Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Moti Yung
@inproceedings{DBLP:conf/acns/LorekYZ24, author = {Pawel Lorek and Moti Yung and Filip Zag{\'{o}}rski}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {3--27}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_1}, doi = {10.1007/978-3-031-54776-8\_1}, timestamp = {Tue, 05 Mar 2024 11:55:03 +0100}, biburl = {https://dblp.org/rec/conf/acns/LorekYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2023-1, editor = {Chunpeng Ge and Moti Yung}, title = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-0942-7}, doi = {10.1007/978-981-97-0942-7}, isbn = {978-981-97-0941-0}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/2023-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2023-2, editor = {Chunpeng Ge and Moti Yung}, title = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14527}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-0945-8}, doi = {10.1007/978-981-97-0945-8}, isbn = {978-981-97-0944-1}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LorekYZ24, author = {Pawel Lorek and Moti Yung and Filip Zag{\'{o}}rski}, title = {Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2024}, url = {https://eprint.iacr.org/2024/285}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LorekYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AmjadPPYY23, author = {Ghous Amjad and Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung}, title = {Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {1}, pages = {417--436}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0025}, doi = {10.56553/POPETS-2023-0025}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/AmjadPPYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KutylowskiPPYZ23, author = {Miroslaw Kutylowski and Giuseppe Persiano and Duong Hieu Phan and Moti Yung and Marcin Zawada}, title = {The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {170--183}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0104}, doi = {10.56553/POPETS-2023-0104}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/KutylowskiPPYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WangCHY23, author = {Yi Wang and Rongmao Chen and Xinyi Huang and Moti Yung}, editor = {Jian Guo and Ron Steinfeld}, title = {Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14443}, pages = {135--167}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8736-8\_5}, doi = {10.1007/978-981-99-8736-8\_5}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WangCHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KutylowskiPPYZ23, author = {Miroslaw Kutylowski and Giuseppe Persiano and Duong Hieu Phan and Moti Yung and Marcin Zawada}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {759--790}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_25}, doi = {10.1007/978-3-031-38545-2\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KutylowskiPPYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/DolevYY23, author = {Shlomi Dolev and Avraam Yagudaev and Moti Yung}, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {{HBSS:} (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version)}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, pages = {389--397}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2\_27}, doi = {10.1007/978-3-031-34671-2\_27}, timestamp = {Thu, 29 Jun 2023 08:38:21 +0200}, biburl = {https://dblp.org/rec/conf/cscml/DolevYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/ChangY23, author = {Donghoon Chang and Moti Yung}, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {Midgame Attacks and Defense Against Them}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, pages = {471--492}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2\_33}, doi = {10.1007/978-3-031-34671-2\_33}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/ChangY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/KoyuncuGYY23, author = {Deniz Koyuncu and Alex Gittens and B{\"{u}}lent Yener and Moti Yung}, editor = {Ambuj K. Singh and Yizhou Sun and Leman Akoglu and Dimitrios Gunopulos and Xifeng Yan and Ravi Kumar and Fatma Ozcan and Jieping Ye}, title = {Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning}, booktitle = {Proceedings of the 29th {ACM} {SIGKDD} Conference on Knowledge Discovery and Data Mining, {KDD} 2023, Long Beach, CA, USA, August 6-10, 2023}, pages = {1164--1175}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3580305.3599297}, doi = {10.1145/3580305.3599297}, timestamp = {Mon, 25 Sep 2023 08:29:22 +0200}, biburl = {https://dblp.org/rec/conf/kdd/KoyuncuGYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2022, editor = {Yi Deng and Moti Yung}, title = {Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13837}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-26553-2}, doi = {10.1007/978-3-031-26553-2}, isbn = {978-3-031-26552-5}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2023, editor = {Ding Wang and Moti Yung and Zheli Liu and Xiaofeng Chen}, title = {Information and Communications Security - 25th International Conference, {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14252}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7356-9}, doi = {10.1007/978-981-99-7356-9}, isbn = {978-981-99-7355-2}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2023, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7}, doi = {10.1007/978-3-031-45933-7}, isbn = {978-3-031-45932-0}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-20043, author = {Deniz Koyuncu and Alex Gittens and B{\"{u}}lent Yener and Moti Yung}, title = {Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning}, journal = {CoRR}, volume = {abs/2305.20043}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.20043}, doi = {10.48550/ARXIV.2305.20043}, eprinttype = {arXiv}, eprint = {2305.20043}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-20043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KutylowskiPPYZ23, author = {Mirek Kutylowski and Giuseppe Persiano and Duong Hieu Phan and Moti Yung and Marcin Zawada}, title = {Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication!}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2023}, url = {https://eprint.iacr.org/2023/356}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KutylowskiPPYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KutylowskiPPYZ23a, author = {Mirek Kutylowski and Giuseppe Persiano and Duong Hieu Phan and Moti Yung and Marcin Zawada}, title = {The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2023}, url = {https://eprint.iacr.org/2023/434}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KutylowskiPPYZ23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EldefrawyJTY23, author = {Karim Eldefrawy and Sashidhar Jakkamsetti and Ben Terner and Moti Yung}, title = {Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2023}, url = {https://eprint.iacr.org/2023/439}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EldefrawyJTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmjadYY23, author = {Ghous Amjad and Kevin Yeo and Moti Yung}, title = {{RSA} Blind Signatures with Public Metadata}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1199}, year = {2023}, url = {https://eprint.iacr.org/2023/1199}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmjadYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCHY23, author = {Yi Wang and Rongmao Chen and Xinyi Huang and Moti Yung}, title = {Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1828}, year = {2023}, url = {https://eprint.iacr.org/2023/1828}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangCHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GittensYY22, author = {Alex Gittens and B{\"{u}}lent Yener and Moti Yung}, title = {An Adversarial Perspective on Accuracy, Robustness, Fairness, and Privacy: Multilateral-Tradeoffs in Trustworthy {ML}}, journal = {{IEEE} Access}, volume = {10}, pages = {120850--120865}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3218715}, doi = {10.1109/ACCESS.2022.3218715}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GittensYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AhmedXCFYY22, author = {Salman Ahmed and Ya Xiao and Taejoong Chung and Carol J. Fung and Moti Yung and Danfeng Daphne Yao}, title = {Privacy Guarantees of Bluetooth Low Energy Contact Tracing: {A} Case Study on {COVIDWISE}}, journal = {Computer}, volume = {55}, number = {2}, pages = {54--62}, year = {2022}, url = {https://doi.org/10.1109/MC.2021.3125611}, doi = {10.1109/MC.2021.3125611}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AhmedXCFYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DavidHMYZ22, author = {Liron David and Avinatan Hassidim and Yossi Matias and Moti Yung and Alon Ziv}, title = {Eddystone-EID: Secure and Private Infrastructural Protocol for {BLE} Beacons}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3877--3889}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3214074}, doi = {10.1109/TIFS.2022.3214074}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DavidHMYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/AhmedXCFYY22, author = {Salman Ahmed and Ya Xiao and Taejoong (Tijay) Chung and Carol J. Fung and Moti Yung and Danfeng (Daphne) Yao}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Privacy Guarantees of {BLE} Contact Tracing for {COVID-19} and Beyond: {A} Case Study on {COVIDWISE}}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1210--1212}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3527279}, doi = {10.1145/3488932.3527279}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/AhmedXCFYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YampolskiyY22, author = {Mark Yampolskiy and Moti Yung}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {AMSec'22: {ACM} {CCS} Workshop on Additive Manufacturing {(3D} Printing) Security}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3557--3558}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563554}, doi = {10.1145/3548606.3563554}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YampolskiyY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/PihurKLSYHZ22, author = {Vasyl Pihur and Aleksandra Korolova and Frederick Liu and Subhash Sankuratripati and Moti Yung and Dachuan Huang and Ruogu Zeng}, editor = {Shlomi Dolev and Jonathan Katz and Amnon Meisels}, title = {Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous Crowds}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13301}, pages = {468--486}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07689-3\_33}, doi = {10.1007/978-3-031-07689-3\_33}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/PihurKLSYHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DavidHMY22, author = {Liron David and Avinatan Hassidim and Yossi Matias and Moti Yung}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Scaling up {GAEN} Pseudorandom Processes: Preparing for a More Extensive Pandemic}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {237--255}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_12}, doi = {10.1007/978-3-031-17140-6\_12}, timestamp = {Tue, 27 Sep 2022 21:06:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DavidHMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PersianoPY22, author = {Giuseppe Persiano and Duong Hieu Phan and Moti Yung}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Anamorphic Encryption: Private Communication Against a Dictator}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {34--63}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_2}, doi = {10.1007/978-3-031-07085-3\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PersianoPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertNPY22, author = {Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {One-Shot Fiat-Shamir-Based {NIZK} Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {488--519}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_17}, doi = {10.1007/978-3-031-07085-3\_17}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertNPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YampolskiyGGMY22, author = {Mark Yampolskiy and Lynne Graves and Jacob Gatlin and Jeffrey Todd McDonald and Moti Yung}, editor = {Willy Susilo and Xiaofeng Chen and Fuchun Guo and Yudi Zhang and Rolly Intan}, title = {Crypto-Steganographic Validity for Additive Manufacturing {(3D} Printing) Design Files}, booktitle = {Information Security - 25th International Conference, {ISC} 2022, Bali, Indonesia, December 18-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13640}, pages = {40--52}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22390-7\_3}, doi = {10.1007/978-3-031-22390-7\_3}, timestamp = {Mon, 06 Nov 2023 13:38:03 +0100}, biburl = {https://dblp.org/rec/conf/isw/YampolskiyGGMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/001800Y22, author = {Long Chen and Ya{-}Nan Li and Qiang Tang and Moti Yung}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2353--2370}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-long}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/001800Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2022amsec, editor = {Mark Yampolskiy and Moti Yung}, title = {Proceedings of the 2022 {ACM} {CCS} Workshop on Additive Manufacturing {(3D} Printing) Security, Los Angeles, CA, USA, 11 November 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560833}, doi = {10.1145/3560833}, isbn = {978-1-4503-9883-1}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2022amsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EldefrawyGKY22, author = {Karim Eldefrawy and Nicholas Genise and Rutuja Kshirsagar and Moti Yung}, title = {On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2022}, url = {https://eprint.iacr.org/2022/096}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EldefrawyGKY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PersianoPY22, author = {Giuseppe Persiano and Duong Hieu Phan and Moti Yung}, title = {Anamorphic Encryption: Private Communication against a Dictator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {639}, year = {2022}, url = {https://eprint.iacr.org/2022/639}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PersianoPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/XuYW21, author = {Shouhuai Xu and Moti Yung and Jingguo Wang}, title = {Seeking Foundations for the Science of Cyber Security}, journal = {Inf. Syst. Frontiers}, volume = {23}, number = {2}, pages = {263--267}, year = {2021}, url = {https://doi.org/10.1007/s10796-021-10134-8}, doi = {10.1007/S10796-021-10134-8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/XuYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WangCHNWY21, author = {Yi Wang and Rongmao Chen and Xinyi Huang and Jianting Ning and Baosheng Wang and Moti Yung}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure {IBE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {427--455}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_15}, doi = {10.1007/978-3-030-92075-3\_15}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WangCHNWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YampolskiyGY21, author = {Mark Yampolskiy and Jacob Gatlin and Moti Yung}, editor = {Mark Yampolskiy and Yuval Elovici and Moti Yung}, title = {Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the {CIA} Triad}, booktitle = {AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing {(3D} Printing) Security, Virtual Event, Republic of Korea, 19 November 2021}, pages = {3--9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3462223.3485618}, doi = {10.1145/3462223.3485618}, timestamp = {Wed, 17 Nov 2021 14:36:02 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YampolskiyGY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WangCYHWY21, author = {Yi Wang and Rongmao Chen and Guomin Yang and Xinyi Huang and Baosheng Wang and Moti Yung}, editor = {Tal Malkin and Chris Peikert}, title = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {270--300}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_10}, doi = {10.1007/978-3-030-84259-8\_10}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WangCYHWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/PatelY21, author = {Akif Patel and Moti Yung}, editor = {Shlomi Dolev and Oded Margalit and Benny Pinkas and Alexander A. Schwarzmann}, title = {Fully Dynamic Password Protected Secret Sharing: Simplifying {PPSS} Operation and Maintenance}, booktitle = {Cyber Security Cryptography and Machine Learning - 5th International Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12716}, pages = {379--396}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78086-9\_28}, doi = {10.1007/978-3-030-78086-9\_28}, timestamp = {Mon, 03 Jan 2022 22:32:47 +0100}, biburl = {https://dblp.org/rec/conf/cscml/PatelY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertNPY21, author = {Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {521--552}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_18}, doi = {10.1007/978-3-030-77883-5\_18}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertNPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DeveveyLNPY21, author = {Julien Devevey and Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, editor = {Juan A. Garay}, title = {Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {659--690}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_24}, doi = {10.1007/978-3-030-75245-3\_24}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DeveveyLNPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YampolskiyGGSY21, author = {Mark Yampolskiy and Lynne Graves and Jacob Gatlin and Anthony Skjellum and Moti Yung}, editor = {Leyla Bilge and Tudor Dumitras}, title = {What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {266--281}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471843}, doi = {10.1145/3471621.3471843}, timestamp = {Fri, 08 Oct 2021 09:46:25 +0200}, biburl = {https://dblp.org/rec/conf/raid/YampolskiyGGSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/EldefrawyGKY21, author = {Karim Eldefrawy and Nicholas Genise and Rutuja Kshirsagar and Moti Yung}, editor = {Colette Johnen and Elad Michael Schiller and Stefan Schmid}, title = {On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 23rd International Symposium, {SSS} 2021, Virtual Event, November 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13046}, pages = {350--364}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91081-5\_23}, doi = {10.1007/978-3-030-91081-5\_23}, timestamp = {Wed, 10 Nov 2021 16:15:58 +0100}, biburl = {https://dblp.org/rec/conf/sss/EldefrawyGKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/21/KutylowskiSY21, author = {Miroslaw Kutylowski and Piotr Syga and Moti Yung}, editor = {Gildas Avoine and Julio Hernandez{-}Castro}, title = {Emerging Security Challenges for Ubiquitous Devices}, booktitle = {Security of Ubiquitous Computing Systems}, pages = {3--18}, publisher = {Springer International Publishing}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-10591-4\_1}, doi = {10.1007/978-3-030-10591-4\_1}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/21/KutylowskiSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiaccs/2021, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210}, doi = {10.1145/3433210}, isbn = {978-1-4503-8287-8}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2021amsec, editor = {Mark Yampolskiy and Yuval Elovici and Moti Yung}, title = {AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing {(3D} Printing) Security, Virtual Event, Republic of Korea, 19 November 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3462223}, doi = {10.1145/3462223}, isbn = {978-1-4503-8480-3}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2021amsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2020, editor = {Yongdong Wu and Moti Yung}, title = {Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12612}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-71852-7}, doi = {10.1007/978-3-030-71852-7}, isbn = {978-3-030-71851-0}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2021, editor = {Yu Yu and Moti Yung}, title = {Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13007}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88323-2}, doi = {10.1007/978-3-030-88323-2}, isbn = {978-3-030-88322-5}, timestamp = {Tue, 19 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2021, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4}, doi = {10.1007/978-3-030-89137-4}, isbn = {978-3-030-89136-7}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2021-1, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Shujun Li and Radha Poovendran and Herv{\'{e}} Debar and Moti Yung}, title = {Security and Privacy in Communication Networks - 17th {EAI} International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {398}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90019-9}, doi = {10.1007/978-3-030-90019-9}, isbn = {978-3-030-90018-2}, timestamp = {Thu, 04 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2021-2, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Shujun Li and Radha Poovendran and Herv{\'{e}} Debar and Moti Yung}, title = {Security and Privacy in Communication Networks - 17th {EAI} International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {399}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90022-9}, doi = {10.1007/978-3-030-90022-9}, isbn = {978-3-030-90021-2}, timestamp = {Tue, 23 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-08842, author = {Salman Ahmed and Ya Xiao and Taejoong Chung and Carol J. Fung and Moti Yung and Danfeng Yao}, title = {Privacy Guarantees of {BLE} Contact Tracing: {A} Case Study on {COVIDWISE}}, journal = {CoRR}, volume = {abs/2111.08842}, year = {2021}, url = {https://arxiv.org/abs/2111.08842}, eprinttype = {arXiv}, eprint = {2111.08842}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-08842.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RussellTYZZ21, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong{-}Sheng Zhou and Jiadong Zhu}, title = {Correcting Subverted Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2021}, url = {https://eprint.iacr.org/2021/042}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RussellTYZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeveveyLNPY21, author = {Julien Devevey and Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, title = {Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2021}, url = {https://eprint.iacr.org/2021/630}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DeveveyLNPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmjadPPYY21, author = {Ghous Amjad and Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung}, title = {Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2021}, url = {https://eprint.iacr.org/2021/765}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmjadPPYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCYHWY21, author = {Yi Wang and Rongmao Chen and Guomin Yang and Xinyi Huang and Baosheng Wang and Moti Yung}, title = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {862}, year = {2021}, url = {https://eprint.iacr.org/2021/862}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangCYHWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCHNWY21, author = {Yi Wang and Rongmao Chen and Xinyi Huang and Jianting Ning and Baosheng Wang and Moti Yung}, title = {Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure {IBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1261}, year = {2021}, url = {https://eprint.iacr.org/2021/1261}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangCHNWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YehSDYK20, author = {Kuo{-}Hui Yeh and Chunhua Su and Robert H. Deng and Moti Yung and Miroslaw Kutylowski}, title = {Special issue on security and privacy of blockchain technologies}, journal = {Int. J. Inf. Sec.}, volume = {19}, number = {3}, pages = {243--244}, year = {2020}, url = {https://doi.org/10.1007/s10207-020-00496-6}, doi = {10.1007/S10207-020-00496-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/YehSDYK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LibertY20, author = {Beno{\^{\i}}t Libert and Moti Yung}, title = {Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1405--1441}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09350-3}, doi = {10.1007/S00145-020-09350-3}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LibertY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/GarayJKY20, author = {Juan A. Garay and David S. Johnson and Aggelos Kiayias and Moti Yung}, title = {The combinatorics of hidden diversity}, journal = {Theor. Comput. Sci.}, volume = {812}, pages = {80--95}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2019.07.016}, doi = {10.1016/J.TCS.2019.07.016}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/GarayJKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DoPY20, author = {Xuan Thanh Do and Duong Hieu Phan and Moti Yung}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12147}, pages = {145--164}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57878-7\_8}, doi = {10.1007/978-3-030-57878-7\_8}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DoPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenHY20, author = {Rongmao Chen and Xinyi Huang and Moti Yung}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Subvert {KEM} to Break {DEM:} Practical Algorithm-Substitution Attacks on Public-Key Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {98--128}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_4}, doi = {10.1007/978-3-030-64834-3\_4}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MiaoP0SY20, author = {Peihan Miao and Sarvar Patel and Mariana Raykova and Karn Seth and Moti Yung}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Two-Sided Malicious Security for Private Intersection-Sum with Cardinality}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {3--33}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_1}, doi = {10.1007/978-3-030-56877-1\_1}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MiaoP0SY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/YungPJ20, author = {Moti Yung and Cem Paya and Daniel James}, editor = {Shlomi Dolev and Vladimir Kolesnikov and Sachin Lodha and Gera Weiss}, title = {Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services}, booktitle = {Cyber Security Cryptography and Machine Learning - Fourth International Symposium, {CSCML} 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12161}, pages = {18--28}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49785-9\_2}, doi = {10.1007/978-3-030-49785-9\_2}, timestamp = {Thu, 25 Jun 2020 16:11:03 +0200}, biburl = {https://dblp.org/rec/conf/cscml/YungPJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KutylowskiLY20, author = {Miroslaw Kutylowski and Anna Lauks{-}Dutka and Moti Yung}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {{GDPR} - Challenges for Reconciling Legal Rules with Technical Reality}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {736--755}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_36}, doi = {10.1007/978-3-030-58951-6\_36}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KutylowskiLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/IonKNPSS0SY20, author = {Mihaela Ion and Ben Kreuter and Ahmet Erhan Nergiz and Sarvar Patel and Shobhit Saxena and Karn Seth and Mariana Raykova and David Shanahan and Moti Yung}, title = {On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {370--389}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00031}, doi = {10.1109/EUROSP48549.2020.00031}, timestamp = {Tue, 10 Nov 2020 11:45:04 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/IonKNPSS0SY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Yung20, author = {Moti Yung}, editor = {Christian Callegari and Soon Xin Ng and Panagiotis G. Sarigiannidis and Sebastiano Battiato and {\'{A}}ngel Serrano S{\'{a}}nchez de Le{\'{o}}n and Adlen Ksentini and Pascal Lorenz and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Secure Computation Protocol: {A} Technology for Our Time}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 1: DCNET, OPTICS, {SIGMAP} and WINSYS, Lieusaint, Paris, France, July 8-10, 2020}, pages = {19}, publisher = {ScitePress}, year = {2020}, timestamp = {Wed, 29 Jul 2020 16:57:23 +0200}, biburl = {https://dblp.org/rec/conf/icete/Yung20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/EldefrawyHOY20, author = {Karim Eldefrawy and Seoyeon Hwang and Rafail Ostrovsky and Moti Yung}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {108--129}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_6}, doi = {10.1007/978-3-030-57990-6\_6}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/EldefrawyHOY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2019, editor = {Zhe Liu and Moti Yung}, title = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-42921-8}, doi = {10.1007/978-3-030-42921-8}, isbn = {978-3-030-42920-1}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MiaoPRSY20, author = {Peihan Miao and Sarvar Patel and Mariana Raykova and Karn Seth and Moti Yung}, title = {Two-Sided Malicious Security for Private Intersection-Sum with Cardinality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2020}, url = {https://eprint.iacr.org/2020/385}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MiaoPRSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EldefrawyHOY20, author = {Karim Eldefrawy and Seoyeon Hwang and Rafail Ostrovsky and Moti Yung}, title = {Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {747}, year = {2020}, url = {https://eprint.iacr.org/2020/747}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EldefrawyHOY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoPY20, author = {Xuan Thanh Do and Duong Hieu Phan and Moti Yung}, title = {A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {826}, year = {2020}, url = {https://eprint.iacr.org/2020/826}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenHY20, author = {Rongmao Chen and Xinyi Huang and Moti Yung}, title = {Subvert {KEM} to Break {DEM:} Practical Algorithm-Substitution Attacks on Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1079}, year = {2020}, url = {https://eprint.iacr.org/2020/1079}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertNPY20, author = {Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, title = {Compact Simulation-Sound {NIZK} Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1334}, year = {2020}, url = {https://eprint.iacr.org/2020/1334}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LibertNPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LeeLPY19, author = {Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park and Moti Yung}, title = {{CCA} Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts}, journal = {Comput. J.