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_22},
  doi          = {10.1007/3-540-49162-7\_22},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HandschuhTY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YoungY99,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Auto-Recoverable Cryptosystems with Faster Initialization and the
                  Escrow Hierarchy},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {306--314},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_24},
  doi          = {10.1007/3-540-49162-7\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YoungY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/FranklinGY99,
  author       = {Matthew K. Franklin and
                  Juan A. Garay and
                  Moti Yung},
  editor       = {Prasad Jayanti},
  title        = {Self-Testing/Correcting Protocols (Extended Abstract)},
  booktitle    = {Distributed Computing, 13th International Symposium, Bratislava, Slovak
                  Republic, September 27-29, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1693},
  pages        = {269--283},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48169-9\_19},
  doi          = {10.1007/3-540-48169-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/FranklinGY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BlundoSHKVY98,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Amir Herzberg and
                  Shay Kutten and
                  Ugo Vaccaro and
                  Moti Yung},
  title        = {Perfectly Secure Key Distribution for Dynamic Conferences},
  journal      = {Inf. Comput.},
  volume       = {146},
  number       = {1},
  pages        = {1--23},
  year         = {1998},
  url          = {https://doi.org/10.1006/inco.1998.2717},
  doi          = {10.1006/INCO.1998.2717},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/BlundoSHKVY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NaorOVY98,
  author       = {Moni Naor and
                  Rafail Ostrovsky and
                  Ramarathnam Venkatesan and
                  Moti Yung},
  title        = {Perfect Zero-Knowledge Arguments for \emph{NP} Using Any One-Way Permutation},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {87--108},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900037},
  doi          = {10.1007/S001459900037},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NaorOVY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/YoungY98,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Joe Buhler},
  title        = {Finding Length-3 Positive Cunningham Chains},
  booktitle    = {Algorithmic Number Theory, Third International Symposium, ANTS-III,
                  Portland, Oregon, USA, June 21-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1423},
  pages        = {289--298},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054869},
  doi          = {10.1007/BFB0054869},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/YoungY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FrankelTY98,
  author       = {Yair Frankel and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Fair Off-Line e-cash Made Easy},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {257--270},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_21},
  doi          = {10.1007/3-540-49649-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FrankelTY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/FrankelY98,
  author       = {Yair Frankel and
                  Moti Yung},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {How to Say "YES" with Smart Cards},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {203--212},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_18},
  doi          = {10.1007/10721064\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/FrankelY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/YoungY98,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Kaisa Nyberg},
  title        = {Auto-Recoverable Auto-Certifiable Cryptosystems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054114},
  doi          = {10.1007/BFB0054114},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/YoungY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonY98,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Rafael Hirschfeld},
  title        = {On Assurance Structures for {WWW} Commerce},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055478},
  doi          = {10.1007/BFB0055478},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FrankelKMY98,
  author       = {Yair Frankel and
                  David W. Kravitz and
                  Charles T. Montgomery and
                  Moti Yung},
  editor       = {Rafael Hirschfeld},
  title        = {Beyond Identity: Warranty-Based Digital Signature Transactions},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {241--253},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055487},
  doi          = {10.1007/BFB0055487},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FrankelKMY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YoungY98,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Serge Vaudenay},
  title        = {Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {122--133},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_9},
  doi          = {10.1007/3-540-69710-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YoungY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/SantisCPY98,
  author       = {Alfredo De Santis and
                  Giovanni Di Crescenzo and
                  Giuseppe Persiano and
                  Moti Yung},
  editor       = {Kim Guldstrand Larsen and
                  Sven Skyum and
                  Glynn Winskel},
  title        = {Image Density is Complete for Non-Interactive-SZK (Extended Abstract)},
  booktitle    = {Automata, Languages and Programming, 25th International Colloquium,
                  ICALP'98, Aalborg, Denmark, July 13-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1443},
  pages        = {784--795},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055102},
  doi          = {10.1007/BFB0055102},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/SantisCPY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/CrescenzoSY98,
  author       = {Giovanni Di Crescenzo and
                  Kouichi Sakurai and
                  Moti Yung},
  editor       = {Kyung{-}Yong Chwa and
                  Oscar H. Ibarra},
  title        = {Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently
                  while Concealing it},
  booktitle    = {Algorithms and Computation, 9th International Symposium, {ISAAC} '98,
                  Taejon, Korea, December 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1533},
  pages        = {59--68},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49381-6\_8},
  doi          = {10.1007/3-540-49381-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/CrescenzoSY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FrankelY98,
  author       = {Yair Frankel and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Distributed Public Key Cryptosystems},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054010},
  doi          = {10.1007/BFB0054010},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FrankelY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Okamoto98,
  author       = {Tatsuaki Okamoto and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Lower Bounds on Term-Based Divisible Cash Systems},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {72--82},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054016},
  doi          = {10.1007/BFB0054016},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Okamoto98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TsiounisY98,
  author       = {Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {On the Security of ElGamal Based Encryption},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {117--134},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054019},
  doi          = {10.1007/BFB0054019},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TsiounisY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/FrankelMY98,
  author       = {Yair Frankel and
                  Philip D. MacKenzie and
                  Moti Yung},
  editor       = {Brian A. Coan and
                  Yehuda Afek},
  title        = {Robust Efficient Distributed RSA-Key Generation},
  booktitle    = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June
                  28 - July 2, 1998},
  pages        = {320},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/277697.277779},
  doi          = {10.1145/277697.277779},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/FrankelMY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaa/KontogiannisPSY98,
  author       = {Spyros C. Kontogiannis and
                  Grammati E. Pantziou and
                  Paul G. Spirakis and
                  Moti Yung},
  editor       = {Gary L. Miller and
                  Phillip B. Gibbons},
  title        = {"Dynamic-Fault-Prone BSP": {A} Paradigm for Robust Computations
                  in Changing Environments},
  booktitle    = {Proceedings of the Tenth Annual {ACM} Symposium on Parallel Algorithms
                  and Architectures, {SPAA} '98, Puerto Vallarta, Mexico, June 28 -
                  July 2, 1998},
  pages        = {37--46},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/277651.277666},
  doi          = {10.1145/277651.277666},
  timestamp    = {Wed, 21 Nov 2018 12:27:44 +0100},
  biburl       = {https://dblp.org/rec/conf/spaa/KontogiannisPSY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/CrescenzoSY98,
  author       = {Giovanni Di Crescenzo and
                  Kouichi Sakurai and
                  Moti Yung},
  editor       = {Michel Morvan and
                  Christoph Meinel and
                  Daniel Krob},
  title        = {Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and
                  Constant-Round Protocols},
  booktitle    = {{STACS} 98, 15th Annual Symposium on Theoretical Aspects of Computer
                  Science, Paris, France, February 25-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1373},
  pages        = {511--521},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0028586},
  doi          = {10.1007/BFB0028586},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/CrescenzoSY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FrankelMY98,
  author       = {Yair Frankel and
                  Philip D. MacKenzie and
                  Moti Yung},
  editor       = {Jeffrey Scott Vitter},
  title        = {Robust Efficient Distributed RSA-Key Generation},