}, volume = {62}, number = {4}, pages = {545--562}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxy122}, doi = {10.1093/COMJNL/BXY122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LeeLPY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PhanY19, author = {Raphael C.{-}W. Phan and Moti Yung}, title = {Paradigm Shifts in Cryptographic Engineering}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {729--730}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2934527}, doi = {10.1109/TDSC.2019.2934527}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PhanY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoY19, author = {Mingyi Zhao and Moti Yung}, editor = {Liqun Chen and Chris J. Mitchell and Thanassis Giannetsos and Daniele Sgandurra}, title = {Secure Zero-Day Detection: Wiping Off the {VEP} Trade-Off}, booktitle = {Proceedings of the 1st {ACM} Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019}, pages = {35--45}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338511.3357350}, doi = {10.1145/3338511.3357350}, timestamp = {Sat, 28 Aug 2021 16:06:52 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PatelPYY19, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {79--93}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354213}, doi = {10.1145/3319535.3354213}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PatelPYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChowRTYZZ19, author = {Sherman S. M. Chow and Alexander Russell and Qiang Tang and Moti Yung and Yongjun Zhao and Hong{-}Sheng Zhou}, editor = {Dongdai Lin and Kazue Sako}, title = {Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {221--251}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_8}, doi = {10.1007/978-3-030-17253-4\_8}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChowRTYZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/DiazCAKRY19, author = {Jesus Diaz and Seung Geol Choi and David Arroyo and Angelos D. Keromytis and Francisco B. Rodr{\'{\i}}guez and Moti Yung}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {143--183}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_7}, doi = {10.1007/978-981-13-1483-4\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/DiazCAKRY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2019, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2}, doi = {10.1007/978-3-030-21568-2}, isbn = {978-3-030-21567-5}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2018, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-14234-6}, doi = {10.1007/978-3-030-14234-6}, isbn = {978-3-030-14233-9}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cscml/2019, editor = {Shlomi Dolev and Danny Hendler and Sachin Lodha and Moti Yung}, title = {Cyber Security Cryptography and Machine Learning - Third International Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11527}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-20951-3}, doi = {10.1007/978-3-030-20951-3}, isbn = {978-3-030-20950-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2019, editor = {Feng Liu and Jia Xu and Shouhuai Xu and Moti Yung}, title = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11933}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34637-9}, doi = {10.1007/978-3-030-34637-9}, isbn = {978-3-030-34636-2}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/ArmknechtVVY19, author = {Frederik Armknecht and Ingrid Verbauwhede and Melanie Volkamer and Moti Yung}, title = {Biggest Failures in Security (Dagstuhl Seminar 19451)}, journal = {Dagstuhl Reports}, volume = {9}, number = {11}, pages = {1--23}, year = {2019}, url = {https://doi.org/10.4230/DagRep.9.11.1}, doi = {10.4230/DAGREP.9.11.1}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtVVY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonKNPRSSSY19, author = {Mihaela Ion and Ben Kreuter and Ahmet Erhan Nergiz and Sarvar Patel and Mariana Raykova and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung}, title = {On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2019}, url = {https://eprint.iacr.org/2019/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonKNPRSSSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatelPYY19, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung}, title = {Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1292}, year = {2019}, url = {https://eprint.iacr.org/2019/1292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatelPYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ChenSYY18, author = {Jiageng Chen and Chunhua Su and Kuo{-}Hui Yeh and Moti Yung}, title = {Special Issue on Advanced Persistent Threat}, journal = {Future Gener. Comput. Syst.}, volume = {79}, pages = {243--246}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.11.005}, doi = {10.1016/J.FUTURE.2017.11.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ChenSYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/EldefrawyOY18, author = {Karim Eldefrawy and Rafail Ostrovsky and Moti Yung}, editor = {Pierangela Samarati and Indrajit Ray and Indrakshi Ray}, title = {Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation}, booktitle = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {11170}, pages = {470--486}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04834-1\_23}, doi = {10.1007/978-3-030-04834-1\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/EldefrawyOY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Russell0YZ18, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong{-}Sheng Zhou}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Correcting Subverted Random Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {241--271}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_9}, doi = {10.1007/978-3-319-96881-0\_9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Russell0YZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/DiazCAKRY18, author = {Jesus Diaz and Seung Geol Choi and David Arroyo and Angelos D. Keromytis and Francisco B. Rodr{\'{\i}}guez and Moti Yung}, editor = {Itai Dinur and Shlomi Dolev and Sachin Lodha}, title = {Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs}, booktitle = {Cyber Security Cryptography and Machine Learning - Second International Symposium, {CSCML} 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10879}, pages = {206--226}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94147-9\_17}, doi = {10.1007/978-3-319-94147-9\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/DiazCAKRY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/EldefrawyOPY18, author = {Karim Eldefrawy and Rafail Ostrovsky and Sunoo Park and Moti Yung}, editor = {Dario Catalano and Roberto De Prisco}, title = {Proactive Secure Multiparty Computation with a Dishonest Majority}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {200--215}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_11}, doi = {10.1007/978-3-319-98113-0\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/EldefrawyOPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/YoungY18, author = {Adam L. Young and Moti Yung}, editor = {Dario Catalano and Roberto De Prisco}, title = {Semantically Secure Anonymity: Foundations of Re-encryption}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {255--273}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_14}, doi = {10.1007/978-3-319-98113-0\_14}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/YoungY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2017, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-75160-3}, doi = {10.1007/978-3-319-75160-3}, isbn = {978-3-319-75159-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scisec/2018, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1}, doi = {10.1007/978-3-030-03026-1}, isbn = {978-3-030-03025-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-04369, author = {Vasyl Pihur and Aleksandra Korolova and Frederick Liu and Subhash Sankuratripati and Moti Yung and Dachuan Huang and Ruogu Zeng}, title = {Differentially-Private "Draw and Discard" Machine Learning}, journal = {CoRR}, volume = {abs/1807.04369}, year = {2018}, url = {http://arxiv.org/abs/1807.04369}, eprinttype = {arXiv}, eprint = {1807.04369}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-04369.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/YoungY17, author = {Adam L. Young and Moti Yung}, title = {Cryptovirology: the birth, neglect, and explosion of ransomware}, journal = {Commun. {ACM}}, volume = {60}, number = {7}, pages = {24--26}, year = {2017}, url = {https://doi.org/10.1145/3097347}, doi = {10.1145/3097347}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/YoungY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YoungY17, author = {Adam L. Young and Moti Yung}, title = {On Ransomware and Envisioning the Enemy of Tomorrow}, journal = {Computer}, volume = {50}, number = {11}, pages = {82--85}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.4041366}, doi = {10.1109/MC.2017.4041366}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/YoungY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Rivero-GarciaSH17, author = {Alexandra Rivero{-}Garc{\'{\i}}a and Iv{\'{a}}n Santos{-}Gonz{\'{a}}lez and Candelaria Hern{\'{a}}ndez{-}Goya and Pino Caballero{-}Gil and Moti Yung}, title = {Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange}, journal = {Sensors}, volume = {17}, number = {4}, pages = {733}, year = {2017}, url = {https://doi.org/10.3390/s17040733}, doi = {10.3390/S17040733}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/Rivero-GarciaSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LeeCLPY17, author = {Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung}, title = {Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency}, journal = {Theor. Comput. Sci.}, volume = {667}, pages = {51--92}, year = {2017}, url = {https://doi.org/10.1016/j.tcs.2016.12.027}, doi = {10.1016/J.TCS.2016.12.027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LeeCLPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DmitrienkoNY17, author = {Alexandra Dmitrienko and David Noack and Moti Yung}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {520--531}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052980}, doi = {10.1145/3052973.3052980}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DmitrienkoNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Russell0YZ17, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong{-}Sheng Zhou}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Generic Semantic Security against a Kleptographic Adversary}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {907--922}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133993}, doi = {10.1145/3133956.3133993}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Russell0YZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0005Y17, author = {Qiang Tang and Moti Yung}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Cliptography: Post-Snowden Cryptography}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2615--2616}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3136065}, doi = {10.1145/3133956.3136065}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0005Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/YoungY17, author = {Adam L. Young and Moti Yung}, editor = {Shlomi Dolev and Sachin Lodha}, title = {The Combinatorics of Product Scanning Multiplication and Squaring}, booktitle = {Cyber Security Cryptography and Machine Learning - First International Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10332}, pages = {99--114}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60080-2\_8}, doi = {10.1007/978-3-319-60080-2\_8}, timestamp = {Sat, 19 Oct 2019 20:25:56 +0200}, biburl = {https://dblp.org/rec/conf/cscml/YoungY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/DolevEGKOY17, author = {Shlomi Dolev and Karim Eldefrawy and Juan A. Garay and Muni Venkateswarlu Kumaramangalam and Rafail Ostrovsky and Moti Yung}, editor = {Elad Michael Schiller and Alexander A. Schwarzmann}, title = {Brief Announcement: Secure Self-Stabilizing Computation}, booktitle = {Proceedings of the {ACM} Symposium on Principles of Distributed Computing, {PODC} 2017, Washington, DC, USA, July 25-27, 2017}, pages = {415--417}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3087801.3087864}, doi = {10.1145/3087801.3087864}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/DolevEGKOY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2016, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54705-3}, doi = {10.1007/978-3-319-54705-3}, isbn = {978-3-319-54704-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mycrypt/2016, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61273-7}, doi = {10.1007/978-3-319-61273-7}, isbn = {978-3-319-61272-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonKNPSSSY17, author = {Mihaela Ion and Ben Kreuter and Erhan Nergiz and Sarvar Patel and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung}, title = {Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {738}, year = {2017}, url = {http://eprint.iacr.org/2017/738}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonKNPSSSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/YaoYZ16, author = {Andrew Chi{-}Chih Yao and Moti Yung and Yunlei Zhao}, title = {Concurrent Knowledge Extraction in Public-Key Models}, journal = {J. Cryptol.}, volume = {29}, number = {1}, pages = {156--219}, year = {2016}, url = {https://doi.org/10.1007/s00145-014-9191-z}, doi = {10.1007/S00145-014-9191-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/YaoYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LibertJY16, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung}, title = {Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares}, journal = {Theor. Comput. Sci.}, volume = {645}, pages = {1--24}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2016.02.031}, doi = {10.1016/J.TCS.2016.02.031}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/LibertJY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Russell0YZ16, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong{-}Sheng Zhou}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Cliptography: Clipping the Power of Kleptographic Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {34--64}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_2}, doi = {10.1007/978-3-662-53890-6\_2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Russell0YZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/YoungY16, author = {Adam L. Young and Moti Yung}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {243--255}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_16}, doi = {10.1007/978-3-662-49301-4\_16}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/YoungY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LibertMPY16, author = {Beno{\^{\i}}t Libert and Fabrice Mouhartem and Thomas Peters and Moti Yung}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Practical "Signatures with Efficient Protocols" from Simple Assumptions}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {511--522}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897898}, doi = {10.1145/2897845.2897898}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LibertMPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ArmknechtMSY16, author = {Frederik Armknecht and Daisuke Moriyama and Ahmad{-}Reza Sadeghi and Moti Yung}, editor = {Kazue Sako}, title = {Towards a Unified Security Model for Physically Unclonable Functions}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {271--287}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_16}, doi = {10.1007/978-3-319-29485-8\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ArmknechtMSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/LibertRY16, author = {Beno{\^{\i}}t Libert and Somindu C. Ramanna and Moti Yung}, editor = {Ioannis Chatzigiannakis and Michael Mitzenmacher and Yuval Rabani and Davide Sangiorgi}, title = {Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions}, booktitle = {43rd International Colloquium on Automata, Languages, and Programming, {ICALP} 2016, July 11-15, 2016, Rome, Italy}, series = {LIPIcs}, volume = {55}, pages = {30:1--30:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2016}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2016.30}, doi = {10.4230/LIPICS.ICALP.2016.30}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/icalp/LibertRY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/DolevELOY16, author = {Shlomi Dolev and Karim Eldefrawy and Joshua Lampkins and Rafail Ostrovsky and Moti Yung}, editor = {George Giakkoupis}, title = {Brief Announcement: Proactive Secret Sharing with a Dishonest Majority}, booktitle = {Proceedings of the 2016 {ACM} Symposium on Principles of Distributed Computing, {PODC} 2016, Chicago, IL, USA, July 25-28, 2016}, pages = {401--403}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2933057.2933059}, doi = {10.1145/2933057.2933059}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/DolevELOY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DengGLWY16, author = {Yi Deng and Juan A. Garay and San Ling and Huaxiong Wang and Moti Yung}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {237--253}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_13}, doi = {10.1007/978-3-319-44618-9\_13}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/DengGLWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DolevDLOY16, author = {Shlomi Dolev and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky and Moti Yung}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Proactive Secret Sharing with a Dishonest Majority}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {529--548}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_28}, doi = {10.1007/978-3-319-44618-9\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DolevDLOY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2015, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-38898-4}, doi = {10.1007/978-3-319-38898-4}, isbn = {978-3-319-38897-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2015, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31550-8}, doi = {10.1007/978-3-319-31550-8}, isbn = {978-3-319-31549-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2016, editor = {Jiageng Chen and Vincenzo Piuri and Chunhua Su and Moti Yung}, title = {Network and System Security - 10th International Conference, {NSS} 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9955}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46298-1}, doi = {10.1007/978-3-319-46298-1}, isbn = {978-3-319-46297-4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtMSY16, author = {Frederik Armknecht and Daisuke Moriyama and Ahmad{-}Reza Sadeghi and Moti Yung}, title = {Towards a Unified Security Model for Physically Unclonable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2016}, url = {http://eprint.iacr.org/2016/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtMSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoungY16, author = {Adam L. Young and Moti Yung}, title = {Semantically Secure Anonymity: Foundations of Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2016}, url = {http://eprint.iacr.org/2016/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoungY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Russell0YZ16, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong{-}Sheng Zhou}, title = {Destroying Steganography via Amalgamation: Kleptographically {CPA} Secure Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2016}, url = {http://eprint.iacr.org/2016/530}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Russell0YZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertRY16, author = {Beno{\^{\i}}t Libert and Somindu C. Ramanna and Moti Yung}, title = {Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {766}, year = {2016}, url = {http://eprint.iacr.org/2016/766}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertRY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LibertPJY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Linearly homomorphic structure-preserving signatures and their applications}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {441--477}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0079-1}, doi = {10.1007/S10623-015-0079-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LibertPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LeeLY15, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, title = {Sequential aggregate signatures with short public keys without random oracles}, journal = {Theor. Comput. Sci.}, volume = {579}, pages = {100--125}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2015.02.019}, doi = {10.1016/J.TCS.2015.02.019}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/LeeLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LibertPJY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound {QA-NIZK} Proofs and Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {681--707}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_28}, doi = {10.1007/978-3-662-48797-6\_28}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LibertPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Yung15, author = {Moti Yung}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1--2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812701}, doi = {10.1145/2810103.2812701}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Yung15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SanderY15, author = {Tomas Sander and Moti Yung}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {WISCS'15: The 2nd {ACM} Workshop on Information Sharing and Collaborative Security}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1717--1718}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812627}, doi = {10.1145/2810103.2812627}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SanderY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AysuGMSY15, author = {Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {556--576}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_28}, doi = {10.1007/978-3-662-48324-4\_28}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/AysuGMSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MoriyamaY15, author = {Daisuke Moriyama and Moti Yung}, title = {The bright side arguments for the coming smartphones crypto war: The added value of device encryption}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {65--73}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346812}, doi = {10.1109/CNS.2015.7346812}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/MoriyamaY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertPY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {296--316}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_15}, doi = {10.1007/978-3-662-48000-7\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DiazCAKRY15, author = {Jesus Diaz and Seung Geol Choi and David Arroyo and Angelos D. Keromytis and Francisco de Borja Rodr{\'{\i}}guez and Moti Yung}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Privacy Threats in E-Shopping (Position Paper)}, booktitle = {Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9481}, pages = {217--225}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29883-2\_14}, doi = {10.1007/978-3-319-29883-2\_14}, timestamp = {Sun, 25 Oct 2020 22:34:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DiazCAKRY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HanzlikKY15, author = {Lucjan Hanzlik and Miroslaw Kutylowski and Moti Yung}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Hard Invalidation of Electronic Signatures}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {421--436}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_29}, doi = {10.1007/978-3-319-17533-1\_29}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HanzlikKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertJYP15, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung and Thomas Peters}, editor = {Jonathan Katz}, title = {Secure Efficient History-Hiding Append-Only Signatures in the Standard Model}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {450--473}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_20}, doi = {10.1007/978-3-662-46447-2\_20}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertJYP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Yung15, author = {Moti Yung}, editor = {Chryssis Georgiou and Paul G. Spirakis}, title = {The "Mobile Adversary" Paradigm in Distributed Computation and Systems}, booktitle = {Proceedings of the 2015 {ACM} Symposium on Principles of Distributed Computing, {PODC} 2015, Donostia-San Sebasti{\'{a}}n, Spain, July 21 - 23, 2015}, pages = {171--172}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2767386.2767453}, doi = {10.1145/2767386.2767453}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/Yung15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GarayGJKY15, author = {Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {134--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_7}, doi = {10.1007/978-3-662-46494-6\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GarayGJKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015wiscs, editor = {Indrajit Ray and Tomas Sander and Moti Yung}, title = {Proceedings of the 2nd {ACM} Workshop on Information Sharing and Collaborative Security, {WISCS} 2015, Denver, Colorado, USA, October 12, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808128}, doi = {10.1145/2808128}, isbn = {978-1-4503-3822-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2015wiscs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2014, editor = {Dongdai Lin and Moti Yung and Jianying Zhou}, title = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8957}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16745-9}, doi = {10.1007/978-3-319-16745-9}, isbn = {978-3-319-16744-2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2014, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27998-5}, doi = {10.1007/978-3-319-27998-5}, isbn = {978-3-319-27997-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2015, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0}, doi = {10.1007/978-3-319-25645-0}, isbn = {978-3-319-25644-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LeeLY15, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, title = {Sequential Aggregate Signatures with Short Public Keys without Random Oracles}, journal = {CoRR}, volume = {abs/1502.06691}, year = {2015}, url = {http://arxiv.org/abs/1502.06691}, eprinttype = {arXiv}, eprint = {1502.06691}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LeeLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPJY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound {QA-NIZK} Proofs and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2015}, url = {http://eprint.iacr.org/2015/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RussellTYZ15, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong{-}Sheng Zhou}, title = {Cliptography: Clipping the Power of Kleptographic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2015}, url = {http://eprint.iacr.org/2015/695}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RussellTYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, title = {Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2015}, url = {http://eprint.iacr.org/2015/743}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AysuGMSY15, author = {Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung}, title = {End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {937}, year = {2015}, url = {http://eprint.iacr.org/2015/937}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AysuGMSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLPY15, author = {Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park and Moti Yung}, title = {{CCA} Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1202}, year = {2015}, url = {http://eprint.iacr.org/2015/1202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LibertJYP14, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung and Thomas Peters}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {1--21}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_1}, doi = {10.1007/978-3-662-45608-8\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LibertJYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/TeranishiYM14, author = {Isamu Teranishi and Moti Yung and Tal Malkin}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Order-Preserving Encryption Secure Beyond One-Wayness}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {42--61}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_3}, doi = {10.1007/978-3-662-45608-8\_3}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/TeranishiYM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/YoungY14, author = {Adam L. Young and Moti Yung}, title = {The drunk motorcyclist protocol for anonymous communication}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {157--165}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997482}, doi = {10.1109/CNS.2014.6997482}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/YoungY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertPJY14, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {514--532}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_29}, doi = {10.1007/978-3-642-55220-5\_29}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertPJY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DmitrienkoNSY14, author = {Alexandra Dmitrienko and David Noack and Ahmad{-}Reza Sadeghi and Moti Yung}, editor = {Rainer B{\"{o}}hme and Michael Brenner and Tyler Moore and Matthew Smith}, title = {On Offline Payments with Bitcoin (Poster Abstract)}, booktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {159--160}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44774-1\_11}, doi = {10.1007/978-3-662-44774-1\_11}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/DmitrienkoNSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertYJP14, author = {Beno{\^{\i}}t Libert and Moti Yung and Marc Joye and Thomas Peters}, editor = {Hugo Krawczyk}, title = {Traceable Group Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {592--610}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_34}, doi = {10.1007/978-3-642-54631-0\_34}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertYJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/LibertJY13, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Shlomi Dolev}, title = {Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares}, booktitle = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '14, Paris, France, July 15-18, 2014}, pages = {303--312}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611462.2611498}, doi = {10.1145/2611462.2611498}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/LibertJY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NaccacheSCY14, author = {David Naccache and Rainer Steinwandt and Adriana Su{\'{a}}rez Corona and Moti Yung}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {598--607}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_34}, doi = {10.1007/978-3-319-10879-7\_34}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/NaccacheSCY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2660267}, isbn = {978-1-4503-2957-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2013, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12087-4}, doi = {10.1007/978-3-319-12087-4}, isbn = {978-3-319-12086-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayGJKY14, author = {Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung}, title = {A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2014}, url = {http://eprint.iacr.org/2014/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayGJKY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertJYP14, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung and Thomas Peters}, title = {Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2014}, url = {http://eprint.iacr.org/2014/743}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertJYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LibertY13, author = {Beno{\^{\i}}t Libert and Moti Yung}, title = {Adaptively secure non-interactive threshold cryptosystems}, journal = {Theor. Comput. Sci.}, volume = {478}, pages = {76--100}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2013.01.001}, doi = {10.1016/J.TCS.2013.01.001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/LibertY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LeeLY13, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Sequential Aggregate Signatures Made Shorter}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {202--217}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_13}, doi = {10.1007/978-3-642-38980-1\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LeeLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LeeCLPY13, author = {Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung}, editor = {Kazue Sako and Palash Sarkar}, title = {Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {235--254}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_13}, doi = {10.1007/978-3-642-42033-7\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LeeCLPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertPJY13, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Ran Canetti and Juan A. Garay}, title = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {289--307}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_17}, doi = {10.1007/978-3-642-40084-1\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertPJY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LeeLY13, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, editor = {Ahmad{-}Reza Sadeghi}, title = {Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {171--188}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_14}, doi = {10.1007/978-3-642-39884-1\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/LeeLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GarayJKY13, author = {Juan A. Garay and David S. Johnson and Aggelos Kiayias and Moti Yung}, editor = {Robert D. Kleinberg}, title = {Resource-based corruptions and the combinatorics of hidden diversity}, booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley, CA, USA, January 9-12, 2013}, pages = {415--428}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2422436.2422482}, doi = {10.1145/2422436.2422482}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/GarayJKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LeeLY13, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {423--442}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_26}, doi = {10.1007/978-3-642-36362-7\_26}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LeeLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2508859}, isbn = {978-1-4503-2477-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2012, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38519-3}, doi = {10.1007/978-3-642-38519-3}, isbn = {978-3-642-38518-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPJY13, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2013}, url = {http://eprint.iacr.org/2013/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPJY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLY13, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, title = {Sequential Aggregate Signatures Made Shorter}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2013}, url = {http://eprint.iacr.org/2013/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkinTY13, author = {Tal Malkin and Isamu Teranishi and Moti Yung}, title = {Order-Preserving Encryption Secure Beyond One-Wayness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2013}, url = {http://eprint.iacr.org/2013/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkinTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPJY13a, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2013}, url = {http://eprint.iacr.org/2013/691}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPJY13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoriyamaMY13, author = {Daisuke Moriyama and Shin'ichiro Matsuo and Moti Yung}, title = {PUF-Based {RFID} Authentication Secure and Private under Complete Memory Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {712}, year = {2013}, url = {http://eprint.iacr.org/2013/712}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoriyamaMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeCLPY13, author = {Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung}, title = {Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {762}, year = {2013}, url = {http://eprint.iacr.org/2013/762}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeCLPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/DolevLY12, author = {Shlomi Dolev and Limor Lahiani and Moti Yung}, title = {Secret swarm unit: Reactive k-secret sharing}, journal = {Ad Hoc Networks}, volume = {10}, number = {7}, pages = {1291--1305}, year = {2012}, url = {https://doi.org/10.1016/j.adhoc.2012.03.011}, doi = {10.1016/J.ADHOC.2012.03.011}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/DolevLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Dachman-SoledM0Y12, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Moti Yung}, title = {Efficient robust private set intersection}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {4}, pages = {289--303}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.048080}, doi = {10.1504/IJACT.2012.048080}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Dachman-SoledM0Y12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Ben-DavidBMPPY12, author = {Assaf Ben{-}David and Omer Berkman and Yossi Matias and Sarvar Patel and Cem Paya and Moti Yung}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {Contextual {OTP:} Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {30--47}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_3}, doi = {10.1007/978-3-642-31284-7\_3}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/Ben-DavidBMPPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/LibertY12, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {David Naccache}, title = {Fully Forward-Secure Group Signatures}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {156--184}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_13}, doi = {10.1007/978-3-642-28368-0\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/LibertY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BerkmanPY12, author = {Omer Berkman and Benny Pinkas and Moti Yung}, editor = {Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Mark Manulis}, title = {Firm Grip Handshakes: {A} Tool for Bidirectional Vouching}, booktitle = {Cryptology and Network Security, 11th International Conference, {CANS} 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings}, volume = {7712}, pages = {142--157}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35404-5\_12}, doi = {10.1007/978-3-642-35404-5\_12}, timestamp = {Sun, 02 Jun 2019 21:12:31 +0200}, biburl = {https://dblp.org/rec/conf/cans/BerkmanPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DodisLXY12, author = {Yevgeniy Dodis and Weiliang Luo and Shouhuai Xu and Moti Yung}, editor = {Heung Youl Youm and Yoojae Won}, title = {Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {57--58}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414489}, doi = {10.1145/2414456.2414489}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DodisLXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertPY12, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Group Signatures with Almost-for-Free Revocation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {571--589}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_34}, doi = {10.1007/978-3-642-32009-5\_34}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertPY12, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, editor = {David Pointcheval and Thomas Johansson}, title = {Scalable Group Signatures with Revocation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {609--627}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_36}, doi = {10.1007/978-3-642-29011-4\_36}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/RabinMMY12, author = {Michael O. Rabin and Yishay Mansour and S. Muthukrishnan and Moti Yung}, editor = {Artur Czumaj and Kurt Mehlhorn and Andrew M. Pitts and Roger Wattenhofer}, title = {Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions}, booktitle = {Automata, Languages, and Programming - 39th International Colloquium, {ICALP} 2012, Warwick, UK, July 9-13, 2012, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {7391}, pages = {738--749}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31594-7\_62}, doi = {10.1007/978-3-642-31594-7\_62}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/RabinMMY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JumaVY12, author = {Ali Juma and Yevgeniy Vahlis and Moti Yung}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Multi-location Leakage Resilient Cryptography}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {504--521}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_30}, doi = {10.1007/978-3-642-30057-8\_30}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/JumaVY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChoiDY12, author = {Seung Geol Choi and Dana Dachman{-}Soled and Moti Yung}, editor = {Ivan Visconti and Roberto De Prisco}, title = {On the Centrality of Off-Line E-Cash to Concrete Partial Information Games}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {264--280}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_15}, doi = {10.1007/978-3-642-32928-9\_15}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/ChoiDY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LibertY12, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {Ronald Cramer}, title = {Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {75--93}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_5}, doi = {10.1007/978-3-642-28914-9\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LibertY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2011, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34704-7}, doi = {10.1007/978-3-642-34704-7}, isbn = {978-3-642-34703-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2012, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1}, doi = {10.1007/978-3-642-33167-1}, isbn = {978-3-642-33166-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2011, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32298-3}, doi = {10.1007/978-3-642-32298-3}, isbn = {978-3-642-32297-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2011, editor = {Souhwan Jung and Moti Yung}, title = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27890-7}, doi = {10.1007/978-3-642-27890-7}, isbn = {978-3-642-27889-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2012, editor = {Dong Hoon Lee and Moti Yung}, title = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8}, doi = {10.1007/978-3-642-35416-8}, isbn = {978-3-642-35415-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JutlaY12, author = {Charanjit S. Jutla and Moti Yung}, title = {PayTree: "Amortized Signature" for Flexible Micro-Payments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2012}, url = {http://eprint.iacr.org/2012/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JutlaY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangY12, author = {Donghoon Chang and Moti Yung}, title = {Adaptive Preimage Resistance Analysis Revisited: {\textbackslash}{\textbackslash} Requirements, Subtleties and Implications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2012}, url = {http://eprint.iacr.org/2012/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPY12, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, title = {Scalable Group Signatures with Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2012}, url = {http://eprint.iacr.org/2012/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPY12a, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, title = {Group Signatures with Almost-for-free Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2012}, url = {http://eprint.iacr.org/2012/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SantisY12, author = {Alfredo De Santis and Moti Yung}, title = {"Metaproofs" (and their Cryptographic Applications)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2012}, url = {http://eprint.iacr.org/2012/495}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SantisY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengGLWY12, author = {Yi Deng and Juan A. Garay and San Ling and Huaxiong Wang and Moti Yung}, title = {On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2012}, url = {http://eprint.iacr.org/2012/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengGLWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLY12, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, title = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2012}, url = {http://eprint.iacr.org/2012/518}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayJKY12, author = {Juan A. Garay and David S. Johnson and Aggelos Kiayias and Moti Yung}, title = {Resource-based Corruptions and the Combinatorics of Hidden Diversity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2012}, url = {http://eprint.iacr.org/2012/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayJKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLY12a, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, title = {Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2012}, url = {http://eprint.iacr.org/2012/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DiamentLKY11, author = {Ted Diament and Homin K. Lee and Angelos D. Keromytis and Moti Yung}, title = {The Efficient Dual Receiver Cryptosystem and Its Applications}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {3}, pages = {135--151}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p135-151.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/DiamentLKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DengLYZ11, author = {Robert H. Deng and Yingjiu Li and Moti Yung and Yunlei Zhao}, title = {A zero-knowledge based framework for {RFID} privacy}, journal = {J. Comput. Secur.}, volume = {19}, number = {6}, pages = {1109--1146}, year = {2011}, url = {https://doi.org/10.3233/JCS-2011-0440}, doi = {10.3233/JCS-2011-0440}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DengLYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LibertY11, author = {Beno{\^{\i}}t Libert and Moti Yung}, title = {Efficient traceable signatures in the standard model}, journal = {Theor. Comput. Sci.}, volume = {412}, number = {12-14}, pages = {1220--1242}, year = {2011}, url = {https://doi.org/10.1016/j.tcs.2010.12.066}, doi = {10.1016/J.TCS.2010.12.066}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/LibertY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY11, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Moti Yung}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {130--146}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_8}, doi = {10.1007/978-3-642-21554-4\_8}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DengFGLSY11, author = {Yi Deng and Dengguo Feng and Vipul Goyal and Dongdai Lin and Amit Sahai and Moti Yung}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {390--406}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_21}, doi = {10.1007/978-3-642-25385-0\_21}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DengFGLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LibertY11, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {1--21}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_1}, doi = {10.1007/978-3-642-34704-7\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LibertY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/Yung11, author = {Moti Yung}, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {From Protecting a System to Protecting a Global Ecosystem}, booktitle = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, pages = {255}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5\_29}, doi = {10.1007/978-3-642-24712-5\_29}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/Yung11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MalkinTY11, author = {Tal Malkin and Isamu Teranishi and Moti Yung}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Key dependent message security: recent results and applications}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {3--12}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943516}, doi = {10.1145/1943513.1943516}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MalkinTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MalkinTY11, author = {Tal Malkin and Isamu Teranishi and Moti Yung}, editor = {Kenneth G. Paterson}, title = {Efficient Circuit-Size Independent Public Key Encryption with {KDM} Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {507--526}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_28}, doi = {10.1007/978-3-642-20465-4\_28}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MalkinTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Yung11, author = {Moti Yung}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Cryptographic Protocols: From the Abstract to the Practical to the Actual}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {1--2}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_1}, doi = {10.1007/978-3-642-29889-9\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Yung11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChangNY11, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, editor = {Antoine Joux}, title = {On the Security of Hash Functions Employing Blockcipher Postprocessing}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {146--166}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_9}, doi = {10.1007/978-3-642-21702-9\_9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/ChangNY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/LibertY11, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {Luca Aceto and Monika Henzinger and Jir{\'{\i}} Sgall}, title = {Adaptively Secure Non-interactive Threshold Cryptosystems}, booktitle = {Automata, Languages and Programming - 38th International Colloquium, {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6756}, pages = {588--600}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22012-8\_47}, doi = {10.1007/978-3-642-22012-8\_47}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/LibertY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/MatsuoMY11, author = {Shin'ichiro Matsuo and Daisuke Moriyama and Moti Yung}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Multifactor Authenticated Key Renewal}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {204--220}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_14}, doi = {10.1007/978-3-642-32298-3\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/MatsuoMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MalkinTVY11, author = {Tal Malkin and Isamu Teranishi and Yevgeniy Vahlis and Moti Yung}, editor = {Yuval Ishai}, title = {Signatures Resilient to Continual Leakage on Memory and Computation}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {89--106}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_7}, doi = {10.1007/978-3-642-19571-6\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MalkinTVY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2009, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-16342-5}, doi = {10.1007/978-3-642-16342-5}, isbn = {978-3-642-16341-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2010, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21518-6}, doi = {10.1007/978-3-642-21518-6}, isbn = {978-3-642-21517-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2010, editor = {Liqun Chen and Moti Yung}, title = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25283-9}, doi = {10.1007/978-3-642-25283-9}, isbn = {978-3-642-25282-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2010, editor = {Yongwha Chung and Moti Yung}, title = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-17955-6}, doi = {10.1007/978-3-642-17955-6}, isbn = {978-3-642-17954-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengFGLSY11, author = {Yi Deng and Dengguo Feng and Vipul Goyal and Dongdai Lin and Amit Sahai and Moti Yung}, title = {Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2011}, url = {http://eprint.iacr.org/2011/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengFGLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangNY11, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, title = {Indifferentiability of the Hash Algorithm {BLAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2011}, url = {http://eprint.iacr.org/2011/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangNY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Yung10, author = {Moti Yung}, title = {Preface}, journal = {Theor. Comput. Sci.}, volume = {411}, number = {10}, pages = {1235}, year = {2010}, url = {https://doi.org/10.1016/j.tcs.2009.10.019}, doi = {10.1016/J.TCS.2009.10.019}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Yung10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LibertQY10, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, title = {Key Evolution Systems in Untrusted Update Environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {37:1--37:34}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880031}, doi = {10.1145/1880022.1880031}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LibertQY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LibertY10, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Dynamic fully forward-secure group signatures}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {70--81}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755698}, doi = {10.1145/1755688.1755698}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LibertY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuSPY10, author = {Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Moti Yung}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Practical leakage-resilient pseudorandom generators}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {141--151}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866324}, doi = {10.1145/1866307.1866324}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuSPY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DengLYZ10, author = {Robert H. Deng and Yingjiu Li and Moti Yung and Yunlei Zhao}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {A New Framework for {RFID} Privacy}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_1}, doi = {10.1007/978-3-642-15497-3\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DengLYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Yung10, author = {Moti Yung}, editor = {Henri Gilbert}, title = {Cryptography between Wonderland and Underland}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {320--321}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_16}, doi = {10.1007/978-3-642-13190-5\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Yung10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasY10, author = {Aggelos Kiayias and Moti Yung}, editor = {Radu Sion}, title = {Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {257--271}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_20}, doi = {10.1007/978-3-642-14577-3\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/LibertY10, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {Samson Abramsky and Cyril Gavoille and Claude Kirchner and Friedhelm Meyer auf der Heide and Paul G. Spirakis}, title = {Efficient Completely Non-malleable Public Key Encryption}, booktitle = {Automata, Languages and Programming, 37th International Colloquium, {ICALP} 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6198}, pages = {127--139}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14165-2\_12}, doi = {10.1007/978-3-642-14165-2\_12}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/LibertY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/YaoYZ10, author = {Andrew Chi{-}Chih Yao and Moti Yung and Yunlei Zhao}, editor = {Samson Abramsky and Cyril Gavoille and Claude Kirchner and Friedhelm Meyer auf der Heide and Paul G. Spirakis}, title = {Concurrent Knowledge Extraction in the Public-Key Model}, booktitle = {Automata, Languages and Programming, 37th International Colloquium, {ICALP} 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6198}, pages = {702--714}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14165-2\_59}, doi = {10.1007/978-3-642-14165-2\_59}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/YaoYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/PhongMY10, author = {Le Trieu Phong and Shin'ichiro Matsuo and Moti Yung}, editor = {Liqun Chen and Moti Yung}, title = {Leakage Resilient Strong Key-Insulated Signatures in Public Channel}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {160--172}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_11}, doi = {10.1007/978-3-642-25283-9\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/PhongMY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/MatsuoPOY10, author = {Shin'ichiro Matsuo and Le Trieu Phong and Miyako Ohkubo and Moti Yung}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {Leakage-Resilient {RFID} Authentication with Forward-Privacy}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {176--188}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_15}, doi = {10.1007/978-3-642-16822-2\_15}, timestamp = {Fri, 03 Sep 2021 17:40:55 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/MatsuoPOY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/YoungY10, author = {Adam L. Young and Moti Yung}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Kleptography from Standard Assumptions and Applications}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {271--290}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_18}, doi = {10.1007/978-3-642-15317-4\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/YoungY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LibertY10, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {Daniele Micciancio}, title = {Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {499--517}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_30}, doi = {10.1007/978-3-642-11799-2\_30}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LibertY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/KiayiasY10, author = {Aggelos Kiayias and Moti Yung}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {The Vector-Ballot Approach for Online Voting Procedures}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {155--174}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_9}, doi = {10.1007/978-3-642-12980-3\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/wote/KiayiasY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/StandaertPYQYO10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu and Jean{-}Jacques Quisquater and Moti Yung and Elisabeth Oswald}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Leakage Resilient Cryptography in Practice}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {99--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_5}, doi = {10.1007/978-3-642-14452-3\_5}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/StandaertPYQYO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2010, editor = {Jianying Zhou and Moti Yung}, title = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2}, doi = {10.1007/978-3-642-13708-2}, isbn = {978-3-642-13707-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2009, editor = {Liqun Chen and Moti Yung}, title = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14597-1}, doi = {10.1007/978-3-642-14597-1}, isbn = {978-3-642-14596-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sss/2010, editor = {Shlomi Dolev and Jorge Arturo Cobb and Michael J. Fischer and Moti Yung}, title = {Stabilization, Safety, and Security of Distributed Systems - 12th International Symposium, {SSS} 2010, New York, NY, USA, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6366}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16023-3}, doi = {10.1007/978-3-642-16023-3}, isbn = {978-3-642-16022-6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sss/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengLYYZ10, author = {Robert H. Deng and Yingjiu Li and Andrew C. Yao and Moti Yung and Yunlei Zhao}, title = {A New Framework for {RFID} Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2010}, url = {http://eprint.iacr.org/2010/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengLYYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoYZ10, author = {Andrew C. Yao and Moti Yung and Yunlei Zhao}, title = {Concurrent Knowledge Extraction in the Public-Key Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2010}, url = {http://eprint.iacr.org/2010/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoYZ10a, author = {Andrew C. Yao and Moti Yung and Yunlei Zhao}, title = {Adaptive Concurrent Non-Malleability with Bare Public-Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2010}, url = {http://eprint.iacr.org/2010/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoYZ10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkinTVY10, author = {Tal Malkin and Isamu Teranishi and Yevgeniy Vahlis and Moti Yung}, title = {Signatures Resilient to Continual Leakage on Memory and Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2010}, url = {http://eprint.iacr.org/2010/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkinTVY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangNY10, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, title = {On the Security of Hash Functions Employing Blockcipher Postprocessing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2010}, url = {http://eprint.iacr.org/2010/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangNY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CookYK09, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, title = {Elastic block ciphers: method, security and instantiations}, journal = {Int. J. Inf. Sec.