  booktitle    = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
                  of Computing, Dallas, Texas, USA, May 23-26, 1998},
  pages        = {663--672},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/276698.276882},
  doi          = {10.1145/276698.276882},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FrankelMY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uwec/BellareGJY98,
  author       = {Mihir Bellare and
                  Juan A. Garay and
                  Charanjit S. Jutla and
                  Moti Yung},
  editor       = {Bennet S. Yee},
  title        = {VarietyCash: {A} Multi-Purpose Electronic Payment System},
  booktitle    = {Proceedings of the 3rd {USENIX} Workshop on Electronic Commerce, Boston,
                  Massachusetts, USA, August 31 - September 3, 1998},
  publisher    = {{USENIX} Association},
  year         = {1998},
  url          = {https://www.usenix.org/conference/3rd-usenix-workshop-electronic-commerce/varietycash-multi-purpose-electronic-payment},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/uwec/BellareGJY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/GarayGKMY97,
  author       = {Juan A. Garay and
                  Inder S. Gopal and
                  Shay Kutten and
                  Yishay Mansour and
                  Moti Yung},
  title        = {Efficient On-Line Call Control Algorithms},
  journal      = {J. Algorithms},
  volume       = {23},
  number       = {1},
  pages        = {180--194},
  year         = {1997},
  url          = {https://doi.org/10.1006/jagm.1996.0821},
  doi          = {10.1006/JAGM.1996.0821},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jal/GarayGKMY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/YenerBOY97,
  author       = {B{\"{u}}lent Yener and
                  Inderpal S. Bhandari and
                  Yoram Ofek and
                  Moti Yung},
  title        = {Fault-Tolerant Convergence Routing},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {42},
  number       = {2},
  pages        = {173--183},
  year         = {1997},
  url          = {https://doi.org/10.1006/jpdc.1997.1320},
  doi          = {10.1006/JPDC.1997.1320},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/YenerBOY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/OfekYY97,
  author       = {Yoram Ofek and
                  B{\"{u}}lent Yener and
                  Moti Yung},
  title        = {Concurrent Asynchronous Broadcast on the MetaNet},
  journal      = {{IEEE} Trans. Computers},
  volume       = {46},
  number       = {7},
  pages        = {737--748},
  year         = {1997},
  url          = {https://doi.org/10.1109/12.599894},
  doi          = {10.1109/12.599894},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/OfekYY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/YuY97,
  author       = {Xiangdong Yu and
                  Moti Yung},
  title        = {Scheduling Task-Trees with Additive Scales on Parallel/Distributed
                  Machines},
  journal      = {Theor. Comput. Sci.},
  volume       = {181},
  number       = {2},
  pages        = {357--378},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0304-3975(96)00280-0},
  doi          = {10.1016/S0304-3975(96)00280-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/YuY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AfekKY97,
  author       = {Yehuda Afek and
                  Shay Kutten and
                  Moti Yung},
  title        = {The Local Detection Paradigm and Its Application to Self-Stabilization},
  journal      = {Theor. Comput. Sci.},
  volume       = {186},
  number       = {1-2},
  pages        = {199--229},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0304-3975(96)00286-1},
  doi          = {10.1016/S0304-3975(96)00286-1},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AfekKY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/YenerOY97,
  author       = {B{\"{u}}lent Yener and
                  Yoram Ofek and
                  Moti Yung},
  title        = {Combinatorial design of congestion-free networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {5},
  number       = {6},
  pages        = {989--1000},
  year         = {1997},
  url          = {https://doi.org/10.1109/90.650156},
  doi          = {10.1109/90.650156},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/YenerOY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HerzbergJJKY97,
  author       = {Amir Herzberg and
                  Markus Jakobsson and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Moti Yung},
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {Proactive Public Key and Signature Systems},
  booktitle    = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  pages        = {100--110},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266420.266442},
  doi          = {10.1145/266420.266442},
  timestamp    = {Tue, 10 Nov 2020 20:00:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HerzbergJJKY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CrescenzoOY97,
  author       = {Giovanni Di Crescenzo and
                  Tatsuaki Okamoto and
                  Moti Yung},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Keeping the SZK-Verifier Honest Unconditionally},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052226},
  doi          = {10.1007/BFB0052226},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CrescenzoOY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YoungY97,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Burton S. Kaliski Jr.},
  title        = {The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {264--276},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052241},
  doi          = {10.1007/BFB0052241},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/YoungY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FrankelGMY97,
  author       = {Yair Frankel and
                  Peter Gemmell and
                  Philip D. MacKenzie and
                  Moti Yung},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Proactive {RSA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {440--454},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052254},
  doi          = {10.1007/BFB0052254},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FrankelGMY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/YoungY97,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Walter Fumy},
  title        = {Kleptography: Using Cryptography Against Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {62--74},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_6},
  doi          = {10.1007/3-540-69053-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/YoungY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareJY97,
  author       = {Mihir Bellare and
                  Markus Jakobsson and
                  Moti Yung},
  editor       = {Walter Fumy},
  title        = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {280--305},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_20},
  doi          = {10.1007/3-540-69053-0\_20},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareJY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JakobssonY97,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Walter Fumy},
  title        = {Distributed "Magic Ink" Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {450--464},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_31},
  doi          = {10.1007/3-540-69053-0\_31},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JakobssonY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DavidaFTY97,
  author       = {George I. Davida and
                  Yair Frankel and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Rafael Hirschfeld},
  title        = {Anonymity Control in E-Cash Systems},
  booktitle    = {Financial Cryptography, First International Conference, {FC} '97,
                  Anguilla, British West Indies, February 24-28, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63594-7\_63},
  doi          = {10.1007/3-540-63594-7\_63},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DavidaFTY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonY97,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Rafael Hirschfeld},
  title        = {Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money
                  System},
  booktitle    = {Financial Cryptography, First International Conference, {FC} '97,
                  Anguilla, British West Indies, February 24-28, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {217--238},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63594-7\_80},
  doi          = {10.1007/3-540-63594-7\_80},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/FrankelGMY97,
  author       = {Yair Frankel and
                  Peter Gemmell and
                  Philip D. MacKenzie and
                  Moti Yung},
  title        = {Optimal Resilience Proactive Public-Key Cryptosystems},
  booktitle    = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97,
                  Miami Beach, Florida, USA, October 19-22, 1997},
  pages        = {384--393},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SFCS.1997.646127},
  doi          = {10.1109/SFCS.1997.646127},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/FrankelGMY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YoungY97,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Eli Biham},
  title        = {Sliding Encryption: {A} Cryptographic Tool for Mobile Agents},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {230--241},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052350},
  doi          = {10.1007/BFB0052350},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YoungY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FrankelY97,
  author       = {Yair Frankel and
                  Moti Yung},
  editor       = {Pierpaolo Degano and
                  Roberto Gorrieri and
                  Alberto Marchetti{-}Spaccamela},
  title        = {On Characterization of Escrow Encryption Schemes},
  booktitle    = {Automata, Languages and Programming, 24th International Colloquium,
                  ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1256},
  pages        = {705--715},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63165-8\_224},
  doi          = {10.1007/3-540-63165-8\_224},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FrankelY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CrescenzoSY97,
  author       = {Giovanni Di Crescenzo and
                  Kouichi Sakurai and