}, volume = {8}, number = {3}, pages = {211--231}, year = {2009}, url = {https://doi.org/10.1007/s10207-008-0075-9}, doi = {10.1007/S10207-008-0075-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CookYK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ChoiHHHKLY09, author = {Seung Geol Choi and Javier Herranz and Dennis Hofheinz and Jung Yeon Hwang and Eike Kiltz and Dong Hoon Lee and Moti Yung}, title = {The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure}, journal = {Inf. Process. Lett.}, volume = {109}, number = {16}, pages = {897--901}, year = {2009}, url = {https://doi.org/10.1016/j.ipl.2009.04.007}, doi = {10.1016/J.IPL.2009.04.007}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ChoiHHHKLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/KatzOY09, author = {Jonathan Katz and Rafail Ostrovsky and Moti Yung}, title = {Efficient and secure authenticated key exchange using weak passwords}, journal = {J. {ACM}}, volume = {57}, number = {1}, pages = {3:1--3:39}, year = {2009}, url = {https://doi.org/10.1145/1613676.1613679}, doi = {10.1145/1613676.1613679}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/KatzOY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY09, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Moti Yung}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Efficient Robust Private Set Intersection}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {125--142}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_8}, doi = {10.1007/978-3-642-01957-9\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CathaloLY09, author = {Julien Cathalo and Beno{\^{\i}}t Libert and Moti Yung}, editor = {Mitsuru Matsui}, title = {Group Encryption: Non-interactive Realization in the Standard Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {179--196}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_11}, doi = {10.1007/978-3-642-10366-7\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CathaloLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChoiEMY09, author = {Seung Geol Choi and Ariel Elbaz and Tal Malkin and Moti Yung}, editor = {Mitsuru Matsui}, title = {Secure Multi-party Computation Minimizing Online Rounds}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {268--286}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_16}, doi = {10.1007/978-3-642-10366-7\_16}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChoiEMY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/NaccacheSY09, author = {David Naccache and Rainer Steinwandt and Moti Yung}, editor = {Arslan Br{\"{o}}mme and Christoph Busch and Detlef H{\"{u}}hnlein}, title = {Reverse Public Key Encryption}, booktitle = {{BIOSIG} 2009 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 17.-18. September 2009 in Darmstadt, Germany}, series = {{LNI}}, volume = {{P-155}}, pages = {155--169}, publisher = {{GI}}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/23181}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/NaccacheSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HwangLY09, author = {Jung Yeon Hwang and Dong Hoon Lee and Moti Yung}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Universal forgery of the identity-based sequential aggregate signature scheme}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {157--160}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533080}, doi = {10.1145/1533057.1533080}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HwangLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CamenischKY09, author = {Jan Camenisch and Aggelos Kiayias and Moti Yung}, editor = {Antoine Joux}, title = {On the Portability of Generalized Schnorr Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {425--442}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_25}, doi = {10.1007/978-3-642-01001-9\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CamenischKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/StandaertMY09, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, editor = {Antoine Joux}, title = {A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {443--461}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_26}, doi = {10.1007/978-3-642-01001-9\_26}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/StandaertMY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiltzPSY09, author = {Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung}, editor = {Antoine Joux}, title = {A New Randomness Extraction Paradigm for Hybrid Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {590--609}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_34}, doi = {10.1007/978-3-642-01001-9\_34}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiltzPSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasYY09, author = {Aggelos Kiayias and B{\"{u}}lent Yener and Moti Yung}, editor = {Roger Dingledine and Philippe Golle}, title = {Privacy-Preserving Information Markets for Computing Statistical Data}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {32--50}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_3}, doi = {10.1007/978-3-642-03549-4\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasYY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/XuY09, author = {Shouhuai Xu and Moti Yung}, editor = {Roger Dingledine and Philippe Golle}, title = {Expecting the Unexpected: Towards Robust Credential Infrastructure}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {201--221}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_12}, doi = {10.1007/978-3-642-03549-4\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/XuY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fct/Yung09, author = {Moti Yung}, editor = {Miroslaw Kutylowski and Witold Charatonik and Maciej Gebala}, title = {How to Guard the Guards Themselves}, booktitle = {Fundamentals of Computation Theory, 17th International Symposium, {FCT} 2009, Wroclaw, Poland, September 2-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5699}, pages = {1--2}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03409-1\_1}, doi = {10.1007/978-3-642-03409-1\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fct/Yung09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/IbrahimKYZ09, author = {Maged H. Ibrahim and Aggelos Kiayias and Moti Yung and Hong{-}Sheng Zhou}, editor = {Susanne Albers and Alberto Marchetti{-}Spaccamela and Yossi Matias and Sotiris E. Nikoletseas and Wolfgang Thomas}, title = {Secure Function Collection with Sublinear Storage}, booktitle = {Automata, Languages and Programming, 36th Internatilonal Colloquium, {ICALP} 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5556}, pages = {534--545}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02930-1\_44}, doi = {10.1007/978-3-642-02930-1\_44}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/IbrahimKYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/XuY09, author = {Shouhuai Xu and Moti Yung}, editor = {Liqun Chen and Moti Yung}, title = {SocialClouds: Concept, Security Architecture and Some Mechanisms}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {104--128}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_7}, doi = {10.1007/978-3-642-14597-1\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/XuY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/LibertY09, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {Hovav Shacham and Brent Waters}, title = {Efficient Traceable Signatures in the Standard Model}, booktitle = {Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5671}, pages = {187--205}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03298-1\_13}, doi = {10.1007/978-3-642-03298-1\_13}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/LibertY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2008x, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01440-6}, doi = {10.1007/978-3-642-01440-6}, isbn = {978-3-642-01439-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2008x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2009, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8}, doi = {10.1007/978-3-642-04474-8}, isbn = {978-3-642-04473-1}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2008, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00306-6}, doi = {10.1007/978-3-642-00306-6}, isbn = {978-3-642-00305-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2009, editor = {Heung Youl Youm and Moti Yung}, title = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9}, doi = {10.1007/978-3-642-10838-9}, isbn = {978-3-642-10837-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0908-2476, author = {Andrew Chi{-}Chih Yao and Moti Yung and Yunlei Zhao}, title = {Concurrent Knowledge-Extraction in the Public-Key Model}, journal = {CoRR}, volume = {abs/0908.2476}, year = {2009}, url = {http://arxiv.org/abs/0908.2476}, eprinttype = {arXiv}, eprint = {0908.2476}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0908-2476.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0910-3282, author = {Andrew Chi{-}Chih Yao and Moti Yung and Yunlei Zhao}, title = {Adaptive Concurrent Non-Malleability with Bare Public-Keys}, journal = {CoRR}, volume = {abs/0910.3282}, year = {2009}, url = {http://arxiv.org/abs/0910.3282}, eprinttype = {arXiv}, eprint = {0910.3282}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-3282.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischKY09, author = {Jan Camenisch and Aggelos Kiayias and Moti Yung}, title = {On the Portability of Generalized Schnorr Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2009}, url = {http://eprint.iacr.org/2009/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertPYQYO09, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu and Jean{-}Jacques Quisquater and Moti Yung and Elisabeth Oswald}, title = {Leakage Resilient Cryptography in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2009}, url = {http://eprint.iacr.org/2009/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertPYQYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/SantisCPY08, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano and Moti Yung}, title = {On Monotone Formula Composition of Perfect Zero-Knowledge Languages}, journal = {{SIAM} J. Comput.}, volume = {38}, number = {4}, pages = {1300--1329}, year = {2008}, url = {https://doi.org/10.1137/S0097539798346123}, doi = {10.1137/S0097539798346123}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/SantisCPY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KiayiasY08, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2752--2769}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921876}, doi = {10.1109/TIT.2008.921876}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KiayiasY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CookYK08, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {187--202}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_14}, doi = {10.1007/978-3-540-70500-0\_14}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CookYK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PetitSPMY08, author = {Christophe Petit and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Tal Malkin and Moti Yung}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {A block cipher based pseudo random number generator secure against side-channel key recovery}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {56--65}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368322}, doi = {10.1145/1368310.1368322}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PetitSPMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LibertQY08, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Key Evolution Systems in Untrusted Update Environments}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {12--21}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_2}, doi = {10.1007/978-3-642-01440-6\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LibertQY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CookYK08, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {157--180}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_14}, doi = {10.1007/978-3-642-01440-6\_14}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CookYK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KiayiasY08, author = {Aggelos Kiayias and Moti Yung}, editor = {Gregory L. Heileman and Marc Joye}, title = {Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {9--18}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456525}, doi = {10.1145/1456520.1456525}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KiayiasY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BenjumeaCLY08, author = {Vicente Benjumea and Seung Geol Choi and Javier L{\'{o}}pez and Moti Yung}, editor = {Gene Tsudik}, title = {Fair Traceable Multi-Group Signatures}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {231--246}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_21}, doi = {10.1007/978-3-540-85230-8\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BenjumeaCLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CallasDNOQY08, author = {Jon Callas and Yvo Desmedt and Daniel Nagy and Akira Otsuka and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Gene Tsudik}, title = {Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report)}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {307--313}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_28}, doi = {10.1007/978-3-540-85230-8\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CallasDNOQY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/StandaertMY08, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, editor = {Reihaneh Safavi{-}Naini}, title = {Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_7}, doi = {10.1007/978-3-540-85093-9\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/StandaertMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/YeomCY08, author = {Yongjin Yeom and Yongkuk Cho and Moti Yung}, title = {High-Speed Implementations of Block Cipher {ARIA} Using Graphics Processing Units}, booktitle = {2008 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2008), 24-26 April 2008, Busan, Korea}, pages = {271--275}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MUE.2008.94}, doi = {10.1109/MUE.2008.94}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/YeomCY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MolY08, author = {Petros Mol and Moti Yung}, editor = {Ronald Cramer}, title = {Recovering {NTRU} Secret Key from Inversion Oracles}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {18--36}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_2}, doi = {10.1007/978-3-540-78440-1\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MolY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KiayiasXY08, author = {Aggelos Kiayias and Shouhuai Xu and Moti Yung}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Privacy Preserving Data Mining within Anonymous Credential Systems}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {57--76}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_5}, doi = {10.1007/978-3-540-85855-3\_5}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/KiayiasXY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2008, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0}, doi = {10.1007/978-3-540-68914-0}, isbn = {978-3-540-68913-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2008, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79499-8}, doi = {10.1007/978-3-540-79499-8}, isbn = {978-3-540-79498-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2007, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77535-5}, doi = {10.1007/978-3-540-77535-5}, isbn = {978-3-540-77534-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenjumeaCLY08, author = {Vicente Benjumea and Seung Geol Choi and Javier L{\'{o}}pez and Moti Yung}, title = {Fair Traceable Multi-Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2008}, url = {http://eprint.iacr.org/2008/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenjumeaCLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzPSY08, author = {Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung}, title = {A New Randomness Extraction Paradigm for Hybrid Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2008}, url = {http://eprint.iacr.org/2008/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzPSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CookYK08, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, title = {Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2008}, url = {http://eprint.iacr.org/2008/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CookYK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KiayiasY07, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {61--78}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9055-8}, doi = {10.1007/S10623-007-9055-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KiayiasY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KatzY07, author = {Jonathan Katz and Moti Yung}, title = {Scalable Protocols for Authenticated Group Key Exchange}, journal = {J. Cryptol.}, volume = {20}, number = {1}, pages = {85--113}, year = {2007}, url = {https://doi.org/10.1007/s00145-006-0361-5}, doi = {10.1007/S00145-006-0361-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KatzY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BleichenbacherKY07, author = {Daniel Bleichenbacher and Aggelos Kiayias and Moti Yung}, title = {Decoding interleaved Reed-Solomon codes over noisy channels}, journal = {Theor. Comput. Sci.}, volume = {379}, number = {3}, pages = {348--360}, year = {2007}, url = {https://doi.org/10.1016/j.tcs.2007.02.043}, doi = {10.1016/J.TCS.2007.02.043}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BleichenbacherKY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChangYSHL07, author = {Donghoon Chang and Moti Yung and Jaechul Sung and Seokhie Hong and Sangjin Lee}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Preimage Attack on the Parallel FFT-Hashing Function}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {59--67}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_5}, doi = {10.1007/978-3-540-73458-1\_5}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChangYSHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KiayiasTY07, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, editor = {Kaoru Kurosawa}, title = {Group Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {181--199}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_11}, doi = {10.1007/978-3-540-76900-2\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KiayiasTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChoiEJMY07, author = {Seung Geol Choi and Ariel Elbaz and Ari Juels and Tal Malkin and Moti Yung}, editor = {Kaoru Kurosawa}, title = {Two-Party Computing with Encrypted Data}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {298--314}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_18}, doi = {10.1007/978-3-540-76900-2\_18}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChoiEJMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BenjumeaCLY07, author = {Vicente Benjumea and Seung Geol Choi and Javier L{\'{o}}pez and Moti Yung}, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {Anonymity 2.0 - {X.509} Extensions Supporting Privacy-Friendly Authentication}, booktitle = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, pages = {265--281}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9\_17}, doi = {10.1007/978-3-540-76969-9\_17}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/BenjumeaCLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LibertQY07, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Forward-secure signatures in untrusted update environments: efficient and generic constructions}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {266--275}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315279}, doi = {10.1145/1315245.1315279}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LibertQY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CookKY07, author = {Debra L. Cook and Angelos D. Keromytis and Moti Yung}, editor = {Feng Bao and Steven Miller}, title = {Elastic block ciphers: the basic design}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {350--352}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229324}, doi = {10.1145/1229285.1229324}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CookKY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Yung08, author = {Moti Yung}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {On the Evolution of User Authentication: Non-bilateral Factors}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {5--10}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_2}, doi = {10.1007/978-3-540-79499-8\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Yung08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YoungY08, author = {Adam L. Young and Moti Yung}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {A Timing-Resistant Elliptic Curve Backdoor in {RSA}}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {427--441}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_33}, doi = {10.1007/978-3-540-79499-8\_33}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YoungY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/YungZ07, author = {Moti Yung and Yunlei Zhao}, editor = {Moni Naor}, title = {Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {129--147}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_8}, doi = {10.1007/978-3-540-72540-4\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/YungZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/XuY07, author = {Shouhuai Xu and Moti Yung}, editor = {Sven Dietrich and Rachna Dhamija}, title = {\emph{K}-Anonymous Multi-party Secret Handshakes}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {72--87}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_10}, doi = {10.1007/978-3-540-77366-5\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/XuY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YoungY07, author = {Adam L. Young and Moti Yung}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Space-Efficient Kleptography Without Random Oracles}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {112--129}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_8}, doi = {10.1007/978-3-540-77370-2\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/YoungY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DolevLY07, author = {Shlomi Dolev and Limor Lahiani and Moti Yung}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Secret Swarm UnitReactive k-Secret Sharing}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {123--137}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_10}, doi = {10.1007/978-3-540-77026-8\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DolevLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/CookYK07, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {The Security of Elastic Block Ciphers Against Key-Recovery Attacks}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {89--103}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_6}, doi = {10.1007/978-3-540-75496-1\_6}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/CookYK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertQY07, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Parallel Key-Insulated Public Key Encryption Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {298--314}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_20}, doi = {10.1007/978-3-540-71677-8\_20}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertQY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2007, editor = {Jonathan Katz and Moti Yung}, title = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5}, doi = {10.1007/978-3-540-72738-5}, isbn = {978-3-540-72737-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007stc, editor = {Peng Ning and Vijay Atluri and Shouhuai Xu and Moti Yung}, title = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing, {STC} 2007, Alexandria, VA, USA, November 2, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-888-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007stc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2007, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-884-8}, timestamp = {Thu, 17 Jan 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2007, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8}, doi = {10.1007/978-3-540-77026-8}, isbn = {978-3-540-77025-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2006, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71093-6}, doi = {10.1007/978-3-540-71093-6}, isbn = {978-3-540-71092-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/YungZ07, author = {Moti Yung and Yunlei Zhao}, title = {Concurrent Knowledge-Extraction in the Public-Key Model}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR07-002}}, year = {2007}, url = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-002/index.html}, eprinttype = {ECCC}, eprint = {TR07-002}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/YungZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasTY07, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, title = {Group Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2007}, url = {http://eprint.iacr.org/2007/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY07, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2007}, url = {http://eprint.iacr.org/2007/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitSPMY07, author = {Christophe Petit and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Tal Malkin and Moti Yung}, title = {A Block Cipher based {PRNG} Secure Against Side-Channel Key Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2007}, url = {http://eprint.iacr.org/2007/356}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitSPMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KiayiasY06, author = {Aggelos Kiayias and Moti Yung}, title = {Secure scalable group signature with dynamic joins and separable authorities}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {24--45}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010821}, doi = {10.1504/IJSN.2006.010821}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KiayiasY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KatzY06, author = {Jonathan Katz and Moti Yung}, title = {Characterization of Security Notions for Probabilistic Private-Key Encryption}, journal = {J. Cryptol.}, volume = {19}, number = {1}, pages = {67--95}, year = {2006}, url = {https://doi.org/10.1007/s00145-005-0310-8}, doi = {10.1007/S00145-005-0310-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KatzY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YoungY06, author = {Adam L. Young and Moti Yung}, title = {On Fundamental Limitations of Proving Data Theft}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {1}, number = {4}, pages = {524--531}, year = {2006}, url = {https://doi.org/10.1109/TIFS.2006.885025}, doi = {10.1109/TIFS.2006.885025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YoungY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChangLNY06, author = {Donghoon Chang and Sangjin Lee and Mridul Nandi and Moti Yung}, editor = {Xuejia Lai and Kefei Chen}, title = {Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {283--298}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_19}, doi = {10.1007/11935230\_19}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChangLNY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrainardJRSY06, author = {John G. Brainard and Ari Juels and Ronald L. Rivest and Michael Szydlo and Moti Yung}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Fourth-factor authentication: somebody you know}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {168--178}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180427}, doi = {10.1145/1180405.1180427}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrainardJRSY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LibertQY06, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Efficient Intrusion-Resilient Signatures Without Random Oracles}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {27--41}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_3}, doi = {10.1007/11937807\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LibertQY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasY06, author = {Aggelos Kiayias and Moti Yung}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {311--325}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_25}, doi = {10.1007/11889663\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/MalkinSY06, author = {Tal Malkin and Fran{\c{c}}ois{-}Xavier Standaert and Moti Yung}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {A Comparative Cost/Security Analysis of Fault Attack Countermeasures}, booktitle = {Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4236}, pages = {159--172}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889700\_15}, doi = {10.1007/11889700\_15}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/MalkinSY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CamtepeYY06, author = {Seyit Ahmet {\c{C}}amtepe and B{\"{u}}lent Yener and Moti Yung}, title = {Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {2262--2267}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.255107}, doi = {10.1109/ICC.2006.255107}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/CamtepeYY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YoungY06, author = {Adam L. Young and Moti Yung}, editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil Sallee}, title = {Hiding Information Hiding}, booktitle = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, series = {Lecture Notes in Computer Science}, volume = {4437}, pages = {161--171}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74124-4\_11}, doi = {10.1007/978-3-540-74124-4\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/YoungY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YoungY06a, author = {Adam L. Young and Moti Yung}, editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil Sallee}, title = {An Elliptic Curve Backdoor Algorithm for {RSASSA}}, booktitle = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, series = {Lecture Notes in Computer Science}, volume = {4437}, pages = {355--374}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74124-4\_24}, doi = {10.1007/978-3-540-74124-4\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YoungY06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChoiPY06, author = {Seung Geol Choi and Kunsoo Park and Moti Yung}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Short Traceable Signatures Based on Bilinear Pairings}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {88--103}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_7}, doi = {10.1007/11908739\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChoiPY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/YungZ06, author = {Moti Yung and Yunlei Zhao}, editor = {Shai Halevi and Tal Rabin}, title = {Interactive Zero-Knowledge with Restricted Random Oracles}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {21--40}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_2}, doi = {10.1007/11681878\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/YungZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisYY06, author = {Yevgeniy Dodis and Aleksandr Yampolskiy and Moti Yung}, editor = {Shai Halevi and Tal Rabin}, title = {Threshold and Proactive Pseudo-Random Permutations}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {542--560}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_28}, doi = {10.1007/11681878\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisYY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2006, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, year = {2006}, url = {https://doi.org/10.1007/11767480}, doi = {10.1007/11767480}, isbn = {3-540-34703-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2006stc, editor = {Ari Juels and Gene Tsudik and Shouhuai Xu and Moti Yung}, title = {Proceedings of the 1st {ACM} Workshop on Scalable Trusted Computing, {STC} 2006, Alexandria, VA, USA, November 3, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-548-7}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2006stc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2006, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807}, doi = {10.1007/11937807}, isbn = {3-540-49608-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2006, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-555-X}, timestamp = {Thu, 17 Jan 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drmtics/2005, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, {DRMTICS} 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3919}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787952}, doi = {10.1007/11787952}, isbn = {3-540-35998-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drmtics/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2006, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853}, doi = {10.1007/11745853}, isbn = {3-540-33851-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scn/2006, editor = {Roberto De Prisco and Moti Yung}, title = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072}, doi = {10.1007/11832072}, isbn = {3-540-38080-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2005, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11604938}, doi = {10.1007/11604938}, isbn = {3-540-31012-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisYY06, author = {Yevgeniy Dodis and Aleksandr Yampolskiy and Moti Yung}, title = {Threshold and Proactive Pseudo-Random Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2006}, url = {http://eprint.iacr.org/2006/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisYY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertMY06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, title = {A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2006}, url = {http://eprint.iacr.org/2006/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertMY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY06, author = {Aggelos Kiayias and Moti Yung}, title = {Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2006}, url = {http://eprint.iacr.org/2006/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangY06, author = {Donghoon Chang and Moti Yung}, title = {Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2006}, url = {http://eprint.iacr.org/2006/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/DodisFKY05, author = {Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung}, title = {Scalable public-key tracing and revoking}, journal = {Distributed Comput.}, volume = {17}, number = {4}, pages = {323--347}, year = {2005}, url = {https://doi.org/10.1007/s00446-004-0120-5}, doi = {10.1007/S00446-004-0120-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/DodisFKY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ParkKY05, author = {Cheol{-}Min Park and Myung{-}Hwan Kim and Moti Yung}, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {A Remark on Implementing the Weil Pairing}, booktitle = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, pages = {313--323}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548\_27}, doi = {10.1007/11599548\_27}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ParkKY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/YoungY05, author = {Adam L. Young and Moti Yung}, editor = {Alfred Menezes}, title = {Malicious Cryptography: Kleptographic Aspects}, booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {7--18}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30574-3\_2}, doi = {10.1007/978-3-540-30574-3\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/YoungY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, editor = {Ronald Cramer}, title = {Group Signatures with Efficient Concurrent Join}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {198--214}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_12}, doi = {10.1007/11426639\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptography and decoding Reed-Solomon codes as a hard problem}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {48}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543956}, doi = {10.1109/ITWTPI.2005.1543956}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icits/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KonstantinouLSSY05, author = {Elisavet Konstantinou and Vasiliki Liagkou and Paul G. Spirakis and Yannis C. Stamatiou and Moti Yung}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {"Trust Engineering: " From Requirements to System Design and Maintenance - {A} Working National Lottery System Experience}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {44--58}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_4}, doi = {10.1007/11556992\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KonstantinouLSSY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, editor = {Ed Dawson and Serge Vaudenay}, title = {Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {151--170}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_11}, doi = {10.1007/11554868\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/YoungY05, author = {Adam L. Young and Moti Yung}, editor = {Ed Dawson and Serge Vaudenay}, title = {Questionable Encryption and Its Applications}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {210--221}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_15}, doi = {10.1007/11554868\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/YoungY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/YoungY05, author = {Adam L. Young and Moti Yung}, editor = {Bart Preneel and Stafford E. Tavares}, title = {A Space Efficient Backdoor in {RSA} and Its Applications}, booktitle = {Selected Areas in Cryptography, 12th International Workshop, {SAC} 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3897}, pages = {128--143}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11693383\_9}, doi = {10.1007/11693383\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/YoungY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2005, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, year = {2005}, url = {https://doi.org/10.1007/b137093}, doi = {10.1007/B137093}, isbn = {3-540-26223-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2005, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548}, doi = {10.1007/11599548}, isbn = {3-540-30855-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2005, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-230-5}, timestamp = {Wed, 22 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2005, editor = {Andrew S. Patrick and Moti Yung}, title = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137875}, doi = {10.1007/B137875}, isbn = {3-540-26656-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icalp/2005, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468}, doi = {10.1007/11523468}, isbn = {3-540-27580-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR05-048, author = {Moti Yung and Yunlei Zhao}, title = {Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR05-048}}, year = {2005}, url = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-048/index.html}, eprinttype = {ECCC}, eprint = {TR05-048}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR05-048.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, title = {Group Signatures with Efficient Concurrent Join}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2005}, url = {http://eprint.iacr.org/2005/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0020579, author = {Adam L. Young and Moti Yung}, title = {Malicious cryptography - exposing cryptovirology}, publisher = {Wiley}, year = {2004}, isbn = {978-0-7645-4975-5}, timestamp = {Thu, 14 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0020579.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/VoraABCDJJLRSY04, author = {Poorvi L. Vora and Ben Adida and Ren Bucholz and David Chaum and David L. Dill and David R. Jefferson and Douglas W. Jones and William Lattin and Aviel D. Rubin and Michael Ian Shamos and Moti Yung}, title = {Evaluation of voting systems}, journal = {Commun. {ACM}}, volume = {47}, number = {11}, pages = {144}, year = {2004}, url = {https://doi.org/10.1145/1029496.1029520}, doi = {10.1145/1029496.1029520}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/VoraABCDJJLRSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/FranklinY04, author = {Matthew K. Franklin and Moti Yung}, title = {Secure Hypergraphs: Privacy from Partial Broadcast}, journal = {{SIAM} J. Discret. Math.}, volume = {18}, number = {3}, pages = {437--450}, year = {2004}, url = {https://doi.org/10.1137/S0895480198335215}, doi = {10.1137/S0895480198335215}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/FranklinY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/McAvenSY04, author = {Luke McAven and Reihaneh Safavi{-}Naini and Moti Yung}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Unconditionally Secure Encryption Under Strong Attacks}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {427--439}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_37}, doi = {10.1007/978-3-540-27800-9\_37}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/McAvenSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KiayiasY04, author = {Aggelos Kiayias and Moti Yung}, editor = {Pil Joong Lee}, title = {Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3329}, pages = {401--416}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30539-2\_28}, doi = {10.1007/978-3-540-30539-2\_28}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KiayiasY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/XuY04, author = {Shouhuai Xu and Moti Yung}, editor = {Jean{-}Jacques Quisquater and Pierre Paradinas and Yves Deswarte and Anas Abou El Kalam}, title = {Accountable Ring Signatures: {A} Smart Card Approach}, booktitle = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {153}, pages = {271--286}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8147-2\_18}, doi = {10.1007/1-4020-8147-2\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/XuY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuY04, author = {Shouhuai Xu and Moti Yung}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {k-anonymous secret handshakes with reusable credentials}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {158--167}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030105}, doi = {10.1145/1030083.1030105}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DiamentLKY04, author = {Theodore Diament and Homin K. Lee and Angelos D. Keromytis and Moti Yung}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {The dual receiver cryptosystem and its applications}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {330--343}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030128}, doi = {10.1145/1030083.1030128}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DiamentLKY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DodisFKMY04, author = {Yevgeniy Dodis and Matthew K. Franklin and Jonathan Katz and Atsuko Miyaji and Moti Yung}, editor = {Tatsuaki Okamoto}, title = {A Generic Construction for Intrusion-Resilient Public-Key Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {81--98}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_7}, doi = {10.1007/978-3-540-24660-2\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DodisFKMY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/YoungY04, author = {Adam L. Young and Moti Yung}, editor = {Tatsuaki Okamoto}, title = {A Key Recovery System as Secure as Factoring}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {129--142}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_11}, doi = {10.1007/978-3-540-24660-2\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/YoungY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MalkinOY04, author = {Tal Malkin and Satoshi Obana and Moti Yung}, editor = {Christian Cachin and Jan Camenisch}, title = {The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {306--322}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_19}, doi = {10.1007/978-3-540-24676-3\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MalkinOY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasTY04, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, editor = {Christian Cachin and Jan Camenisch}, title = {Traceable Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {571--589}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_34}, doi = {10.1007/978-3-540-24676-3\_34}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasTY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasY04, author = {Aggelos Kiayias and Moti Yung}, editor = {Ari Juels}, title = {The Vector-Ballot e-Voting Approach}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {72--89}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_9}, doi = {10.1007/978-3-540-27809-2\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KonstantinouLSSY04, author = {Elisavet Konstantinou and Vasiliki Liagkou and Paul G. Spirakis and Yannis C. Stamatiou and Moti Yung}, editor = {Ari Juels}, title = {Electronic National Lotteries}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {147--163}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_18}, doi = {10.1007/978-3-540-27809-2\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KonstantinouLSSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/McAvenSY04, author = {Luke McAven and Reihaneh Safavi{-}Naini and Moti Yung}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {148--161}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_13}, doi = {10.1007/978-3-540-30556-9\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/McAvenSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Safavi-NainiMY04, author = {Reihaneh Safavi{-}Naini and Luke McAven and Moti Yung}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures"}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {231--247}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_17}, doi = {10.1007/978-3-540-24632-9\_17}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Safavi-NainiMY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/YoungY04, author = {Adam L. Young and Moti Yung}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {A Subliminal Channel in Secret Block Ciphers}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {198--211}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_14}, doi = {10.1007/978-3-540-30564-4\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/YoungY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/YoungY04, author = {Adam L. Young and Moti Yung}, editor = {Carlo Blundo and Stelvio Cimato}, title = {Relationships Between Diffie-Hellman and "Index Oracles"}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {16--32}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_2}, doi = {10.1007/978-3-540-30598-9\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/YoungY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2004, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98360}, doi = {10.1007/B98360}, isbn = {3-540-22217-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2004, editor = {Aggelos Kiayias and Moti Yung}, title = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, publisher = {{ACM}}, year = {2004}, isbn = {1-58113-969-1}, timestamp = {Wed, 15 Dec 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2003, editor = {Kijoon Chae and Moti Yung}, title = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b95188}, doi = {10.1007/B95188}, isbn = {3-540-20827-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2004, editor = {Chae Hoon Lim and Moti Yung}, title = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b103174}, doi = {10.1007/B103174}, isbn = {3-540-24015-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasTY04, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, title = {Traceable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2004}, url = {http://eprint.iacr.org/2004/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasTY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkinOY04, author = {Tal Malkin and Satoshi Obana and Moti Yung}, title = {The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2004}, url = {http://eprint.iacr.org/2004/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkinOY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY04, author = {Aggelos Kiayias and Moti Yung}, title = {Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2004}, url = {http://eprint.iacr.org/2004/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CookYK04, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, title = {Elastic Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2004}, url = {http://eprint.iacr.org/2004/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CookYK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CookYK04a, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, title = {Elastic {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2004}, url = {http://eprint.iacr.org/2004/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CookYK04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisFKY04, author = {Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung}, title = {Scalable Public-Key Tracing and Revoking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2004}, url = {http://eprint.iacr.org/2004/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisFKY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY04a, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2004}, url = {http://eprint.iacr.org/2004/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YoungY03, author = {Adam L. Young and Moti Yung}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {297--311}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_26}, doi = {10.1007/3-540-45067-X\_26}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YoungY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KatzY03, author = {Jonathan Katz and Moti Yung}, editor = {Dan Boneh}, title = {Scalable Protocols for Authenticated Group Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {110--125}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_7}, doi = {10.1007/978-3-540-45146-4\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KatzY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DodisFKMY03, author = {Yevgeniy Dodis and Matthew K. Franklin and Jonathan Katz and Atsuko Miyaji and Moti Yung}, editor = {Marc Joye}, title = {Intrusion-Resilient Public-Key Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {19--32}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_2}, doi = {10.1007/3-540-36563-X\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DodisFKMY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsom/BaldiOY03, author = {Mario Baldi and Yoram Ofek and Moti Yung}, editor = {Marcus Brunner and Alexander Keller}, title = {Idiosyncratic Signatures for Authenticated Execution of Management Code}, booktitle = {Self-Managing Distributed Systems, 14th {IFIP/IEEE} International Workshop on Distributed Systems: Operations and Management, {DSOM} 2003, Heidelberg, Germany, October 20-22, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2867}, pages = {204--206}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39671-0\_21}, doi = {10.1007/978-3-540-39671-0\_21}, timestamp = {Tue, 20 Aug 2019 14:59:26 +0200}, biburl = {https://dblp.org/rec/conf/dsom/BaldiOY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasY03, author = {Aggelos Kiayias and Moti Yung}, editor = {Eli Biham}, title = {Extracting Group Signatures from Traitor Tracing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {630--648}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_39}, doi = {10.1007/3-540-39200-9\_39}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/XuY03, author = {Shouhuai Xu and Moti Yung}, editor = {Rebecca N. Wright}, title = {Retrofitting Fairness on the Original RSA-Based E-cash}, booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2742}, pages = {51--68}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45126-6\_4}, doi = {10.1007/978-3-540-45126-6\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/XuY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Yung03, author = {Moti Yung}, editor = {Rebecca N. Wright}, title = {Trusted Computing Platforms: The Good, the Bad, and the Ugly}, booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2742}, pages = {250--254}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45126-6\_18}, doi = {10.1007/978-3-540-45126-6\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Yung03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasY03, author = {Aggelos Kiayias and Moti Yung}, editor = {Rebecca N. Wright}, title = {Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making}, booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2742}, pages = {303--320}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45126-6\_22}, doi = {10.1007/978-3-540-45126-6\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/BaldiOY03, author = {Mario Baldi and Yoram Ofek and Moti Yung}, title = {The TrustedFlow {(TM)} Protocol-Idiosyncratic Signatures for Authenticated Execution}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {288--291}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 16:23:26 +0100}, biburl = {https://dblp.org/rec/conf/iaw/BaldiOY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BleichenbacherKY03, author = {Daniel Bleichenbacher and Aggelos Kiayias and Moti Yung}, editor = {Jos C. M. Baeten and Jan Karel Lenstra and Joachim Parrow and Gerhard J. Woeginger}, title = {Decoding of Interleaved Reed Solomon Codes over Noisy Data}, booktitle = {Automata, Languages and Programming, 30th International Colloquium, {ICALP} 2003, Eindhoven, The Netherlands, June 30 - July 4, 2003. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2719}, pages = {97--108}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45061-0\_9}, doi = {10.1007/3-540-45061-0\_9}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BleichenbacherKY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DodisKXY03, author = {Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung}, editor = {Yvo Desmedt}, title = {Strong Key-Insulated Signature Schemes}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {130--144}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_10}, doi = {10.1007/3-540-36288-6\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DodisKXY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/DodisFKY03, author = {Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung}, editor = {Elizabeth Borowsky and Sergio Rajsbaum}, title = {Scalable public-key tracing and revoking}, booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July 13-16, 2003}, pages = {190--199}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/872035.872062}, doi = {10.1145/872035.872062}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/DodisFKY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KiayiasY03, author = {Aggelos Kiayias and Moti Yung}, editor = {Dimitris Gritzalis}, title = {Robust Verifiable non-Interactive Zero-Sharing - {A} Plug-in Utility for Enhanced Voters' Privacy}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {139--151}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_9}, doi = {10.1007/978-1-4615-0239-5\_9}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/KiayiasY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2003, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b13996}, doi = {10.1007/B13996}, isbn = {3-540-20208-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2003w, editor = {Moti Yung}, title = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, publisher = {{ACM}}, year = {2003}, isbn = {1-58113-786-9}, timestamp = {Thu, 23 Jun 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/2003w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzY03, author = {Jonathan Katz and Moti Yung}, title = {Scalable Protocols for Authenticated Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2003}, url = {http://eprint.iacr.org/2003/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/MayerOOY02, author = {Alain J. Mayer and Rafail Ostrovsky and Yoram Ofek and Moti Yung}, title = {Self-Stabilizing Symmetry Breaking in Constant Space}, journal = {{SIAM} J. Comput.}, volume = {31}, number = {5}, pages = {1571--1595}, year = {2002}, url = {https://doi.org/10.1137/S0097539798285997}, doi = {10.1137/S0097539798285997}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/MayerOOY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/FrankelMY02, author = {Yair Frankel and Philip D. MacKenzie and Moti Yung}, title = {Adaptively secure distributed public-key systems}, journal = {Theor. Comput. Sci.