                  Moti Yung},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Zero-knowledge proofs of decision power: new protocols and optimal
                  round-complexity},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {17--27},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028458},
  doi          = {10.1007/BFB0028458},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/CrescenzoSY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JansonTY97,
  author       = {Philippe A. Janson and
                  Gene Tsudik and
                  Moti Yung},
  title        = {Scalability and Flexibility in Authentication Services: The KryptoKnight
                  Approach},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '97, The Conference on Computer Communications,
                  Sixteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Driving the Information Revolution, Kobe, Japan, April
                  7-12, 1997},
  pages        = {725--736},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/INFCOM.1997.644526},
  doi          = {10.1109/INFCOM.1997.644526},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JansonTY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sequences/MayerY97,
  author       = {Andrew Mayer and
                  Moti Yung},
  editor       = {Bruno Carpentieri and
                  Alfredo De Santis and
                  Ugo Vaccaro and
                  James A. Storer},
  title        = {Generalized secret sharing and group-key distribution using short
                  keys},
  booktitle    = {Compression and Complexity of {SEQUENCES} 1997, Positano, Amalfitan
                  Coast, Salerno, Italy, June 11-13, 1997, Proceedings},
  pages        = {30--44},
  publisher    = {{IEEE}},
  year         = {1997},
  url          = {https://doi.org/10.1109/SEQUEN.1997.666901},
  doi          = {10.1109/SEQUEN.1997.666901},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/sequences/MayerY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YoungY97,
  author       = {Adam L. Young and
                  Moti Yung},
  title        = {Deniable Password Snatching: On the Possibility of Evasive Electronic
                  Espionage},
  booktitle    = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
                  CA, {USA}},
  pages        = {224--235},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SECPRI.1997.601339},
  doi          = {10.1109/SECPRI.1997.601339},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YoungY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareJY97,
  author       = {Mihir Bellare and
                  Markus Jakobsson and
                  Moti Yung},
  title        = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {1997},
  url          = {http://eprint.iacr.org/1997/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareJY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BellareY96,
  author       = {Mihir Bellare and
                  Moti Yung},
  title        = {Certifying Permutations: Noninteractive Zero-Knowledge Based on Any
                  Trapdoor Permutation},
  journal      = {J. Cryptol.},
  volume       = {9},
  number       = {3},
  pages        = {149--166},
  year         = {1996},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BellareY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FrankelTY96,
  author       = {Yair Frankel and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Kwangjo Kim and
                  Tsutomu Matsumoto},
  title        = {"Indirect Discourse Proof": Achieving Efficient Fair Off-Line
                  E-cash},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Kyongju, Korea, November 3-7, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1163},
  pages        = {286--300},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034855},
  doi          = {10.1007/BFB0034855},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FrankelTY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonY96,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Revokable and Versatile Electronic Money (extended abstract)},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {76--87},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238191},
  doi          = {10.1145/238168.238191},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JakobssonY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/ShanbhogueY96,
  author       = {Vasant Shanbhogue and
                  Moti Yung},
  editor       = {Jin{-}yi Cai and
                  C. K. Wong},
  title        = {Distributed Computing in Asynchronous Networks with Byzantine Edges},
  booktitle    = {Computing and Combinatorics, Second Annual International Conference,
                  {COCOON} '96, Hong Kong, June 17-19, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1090},
  pages        = {352--360},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61332-3\_169},
  doi          = {10.1007/3-540-61332-3\_169},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/ShanbhogueY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YoungY96,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Neal Koblitz},
  title        = {The Dark Side of "Black-Box" Cryptography, or: Should We
                  Trust Capstone?},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {89--103},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_8},
  doi          = {10.1007/3-540-68697-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YoungY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JakobssonY96,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Neal Koblitz},
  title        = {Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_15},
  doi          = {10.1007/3-540-68697-5\_15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/JakobssonY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerFSY96,
  author       = {Ronald Cramer and
                  Matthew K. Franklin and
                  Berry Schoenmakers and
                  Moti Yung},
  editor       = {Ueli M. Maurer},
  title        = {Multi-Autority Secret-Ballot Elections with Linear Work},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {72--83},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_7},
  doi          = {10.1007/3-540-68339-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerFSY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/YuY96,
  author       = {Xiangdong Yu and
                  Moti Yung},
  editor       = {Friedhelm Meyer auf der Heide and
                  Burkhard Monien},
  title        = {Agent Rendezvous: {A} Dynamic Symmetry-Breaking Problem},
  booktitle    = {Automata, Languages and Programming, 23rd International Colloquium,
                  ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1099},
  pages        = {610--621},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61440-0\_163},
  doi          = {10.1007/3-540-61440-0\_163},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/YuY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BurmesterDISSY96,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Toshiya Itoh and
                  Kouichi Sakurai and
                  Hiroki Shizuya and
                  Moti Yung},
  editor       = {Ross J. Anderson},
  title        = {A Progress Report on Subliminal-Free Channels},
  booktitle    = {Information Hiding, First International Workshop, Cambridge, UK, May
                  30 - June 1, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1174},
  pages        = {157--168},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61996-8\_39},
  doi          = {10.1007/3-540-61996-8\_39},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BurmesterDISSY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiOY96,
  author       = {Chung{-}Sheng Li and
                  Yoram Ofek and
                  Moti Yung},
  title        = {"Time-Driven Priority" Flow Control for Real-Time Heterogeneous
                  Internetworking},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '96, The Conference on Computer Communications,
                  Fifteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Networking the Next Generation, San Francisco, CA, USA,
                  March 24-28, 1996},
  pages        = {189--197},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/INFCOM.1996.497893},
  doi          = {10.1109/INFCOM.1996.497893},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiOY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/MayerOY96,
  author       = {Alain J. Mayer and
                  Yoram Ofek and
                  Moti Yung},
  title        = {Approximating Max-Min Fair Rates via Distributed Local Scheduling
                  with Partial Information},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '96, The Conference on Computer Communications,
                  Fifteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Networking the Next Generation, San Francisco, CA, USA,
                  March 24-28, 1996},
  pages        = {928--936},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/INFCOM.1996.493393},
  doi          = {10.1109/INFCOM.1996.493393},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/MayerOY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/FrankelGY96,
  author       = {Yair Frankel and
                  Peter Gemmell and
                  Moti Yung},
  editor       = {James E. Burns and
                  Yoram Moses},
  title        = {Witness-Based Cryptographic Program Checking and Applications (an
                  Announcement)},
  booktitle    = {Proceedings of the Fifteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Philadelphia, Pennsylvania, USA, May 23-26,
                  1996},
  pages        = {211},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/248052.248094},
  doi          = {10.1145/248052.248094},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/FrankelGY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/MayerOY96,
  author       = {Alain J. Mayer and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {{\'{E}}va Tardos},
  title        = {Self-Stabilizing Algorithms for Synchronous Unidirectional Rings},
  booktitle    = {Proceedings of the Seventh Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, 28-30 January 1996, Atlanta, Georgia, {USA}},
  pages        = {564--573},
  publisher    = {{ACM/SIAM}},
  year         = {1996},
  url          = {http://dl.acm.org/citation.cfm?id=313852.314120},
  timestamp    = {Thu, 05 Jul 2018 07:29:31 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/MayerOY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YoungY96,
  author       = {Adam L. Young and
                  Moti Yung},