}, volume = {287}, number = {2}, pages = {535--561}, year = {2002}, url = {https://doi.org/10.1016/S0304-3975(01)00260-2}, doi = {10.1016/S0304-3975(01)00260-2}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/FrankelMY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimLY02, author = {Hyun{-}Jeong Kim and Dong Hoon Lee and Moti Yung}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Privacy against Piracy: Protecting Two-Level Revocable {P-K} Traitor Tracing}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {482--496}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_36}, doi = {10.1007/3-540-45450-0\_36}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimLY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KatzY02, author = {Jonathan Katz and Moti Yung}, editor = {Yuliang Zheng}, title = {Threshold Cryptosystems Based on Factoring}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {192--205}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_12}, doi = {10.1007/3-540-36178-2\_12}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KatzY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Yung02, author = {Moti Yung}, editor = {Yuliang Zheng}, title = {Crypto-integrity}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {567--573}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_35}, doi = {10.1007/3-540-36178-2\_35}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Yung02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {Joan Feigenbaum}, title = {Breaking and Repairing Asymmetric Public-Key Traitor Tracing}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {32--50}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_3}, doi = {10.1007/978-3-540-44993-5\_3}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JoyeQYY02, author = {Marc Joye and Jean{-}Jacques Quisquater and Sung{-}Ming Yen and Moti Yung}, editor = {Bart Preneel}, title = {Observability Analysis - Detecting When Improved Cryptosystems Fail}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {17--29}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_2}, doi = {10.1007/3-540-45760-7\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JoyeQYY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisKXY02, author = {Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung}, editor = {Lars R. Knudsen}, title = {Key-Insulated Public Key Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {65--82}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_5}, doi = {10.1007/3-540-46035-7\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisKXY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {Lars R. Knudsen}, title = {Traitor Tracing with Constant Transmission Rate}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {450--465}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_30}, doi = {10.1007/3-540-46035-7\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/XuY02, author = {Shouhuai Xu and Moti Yung}, editor = {Matt Blaze}, title = {The Dark Side of Threshold Cryptography}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {198--219}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_15}, doi = {10.1007/3-540-36504-4\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/XuY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GeerY02, author = {Daniel E. Geer Jr. and Moti Yung}, editor = {Matt Blaze}, title = {Split-and-Delegate: Threshold Cryptography for the Masses}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {220--237}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_16}, doi = {10.1007/3-540-36504-4\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GeerY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {Peter Widmayer and Francisco Triguero Ruiz and Rafael Morales Bueno and Matthew Hennessy and Stephan J. Eidenbenz and Ricardo Conejo}, title = {Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes}, booktitle = {Automata, Languages and Programming, 29th International Colloquium, {ICALP} 2002, Malaga, Spain, July 8-13, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2380}, pages = {232--243}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45465-9\_21}, doi = {10.1007/3-540-45465-9\_21}, timestamp = {Wed, 11 Sep 2019 13:15:53 +0200}, biburl = {https://dblp.org/rec/conf/icalp/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {David Naccache and Pascal Paillier}, title = {Self-tallying Elections and Perfect Ballot Secrecy}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {141--158}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_10}, doi = {10.1007/3-540-45664-3\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KatzOY02, author = {Jonathan Katz and Rafail Ostrovsky and Moti Yung}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Forward Secrecy in Password-Only Key Exchange Protocols}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {29--44}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_3}, doi = {10.1007/3-540-36413-7\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/KatzOY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sisw/DodisY02, author = {Yevgeniy Dodis and Moti Yung}, title = {Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case}, booktitle = {Proceedings of the First International {IEEE} Security in Storage Workshop, {SISW} 2002, Greenbelt, Maryland, USA, December 11, 2002}, pages = {45--52}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SISW.2002.1183509}, doi = {10.1109/SISW.2002.1183509}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sisw/DodisY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2002, editor = {Moti Yung}, title = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9}, doi = {10.1007/3-540-45708-9}, isbn = {3-540-44050-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR02-017, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR02-017}}, year = {2002}, url = {https://eccc.weizmann.ac.il/eccc-reports/2002/TR02-017/index.html}, eprinttype = {ECCC}, eprint = {TR02-017}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR02-017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKXY02, author = {Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung}, title = {Key-Insulated Public-Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2002}, url = {http://eprint.iacr.org/2002/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKXY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MRaihiY01, author = {David M'Ra{\"{\i}}hi and Moti Yung}, title = {E-commerce applications of smart cards}, journal = {Comput. Networks}, volume = {36}, number = {4}, pages = {453--472}, year = {2001}, url = {https://doi.org/10.1016/S1389-1286(01)00166-9}, doi = {10.1016/S1389-1286(01)00166-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MRaihiY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasY01, author = {Aggelos Kiayias and Moti Yung}, editor = {Tomas Sander}, title = {On Crafty Pirates and Foxy Tracers}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {22--39}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_3}, doi = {10.1007/3-540-47870-1\_3}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YoungY01, author = {Adam L. Young and Moti Yung}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Bandwidth-Optimal Kleptographic Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {235--250}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_20}, doi = {10.1007/3-540-44709-1\_20}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/YoungY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiayiasY01, author = {Aggelos Kiayias and Moti Yung}, editor = {Joe Kilian}, title = {Self Protecting Pirates and Black-Box Traitor Tracing}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {63--79}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_4}, doi = {10.1007/3-540-44647-8\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiayiasY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JoyeQY01, author = {Marc Joye and Jean{-}Jacques Quisquater and Moti Yung}, editor = {David Naccache}, title = {On the Power of Misbehaving Adversaries and Security Analysis of the Original {EPOC}}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {208--222}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_16}, doi = {10.1007/3-540-45353-9\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JoyeQY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatzOY01, author = {Jonathan Katz and Rafail Ostrovsky and Moti Yung}, editor = {Birgit Pfitzmann}, title = {Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {475--494}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_29}, doi = {10.1007/3-540-44987-6\_29}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatzOY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GerckNRRY01, author = {Ed Gerck and C. Andrew Neff and Ronald L. Rivest and Aviel D. Rubin and Moti Yung}, editor = {Paul F. Syverson}, title = {The Business of Electronic Voting}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {234--259}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_21}, doi = {10.1007/3-540-46088-8\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GerckNRRY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BuonannoKY01, author = {Enrico Buonanno and Jonathan Katz and Moti Yung}, editor = {Mitsuru Matsui}, title = {Incremental Unforgeable Encryption}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {109--124}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_9}, doi = {10.1007/3-540-45473-X\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BuonannoKY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/KiayiasY01, author = {Aggelos Kiayias and Moti Yung}, editor = {Fernando Orejas and Paul G. Spirakis and Jan van Leeuwen}, title = {Secure Games with Polynomial Expressions}, booktitle = {Automata, Languages and Programming, 28th International Colloquium, {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2076}, pages = {939--950}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-48224-5\_76}, doi = {10.1007/3-540-48224-5\_76}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/KiayiasY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ValdezY01, author = {Enriquillo Valdez and Moti Yung}, editor = {George I. Davida and Yair Frankel}, title = {{DISSECT:} DIStribution for SECurity Tool}, booktitle = {Information Security, 4th International Conference, {ISC} 2001, Malaga, Spain, October 1-3, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2200}, pages = {125--143}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45439-X\_9}, doi = {10.1007/3-540-45439-X\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/ValdezY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FrankelMY01, author = {Yair Frankel and Philip D. MacKenzie and Moti Yung}, editor = {Kwangjo Kim}, title = {Adaptive Security for the Additive-Sharing Based Proactive {RSA}}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {240--263}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_18}, doi = {10.1007/3-540-44586-2\_18}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FrankelMY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Young01, author = {Adam L. Young and Moti Yung}, editor = {Kwangjo Kim}, title = {A {PVSS} as Hard as Discrete Log and Shareholder Separability}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {287--299}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_21}, doi = {10.1007/3-540-44586-2\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Young01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KiayiasY01, author = {Aggelos Kiayias and Moti Yung}, editor = {Serge Vaudenay and Amr M. Youssef}, title = {Polynomial Reconstruction Based Cryptography}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {129--133}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X\_10}, doi = {10.1007/3-540-45537-X\_10}, timestamp = {Tue, 01 Jun 2021 15:22:31 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KiayiasY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzOY01, author = {Jonathan Katz and Rafail Ostrovsky and Moti Yung}, title = {Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2001}, url = {http://eprint.iacr.org/2001/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzOY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzY01, author = {Jonathan Katz and Moti Yung}, title = {Threshold Cryptosystems Based on Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2001}, url = {http://eprint.iacr.org/2001/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/NikoletseasPSY00, author = {Sotiris E. Nikoletseas and Krishna V. Palem and Paul G. Spirakis and Moti Yung}, title = {Connectivity Properties in Random Regular Graphs with Edge Faults}, journal = {Int. J. Found. Comput. Sci.}, volume = {11}, number = {2}, pages = {247--262}, year = {2000}, url = {https://doi.org/10.1142/S0129054100000156}, doi = {10.1142/S0129054100000156}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/NikoletseasPSY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/FranklinGY00, author = {Matthew K. Franklin and Zvi Galil and Moti Yung}, title = {Eavesdropping games: a graph-theoretic approach to privacy in distributed systems}, journal = {J. {ACM}}, volume = {47}, number = {2}, pages = {225--243}, year = {2000}, url = {https://doi.org/10.1145/333979.333980}, doi = {10.1145/333979.333980}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/FranklinGY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/OfekY00, author = {Yoram Ofek and Moti Yung}, title = {Combined Asynchronous/Synchronous Packet Switching Architecture: QoS Guarantees for Integrated Parallel Computing and Real-Time Traffic}, journal = {J. Parallel Distributed Comput.}, volume = {60}, number = {3}, pages = {275--295}, year = {2000}, url = {https://doi.org/10.1006/jpdc.1999.1607}, doi = {10.1006/JPDC.1999.1607}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/OfekY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/KontogiannisPSY00, author = {Spyros C. Kontogiannis and Grammati E. Pantziou and Paul G. Spirakis and Moti Yung}, title = {Robust Parallel Computations through Randomization}, journal = {Theory Comput. Syst.}, volume = {33}, number = {5/6}, pages = {427--464}, year = {2000}, url = {https://doi.org/10.1007/s002240010009}, doi = {10.1007/S002240010009}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mst/KontogiannisPSY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/MayerOY00, author = {Alain J. Mayer and Yoram Ofek and Moti Yung}, title = {Local and congestion-driven fairness algorithm in arbitrary topology networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {8}, number = {3}, pages = {362--372}, year = {2000}, url = {https://doi.org/10.1109/90.851982}, doi = {10.1109/90.851982}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/MayerOY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YoungY00, author = {Adam L. Young and Moti Yung}, editor = {Tatsuaki Okamoto}, title = {Towards Signature-Only Signature Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {97--115}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_9}, doi = {10.1007/3-540-44448-3\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/YoungY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/XuYZ00, author = {Shouhuai Xu and Moti Yung and Gendu Zhang}, editor = {Josep Domingo{-}Ferrer and David Chan and Anthony Watson}, title = {Friendly Observers Ease Off-Line E-Cash}, booktitle = {Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {180}, pages = {3--18}, publisher = {Kluwer}, year = {2000}, timestamp = {Thu, 01 Aug 2002 11:36:41 +0200}, biburl = {https://dblp.org/rec/conf/cardis/XuYZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HastadJJY00, author = {Johan H{\aa}stad and Jakob Jonsson and Ari Juels and Moti Yung}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Funkspiel schemes: an alternative to conventional tamper resistance}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {125--133}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352619}, doi = {10.1145/352600.352619}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HastadJJY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SanderTY00, author = {Tomas Sander and Amnon Ta{-}Shma and Moti Yung}, editor = {Yair Frankel}, title = {Blind, Auditable Membership Proofs}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {53--71}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_5}, doi = {10.1007/3-540-45472-1\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/SanderTY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Yung00, author = {Moti Yung}, editor = {Yair Frankel}, title = {Payment Systems: The Next Generation}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {136--139}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_10}, doi = {10.1007/3-540-45472-1\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Yung00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KatzY00, author = {Jonathan Katz and Moti Yung}, editor = {Bruce Schneier}, title = {Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {284--299}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_20}, doi = {10.1007/3-540-44706-7\_20}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KatzY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YoungY00, author = {Adam L. Young and Moti Yung}, editor = {Dongho Won}, title = {Hash to the Rescue: Space Minimization for {PKI} Directories}, booktitle = {Information Security and Cryptology - {ICISC} 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2015}, pages = {235--245}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45247-8\_19}, doi = {10.1007/3-540-45247-8\_19}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YoungY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrickellPVY00, author = {Ernest F. Brickell and David Pointcheval and Serge Vaudenay and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Design Validations for Discrete Logarithm Based Signature Schemes}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {276--292}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_19}, doi = {10.1007/978-3-540-46588-1\_19}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BrickellPVY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FrankelMY00, author = {Yair Frankel and Philip D. MacKenzie and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {"Psyeudorandom Intermixing": {A} Tool for Shared Cryptography}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {306--325}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_21}, doi = {10.1007/978-3-540-46588-1\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FrankelMY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YoungY00, author = {Adam L. Young and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {RSA-Based Auto-recoverable Cryptosystems}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {326--341}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_22}, doi = {10.1007/978-3-540-46588-1\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YoungY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KatzY00, author = {Jonathan Katz and Moti Yung}, editor = {F. Frances Yao and Eugene M. Luks}, title = {Complete characterization of security notions for probabilistic private-key encryption}, booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, {USA}}, pages = {245--254}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/335305.335335}, doi = {10.1145/335305.335335}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/KatzY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CrescenzoSY00, author = {Giovanni Di Crescenzo and Kouichi Sakurai and Moti Yung}, editor = {F. Frances Yao and Eugene M. Luks}, title = {On zero-knowledge proofs (extended abstract): "from membership to decision"}, booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, {USA}}, pages = {255--264}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/335305.335336}, doi = {10.1145/335305.335336}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CrescenzoSY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YenerOY99, author = {B{\"{u}}lent Yener and Yoram Ofek and Moti Yung}, title = {Convergence routing on disjoint spanning trees}, journal = {Comput. Networks}, volume = {31}, number = {5}, pages = {429--443}, year = {1999}, url = {https://doi.org/10.1016/S0169-7552(98)00259-1}, doi = {10.1016/S0169-7552(98)00259-1}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YenerOY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/OfekY99, author = {Yoram Ofek and Moti Yung}, title = {Access regulation mechanism for switch-based {LAN}}, journal = {Comput. Networks}, volume = {31}, number = {5}, pages = {505--518}, year = {1999}, url = {https://doi.org/10.1016/S0169-7552(98)00291-8}, doi = {10.1016/S0169-7552(98)00291-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/OfekY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FrankelMY99, author = {Yair Frankel and Philip D. MacKenzie and Moti Yung}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Adaptively-Secure Optimal-Resilience Proactive {RSA}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {180--194}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_15}, doi = {10.1007/978-3-540-48000-6\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FrankelMY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MayerY99, author = {Alain J. Mayer and Moti Yung}, editor = {Juzar Motiwalla and Gene Tsudik}, title = {Secure Protocol Transformation via "Expansion": From Two-Party to Groups}, booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and Communications Security, Singapore, November 1-4, 1999}, pages = {83--92}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/319709.319721}, doi = {10.1145/319709.319721}, timestamp = {Tue, 10 Nov 2020 20:00:25 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MayerY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cqre/JakobssonMTY99, author = {Markus Jakobsson and David M'Ra{\"{\i}}hi and Yiannis Tsiounis and Moti Yung}, editor = {Rainer Baumgart}, title = {Electronic Payments: Where Do We Go from Here?}, booktitle = {Secure Networking - {CQRE} (Secure) '99, International Exhibition and Congress D{\"{u}}sseldorf, Germany, November 30 - December 2, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1740}, pages = {43--63}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46701-7\_4}, doi = {10.1007/3-540-46701-7\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cqre/JakobssonMTY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cqre/YoungY99, author = {Adam L. Young and Moti Yung}, editor = {Rainer Baumgart}, title = {Auto-recoverable Auto-certifiable Cryptosystems {(A} Survey)}, booktitle = {Secure Networking - {CQRE} (Secure) '99, International Exhibition and Congress D{\"{u}}sseldorf, Germany, November 30 - December 2, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1740}, pages = {204--218}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46701-7\_18}, doi = {10.1007/3-540-46701-7\_18}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cqre/YoungY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esa/FrankelMY99, author = {Yair Frankel and Philip D. MacKenzie and Moti Yung}, editor = {Jaroslav Nesetril}, title = {Adaptively-Secure Distributed Public-Key Systems}, booktitle = {Algorithms - {ESA} '99, 7th Annual European Symposium, Prague, Czech Republic, July 16-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1643}, pages = {4--27}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48481-7\_2}, doi = {10.1007/3-540-48481-7\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/esa/FrankelMY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FrankelY99, author = {Yair Frankel and Moti Yung}, editor = {Matthew K. Franklin}, title = {Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control"}, booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1648}, pages = {241--252}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48390-X\_18}, doi = {10.1007/3-540-48390-X\_18}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FrankelY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/SanderYY99, author = {Tomas Sander and Adam L. Young and Moti Yung}, title = {Non-Interactive CryptoComputing For NC\({}^{\mbox{1}}\)}, booktitle = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99, 17-18 October, 1999, New York, NY, {USA}}, pages = {554--567}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/SFFCS.1999.814630}, doi = {10.1109/SFFCS.1999.814630}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/SanderYY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JakobssonSY99, author = {Markus Jakobsson and Julien P. Stern and Moti Yung}, editor = {Lars R. Knudsen}, title = {Scramble All, Encrypt Small}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {95--111}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_8}, doi = {10.1007/3-540-48519-8\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/JakobssonSY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MiyazakiSY99, author = {Shingo Miyazaki and Kouichi Sakurai and Moti Yung}, editor = {JooSeok Song}, title = {On Threshold RSA-Signing with no Dealer}, booktitle = {Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1787}, pages = {197--207}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719994\_16}, doi = {10.1007/10719994\_16}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MiyazakiSY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PaillierY99, author = {Pascal Paillier and Moti Yung}, editor = {JooSeok Song}, title = {Self-Escrowed Public-Key Infrastructures}, booktitle = {Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1787}, pages = {257--268}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719994\_20}, doi = {10.1007/10719994\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PaillierY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ValdezY99, author = {Enriquillo Valdez and Moti Yung}, editor = {Andreas Pfitzmann}, title = {Software DisEngineering: Program Hiding Architecture and Experiments}, booktitle = {Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1768}, pages = {379--394}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719724\_26}, doi = {10.1007/10719724\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/ValdezY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/XuYZZ99, author = {Shouhuai Xu and Moti Yung and Gendu Zhang and Hong Zhu}, editor = {Masahiro Mambo and Yuliang Zheng}, title = {Money Conservation via Atomicity in Fair Off-Line E-Cash}, booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, pages = {14--31}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X\_2}, doi = {10.1007/3-540-47790-X\_2}, timestamp = {Thu, 02 Dec 2021 11:46:17 +0100}, biburl = {https://dblp.org/rec/conf/isw/XuYZZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HandschuhTY99, author = {Helena Handschuh and Yiannis Tsiounis and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Decision Oracles are Equivalent to Matching Oracles}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {276--289}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_22}, doi = {10.1007/3-540-49162-7\_22}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HandschuhTY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YoungY99, author = {Adam L. Young and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {306--314}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_24}, doi = {10.1007/3-540-49162-7\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YoungY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/FranklinGY99, author = {Matthew K. Franklin and Juan A. Garay and Moti Yung}, editor = {Prasad Jayanti}, title = {Self-Testing/Correcting Protocols (Extended Abstract)}, booktitle = {Distributed Computing, 13th International Symposium, Bratislava, Slovak Republic, September 27-29, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1693}, pages = {269--283}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48169-9\_19}, doi = {10.1007/3-540-48169-9\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/FranklinGY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BlundoSHKVY98, author = {Carlo Blundo and Alfredo De Santis and Amir Herzberg and Shay Kutten and Ugo Vaccaro and Moti Yung}, title = {Perfectly Secure Key Distribution for Dynamic Conferences}, journal = {Inf. Comput.}, volume = {146}, number = {1}, pages = {1--23}, year = {1998}, url = {https://doi.org/10.1006/inco.1998.2717}, doi = {10.1006/INCO.1998.2717}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/BlundoSHKVY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NaorOVY98, author = {Moni Naor and Rafail Ostrovsky and Ramarathnam Venkatesan and Moti Yung}, title = {Perfect Zero-Knowledge Arguments for \emph{NP} Using Any One-Way Permutation}, journal = {J. Cryptol.}, volume = {11}, number = {2}, pages = {87--108}, year = {1998}, url = {https://doi.org/10.1007/s001459900037}, doi = {10.1007/S001459900037}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NaorOVY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/YoungY98, author = {Adam L. Young and Moti Yung}, editor = {Joe Buhler}, title = {Finding Length-3 Positive Cunningham Chains}, booktitle = {Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1423}, pages = {289--298}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054869}, doi = {10.1007/BFB0054869}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/YoungY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FrankelTY98, author = {Yair Frankel and Yiannis Tsiounis and Moti Yung}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Fair Off-Line e-cash Made Easy}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {257--270}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_21}, doi = {10.1007/3-540-49649-1\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FrankelTY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/FrankelY98, author = {Yair Frankel and Moti Yung}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {How to Say "YES" with Smart Cards}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {203--212}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_18}, doi = {10.1007/10721064\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/FrankelY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/YoungY98, author = {Adam L. Young and Moti Yung}, editor = {Kaisa Nyberg}, title = {Auto-Recoverable Auto-Certifiable Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {17--31}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054114}, doi = {10.1007/BFB0054114}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/YoungY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonY98, author = {Markus Jakobsson and Moti Yung}, editor = {Rafael Hirschfeld}, title = {On Assurance Structures for {WWW} Commerce}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {141--157}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055478}, doi = {10.1007/BFB0055478}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JakobssonY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FrankelKMY98, author = {Yair Frankel and David W. Kravitz and Charles T. Montgomery and Moti Yung}, editor = {Rafael Hirschfeld}, title = {Beyond Identity: Warranty-Based Digital Signature Transactions}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {241--253}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055487}, doi = {10.1007/BFB0055487}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/FrankelKMY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YoungY98, author = {Adam L. Young and Moti Yung}, editor = {Serge Vaudenay}, title = {Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {122--133}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_9}, doi = {10.1007/3-540-69710-1\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/YoungY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/SantisCPY98, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano and Moti Yung}, editor = {Kim Guldstrand Larsen and Sven Skyum and Glynn Winskel}, title = {Image Density is Complete for Non-Interactive-SZK (Extended Abstract)}, booktitle = {Automata, Languages and Programming, 25th International Colloquium, ICALP'98, Aalborg, Denmark, July 13-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1443}, pages = {784--795}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055102}, doi = {10.1007/BFB0055102}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/SantisCPY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/CrescenzoSY98, author = {Giovanni Di Crescenzo and Kouichi Sakurai and Moti Yung}, editor = {Kyung{-}Yong Chwa and Oscar H. Ibarra}, title = {Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it}, booktitle = {Algorithms and Computation, 9th International Symposium, {ISAAC} '98, Taejon, Korea, December 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1533}, pages = {59--68}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49381-6\_8}, doi = {10.1007/3-540-49381-6\_8}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/CrescenzoSY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FrankelY98, author = {Yair Frankel and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Distributed Public Key Cryptosystems}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {1--13}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054010}, doi = {10.1007/BFB0054010}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FrankelY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Okamoto98, author = {Tatsuaki Okamoto and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Lower Bounds on Term-Based Divisible Cash Systems}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {72--82}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054016}, doi = {10.1007/BFB0054016}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Okamoto98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TsiounisY98, author = {Yiannis Tsiounis and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {On the Security of ElGamal Based Encryption}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {117--134}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054019}, doi = {10.1007/BFB0054019}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TsiounisY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/FrankelMY98, author = {Yair Frankel and Philip D. MacKenzie and Moti Yung}, editor = {Brian A. Coan and Yehuda Afek}, title = {Robust Efficient Distributed RSA-Key Generation}, booktitle = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June 28 - July 2, 1998}, pages = {320}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/277697.277779}, doi = {10.1145/277697.277779}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/FrankelMY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaa/KontogiannisPSY98, author = {Spyros C. Kontogiannis and Grammati E. Pantziou and Paul G. Spirakis and Moti Yung}, editor = {Gary L. Miller and Phillip B. Gibbons}, title = {"Dynamic-Fault-Prone BSP": {A} Paradigm for Robust Computations in Changing Environments}, booktitle = {Proceedings of the Tenth Annual {ACM} Symposium on Parallel Algorithms and Architectures, {SPAA} '98, Puerto Vallarta, Mexico, June 28 - July 2, 1998}, pages = {37--46}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/277651.277666}, doi = {10.1145/277651.277666}, timestamp = {Wed, 21 Nov 2018 12:27:44 +0100}, biburl = {https://dblp.org/rec/conf/spaa/KontogiannisPSY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/CrescenzoSY98, author = {Giovanni Di Crescenzo and Kouichi Sakurai and Moti Yung}, editor = {Michel Morvan and Christoph Meinel and Daniel Krob}, title = {Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols}, booktitle = {{STACS} 98, 15th Annual Symposium on Theoretical Aspects of Computer Science, Paris, France, February 25-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1373}, pages = {511--521}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0028586}, doi = {10.1007/BFB0028586}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/stacs/CrescenzoSY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FrankelMY98, author = {Yair Frankel and Philip D. MacKenzie and Moti Yung}, editor = {Jeffrey Scott Vitter}, title = {Robust Efficient Distributed RSA-Key Generation}, booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory of Computing, Dallas, Texas, USA, May 23-26, 1998}, pages = {663--672}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/276698.276882}, doi = {10.1145/276698.276882}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FrankelMY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uwec/BellareGJY98, author = {Mihir Bellare and Juan A. Garay and Charanjit S. Jutla and Moti Yung}, editor = {Bennet S. Yee}, title = {VarietyCash: {A} Multi-Purpose Electronic Payment System}, booktitle = {Proceedings of the 3rd {USENIX} Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31 - September 3, 1998}, publisher = {{USENIX} Association}, year = {1998}, url = {https://www.usenix.org/conference/3rd-usenix-workshop-electronic-commerce/varietycash-multi-purpose-electronic-payment}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/uwec/BellareGJY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/GarayGKMY97, author = {Juan A. Garay and Inder S. Gopal and Shay Kutten and Yishay Mansour and Moti Yung}, title = {Efficient On-Line Call Control Algorithms}, journal = {J. Algorithms}, volume = {23}, number = {1}, pages = {180--194}, year = {1997}, url = {https://doi.org/10.1006/jagm.1996.0821}, doi = {10.1006/JAGM.1996.0821}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/GarayGKMY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/YenerBOY97, author = {B{\"{u}}lent Yener and Inderpal S. Bhandari and Yoram Ofek and Moti Yung}, title = {Fault-Tolerant Convergence Routing}, journal = {J. Parallel Distributed Comput.