  title        = {Cryptovirology: Extortion-Based Security Threats and Countermeasures},
  booktitle    = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
                  CA, {USA}},
  pages        = {129--140},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SECPRI.1996.502676},
  doi          = {10.1109/SECPRI.1996.502676},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YoungY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FrankelGY96,
  author       = {Yair Frankel and
                  Peter Gemmell and
                  Moti Yung},
  editor       = {Gary L. Miller},
  title        = {Witness-Based Cryptographic Program Checking and Robust Function Sharing},
  booktitle    = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory
                  of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996},
  pages        = {499--508},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/237814.237998},
  doi          = {10.1145/237814.237998},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FrankelGY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrankelGMY96,
  author       = {Yair Frankel and
                  Peter Gemmell and
                  Philip D. MacKenzie and
                  Moti Yung},
  title        = {Proactive {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrankelGMY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/BirdGHJKMY95,
  author       = {Ray Bird and
                  Inder S. Gopal and
                  Amir Herzberg and
                  Philippe A. Janson and
                  Shay Kutten and
                  Refik Molva and
                  Moti Yung},
  title        = {The KryptoKnight family of light-weight protocols for authentication
                  and key distribution},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {3},
  number       = {1},
  pages        = {31--41},
  year         = {1995},
  url          = {https://doi.org/10.1109/90.365435},
  doi          = {10.1109/90.365435},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/BirdGHJKMY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/OfekY95,
  author       = {Yoram Ofek and
                  Moti Yung},
  title        = {{METANET} principles of an arbitrary topology {LAN}},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {3},
  number       = {2},
  pages        = {169--180},
  year         = {1995},
  url          = {https://doi.org/10.1109/90.374118},
  doi          = {10.1109/90.374118},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/OfekY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/FrankelHKKKY95,
  author       = {Yair Frankel and
                  Amir Herzberg and
                  Paul A. Karger and
                  Hugo Krawczyk and
                  Charles A. Kunzinger and
                  Mordechai M. Yung},
  title        = {Security issues in a {CDPD} wireless network},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {2},
  number       = {4},
  pages        = {16--27},
  year         = {1995},
  url          = {https://doi.org/10.1109/98.403454},
  doi          = {10.1109/98.403454},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/FrankelHKKKY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/YuY95,
  author       = {Xiangdong Yu and
                  Moti Yung},
  editor       = {Ding{-}Zhu Du and
                  Ming Li},
  title        = {Scheduling Task-Tree with Additive Scales on Parallel / Distributed
                  Machines},
  booktitle    = {Computing and Combinatorics, First Annual International Conference,
                  {COCOON} '95, Xi'an, China, August 24-26, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {959},
  pages        = {607--616},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0030883},
  doi          = {10.1007/BFB0030883},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/YuY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FrankelY95,
  author       = {Yair Frankel and
                  Moti Yung},
  editor       = {Don Coppersmith},
  title        = {Escrow Encryption Systems Visited: Attacks, Analysis and Designs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {222--235},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_18},
  doi          = {10.1007/3-540-44750-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FrankelY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FrankelY95a,
  author       = {Yair Frankel and
                  Moti Yung},
  editor       = {Don Coppersmith},
  title        = {Cryptanalysis of the Immunized {LL} Public Key Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {287--296},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_23},
  doi          = {10.1007/3-540-44750-4\_23},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FrankelY95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HerzbergJKY95,
  author       = {Amir Herzberg and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Moti Yung},
  editor       = {Don Coppersmith},
  title        = {Proactive Secret Sharing Or: How to Cope With Perpetual Leakage},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {339--352},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_27},
  doi          = {10.1007/3-540-44750-4\_27},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HerzbergJKY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esa/AlonGY95,
  author       = {Noga Alon and
                  Zvi Galil and
                  Moti Yung},
  editor       = {Paul G. Spirakis},
  title        = {Efficient Dynamic-Resharing "Verifiable Secret Sharing"
                  Against Mobile Adversary},
  booktitle    = {Algorithms - {ESA} '95, Third Annual European Symposium, Corfu, Greece,
                  September 25-27, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {979},
  pages        = {523--537},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60313-1\_168},
  doi          = {10.1007/3-540-60313-1\_168},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esa/AlonGY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GalilMY95,
  author       = {Zvi Galil and
                  Alain J. Mayer and
                  Moti Yung},
  title        = {Resolving Message Complexity of Byzantine Agreement and beyond},
  booktitle    = {36th Annual Symposium on Foundations of Computer Science, Milwaukee,
                  Wisconsin, USA, 23-25 October 1995},
  pages        = {724--733},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/SFCS.1995.492674},
  doi          = {10.1109/SFCS.1995.492674},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GalilMY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/NikoletseasRSY95,
  author       = {Sotiris E. Nikoletseas and
                  John H. Reif and
                  Paul G. Spirakis and
                  Moti Yung},
  editor       = {Zolt{\'{a}}n F{\"{u}}l{\"{o}}p and
                  Ferenc G{\'{e}}cseg},
  title        = {Stochastic Graphs Have Short Memory: Fully Dynamic Connectivity in
                  Poly-Log Expected Time},
  booktitle    = {Automata, Languages and Programming, 22nd International Colloquium,
                  ICALP95, Szeged, Hungary, July 10-14, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {944},
  pages        = {159--170},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60084-1\_71},
  doi          = {10.1007/3-540-60084-1\_71},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/NikoletseasRSY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/YenerOY95,
  author       = {B{\"{u}}lent Yener and
                  Yoram Ofek and
                  Moti Yung},
  title        = {Topological Design of Loss-Free Switch-Based LANs},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '95, The Conference on Computer Communications,
                  Fourteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Bringing Information to People, Boston, Massachusetts,
                  USA, April 2-6, 1995},
  pages        = {88--96},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/INFCOM.1995.515864},
  doi          = {10.1109/INFCOM.1995.515864},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/YenerOY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/MayerOY95,
  author       = {Alain J. Mayer and
                  Yoram Ofek and
                  Moti Yung},
  title        = {Local Fairness in General-Topology Networks with Convergence Routing},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '95, The Conference on Computer Communications,
                  Fourteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Bringing Information to People, Boston, Massachusetts,
                  USA, April 2-6, 1995},
  pages        = {891--899},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  timestamp    = {Mon, 26 Jan 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/MayerOY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FranklinY95,
  author       = {Matthew K. Franklin and
                  Moti Yung},
  editor       = {Frank Thomson Leighton and
                  Allan Borodin},
  title        = {Secure hypergraphs: privacy from partial broadcast (Extended Abstract)},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory
                  of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}},
  pages        = {36--44},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/225058.225077},
  doi          = {10.1145/225058.225077},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FranklinY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/OfekY94,
  author       = {Yoram Ofek and
                  Moti Yung},
  title        = {Routing and Flow Control on the MetaNet: An Overview},
  journal      = {Comput. Networks {ISDN} Syst.},
  volume       = {26},
  number       = {6-8},
  pages        = {859--872},
  year         = {1994},
  url          = {https://doi.org/10.1016/0169-7552(94)90050-7},
  doi          = {10.1016/0169-7552(94)90050-7},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/OfekY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/YuY94,
  author       = {Xiangdong Yu and
                  Moti Yung},
  title        = {Space Lower-Bounds for Pseudorandom-Generators},
  booktitle    = {Proceedings of the Ninth Annual Structure in Complexity Theory Conference,
                  Amsterdam, The Netherlands, June 28 - July 1, 1994},
  pages        = {186--197},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/SCT.1994.315805},
  doi          = {10.1109/SCT.1994.315805},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/YuY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esa/ParlatiY94,
  author       = {Giuseppe Parlati and
                  Moti Yung},
  editor       = {Jan van Leeuwen},
  title        = {Non-Exploratory Self-Stabilization for Constant-Space Symmetry-Breaking},
  booktitle    = {Algorithms - {ESA} '94, Second Annual European Symposium, Utrecht,
                  The Netherlands, September 26-28, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {855},
  pages        = {183--201},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0049408},
  doi          = {10.1007/BFB0049408},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esa/ParlatiY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FranklinY94,
  author       = {Matthew K. Franklin and
                  Moti Yung},
  editor       = {Alfredo De Santis},
  title        = {The Blinding of Weak Signatures (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {67--76},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053425},
  doi          = {10.1007/BFB0053425},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FranklinY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/SantisCPY94,
  author       = {Alfredo De Santis and
                  Giovanni Di Crescenzo and
                  Giuseppe Persiano and
                  Moti Yung},
  title        = {On Monotone Formula Closure of {SZK}},
  booktitle    = {35th Annual Symposium on Foundations of Computer Science, Santa Fe,
                  New Mexico, USA, 20-22 November 1994},
  pages        = {454--465},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/SFCS.1994.365745},
  doi          = {10.1109/SFCS.1994.365745},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/SantisCPY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/NikolestseasPSY94,
  author       = {Sotiris E. Nikoletseas and
                  Krishna V. Palem and
                  Paul G. Spirakis and
                  Moti Yung},
  editor       = {Serge Abiteboul and
                  Eli Shamir},
  title        = {Short Vertex Disjoint Paths and Multiconnectivity in Random Graphs:
                  Reliable Network Computing},
  booktitle    = {Automata, Languages and Programming, 21st International Colloquium,
                  ICALP94, Jerusalem, Israel, July 11-14, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {820},
  pages        = {508--519},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58201-0\_94},
  doi          = {10.1007/3-540-58201-0\_94},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/NikolestseasPSY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/YenerBOY94,
  author       = {B{\"{u}}lent Yener and
                  Inderpal S. Bhandari and
                  Yoram Ofek and
                  Moti Yung},
  title        = {Fault-tolerant convergence routing},
  booktitle    = {1994 International Conference on Network Protocols, {ICNP} 1994, Boston,
                  MA, USA, October 25-28, 1994, Proceedings},
  pages        = {229--238},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/ICNP.1994.344356},
  doi          = {10.1109/ICNP.1994.344356},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/YenerBOY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/OfekY94,
  author       = {Yoram Ofek and
                  Moti Yung},
  title        = {The Integrated MetaNet Architecture: {A} Switch-Based Multimedia {LAN}
                  for Parallel Computing and Real-Time Traffic},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '94, The Conference on Computer Communications,
                  Thirteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Networking for Global Communications, Toronto, Ontario,
                  Canada, June 12-16, 1994},
  pages        = {802--811},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/INFCOM.1994.337658},
  doi          = {10.1109/INFCOM.1994.337658},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/OfekY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/PriscoMY94,
  author       = {Roberto De Prisco and
                  Alain J. Mayer and
                  Moti Yung},
  editor       = {James H. Anderson and
                  David Peleg and
                  Elizabeth Borowsky},
  title        = {Time-Optimal Message-Efficient Work Performance in the Presence of
                  Faults (Extended Summary)},
  booktitle    = {Proceedings of the Thirteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Los Angeles, California, USA, August 14-17,
                  1994},
  pages        = {161--172},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/197917.198082},
  doi          = {10.1145/197917.198082},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/PriscoMY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/AielloVY94,
  author       = {William Aiello and
                  Ramarathnam Venkatesan and
                  Moti Yung},
  editor       = {James H. Anderson and
                  David Peleg and
                  Elizabeth Borowsky},
  title        = {Coins, Weights and Contention in Balancing Networks},
  booktitle    = {Proceedings of the Thirteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Los Angeles, California, USA, August 14-17,
                  1994},
  pages        = {193--205},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/197917.198090},
  doi          = {10.1145/197917.198090},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/AielloVY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/SantisDFY94,
  author       = {Alfredo De Santis and
                  Yvo Desmedt and
                  Yair Frankel and
                  Moti Yung},
  editor       = {Frank Thomson Leighton and
                  Michael T. Goodrich},
  title        = {How to share a function securely},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of
                  Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  pages        = {522--533},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/195058.195405},
  doi          = {10.1145/195058.195405},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/SantisDFY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/Yung94,
  author       = {Moti Yung},
  editor       = {Gerard Tel and
                  Paul M. B. Vit{\'{a}}nyi},
  title        = {Secure Distributed Computing: Theory and Practice},
  booktitle    = {Distributed Algorithms, 8th International Workshop, {WDAG} '94, Terschelling,
                  The Netherlands, September 29 - October 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {857},
  pages        = {53--73},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0020424},
  doi          = {10.1007/BFB0020424},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/Yung94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/DolevDWY93,
  author       = {Danny Dolev and
                  Cynthia Dwork and
                  Orli Waarts and
                  Moti Yung},
  title        = {Perfectly Secure Message Transmission},
  journal      = {J. {ACM}},
  volume       = {40},
  number       = {1},
  pages        = {17--47},
  year         = {1993},
  url          = {https://doi.org/10.1145/138027.138036},
  doi          = {10.1145/138027.138036},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/DolevDWY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/EppsteinITTWY93,
  author       = {David Eppstein and
                  Giuseppe F. Italiano and
                  Roberto Tamassia and
                  Robert Endre Tarjan and
                  Jeffery R. Westbrook and
                  Moti Yung},
  title        = {Corrigendum: Maintenance of a Minimum Spanning Forest in a Dynamic
                  Plane Graph},
  journal      = {J. Algorithms},
  volume       = {15},
  number       = {1},
  pages        = {173},
  year         = {1993},
  timestamp    = {Mon, 08 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jal/EppsteinITTWY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/BirdGHJKMY93,
  author       = {Ray Bird and
                  Inder S. Gopal and
                  Amir Herzberg and
                  Philippe A. Janson and
                  Shay Kutten and
                  Refik Molva and
                  Moti Yung},
  title        = {Systematic Design of a Family of Attack-Resistant Authentication Protocols},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {11},
  number       = {5},
  pages        = {679--693},
  year         = {1993},
  url          = {https://doi.org/10.1109/49.223869},
  doi          = {10.1109/49.223869},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/BirdGHJKMY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OstrovskyVY93,
  author       = {Rafail Ostrovsky and
                  Ramarathnam Venkatesan and
                  Moti Yung},
  editor       = {Tor Helleseth},
  title        = {Interactive Hashing Simplifies Zero-Knowledge Protocol Design},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {267--273},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_23},
  doi          = {10.1007/3-540-48285-7\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OstrovskyVY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/FranklinGY93,
  author       = {Matthew K. Franklin and
                  Zvi Galil and
                  Moti Yung},
  title        = {Eavesdropping Games: {A} Graph-Theoretic Approach to Privacy in Distributed
                  Systems},
  booktitle    = {34th Annual Symposium on Foundations of Computer Science, Palo Alto,
                  California, USA, 3-5 November 1993},
  pages        = {670--679},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/SFCS.1993.366820},
  doi          = {10.1109/SFCS.1993.366820},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/FranklinGY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FranklinY93,
  author       = {Matthew K. Franklin and
                  Moti Yung},
  editor       = {Andrzej Lingas and
                  Rolf G. Karlsson and
                  Svante Carlsson},
  title        = {Secure and Efficient Off-Line Digital Money (Extended Abstract)},
  booktitle    = {Automata, Languages and Programming, 20nd International Colloquium,
                  ICALP93, Lund, Sweden, July 5-9, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {700},
  pages        = {265--276},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-56939-1\_78},
  doi          = {10.1007/3-540-56939-1\_78},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FranklinY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/GarayGKMY93,
  author       = {Juan A. Garay and
                  Inder S. Gopal and
                  Shay Kutten and
                  Yishay Mansour and
                  Moti Yung},
  title        = {Efficient On-Line Call Control Algorithms},