}, volume = {42}, number = {2}, pages = {173--183}, year = {1997}, url = {https://doi.org/10.1006/jpdc.1997.1320}, doi = {10.1006/JPDC.1997.1320}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/YenerBOY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/OfekYY97, author = {Yoram Ofek and B{\"{u}}lent Yener and Moti Yung}, title = {Concurrent Asynchronous Broadcast on the MetaNet}, journal = {{IEEE} Trans. Computers}, volume = {46}, number = {7}, pages = {737--748}, year = {1997}, url = {https://doi.org/10.1109/12.599894}, doi = {10.1109/12.599894}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/OfekYY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/YuY97, author = {Xiangdong Yu and Moti Yung}, title = {Scheduling Task-Trees with Additive Scales on Parallel/Distributed Machines}, journal = {Theor. Comput. Sci.}, volume = {181}, number = {2}, pages = {357--378}, year = {1997}, url = {https://doi.org/10.1016/S0304-3975(96)00280-0}, doi = {10.1016/S0304-3975(96)00280-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/YuY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AfekKY97, author = {Yehuda Afek and Shay Kutten and Moti Yung}, title = {The Local Detection Paradigm and Its Application to Self-Stabilization}, journal = {Theor. Comput. Sci.}, volume = {186}, number = {1-2}, pages = {199--229}, year = {1997}, url = {https://doi.org/10.1016/S0304-3975(96)00286-1}, doi = {10.1016/S0304-3975(96)00286-1}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AfekKY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/YenerOY97, author = {B{\"{u}}lent Yener and Yoram Ofek and Moti Yung}, title = {Combinatorial design of congestion-free networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {5}, number = {6}, pages = {989--1000}, year = {1997}, url = {https://doi.org/10.1109/90.650156}, doi = {10.1109/90.650156}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/YenerOY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HerzbergJJKY97, author = {Amir Herzberg and Markus Jakobsson and Stanislaw Jarecki and Hugo Krawczyk and Moti Yung}, editor = {Richard Graveman and Philippe A. Janson and Clifford Neuman and Li Gong}, title = {Proactive Public Key and Signature Systems}, booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997}, pages = {100--110}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266420.266442}, doi = {10.1145/266420.266442}, timestamp = {Tue, 10 Nov 2020 20:00:22 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HerzbergJJKY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CrescenzoOY97, author = {Giovanni Di Crescenzo and Tatsuaki Okamoto and Moti Yung}, editor = {Burton S. Kaliski Jr.}, title = {Keeping the SZK-Verifier Honest Unconditionally}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {31--45}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052226}, doi = {10.1007/BFB0052226}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CrescenzoOY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YoungY97, author = {Adam L. Young and Moti Yung}, editor = {Burton S. Kaliski Jr.}, title = {The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {264--276}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052241}, doi = {10.1007/BFB0052241}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/YoungY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FrankelGMY97, author = {Yair Frankel and Peter Gemmell and Philip D. MacKenzie and Moti Yung}, editor = {Burton S. Kaliski Jr.}, title = {Proactive {RSA}}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {440--454}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052254}, doi = {10.1007/BFB0052254}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FrankelGMY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/YoungY97, author = {Adam L. Young and Moti Yung}, editor = {Walter Fumy}, title = {Kleptography: Using Cryptography Against Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {62--74}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_6}, doi = {10.1007/3-540-69053-0\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/YoungY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareJY97, author = {Mihir Bellare and Markus Jakobsson and Moti Yung}, editor = {Walter Fumy}, title = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {280--305}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_20}, doi = {10.1007/3-540-69053-0\_20}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareJY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JakobssonY97, author = {Markus Jakobsson and Moti Yung}, editor = {Walter Fumy}, title = {Distributed "Magic Ink" Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {450--464}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_31}, doi = {10.1007/3-540-69053-0\_31}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JakobssonY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DavidaFTY97, author = {George I. Davida and Yair Frankel and Yiannis Tsiounis and Moti Yung}, editor = {Rafael Hirschfeld}, title = {Anonymity Control in E-Cash Systems}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {1--16}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63594-7\_63}, doi = {10.1007/3-540-63594-7\_63}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DavidaFTY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonY97, author = {Markus Jakobsson and Moti Yung}, editor = {Rafael Hirschfeld}, title = {Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {217--238}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63594-7\_80}, doi = {10.1007/3-540-63594-7\_80}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/JakobssonY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/FrankelGMY97, author = {Yair Frankel and Peter Gemmell and Philip D. MacKenzie and Moti Yung}, title = {Optimal Resilience Proactive Public-Key Cryptosystems}, booktitle = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97, Miami Beach, Florida, USA, October 19-22, 1997}, pages = {384--393}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SFCS.1997.646127}, doi = {10.1109/SFCS.1997.646127}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/FrankelGMY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YoungY97, author = {Adam L. Young and Moti Yung}, editor = {Eli Biham}, title = {Sliding Encryption: {A} Cryptographic Tool for Mobile Agents}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {230--241}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052350}, doi = {10.1007/BFB0052350}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/YoungY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FrankelY97, author = {Yair Frankel and Moti Yung}, editor = {Pierpaolo Degano and Roberto Gorrieri and Alberto Marchetti{-}Spaccamela}, title = {On Characterization of Escrow Encryption Schemes}, booktitle = {Automata, Languages and Programming, 24th International Colloquium, ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1256}, pages = {705--715}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63165-8\_224}, doi = {10.1007/3-540-63165-8\_224}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FrankelY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CrescenzoSY97, author = {Giovanni Di Crescenzo and Kouichi Sakurai and Moti Yung}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Zero-knowledge proofs of decision power: new protocols and optimal round-complexity}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {17--27}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028458}, doi = {10.1007/BFB0028458}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/CrescenzoSY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JansonTY97, author = {Philippe A. Janson and Gene Tsudik and Moti Yung}, title = {Scalability and Flexibility in Authentication Services: The KryptoKnight Approach}, booktitle = {Proceedings {IEEE} {INFOCOM} '97, The Conference on Computer Communications, Sixteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Driving the Information Revolution, Kobe, Japan, April 7-12, 1997}, pages = {725--736}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/INFCOM.1997.644526}, doi = {10.1109/INFCOM.1997.644526}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JansonTY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sequences/MayerY97, author = {Andrew Mayer and Moti Yung}, editor = {Bruno Carpentieri and Alfredo De Santis and Ugo Vaccaro and James A. Storer}, title = {Generalized secret sharing and group-key distribution using short keys}, booktitle = {Compression and Complexity of {SEQUENCES} 1997, Positano, Amalfitan Coast, Salerno, Italy, June 11-13, 1997, Proceedings}, pages = {30--44}, publisher = {{IEEE}}, year = {1997}, url = {https://doi.org/10.1109/SEQUEN.1997.666901}, doi = {10.1109/SEQUEN.1997.666901}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/sequences/MayerY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YoungY97, author = {Adam L. Young and Moti Yung}, title = {Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage}, booktitle = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, {USA}}, pages = {224--235}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SECPRI.1997.601339}, doi = {10.1109/SECPRI.1997.601339}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/YoungY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareJY97, author = {Mihir Bellare and Markus Jakobsson and Moti Yung}, title = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {1997}, url = {http://eprint.iacr.org/1997/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareJY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BellareY96, author = {Mihir Bellare and Moti Yung}, title = {Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation}, journal = {J. Cryptol.}, volume = {9}, number = {3}, pages = {149--166}, year = {1996}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BellareY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FrankelTY96, author = {Yair Frankel and Yiannis Tsiounis and Moti Yung}, editor = {Kwangjo Kim and Tsutomu Matsumoto}, title = {"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash}, booktitle = {Advances in Cryptology - {ASIACRYPT} '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1163}, pages = {286--300}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034855}, doi = {10.1007/BFB0034855}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FrankelTY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JakobssonY96, author = {Markus Jakobsson and Moti Yung}, editor = {Li Gong and Jacques Stearn}, title = {Revokable and Versatile Electronic Money (extended abstract)}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {76--87}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238191}, doi = {10.1145/238168.238191}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JakobssonY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/ShanbhogueY96, author = {Vasant Shanbhogue and Moti Yung}, editor = {Jin{-}yi Cai and C. K. Wong}, title = {Distributed Computing in Asynchronous Networks with Byzantine Edges}, booktitle = {Computing and Combinatorics, Second Annual International Conference, {COCOON} '96, Hong Kong, June 17-19, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1090}, pages = {352--360}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61332-3\_169}, doi = {10.1007/3-540-61332-3\_169}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/ShanbhogueY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YoungY96, author = {Adam L. Young and Moti Yung}, editor = {Neal Koblitz}, title = {The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {89--103}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_8}, doi = {10.1007/3-540-68697-5\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YoungY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JakobssonY96, author = {Markus Jakobsson and Moti Yung}, editor = {Neal Koblitz}, title = {Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {186--200}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_15}, doi = {10.1007/3-540-68697-5\_15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/JakobssonY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerFSY96, author = {Ronald Cramer and Matthew K. Franklin and Berry Schoenmakers and Moti Yung}, editor = {Ueli M. Maurer}, title = {Multi-Autority Secret-Ballot Elections with Linear Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {72--83}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_7}, doi = {10.1007/3-540-68339-9\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerFSY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/YuY96, author = {Xiangdong Yu and Moti Yung}, editor = {Friedhelm Meyer auf der Heide and Burkhard Monien}, title = {Agent Rendezvous: {A} Dynamic Symmetry-Breaking Problem}, booktitle = {Automata, Languages and Programming, 23rd International Colloquium, ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1099}, pages = {610--621}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61440-0\_163}, doi = {10.1007/3-540-61440-0\_163}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/YuY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BurmesterDISSY96, author = {Mike Burmester and Yvo Desmedt and Toshiya Itoh and Kouichi Sakurai and Hiroki Shizuya and Moti Yung}, editor = {Ross J. Anderson}, title = {A Progress Report on Subliminal-Free Channels}, booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1174}, pages = {157--168}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61996-8\_39}, doi = {10.1007/3-540-61996-8\_39}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/BurmesterDISSY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiOY96, author = {Chung{-}Sheng Li and Yoram Ofek and Moti Yung}, title = {"Time-Driven Priority" Flow Control for Real-Time Heterogeneous Internetworking}, booktitle = {Proceedings {IEEE} {INFOCOM} '96, The Conference on Computer Communications, Fifteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Networking the Next Generation, San Francisco, CA, USA, March 24-28, 1996}, pages = {189--197}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/INFCOM.1996.497893}, doi = {10.1109/INFCOM.1996.497893}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiOY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/MayerOY96, author = {Alain J. Mayer and Yoram Ofek and Moti Yung}, title = {Approximating Max-Min Fair Rates via Distributed Local Scheduling with Partial Information}, booktitle = {Proceedings {IEEE} {INFOCOM} '96, The Conference on Computer Communications, Fifteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Networking the Next Generation, San Francisco, CA, USA, March 24-28, 1996}, pages = {928--936}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/INFCOM.1996.493393}, doi = {10.1109/INFCOM.1996.493393}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/MayerOY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/FrankelGY96, author = {Yair Frankel and Peter Gemmell and Moti Yung}, editor = {James E. Burns and Yoram Moses}, title = {Witness-Based Cryptographic Program Checking and Applications (an Announcement)}, booktitle = {Proceedings of the Fifteenth Annual {ACM} Symposium on Principles of Distributed Computing, Philadelphia, Pennsylvania, USA, May 23-26, 1996}, pages = {211}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/248052.248094}, doi = {10.1145/248052.248094}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/FrankelGY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/MayerOY96, author = {Alain J. Mayer and Rafail Ostrovsky and Moti Yung}, editor = {{\'{E}}va Tardos}, title = {Self-Stabilizing Algorithms for Synchronous Unidirectional Rings}, booktitle = {Proceedings of the Seventh Annual {ACM-SIAM} Symposium on Discrete Algorithms, 28-30 January 1996, Atlanta, Georgia, {USA}}, pages = {564--573}, publisher = {{ACM/SIAM}}, year = {1996}, url = {http://dl.acm.org/citation.cfm?id=313852.314120}, timestamp = {Thu, 05 Jul 2018 07:29:31 +0200}, biburl = {https://dblp.org/rec/conf/soda/MayerOY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YoungY96, author = {Adam L. Young and Moti Yung}, title = {Cryptovirology: Extortion-Based Security Threats and Countermeasures}, booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, pages = {129--140}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SECPRI.1996.502676}, doi = {10.1109/SECPRI.1996.502676}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/YoungY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FrankelGY96, author = {Yair Frankel and Peter Gemmell and Moti Yung}, editor = {Gary L. Miller}, title = {Witness-Based Cryptographic Program Checking and Robust Function Sharing}, booktitle = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996}, pages = {499--508}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/237814.237998}, doi = {10.1145/237814.237998}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FrankelGY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrankelGMY96, author = {Yair Frankel and Peter Gemmell and Philip D. MacKenzie and Moti Yung}, title = {Proactive {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {1996}, url = {http://eprint.iacr.org/1996/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrankelGMY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/BirdGHJKMY95, author = {Ray Bird and Inder S. Gopal and Amir Herzberg and Philippe A. Janson and Shay Kutten and Refik Molva and Moti Yung}, title = {The KryptoKnight family of light-weight protocols for authentication and key distribution}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {3}, number = {1}, pages = {31--41}, year = {1995}, url = {https://doi.org/10.1109/90.365435}, doi = {10.1109/90.365435}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/BirdGHJKMY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/OfekY95, author = {Yoram Ofek and Moti Yung}, title = {{METANET} principles of an arbitrary topology {LAN}}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {3}, number = {2}, pages = {169--180}, year = {1995}, url = {https://doi.org/10.1109/90.374118}, doi = {10.1109/90.374118}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/OfekY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/FrankelHKKKY95, author = {Yair Frankel and Amir Herzberg and Paul A. Karger and Hugo Krawczyk and Charles A. Kunzinger and Mordechai M. Yung}, title = {Security issues in a {CDPD} wireless network}, journal = {{IEEE} Wirel. Commun.}, volume = {2}, number = {4}, pages = {16--27}, year = {1995}, url = {https://doi.org/10.1109/98.403454}, doi = {10.1109/98.403454}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/FrankelHKKKY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/YuY95, author = {Xiangdong Yu and Moti Yung}, editor = {Ding{-}Zhu Du and Ming Li}, title = {Scheduling Task-Tree with Additive Scales on Parallel / Distributed Machines}, booktitle = {Computing and Combinatorics, First Annual International Conference, {COCOON} '95, Xi'an, China, August 24-26, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {959}, pages = {607--616}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0030883}, doi = {10.1007/BFB0030883}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/YuY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FrankelY95, author = {Yair Frankel and Moti Yung}, editor = {Don Coppersmith}, title = {Escrow Encryption Systems Visited: Attacks, Analysis and Designs}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {222--235}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_18}, doi = {10.1007/3-540-44750-4\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FrankelY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FrankelY95a, author = {Yair Frankel and Moti Yung}, editor = {Don Coppersmith}, title = {Cryptanalysis of the Immunized {LL} Public Key Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {287--296}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_23}, doi = {10.1007/3-540-44750-4\_23}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FrankelY95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HerzbergJKY95, author = {Amir Herzberg and Stanislaw Jarecki and Hugo Krawczyk and Moti Yung}, editor = {Don Coppersmith}, title = {Proactive Secret Sharing Or: How to Cope With Perpetual Leakage}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {339--352}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_27}, doi = {10.1007/3-540-44750-4\_27}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HerzbergJKY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esa/AlonGY95, author = {Noga Alon and Zvi Galil and Moti Yung}, editor = {Paul G. Spirakis}, title = {Efficient Dynamic-Resharing "Verifiable Secret Sharing" Against Mobile Adversary}, booktitle = {Algorithms - {ESA} '95, Third Annual European Symposium, Corfu, Greece, September 25-27, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {979}, pages = {523--537}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60313-1\_168}, doi = {10.1007/3-540-60313-1\_168}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/esa/AlonGY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GalilMY95, author = {Zvi Galil and Alain J. Mayer and Moti Yung}, title = {Resolving Message Complexity of Byzantine Agreement and beyond}, booktitle = {36th Annual Symposium on Foundations of Computer Science, Milwaukee, Wisconsin, USA, 23-25 October 1995}, pages = {724--733}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/SFCS.1995.492674}, doi = {10.1109/SFCS.1995.492674}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GalilMY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/NikoletseasRSY95, author = {Sotiris E. Nikoletseas and John H. Reif and Paul G. Spirakis and Moti Yung}, editor = {Zolt{\'{a}}n F{\"{u}}l{\"{o}}p and Ferenc G{\'{e}}cseg}, title = {Stochastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time}, booktitle = {Automata, Languages and Programming, 22nd International Colloquium, ICALP95, Szeged, Hungary, July 10-14, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {944}, pages = {159--170}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60084-1\_71}, doi = {10.1007/3-540-60084-1\_71}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/NikoletseasRSY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/YenerOY95, author = {B{\"{u}}lent Yener and Yoram Ofek and Moti Yung}, title = {Topological Design of Loss-Free Switch-Based LANs}, booktitle = {Proceedings {IEEE} {INFOCOM} '95, The Conference on Computer Communications, Fourteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Bringing Information to People, Boston, Massachusetts, USA, April 2-6, 1995}, pages = {88--96}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/INFCOM.1995.515864}, doi = {10.1109/INFCOM.1995.515864}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/YenerOY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/MayerOY95, author = {Alain J. Mayer and Yoram Ofek and Moti Yung}, title = {Local Fairness in General-Topology Networks with Convergence Routing}, booktitle = {Proceedings {IEEE} {INFOCOM} '95, The Conference on Computer Communications, Fourteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Bringing Information to People, Boston, Massachusetts, USA, April 2-6, 1995}, pages = {891--899}, publisher = {{IEEE} Computer Society}, year = {1995}, timestamp = {Mon, 26 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/MayerOY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FranklinY95, author = {Matthew K. Franklin and Moti Yung}, editor = {Frank Thomson Leighton and Allan Borodin}, title = {Secure hypergraphs: privacy from partial broadcast (Extended Abstract)}, booktitle = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}}, pages = {36--44}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/225058.225077}, doi = {10.1145/225058.225077}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FranklinY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/OfekY94, author = {Yoram Ofek and Moti Yung}, title = {Routing and Flow Control on the MetaNet: An Overview}, journal = {Comput. Networks {ISDN} Syst.