  booktitle    = {Second Israel Symposium on Theory of Computing Systems, {ISTCS} 1993,
                  Natanya, Israel, June 7-9, 1993, Proceedings},
  pages        = {285--293},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/ISTCS.1993.253460},
  doi          = {10.1109/ISTCS.1993.253460},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/istcs/GarayGKMY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/YenerOY93,
  author       = {B{\"{u}}lent Yener and
                  Yoram Ofek and
                  Moti Yung},
  title        = {Configuration and performance issues in the MetaNet design},
  booktitle    = {18th Conference on Local Computer Networks, September 19-22, 1993,
                  Minneapolis, Minnesota, USA, Proceedings},
  pages        = {291--299},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/LCN.1993.591236},
  doi          = {10.1109/LCN.1993.591236},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/YenerOY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HanssonMY92,
  author       = {Othar Hansson and
                  Andrew Mayer and
                  Moti Yung},
  title        = {Criticizing solutions to relaxed models yields powerful admissible
                  heuristics},
  journal      = {Inf. Sci.},
  volume       = {63},
  number       = {3},
  pages        = {207--227},
  year         = {1992},
  url          = {https://doi.org/10.1016/0020-0255(92)90070-O},
  doi          = {10.1016/0020-0255(92)90070-O},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HanssonMY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/EppsteinITTWY92,
  author       = {David Eppstein and
                  Giuseppe F. Italiano and
                  Roberto Tamassia and
                  Robert Endre Tarjan and
                  Jeffery R. Westbrook and
                  Moti Yung},
  title        = {Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph},
  journal      = {J. Algorithms},
  volume       = {13},
  number       = {1},
  pages        = {33--54},
  year         = {1992},
  url          = {https://doi.org/10.1016/0196-6774(92)90004-V},
  doi          = {10.1016/0196-6774(92)90004-V},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jal/EppsteinITTWY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorOVY92,
  author       = {Moni Naor and
                  Rafail Ostrovsky and
                  Ramarathnam Venkatesan and
                  Moti Yung},
  editor       = {Ernest F. Brickell},
  title        = {Perfect Zero-Knowledge Arguments for {NP} Can Be Based on General
                  Complexity Assumptions (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_14},
  doi          = {10.1007/3-540-48071-4\_14},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorOVY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareY92,
  author       = {Mihir Bellare and
                  Moti Yung},
  editor       = {Ernest F. Brickell},
  title        = {Certifying Cryptographic Tools: The Case of Trapdoor Permutations},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {442--460},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_31},
  doi          = {10.1007/3-540-48071-4\_31},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlundoSHKVY92,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Amir Herzberg and
                  Shay Kutten and
                  Ugo Vaccaro and
                  Moti Yung},
  editor       = {Ernest F. Brickell},
  title        = {Perfectly-Secure Key Distribution for Dynamic Conferences},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {471--486},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_33},
  doi          = {10.1007/3-540-48071-4\_33},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlundoSHKVY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/SantisPY92,
  author       = {Alfredo De Santis and
                  Giuseppe Persiano and
                  Moti Yung},
  editor       = {Werner Kuich},
  title        = {One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier},
  booktitle    = {Automata, Languages and Programming, 19th International Colloquium,
                  ICALP92, Vienna, Austria, July 13-17, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {623},
  pages        = {28--40},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-55719-9\_61},
  doi          = {10.1007/3-540-55719-9\_61},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/SantisPY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/DesmedtFY92,
  author       = {Yvo Desmedt and
                  Yair Frankel and
                  Moti Yung},
  title        = {Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated
                  Multicast/Feedback},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '92, The Conference on Computer Communications,
                  Eleventh Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, One World through Communications, Florence, Italy, May
                  4-8, 1992},
  pages        = {2045--2054},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/INFCOM.1992.263476},
  doi          = {10.1109/INFCOM.1992.263476},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/DesmedtFY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/OstrovskyVY92,
  author       = {Rafail Ostrovsky and
                  Ramarathnam Venkatesan and
                  Moti Yung},
  editor       = {Alain Finkel and
                  Matthias Jantzen},
  title        = {Secure Commitment Against {A} Powerful Adversary},
  booktitle    = {{STACS} 92, 9th Annual Symposium on Theoretical Aspects of Computer
                  Science, Cachan, France, February 13-15, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {577},
  pages        = {439--448},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-55210-3\_203},
  doi          = {10.1007/3-540-55210-3\_203},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/OstrovskyVY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/MayerOOY92,
  author       = {Alain J. Mayer and
                  Yoram Ofek and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {S. Rao Kosaraju and
                  Mike Fellows and
                  Avi Wigderson and
                  John A. Ellis},
  title        = {Self-Stabilizing Symmetry Breaking in Constant-Space (Extended Abstract)},
  booktitle    = {Proceedings of the 24th Annual {ACM} Symposium on Theory of Computing,
                  May 4-6, 1992, Victoria, British Columbia, Canada},
  pages        = {667--678},
  publisher    = {{ACM}},
  year         = {1992},
  url          = {https://doi.org/10.1145/129712.129777},
  doi          = {10.1145/129712.129777},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/MayerOOY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FranklinY92,
  author       = {Matthew K. Franklin and
                  Moti Yung},
  editor       = {S. Rao Kosaraju and
                  Mike Fellows and
                  Avi Wigderson and
                  John A. Ellis},
  title        = {Communication Complexity of Secure Computation (Extended Abstract)},
  booktitle    = {Proceedings of the 24th Annual {ACM} Symposium on Theory of Computing,
                  May 4-6, 1992, Victoria, British Columbia, Canada},
  pages        = {699--710},
  publisher    = {{ACM}},
  year         = {1992},
  url          = {https://doi.org/10.1145/129712.129780},
  doi          = {10.1145/129712.129780},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FranklinY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BrassardCY91,
  author       = {Gilles Brassard and
                  Claude Cr{\'{e}}peau and
                  Moti Yung},
  title        = {Constant-Round Perfect Zero-Knowledge Computationally Convincing Protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {84},
  number       = {1},
  pages        = {23--52},
  year         = {1991},
  url          = {https://doi.org/10.1016/0304-3975(91)90259-5},
  doi          = {10.1016/0304-3975(91)90259-5},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BrassardCY91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BirdGHJKMY91,
  author       = {Ray Bird and
                  Inder S. Gopal and
                  Amir Herzberg and
                  Philippe A. Janson and
                  Shay Kutten and
                  Refik Molva and
                  Moti Yung},
  editor       = {Joan Feigenbaum},
  title        = {Systematic Design of Two-Party Authentication Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {44--61},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_3},
  doi          = {10.1007/3-540-46766-1\_3},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BirdGHJKMY91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DesmedtY91,
  author       = {Yvo Desmedt and
                  Moti Yung},
  editor       = {Donald W. Davies},
  title        = {Weakness of Undeniable Signature Schemes (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {205--220},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_19},
  doi          = {10.1007/3-540-46416-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DesmedtY91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/OfekY91,
  author       = {Yoram Ofek and
                  Moti Yung},
  title        = {Lossless Asynchronous Broadcast-with-Feedback on the MetaNet Architecture},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '91, The Conference on Computer Communications,
                  Tenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Networking in the 90s, Bal Harbour, Florida, USA, April
                  7-11, 1991},
  pages        = {1050--1063},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/INFCOM.1991.147620},
  doi          = {10.1109/INFCOM.1991.147620},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/OfekY91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/OstrovskyY91,
  author       = {Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Luigi Logrippo},
  title        = {How to Withstand Mobile Virus Attacks (Extended Abstract)},
  booktitle    = {Proceedings of the Tenth Annual {ACM} Symposium on Principles of Distributed
                  Computing, Montreal, Quebec, Canada, August 19-21, 1991},
  pages        = {51--59},
  publisher    = {{ACM}},
  year         = {1991},
  url          = {https://doi.org/10.1145/112600.112605},
  doi          = {10.1145/112600.112605},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/OstrovskyY91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/ChrobakEIY91,
  author       = {Marek Chrobak and
                  David Eppstein and
                  Giuseppe F. Italiano and
                  Moti Yung},
  editor       = {Alok Aggarwal},