}, volume = {26}, number = {6-8}, pages = {859--872}, year = {1994}, url = {https://doi.org/10.1016/0169-7552(94)90050-7}, doi = {10.1016/0169-7552(94)90050-7}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/OfekY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/YuY94, author = {Xiangdong Yu and Moti Yung}, title = {Space Lower-Bounds for Pseudorandom-Generators}, booktitle = {Proceedings of the Ninth Annual Structure in Complexity Theory Conference, Amsterdam, The Netherlands, June 28 - July 1, 1994}, pages = {186--197}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/SCT.1994.315805}, doi = {10.1109/SCT.1994.315805}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/YuY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esa/ParlatiY94, author = {Giuseppe Parlati and Moti Yung}, editor = {Jan van Leeuwen}, title = {Non-Exploratory Self-Stabilization for Constant-Space Symmetry-Breaking}, booktitle = {Algorithms - {ESA} '94, Second Annual European Symposium, Utrecht, The Netherlands, September 26-28, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {855}, pages = {183--201}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0049408}, doi = {10.1007/BFB0049408}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/esa/ParlatiY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FranklinY94, author = {Matthew K. Franklin and Moti Yung}, editor = {Alfredo De Santis}, title = {The Blinding of Weak Signatures (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {67--76}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053425}, doi = {10.1007/BFB0053425}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FranklinY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/SantisCPY94, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano and Moti Yung}, title = {On Monotone Formula Closure of {SZK}}, booktitle = {35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994}, pages = {454--465}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/SFCS.1994.365745}, doi = {10.1109/SFCS.1994.365745}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/SantisCPY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/NikolestseasPSY94, author = {Sotiris E. Nikoletseas and Krishna V. Palem and Paul G. Spirakis and Moti Yung}, editor = {Serge Abiteboul and Eli Shamir}, title = {Short Vertex Disjoint Paths and Multiconnectivity in Random Graphs: Reliable Network Computing}, booktitle = {Automata, Languages and Programming, 21st International Colloquium, ICALP94, Jerusalem, Israel, July 11-14, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {820}, pages = {508--519}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58201-0\_94}, doi = {10.1007/3-540-58201-0\_94}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/NikolestseasPSY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/YenerBOY94, author = {B{\"{u}}lent Yener and Inderpal S. Bhandari and Yoram Ofek and Moti Yung}, title = {Fault-tolerant convergence routing}, booktitle = {1994 International Conference on Network Protocols, {ICNP} 1994, Boston, MA, USA, October 25-28, 1994, Proceedings}, pages = {229--238}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/ICNP.1994.344356}, doi = {10.1109/ICNP.1994.344356}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/YenerBOY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/OfekY94, author = {Yoram Ofek and Moti Yung}, title = {The Integrated MetaNet Architecture: {A} Switch-Based Multimedia {LAN} for Parallel Computing and Real-Time Traffic}, booktitle = {Proceedings {IEEE} {INFOCOM} '94, The Conference on Computer Communications, Thirteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Networking for Global Communications, Toronto, Ontario, Canada, June 12-16, 1994}, pages = {802--811}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/INFCOM.1994.337658}, doi = {10.1109/INFCOM.1994.337658}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/OfekY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/PriscoMY94, author = {Roberto De Prisco and Alain J. Mayer and Moti Yung}, editor = {James H. Anderson and David Peleg and Elizabeth Borowsky}, title = {Time-Optimal Message-Efficient Work Performance in the Presence of Faults (Extended Summary)}, booktitle = {Proceedings of the Thirteenth Annual {ACM} Symposium on Principles of Distributed Computing, Los Angeles, California, USA, August 14-17, 1994}, pages = {161--172}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/197917.198082}, doi = {10.1145/197917.198082}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/PriscoMY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/AielloVY94, author = {William Aiello and Ramarathnam Venkatesan and Moti Yung}, editor = {James H. Anderson and David Peleg and Elizabeth Borowsky}, title = {Coins, Weights and Contention in Balancing Networks}, booktitle = {Proceedings of the Thirteenth Annual {ACM} Symposium on Principles of Distributed Computing, Los Angeles, California, USA, August 14-17, 1994}, pages = {193--205}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/197917.198090}, doi = {10.1145/197917.198090}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/AielloVY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/SantisDFY94, author = {Alfredo De Santis and Yvo Desmedt and Yair Frankel and Moti Yung}, editor = {Frank Thomson Leighton and Michael T. Goodrich}, title = {How to share a function securely}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {522--533}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/195058.195405}, doi = {10.1145/195058.195405}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/SantisDFY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/Yung94, author = {Moti Yung}, editor = {Gerard Tel and Paul M. B. Vit{\'{a}}nyi}, title = {Secure Distributed Computing: Theory and Practice}, booktitle = {Distributed Algorithms, 8th International Workshop, {WDAG} '94, Terschelling, The Netherlands, September 29 - October 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {857}, pages = {53--73}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0020424}, doi = {10.1007/BFB0020424}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/Yung94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/DolevDWY93, author = {Danny Dolev and Cynthia Dwork and Orli Waarts and Moti Yung}, title = {Perfectly Secure Message Transmission}, journal = {J. {ACM}}, volume = {40}, number = {1}, pages = {17--47}, year = {1993}, url = {https://doi.org/10.1145/138027.138036}, doi = {10.1145/138027.138036}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/DolevDWY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/EppsteinITTWY93, author = {David Eppstein and Giuseppe F. Italiano and Roberto Tamassia and Robert Endre Tarjan and Jeffery R. Westbrook and Moti Yung}, title = {Corrigendum: Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph}, journal = {J. Algorithms}, volume = {15}, number = {1}, pages = {173}, year = {1993}, timestamp = {Mon, 08 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/EppsteinITTWY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/BirdGHJKMY93, author = {Ray Bird and Inder S. Gopal and Amir Herzberg and Philippe A. Janson and Shay Kutten and Refik Molva and Moti Yung}, title = {Systematic Design of a Family of Attack-Resistant Authentication Protocols}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {11}, number = {5}, pages = {679--693}, year = {1993}, url = {https://doi.org/10.1109/49.223869}, doi = {10.1109/49.223869}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/BirdGHJKMY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OstrovskyVY93, author = {Rafail Ostrovsky and Ramarathnam Venkatesan and Moti Yung}, editor = {Tor Helleseth}, title = {Interactive Hashing Simplifies Zero-Knowledge Protocol Design}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {267--273}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_23}, doi = {10.1007/3-540-48285-7\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OstrovskyVY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/FranklinGY93, author = {Matthew K. Franklin and Zvi Galil and Moti Yung}, title = {Eavesdropping Games: {A} Graph-Theoretic Approach to Privacy in Distributed Systems}, booktitle = {34th Annual Symposium on Foundations of Computer Science, Palo Alto, California, USA, 3-5 November 1993}, pages = {670--679}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/SFCS.1993.366820}, doi = {10.1109/SFCS.1993.366820}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/FranklinGY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FranklinY93, author = {Matthew K. Franklin and Moti Yung}, editor = {Andrzej Lingas and Rolf G. Karlsson and Svante Carlsson}, title = {Secure and Efficient Off-Line Digital Money (Extended Abstract)}, booktitle = {Automata, Languages and Programming, 20nd International Colloquium, ICALP93, Lund, Sweden, July 5-9, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {700}, pages = {265--276}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-56939-1\_78}, doi = {10.1007/3-540-56939-1\_78}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FranklinY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/GarayGKMY93, author = {Juan A. Garay and Inder S. Gopal and Shay Kutten and Yishay Mansour and Moti Yung}, title = {Efficient On-Line Call Control Algorithms}, booktitle = {Second Israel Symposium on Theory of Computing Systems, {ISTCS} 1993, Natanya, Israel, June 7-9, 1993, Proceedings}, pages = {285--293}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/ISTCS.1993.253460}, doi = {10.1109/ISTCS.1993.253460}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/istcs/GarayGKMY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/YenerOY93, author = {B{\"{u}}lent Yener and Yoram Ofek and Moti Yung}, title = {Configuration and performance issues in the MetaNet design}, booktitle = {18th Conference on Local Computer Networks, September 19-22, 1993, Minneapolis, Minnesota, USA, Proceedings}, pages = {291--299}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/LCN.1993.591236}, doi = {10.1109/LCN.1993.591236}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/YenerOY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HanssonMY92, author = {Othar Hansson and Andrew Mayer and Moti Yung}, title = {Criticizing solutions to relaxed models yields powerful admissible heuristics}, journal = {Inf. Sci.}, volume = {63}, number = {3}, pages = {207--227}, year = {1992}, url = {https://doi.org/10.1016/0020-0255(92)90070-O}, doi = {10.1016/0020-0255(92)90070-O}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HanssonMY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/EppsteinITTWY92, author = {David Eppstein and Giuseppe F. Italiano and Roberto Tamassia and Robert Endre Tarjan and Jeffery R. Westbrook and Moti Yung}, title = {Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph}, journal = {J. Algorithms}, volume = {13}, number = {1}, pages = {33--54}, year = {1992}, url = {https://doi.org/10.1016/0196-6774(92)90004-V}, doi = {10.1016/0196-6774(92)90004-V}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/EppsteinITTWY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorOVY92, author = {Moni Naor and Rafail Ostrovsky and Ramarathnam Venkatesan and Moti Yung}, editor = {Ernest F. Brickell}, title = {Perfect Zero-Knowledge Arguments for {NP} Can Be Based on General Complexity Assumptions (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {196--214}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_14}, doi = {10.1007/3-540-48071-4\_14}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorOVY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareY92, author = {Mihir Bellare and Moti Yung}, editor = {Ernest F. Brickell}, title = {Certifying Cryptographic Tools: The Case of Trapdoor Permutations}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {442--460}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_31}, doi = {10.1007/3-540-48071-4\_31}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlundoSHKVY92, author = {Carlo Blundo and Alfredo De Santis and Amir Herzberg and Shay Kutten and Ugo Vaccaro and Moti Yung}, editor = {Ernest F. Brickell}, title = {Perfectly-Secure Key Distribution for Dynamic Conferences}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {471--486}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_33}, doi = {10.1007/3-540-48071-4\_33}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlundoSHKVY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/SantisPY92, author = {Alfredo De Santis and Giuseppe Persiano and Moti Yung}, editor = {Werner Kuich}, title = {One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier}, booktitle = {Automata, Languages and Programming, 19th International Colloquium, ICALP92, Vienna, Austria, July 13-17, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {623}, pages = {28--40}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55719-9\_61}, doi = {10.1007/3-540-55719-9\_61}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/SantisPY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/DesmedtFY92, author = {Yvo Desmedt and Yair Frankel and Moti Yung}, title = {Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback}, booktitle = {Proceedings {IEEE} {INFOCOM} '92, The Conference on Computer Communications, Eleventh Annual Joint Conference of the {IEEE} Computer and Communications Societies, One World through Communications, Florence, Italy, May 4-8, 1992}, pages = {2045--2054}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/INFCOM.1992.263476}, doi = {10.1109/INFCOM.1992.263476}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/DesmedtFY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/OstrovskyVY92, author = {Rafail Ostrovsky and Ramarathnam Venkatesan and Moti Yung}, editor = {Alain Finkel and Matthias Jantzen}, title = {Secure Commitment Against {A} Powerful Adversary}, booktitle = {{STACS} 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, France, February 13-15, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {577}, pages = {439--448}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55210-3\_203}, doi = {10.1007/3-540-55210-3\_203}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/stacs/OstrovskyVY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/MayerOOY92, author = {Alain J. Mayer and Yoram Ofek and Rafail Ostrovsky and Moti Yung}, editor = {S. Rao Kosaraju and Mike Fellows and Avi Wigderson and John A. Ellis}, title = {Self-Stabilizing Symmetry Breaking in Constant-Space (Extended Abstract)}, booktitle = {Proceedings of the 24th Annual {ACM} Symposium on Theory of Computing, May 4-6, 1992, Victoria, British Columbia, Canada}, pages = {667--678}, publisher = {{ACM}}, year = {1992}, url = {https://doi.org/10.1145/129712.129777}, doi = {10.1145/129712.129777}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/MayerOOY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FranklinY92, author = {Matthew K. Franklin and Moti Yung}, editor = {S. Rao Kosaraju and Mike Fellows and Avi Wigderson and John A. Ellis}, title = {Communication Complexity of Secure Computation (Extended Abstract)}, booktitle = {Proceedings of the 24th Annual {ACM} Symposium on Theory of Computing, May 4-6, 1992, Victoria, British Columbia, Canada}, pages = {699--710}, publisher = {{ACM}}, year = {1992}, url = {https://doi.org/10.1145/129712.129780}, doi = {10.1145/129712.129780}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FranklinY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BrassardCY91, author = {Gilles Brassard and Claude Cr{\'{e}}peau and Moti Yung}, title = {Constant-Round Perfect Zero-Knowledge Computationally Convincing Protocols}, journal = {Theor. Comput. Sci.}, volume = {84}, number = {1}, pages = {23--52}, year = {1991}, url = {https://doi.org/10.1016/0304-3975(91)90259-5}, doi = {10.1016/0304-3975(91)90259-5}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BrassardCY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BirdGHJKMY91, author = {Ray Bird and Inder S. Gopal and Amir Herzberg and Philippe A. Janson and Shay Kutten and Refik Molva and Moti Yung}, editor = {Joan Feigenbaum}, title = {Systematic Design of Two-Party Authentication Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {44--61}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_3}, doi = {10.1007/3-540-46766-1\_3}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BirdGHJKMY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DesmedtY91, author = {Yvo Desmedt and Moti Yung}, editor = {Donald W. Davies}, title = {Weakness of Undeniable Signature Schemes (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {205--220}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_19}, doi = {10.1007/3-540-46416-6\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DesmedtY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/OfekY91, author = {Yoram Ofek and Moti Yung}, title = {Lossless Asynchronous Broadcast-with-Feedback on the MetaNet Architecture}, booktitle = {Proceedings {IEEE} {INFOCOM} '91, The Conference on Computer Communications, Tenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Networking in the 90s, Bal Harbour, Florida, USA, April 7-11, 1991}, pages = {1050--1063}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/INFCOM.1991.147620}, doi = {10.1109/INFCOM.1991.147620}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/OfekY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/OstrovskyY91, author = {Rafail Ostrovsky and Moti Yung}, editor = {Luigi Logrippo}, title = {How to Withstand Mobile Virus Attacks (Extended Abstract)}, booktitle = {Proceedings of the Tenth Annual {ACM} Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, August 19-21, 1991}, pages = {51--59}, publisher = {{ACM}}, year = {1991}, url = {https://doi.org/10.1145/112600.112605}, doi = {10.1145/112600.112605}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/OstrovskyY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/ChrobakEIY91, author = {Marek Chrobak and David Eppstein and Giuseppe F. Italiano and Moti Yung}, editor = {Alok Aggarwal}, title = {Efficient Sequential and Parallel Algorithms for Computing Recovery Points in Trees and Paths}, booktitle = {Proceedings of the Second Annual {ACM/SIGACT-SIAM} Symposium on Discrete Algorithms, 28-30 January 1991, San Francisco, California, {USA}}, pages = {158--167}, publisher = {{ACM/SIAM}}, year = {1991}, url = {http://dl.acm.org/citation.cfm?id=127787.127821}, timestamp = {Thu, 05 Jul 2018 07:28:55 +0200}, biburl = {https://dblp.org/rec/conf/soda/ChrobakEIY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/YungALS90, author = {Yehuda Afek and Gad M. Landau and Baruch Schieber and Moti Yung}, title = {The Power of Multimedia: Combining Point-to-Point and Multiaccess Networks}, journal = {Inf. Comput.}, volume = {84}, number = {1}, pages = {97--118}, year = {1990}, url = {https://doi.org/10.1016/0890-5401(90)90035-G}, doi = {10.1016/0890-5401(90)90035-G}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/YungALS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrassardY90, author = {Gilles Brassard and Moti Yung}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {One-Way Group Actions}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {94--107}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_7}, doi = {10.1007/3-540-38424-3\_7}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrassardY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtY90, author = {Yvo Desmedt and Moti Yung}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {177--188}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_13}, doi = {10.1007/3-540-38424-3\_13}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SantisY90, author = {Alfredo De Santis and Moti Yung}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {366--377}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_27}, doi = {10.1007/3-540-38424-3\_27}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SantisY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/OstrovskyVY90, author = {Rafail Ostrovsky and Ramarathnam Venkatesan and Moti Yung}, editor = {Jin{-}Yi Cai}, title = {Fair Games against an All-Powerful Adversary}, booktitle = {Advances In Computational Complexity Theory, Proceedings of a {DIMACS} Workshop, New Jersey, USA, December 3-7, 1990}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {13}, pages = {155--169}, publisher = {{DIMACS/AMS}}, year = {1990}, url = {https://doi.org/10.1090/dimacs/013/09}, doi = {10.1090/DIMACS/013/09}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/OstrovskyVY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SantisY90, author = {Alfredo De Santis and Moti Yung}, editor = {Ivan Damg{\aa}rd}, title = {On the Design of Provably Secure Cryptographic Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {412--431}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_37}, doi = {10.1007/3-540-46877-3\_37}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SantisY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DolevDWY90, author = {Danny Dolev and Cynthia Dwork and Orli Waarts and Moti Yung}, title = {Perfectly Secure Message Transmission}, booktitle = {31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, October 22-24, 1990, Volume {I}}, pages = {36--45}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/FSCS.1990.89522}, doi = {10.1109/FSCS.1990.89522}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DolevDWY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/OfekY90, author = {Yoram Ofek and Moti Yung}, editor = {Cynthia Dwork}, title = {Principle for High Speed Network Control: Congestion- and Deadlock-Freeness, Self-Routing, and a Single Buffer per Link}, booktitle = {Proceedings of the Ninth Annual {ACM} Symposium on Principles of Distributed Computing, Quebec City, Quebec, Canada, August 22-24, 1990}, pages = {161--175}, publisher = {{ACM}}, year = {1990}, url = {https://doi.org/10.1145/93385.93414}, doi = {10.1145/93385.93414}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/OfekY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/EppsteinITTWY90, author = {David Eppstein and Giuseppe F. Italiano and Roberto Tamassia and Robert Endre Tarjan and Jeffery R. Westbrook and Moti Yung}, editor = {David S. Johnson}, title = {Maintenance of a Minimum Spanning Forest in a Dynamic Planar Graph}, booktitle = {Proceedings of the First Annual {ACM-SIAM} Symposium on Discrete Algorithms, 22-24 January 1990, San Francisco, California, {USA}}, pages = {1--11}, publisher = {{SIAM}}, year = {1990}, url = {http://dl.acm.org/citation.cfm?id=320176.320177}, timestamp = {Mon, 08 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soda/EppsteinITTWY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorY90, author = {Moni Naor and Moti Yung}, editor = {Harriet Ortiz}, title = {Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks}, booktitle = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing, May 13-17, 1990, Baltimore, Maryland, {USA}}, pages = {427--437}, publisher = {{ACM}}, year = {1990}, url = {https://doi.org/10.1145/100216.100273}, doi = {10.1145/100216.100273}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/AfekKY90, author = {Yehuda Afek and Shay Kutten and Moti Yung}, editor = {Jan van Leeuwen and Nicola Santoro}, title = {Memory-Efficient Self Stabilizing Protocols for General Networks}, booktitle = {Distributed Algorithms, 4th International Workshop, {WDAG} '90, Bari, Italy, September 24-26, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {486}, pages = {15--28}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-54099-7\_2}, doi = {10.1007/3-540-54099-7\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/AfekKY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/OfekY90, author = {Yoram Ofek and Moti Yung}, editor = {Jan van Leeuwen and Nicola Santoro}, title = {Efficient Mechanism for Fairness and Deadlock-Avoidance in High-Speed Networks}, booktitle = {Distributed Algorithms, 4th International Workshop, {WDAG} '90, Bari, Italy, September 24-26, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {486}, pages = {192--212}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-54099-7\_14}, doi = {10.1007/3-540-54099-7\_14}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wdag/OfekY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/ChrobakY89, author = {Marek Chrobak and Moti Yung}, title = {Fast Algorithms for Edge-Coloring Planar Graphs}, journal = {J. Algorithms}, volume = {10}, number = {1}, pages = {35--51}, year = {1989}, url = {https://doi.org/10.1016/0196-6774(89)90022-9}, doi = {10.1016/0196-6774(89)90022-9}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/ChrobakY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/AbramsonY89, author = {Bruce Abramson and Moti Yung}, title = {Divide and Conquer under Global Constraints: {A} Solution to the N-Queens Problem}, journal = {J. Parallel Distributed Comput.}, volume = {6}, number = {3}, pages = {649--662}, year = {1989}, url = {https://doi.org/10.1016/0743-7315(89)90011-7}, doi = {10.1016/0743-7315(89)90011-7}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/AbramsonY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GalilHY89, author = {Zvi Galil and Stuart Haber and Moti Yung}, title = {Minimum-Knowledge Interactive Proofs for Decision Problems}, journal = {{SIAM} J. Comput.}, volume = {18}, number = {4}, pages = {711--739}, year = {1989}, url = {https://doi.org/10.1137/0218049}, doi = {10.1137/0218049}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/GalilHY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/GalilHY89, author = {Zvi Galil and Stuart Haber and Moti Yung}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Security against Replay Chosen-Ciphertext Attack}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {183--190}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/12}, doi = {10.1090/DIMACS/002/12}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/GalilHY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/OstrovskyY89, author = {Rafail Ostrovsky and Moti Yung}, editor = {Joan Feigenbaum and Michael Merritt}, title = {On Necessary Conditions for Secure Distributed Computation}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {229--234}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/16}, doi = {10.1090/DIMACS/002/16}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/OstrovskyY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GalilHY89, author = {Zvi Galil and Stuart Haber and Moti Yung}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {A Secure Public-key Authentication Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {3--15}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_2}, doi = {10.1007/3-540-46885-4\_2}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GalilHY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrassardCY89, author = {Gilles Brassard and Claude Cr{\'{e}}peau and Moti Yung}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {Everything in {NP} can be Argued in \emph{Perfect} Zero-Knowledge in a \emph{Bounded} Number of Rounds (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {192--195}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_21}, doi = {10.1007/3-540-46885-4\_21}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrassardCY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Yung89, author = {Moti Yung}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {Zero-Knowledge Proofs of Computational Power (Extended Summary)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {196--207}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_22}, doi = {10.1007/3-540-46885-4\_22}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Yung89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KharitonovGY89, author = {Michael Kharitonov and Andrew V. Goldberg and Moti Yung}, title = {Lower Bounds for Pseudorandom Number Generators}, booktitle = {30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989}, pages = {242--247}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SFCS.1989.63485}, doi = {10.1109/SFCS.1989.63485}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KharitonovGY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BrassardC89, author = {Gilles Brassard and Claude Cr{\'{e}}peau and Moti Yung}, editor = {Giorgio Ausiello and Mariangiola Dezani{-}Ciancaglini and Simona Ronchi Della Rocca}, title = {Everything in {NP} can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds}, booktitle = {Automata, Languages and Programming, 16th International Colloquium, ICALP89, Stresa, Italy, July 11-15, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {372}, pages = {123--136}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/BFb0035756}, doi = {10.1007/BFB0035756}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BrassardC89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorY89, author = {Moni Naor and Moti Yung}, editor = {David S. Johnson}, title = {Universal One-Way Hash Functions and their Cryptographic Applications}, booktitle = {Proceedings of the 21st Annual {ACM} Symposium on Theory of Computing, May 14-17, 1989, Seattle, Washington, {USA}}, pages = {33--43}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/73007.73011}, doi = {10.1145/73007.73011}, timestamp = {Wed, 24 Nov 2021 12:15:31 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/awoc/ChrobakY88, author = {Marek Chrobak and Moti Yung}, editor = {John H. Reif}, title = {Fast Parallel and Sequential Algorithms for Edge-Coloring Planar Graphs}, booktitle = {{VLSI} Algorithms and Architectures, 3rd Aegean Workshop on Computing, {AWOC} 88, Corfu, Greece, June 28 - July 1, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {319}, pages = {11--23}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/BFb0040369}, doi = {10.1007/BFB0040369}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/awoc/ChrobakY88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/AfekLSY88, author = {Yehuda Afek and Gad M. Landau and Baruch Schieber and Moti Yung}, editor = {Danny Dolev}, title = {The Power of Multimedia: Combining Point-to Point and Multi-Access Networks}, booktitle = {Proceedings of the Seventh Annual {ACM} Symposium on Principles of Distributed Computing, Toronto, Ontario, Canada, August 15-17, 1988}, pages = {90--104}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62546.62564}, doi = {10.1145/62546.62564}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/AfekLSY88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GalilY87, author = {Zvi Galil and Moti Yung}, title = {Partitioned Encryption and Achieving Simultaneity by Partitioning}, journal = {Inf. Process. Lett.}, volume = {26}, number = {2}, pages = {81--88}, year = {1987}, url = {https://doi.org/10.1016/0020-0190(87)90042-1}, doi = {10.1016/0020-0190(87)90042-1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/GalilY87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/GalilLY87, author = {Zvi Galil and Gad M. Landau and Mordechai M. Yung}, title = {Distributed Algorithms in Synchronous Broadcasting Networks}, journal = {Theor. Comput. Sci.}, volume = {49}, pages = {171--184}, year = {1987}, url = {https://doi.org/10.1016/0304-3975(87)90006-5}, doi = {10.1016/0304-3975(87)90006-5}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/GalilLY87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ImpagliazzoY87, author = {Russell Impagliazzo and Moti Yung}, editor = {Carl Pomerance}, title = {Direct Minimum-Knowledge Computations}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {40--51}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_4}, doi = {10.1007/3-540-48184-2\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ImpagliazzoY87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GalilHY87, author = {Zvi Galil and Stuart Haber and Moti Yung}, editor = {Carl Pomerance}, title = {Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {135--155}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_10}, doi = {10.1007/3-540-48184-2\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GalilHY87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fjcc/AbramsonY86, author = {Bruce Abramson and Moti Yung}, title = {Construction Through Decomposition: {A} Divide-and-Conquer Algoithm for the N-Queens Problem}, booktitle = {Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, {USA}}, pages = {620--628}, publisher = {{IEEE} Computer Society}, year = {1986}, timestamp = {Fri, 29 Sep 2017 14:35:52 +0200}, biburl = {https://dblp.org/rec/conf/fjcc/AbramsonY86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/BenalohY86, author = {Josh Cohen Benaloh and Moti Yung}, editor = {Joseph Y. Halpern}, title = {Distributing the Power of a Government to Enhance the Privacy of Voters (Extended Abstract)}, booktitle = {Proceedings of the Fifth Annual {ACM} Symposium on Principles of Distributed Computing, Calgary, Alberta, Canada, August 11-13, 1986}, pages = {52--62}, publisher = {{ACM}}, year = {1986}, url = {https://doi.org/10.1145/10590.10595}, doi = {10.1145/10590.10595}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/BenalohY86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Yung85, author = {Mordechai M. Yung}, title = {A Secure and Useful 'Keyless Cryptosystem'}, journal = {Inf. Process. Lett.}, volume = {21}, number = {1}, pages = {35--38}, year = {1985}, url = {https://doi.org/10.1016/0020-0190(85)90106-1}, doi = {10.1016/0020-0190(85)90106-1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Yung85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GalilHY85, author = {Zvi Galil and Stuart Haber and Moti Yung}, editor = {Hugh C. Williams}, title = {Symmetric Public-Key Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {128--137}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_12}, doi = {10.1007/3-540-39799-X\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GalilHY85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GalilHY85, author = {Zvi Galil and Stuart Haber and Moti Yung}, title = {A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems (Extended Abstract)}, booktitle = {26th Annual Symposium on Foundations of Computer Science, Portland, Oregon, USA, 21-23 October 1985}, pages = {360--371}, publisher = {{IEEE} Computer Society}, year = {1985}, url = {https://doi.org/10.1109/SFCS.1985.1}, doi = {10.1109/SFCS.1985.1}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GalilHY85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/LandauYG85, author = {Gad M. Landau and Mordechai M. Yung and Zvi Galil}, editor = {Wilfried Brauer}, title = {Distributed Algorithms in Synchronous Broadcasting Networks (Extended Abstract)}, booktitle = {Automata, Languages and Programming, 12th Colloquium, Nafplion, Greece, July 15-19, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {194}, pages = {363--372}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/BFb0015762}, doi = {10.1007/BFB0015762}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/LandauYG85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Yung84, author = {Moti Yung}, editor = {G. R. Blakley and David Chaum}, title = {Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract)}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {439--453}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_35}, doi = {10.1007/3-540-39568-7\_35}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Yung84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.