  title        = {Efficient Sequential and Parallel Algorithms for Computing Recovery
                  Points in Trees and Paths},
  booktitle    = {Proceedings of the Second Annual {ACM/SIGACT-SIAM} Symposium on Discrete
                  Algorithms, 28-30 January 1991, San Francisco, California, {USA}},
  pages        = {158--167},
  publisher    = {{ACM/SIAM}},
  year         = {1991},
  url          = {http://dl.acm.org/citation.cfm?id=127787.127821},
  timestamp    = {Thu, 05 Jul 2018 07:28:55 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/ChrobakEIY91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/YungALS90,
  author       = {Yehuda Afek and
                  Gad M. Landau and
                  Baruch Schieber and
                  Moti Yung},
  title        = {The Power of Multimedia: Combining Point-to-Point and Multiaccess
                  Networks},
  journal      = {Inf. Comput.},
  volume       = {84},
  number       = {1},
  pages        = {97--118},
  year         = {1990},
  url          = {https://doi.org/10.1016/0890-5401(90)90035-G},
  doi          = {10.1016/0890-5401(90)90035-G},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/YungALS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrassardY90,
  author       = {Gilles Brassard and
                  Moti Yung},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {One-Way Group Actions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {94--107},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_7},
  doi          = {10.1007/3-540-38424-3\_7},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrassardY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtY90,
  author       = {Yvo Desmedt and
                  Moti Yung},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Abritrated Unconditionally Secure Authentication Can Be Unconditionally
                  Protected Against Arbiter's Attacks (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {177--188},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_13},
  doi          = {10.1007/3-540-38424-3\_13},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SantisY90,
  author       = {Alfredo De Santis and
                  Moti Yung},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover
                  Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {366--377},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_27},
  doi          = {10.1007/3-540-38424-3\_27},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SantisY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/OstrovskyVY90,
  author       = {Rafail Ostrovsky and
                  Ramarathnam Venkatesan and
                  Moti Yung},
  editor       = {Jin{-}Yi Cai},
  title        = {Fair Games against an All-Powerful Adversary},
  booktitle    = {Advances In Computational Complexity Theory, Proceedings of a {DIMACS}
                  Workshop, New Jersey, USA, December 3-7, 1990},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {13},
  pages        = {155--169},
  publisher    = {{DIMACS/AMS}},
  year         = {1990},
  url          = {https://doi.org/10.1090/dimacs/013/09},
  doi          = {10.1090/DIMACS/013/09},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/OstrovskyVY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SantisY90,
  author       = {Alfredo De Santis and
                  Moti Yung},
  editor       = {Ivan Damg{\aa}rd},
  title        = {On the Design of Provably Secure Cryptographic Hash Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {412--431},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_37},
  doi          = {10.1007/3-540-46877-3\_37},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SantisY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DolevDWY90,
  author       = {Danny Dolev and
                  Cynthia Dwork and
                  Orli Waarts and
                  Moti Yung},
  title        = {Perfectly Secure Message Transmission},
  booktitle    = {31st Annual Symposium on Foundations of Computer Science, St. Louis,
                  Missouri, USA, October 22-24, 1990, Volume {I}},
  pages        = {36--45},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/FSCS.1990.89522},
  doi          = {10.1109/FSCS.1990.89522},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DolevDWY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/OfekY90,
  author       = {Yoram Ofek and
                  Moti Yung},
  editor       = {Cynthia Dwork},
  title        = {Principle for High Speed Network Control: Congestion- and Deadlock-Freeness,
                  Self-Routing, and a Single Buffer per Link},
  booktitle    = {Proceedings of the Ninth Annual {ACM} Symposium on Principles of Distributed
                  Computing, Quebec City, Quebec, Canada, August 22-24, 1990},
  pages        = {161--175},
  publisher    = {{ACM}},
  year         = {1990},
  url          = {https://doi.org/10.1145/93385.93414},
  doi          = {10.1145/93385.93414},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/OfekY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/EppsteinITTWY90,
  author       = {David Eppstein and
                  Giuseppe F. Italiano and
                  Roberto Tamassia and
                  Robert Endre Tarjan and
                  Jeffery R. Westbrook and
                  Moti Yung},
  editor       = {David S. Johnson},
  title        = {Maintenance of a Minimum Spanning Forest in a Dynamic Planar Graph},
  booktitle    = {Proceedings of the First Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  22-24 January 1990, San Francisco, California, {USA}},
  pages        = {1--11},
  publisher    = {{SIAM}},
  year         = {1990},
  url          = {http://dl.acm.org/citation.cfm?id=320176.320177},
  timestamp    = {Mon, 08 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/EppsteinITTWY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorY90,
  author       = {Moni Naor and
                  Moti Yung},
  editor       = {Harriet Ortiz},
  title        = {Public-key Cryptosystems Provably Secure against Chosen Ciphertext
                  Attacks},
  booktitle    = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing,
                  May 13-17, 1990, Baltimore, Maryland, {USA}},
  pages        = {427--437},
  publisher    = {{ACM}},
  year         = {1990},
  url          = {https://doi.org/10.1145/100216.100273},
  doi          = {10.1145/100216.100273},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/AfekKY90,
  author       = {Yehuda Afek and
                  Shay Kutten and
                  Moti Yung},
  editor       = {Jan van Leeuwen and
                  Nicola Santoro},
  title        = {Memory-Efficient Self Stabilizing Protocols for General Networks},
  booktitle    = {Distributed Algorithms, 4th International Workshop, {WDAG} '90, Bari,
                  Italy, September 24-26, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {486},
  pages        = {15--28},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-54099-7\_2},
  doi          = {10.1007/3-540-54099-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/AfekKY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/OfekY90,
  author       = {Yoram Ofek and
                  Moti Yung},
  editor       = {Jan van Leeuwen and
                  Nicola Santoro},
  title        = {Efficient Mechanism for Fairness and Deadlock-Avoidance in High-Speed
                  Networks},
  booktitle    = {Distributed Algorithms, 4th International Workshop, {WDAG} '90, Bari,
                  Italy, September 24-26, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {486},
  pages        = {192--212},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-54099-7\_14},
  doi          = {10.1007/3-540-54099-7\_14},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/OfekY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/ChrobakY89,
  author       = {Marek Chrobak and
                  Moti Yung},
  title        = {Fast Algorithms for Edge-Coloring Planar Graphs},
  journal      = {J. Algorithms},
  volume       = {10},
  number       = {1},
  pages        = {35--51},
  year         = {1989},
  url          = {https://doi.org/10.1016/0196-6774(89)90022-9},
  doi          = {10.1016/0196-6774(89)90022-9},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jal/ChrobakY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/AbramsonY89,
  author       = {Bruce Abramson and
                  Moti Yung},
  title        = {Divide and Conquer under Global Constraints: {A} Solution to the N-Queens
                  Problem},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {6},
  number       = {3},
  pages        = {649--662},
  year         = {1989},
  url          = {https://doi.org/10.1016/0743-7315(89)90011-7},
  doi          = {10.1016/0743-7315(89)90011-7},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/AbramsonY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GalilHY89,
  author       = {Zvi Galil and
                  Stuart Haber and
                  Moti Yung},
  title        = {Minimum-Knowledge Interactive Proofs for Decision Problems},
  journal      = {{SIAM} J. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {711--739},
  year         = {1989},
  url          = {https://doi.org/10.1137/0218049},
  doi          = {10.1137/0218049},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/GalilHY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/GalilHY89,
  author       = {Zvi Galil and
                  Stuart Haber and
                  Moti Yung},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Security against Replay Chosen-Ciphertext Attack},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {183--190},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/12},
  doi          = {10.1090/DIMACS/002/12},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/GalilHY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/OstrovskyY89,
  author       = {Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {On Necessary Conditions for Secure Distributed Computation},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {229--234},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/16},
  doi          = {10.1090/DIMACS/002/16},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/OstrovskyY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GalilHY89,
  author       = {Zvi Galil and
                  Stuart Haber and
                  Moti Yung},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {A Secure Public-key Authentication Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_2},
  doi          = {10.1007/3-540-46885-4\_2},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GalilHY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrassardCY89,
  author       = {Gilles Brassard and
                  Claude Cr{\'{e}}peau and
                  Moti Yung},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {Everything in {NP} can be Argued in \emph{Perfect} Zero-Knowledge
                  in a \emph{Bounded} Number of Rounds (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {192--195},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_21},
  doi          = {10.1007/3-540-46885-4\_21},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BrassardCY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Yung89,
  author       = {Moti Yung},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {Zero-Knowledge Proofs of Computational Power (Extended Summary)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {196--207},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_22},
  doi          = {10.1007/3-540-46885-4\_22},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Yung89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KharitonovGY89,
  author       = {Michael Kharitonov and
                  Andrew V. Goldberg and
                  Moti Yung},
  title        = {Lower Bounds for Pseudorandom Number Generators},
  booktitle    = {30th Annual Symposium on Foundations of Computer Science, Research
                  Triangle Park, North Carolina, USA, 30 October - 1 November 1989},
  pages        = {242--247},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SFCS.1989.63485},
  doi          = {10.1109/SFCS.1989.63485},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KharitonovGY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BrassardC89,
  author       = {Gilles Brassard and
                  Claude Cr{\'{e}}peau and
                  Moti Yung},
  editor       = {Giorgio Ausiello and
                  Mariangiola Dezani{-}Ciancaglini and
                  Simona Ronchi Della Rocca},
  title        = {Everything in {NP} can be Argued in Perfect Zero-Knowledge in a Bounded
                  Number of Rounds},
  booktitle    = {Automata, Languages and Programming, 16th International Colloquium,
                  ICALP89, Stresa, Italy, July 11-15, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {372},
  pages        = {123--136},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/BFb0035756},
  doi          = {10.1007/BFB0035756},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BrassardC89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorY89,
  author       = {Moni Naor and
                  Moti Yung},
  editor       = {David S. Johnson},
  title        = {Universal One-Way Hash Functions and their Cryptographic Applications},
  booktitle    = {Proceedings of the 21st Annual {ACM} Symposium on Theory of Computing,
                  May 14-17, 1989, Seattle, Washington, {USA}},
  pages        = {33--43},
  publisher    = {{ACM}},
  year         = {1989},
  url          = {https://doi.org/10.1145/73007.73011},
  doi          = {10.1145/73007.73011},
  timestamp    = {Wed, 24 Nov 2021 12:15:31 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awoc/ChrobakY88,
  author       = {Marek Chrobak and
                  Moti Yung},
  editor       = {John H. Reif},
  title        = {Fast Parallel and Sequential Algorithms for Edge-Coloring Planar Graphs},
  booktitle    = {{VLSI} Algorithms and Architectures, 3rd Aegean Workshop on Computing,
                  {AWOC} 88, Corfu, Greece, June 28 - July 1, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {319},
  pages        = {11--23},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/BFb0040369},
  doi          = {10.1007/BFB0040369},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/awoc/ChrobakY88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/AfekLSY88,
  author       = {Yehuda Afek and
                  Gad M. Landau and
                  Baruch Schieber and
                  Moti Yung},
  editor       = {Danny Dolev},
  title        = {The Power of Multimedia: Combining Point-to Point and Multi-Access
                  Networks},
  booktitle    = {Proceedings of the Seventh Annual {ACM} Symposium on Principles of
                  Distributed Computing, Toronto, Ontario, Canada, August 15-17, 1988},
  pages        = {90--104},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62546.62564},
  doi          = {10.1145/62546.62564},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/AfekLSY88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GalilY87,
  author       = {Zvi Galil and
                  Moti Yung},
  title        = {Partitioned Encryption and Achieving Simultaneity by Partitioning},
  journal      = {Inf. Process. Lett.},
  volume       = {26},
  number       = {2},
  pages        = {81--88},
  year         = {1987},
  url          = {https://doi.org/10.1016/0020-0190(87)90042-1},
  doi          = {10.1016/0020-0190(87)90042-1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/GalilY87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GalilLY87,
  author       = {Zvi Galil and
                  Gad M. Landau and
                  Mordechai M. Yung},
  title        = {Distributed Algorithms in Synchronous Broadcasting Networks},
  journal      = {Theor. Comput. Sci.},
  volume       = {49},
  pages        = {171--184},
  year         = {1987},
  url          = {https://doi.org/10.1016/0304-3975(87)90006-5},
  doi          = {10.1016/0304-3975(87)90006-5},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/GalilLY87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ImpagliazzoY87,
  author       = {Russell Impagliazzo and
                  Moti Yung},
  editor       = {Carl Pomerance},
  title        = {Direct Minimum-Knowledge Computations},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {40--51},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_4},
  doi          = {10.1007/3-540-48184-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ImpagliazzoY87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GalilHY87,
  author       = {Zvi Galil and
                  Stuart Haber and
                  Moti Yung},
  editor       = {Carl Pomerance},
  title        = {Cryptographic Computation: Secure Faut-Tolerant Protocols and the
                  Public-Key Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {135--155},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_10},
  doi          = {10.1007/3-540-48184-2\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GalilHY87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fjcc/AbramsonY86,
  author       = {Bruce Abramson and
                  Moti Yung},
  title        = {Construction Through Decomposition: {A} Divide-and-Conquer Algoithm
                  for the N-Queens Problem},
  booktitle    = {Proceedings of the Fall Joint Computer Conference, November 2-6, 1986,
                  Dallas, Texas, {USA}},
  pages        = {620--628},
  publisher    = {{IEEE} Computer Society},
  year         = {1986},
  timestamp    = {Fri, 29 Sep 2017 14:35:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fjcc/AbramsonY86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/BenalohY86,
  author       = {Josh Cohen Benaloh and
                  Moti Yung},
  editor       = {Joseph Y. Halpern},
  title        = {Distributing the Power of a Government to Enhance the Privacy of Voters
                  (Extended Abstract)},
  booktitle    = {Proceedings of the Fifth Annual {ACM} Symposium on Principles of Distributed
                  Computing, Calgary, Alberta, Canada, August 11-13, 1986},
  pages        = {52--62},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/10590.10595},
  doi          = {10.1145/10590.10595},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/BenalohY86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Yung85,
  author       = {Mordechai M. Yung},
  title        = {A Secure and Useful 'Keyless Cryptosystem'},
  journal      = {Inf. Process. Lett.},
  volume       = {21},
  number       = {1},
  pages        = {35--38},
  year         = {1985},
  url          = {https://doi.org/10.1016/0020-0190(85)90106-1},
  doi          = {10.1016/0020-0190(85)90106-1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Yung85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GalilHY85,
  author       = {Zvi Galil and
                  Stuart Haber and
                  Moti Yung},
  editor       = {Hugh C. Williams},
  title        = {Symmetric Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {128--137},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_12},
  doi          = {10.1007/3-540-39799-X\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GalilHY85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GalilHY85,
  author       = {Zvi Galil and
                  Stuart Haber and
                  Moti Yung},
  title        = {A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge
                  Public-Key Cryptosystems (Extended Abstract)},
  booktitle    = {26th Annual Symposium on Foundations of Computer Science, Portland,
                  Oregon, USA, 21-23 October 1985},
  pages        = {360--371},
  publisher    = {{IEEE} Computer Society},
  year         = {1985},
  url          = {https://doi.org/10.1109/SFCS.1985.1},
  doi          = {10.1109/SFCS.1985.1},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GalilHY85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/LandauYG85,
  author       = {Gad M. Landau and
                  Mordechai M. Yung and
                  Zvi Galil},
  editor       = {Wilfried Brauer},
  title        = {Distributed Algorithms in Synchronous Broadcasting Networks (Extended
                  Abstract)},
  booktitle    = {Automata, Languages and Programming, 12th Colloquium, Nafplion, Greece,
                  July 15-19, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {194},
  pages        = {363--372},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/BFb0015762},
  doi          = {10.1007/BFB0015762},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/LandauYG85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Yung84,
  author       = {Moti Yung},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {Cryptoprotocols: Subscription to a Public Key, the Secret Blocking
                  and the Multi-Player Mental Poker Game (Extended Abstract)},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {439--453},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_35},
  doi          = {10.1007/3-540-39568-7\_35},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Yung84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics