default search action
Moti Yung
Mordechai M. Yung
Person information
- affiliation: Google Inc., New York, NY, USA
- affiliation: Columbia University, New York City, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c364]Pawel Lorek, Moti Yung, Filip Zagórski:
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications. ACNS (3) 2024: 3-27 - [c363]Aleksandr Dolgavin, Mark Yampolskiy, Moti Yung:
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files. CODASPY 2024: 211-220 - [c362]Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond. CRYPTO (2) 2024: 422-455 - [c361]Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung:
SpotProxy: Rediscovering the Cloud for Censorship Circumvention. USENIX Security Symposium 2024 - [e77]Chunpeng Ge, Moti Yung:
Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14526, Springer 2024, ISBN 978-981-97-0941-0 [contents] - [e76]Chunpeng Ge, Moti Yung:
Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14527, Springer 2024, ISBN 978-981-97-0944-1 [contents] - [i95]Aleksandr Dolgavin, Mark Yampolskiy, Moti Yung:
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files. CoRR abs/2404.05106 (2024) - [i94]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu:
Correcting Subverted Random Oracles. CoRR abs/2404.09442 (2024) - [i93]Pawel Lorek, Moti Yung, Filip Zagórski:
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications. IACR Cryptol. ePrint Arch. 2024: 285 (2024) - [i92]Karim Eldefrawy, Benjamin Terner, Moti Yung:
Composing Timed Cryptographic Protocols: Foundations and Applications. IACR Cryptol. ePrint Arch. 2024: 676 (2024) - [i91]Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, Moti Yung:
Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE. IACR Cryptol. ePrint Arch. 2024: 1128 (2024) - [i90]Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Public-Key Anamorphism in (CCA-secure) Public-Key Encryption and Beyond. IACR Cryptol. ePrint Arch. 2024: 1327 (2024) - 2023
- [j78]Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung:
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption. Proc. Priv. Enhancing Technol. 2023(1): 417-436 (2023) - [j77]Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. Proc. Priv. Enhancing Technol. 2023(4): 170-183 (2023) - [c360]Yi Wang, Rongmao Chen, Xinyi Huang, Moti Yung:
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions. ASIACRYPT (6) 2023: 135-167 - [c359]Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication! CRYPTO (2) 2023: 759-790 - [c358]Shlomi Dolev, Avraam Yagudaev, Moti Yung:
HBSS: (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version). CSCML 2023: 389-397 - [c357]Donghoon Chang, Moti Yung:
Midgame Attacks and Defense Against Them. CSCML 2023: 471-492 - [c356]Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung:
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning. KDD 2023: 1164-1175 - [e75]Yi Deng, Moti Yung:
Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13837, Springer 2023, ISBN 978-3-031-26552-5 [contents] - [e74]Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen:
Information and Communications Security - 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings. Lecture Notes in Computer Science 14252, Springer 2023, ISBN 978-981-99-7355-2 [contents] - [e73]Moti Yung, Chao Chen, Weizhi Meng:
Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings. Lecture Notes in Computer Science 14299, Springer 2023, ISBN 978-3-031-45932-0 [contents] - [i89]Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung:
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning. CoRR abs/2305.20043 (2023) - [i88]Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication! IACR Cryptol. ePrint Arch. 2023: 356 (2023) - [i87]Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. IACR Cryptol. ePrint Arch. 2023: 434 (2023) - [i86]Karim Eldefrawy, Sashidhar Jakkamsetti, Ben Terner, Moti Yung:
Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition. IACR Cryptol. ePrint Arch. 2023: 439 (2023) - [i85]Ghous Amjad, Kevin Yeo, Moti Yung:
RSA Blind Signatures with Public Metadata. IACR Cryptol. ePrint Arch. 2023: 1199 (2023) - [i84]Yi Wang, Rongmao Chen, Xinyi Huang, Moti Yung:
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions. IACR Cryptol. ePrint Arch. 2023: 1828 (2023) - 2022
- [j76]Alex Gittens, Bülent Yener, Moti Yung:
An Adversarial Perspective on Accuracy, Robustness, Fairness, and Privacy: Multilateral-Tradeoffs in Trustworthy ML. IEEE Access 10: 120850-120865 (2022) - [j75]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Daphne Yao:
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE. Computer 55(2): 54-62 (2022) - [j74]Liron David, Avinatan Hassidim, Yossi Matias, Moti Yung, Alon Ziv:
Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons. IEEE Trans. Inf. Forensics Secur. 17: 3877-3889 (2022) - [c355]Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol J. Fung, Moti Yung, Danfeng (Daphne) Yao:
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE. AsiaCCS 2022: 1210-1212 - [c354]Mark Yampolskiy, Moti Yung:
AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) Security. CCS 2022: 3557-3558 - [c353]Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng:
Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous Crowds. CSCML 2022: 468-486 - [c352]Liron David, Avinatan Hassidim, Yossi Matias, Moti Yung:
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic. ESORICS (1) 2022: 237-255 - [c351]Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Anamorphic Encryption: Private Communication Against a Dictator. EUROCRYPT (2) 2022: 34-63 - [c350]Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model. EUROCRYPT (2) 2022: 488-519 - [c349]Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Jeffrey Todd McDonald, Moti Yung:
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files. ISC 2022: 40-52 - [c348]Long Chen, Ya-Nan Li, Qiang Tang, Moti Yung:
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage. USENIX Security Symposium 2022: 2353-2370 - [e72]Mark Yampolskiy, Moti Yung:
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security, Los Angeles, CA, USA, 11 November 2022. ACM 2022, ISBN 978-1-4503-9883-1 [contents] - [i83]Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung:
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications. IACR Cryptol. ePrint Arch. 2022: 96 (2022) - [i82]Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Anamorphic Encryption: Private Communication against a Dictator. IACR Cryptol. ePrint Arch. 2022: 639 (2022) - 2021
- [j73]Shouhuai Xu, Moti Yung, Jingguo Wang:
Seeking Foundations for the Science of Cyber Security. Inf. Syst. Frontiers 23(2): 263-267 (2021) - [c347]Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE. ASIACRYPT (2) 2021: 427-455 - [c346]Mark Yampolskiy, Jacob Gatlin, Moti Yung:
Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad. AMSec@CCS 2021: 3-9 - [c345]Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. CRYPTO (4) 2021: 270-300 - [c344]Akif Patel, Moti Yung:
Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance. CSCML 2021: 379-396 - [c343]Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme. EUROCRYPT (3) 2021: 521-552 - [c342]Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. Public Key Cryptography (1) 2021: 659-690 - [c341]Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Anthony Skjellum, Moti Yung:
What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files. RAID 2021: 266-281 - [c340]Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung:
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications. SSS 2021: 350-364 - [p4]Miroslaw Kutylowski, Piotr Syga, Moti Yung:
Emerging Security Challenges for Ubiquitous Devices. Security of Ubiquitous Computing Systems 2021: 3-18 - [e71]Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung:
ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. ACM 2021, ISBN 978-1-4503-8287-8 [contents] - [e70]Mark Yampolskiy, Yuval Elovici, Moti Yung:
AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8480-3 [contents] - [e69]Yongdong Wu, Moti Yung:
Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12612, Springer 2021, ISBN 978-3-030-71851-0 [contents] - [e68]Yu Yu, Moti Yung:
Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13007, Springer 2021, ISBN 978-3-030-88322-5 [contents] - [e67]Wenlian Lu, Kun Sun, Moti Yung, Feng Liu:
Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13005, Springer 2021, ISBN 978-3-030-89136-7 [contents] - [e66]Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 398, Springer 2021, ISBN 978-3-030-90018-2 [contents] - [e65]Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 399, Springer 2021, ISBN 978-3-030-90021-2 [contents] - [i81]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Yao:
Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE. CoRR abs/2111.08842 (2021) - [i80]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu:
Correcting Subverted Random Oracles. IACR Cryptol. ePrint Arch. 2021: 42 (2021) - [i79]Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. IACR Cryptol. ePrint Arch. 2021: 630 (2021) - [i78]Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung:
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption. IACR Cryptol. ePrint Arch. 2021: 765 (2021) - [i77]Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. IACR Cryptol. ePrint Arch. 2021: 862 (2021) - [i76]Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE. IACR Cryptol. ePrint Arch. 2021: 1261 (2021) - 2020
- [j72]Kuo-Hui Yeh, Chunhua Su, Robert H. Deng, Moti Yung, Miroslaw Kutylowski:
Special issue on security and privacy of blockchain technologies. Int. J. Inf. Sec. 19(3): 243-244 (2020) - [j71]Benoît Libert, Moti Yung:
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions. J. Cryptol. 33(4): 1405-1441 (2020) - [j70]Juan A. Garay, David S. Johnson, Aggelos Kiayias, Moti Yung:
The combinatorics of hidden diversity. Theor. Comput. Sci. 812: 80-95 (2020) - [c339]Xuan Thanh Do, Duong Hieu Phan, Moti Yung:
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. ACNS (2) 2020: 145-164 - [c338]Rongmao Chen, Xinyi Huang, Moti Yung:
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. ASIACRYPT (2) 2020: 98-128 - [c337]Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung:
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality. CRYPTO (3) 2020: 3-33 - [c336]Moti Yung, Cem Paya, Daniel James:
Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services. CSCML 2020: 18-28 - [c335]Miroslaw Kutylowski, Anna Lauks-Dutka, Moti Yung:
GDPR - Challenges for Reconciling Legal Rules with Technical Reality. ESORICS (1) 2020: 736-755 - [c334]Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, Mariana Raykova, David Shanahan, Moti Yung:
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality. EuroS&P 2020: 370-389 - [c333]Moti Yung:
Secure Computation Protocol: A Technology for Our Time. ICETE (1) 2020: 19 - [c332]Karim Eldefrawy, Seoyeon Hwang, Rafail Ostrovsky, Moti Yung:
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups. SCN 2020: 108-129 - [e64]Zhe Liu, Moti Yung:
Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12020, Springer 2020, ISBN 978-3-030-42920-1 [contents] - [i75]Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung:
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality. IACR Cryptol. ePrint Arch. 2020: 385 (2020) - [i74]Karim Eldefrawy, Seoyeon Hwang, Rafail Ostrovsky, Moti Yung:
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups. IACR Cryptol. ePrint Arch. 2020: 747 (2020) - [i73]Xuan Thanh Do, Duong Hieu Phan, Moti Yung:
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. IACR Cryptol. ePrint Arch. 2020: 826 (2020) - [i72]Rongmao Chen, Xinyi Huang, Moti Yung:
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. IACR Cryptol. ePrint Arch. 2020: 1079 (2020) - [i71]Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures. IACR Cryptol. ePrint Arch. 2020: 1334 (2020)
2010 – 2019
- 2019
- [j69]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. Comput. J. 62(4): 545-562 (2019) - [j68]Raphael C.-W. Phan, Moti Yung:
Paradigm Shifts in Cryptographic Engineering. IEEE Trans. Dependable Secur. Comput. 16(5): 729-730 (2019) - [c331]Mingyi Zhao, Moti Yung:
Secure Zero-Day Detection: Wiping Off the VEP Trade-Off. CYSARM@CCS 2019: 35-45 - [c330]Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung:
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing. CCS 2019: 79-93 - [c329]Sherman S. M. Chow, Alexander Russell, Qiang Tang, Moti Yung, Yongjun Zhao, Hong-Sheng Zhou:
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog. Public Key Cryptography (1) 2019: 221-251 - [p3]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung:
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions. Advances in Cyber Security 2019: 143-183 - [e63]Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung:
Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11464, Springer 2019, ISBN 978-3-030-21567-5 [contents] - [e62]Fuchun Guo, Xinyi Huang, Moti Yung:
Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11449, Springer 2019, ISBN 978-3-030-14233-9 [contents] - [e61]Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung:
Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings. Lecture Notes in Computer Science 11527, Springer 2019, ISBN 978-3-030-20950-6 [contents] - [e60]Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11933, Springer 2019, ISBN 978-3-030-34636-2 [contents] - [i70]Frederik Armknecht, Ingrid Verbauwhede, Melanie Volkamer, Moti Yung:
Biggest Failures in Security (Dagstuhl Seminar 19451). Dagstuhl Reports 9(11): 1-23 (2019) - [i69]Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung:
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications. IACR Cryptol. ePrint Arch. 2019: 723 (2019) - [i68]Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung:
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing. IACR Cryptol. ePrint Arch. 2019: 1292 (2019) - 2018
- [j67]Jiageng Chen, Chunhua Su, Kuo-Hui Yeh, Moti Yung:
Special Issue on Advanced Persistent Threat. Future Gener. Comput. Syst. 79: 243-246 (2018) - [c328]Karim Eldefrawy, Rafail Ostrovsky, Moti Yung:
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. From Database to Cyber Security 2018: 470-486 - [c327]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Correcting Subverted Random Oracles. CRYPTO (2) 2018: 241-271 - [c326]Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung:
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs. CSCML 2018: 206-226 - [c325]Karim Eldefrawy, Rafail Ostrovsky, Sunoo Park, Moti Yung:
Proactive Secure Multiparty Computation with a Dishonest Majority. SCN 2018: 200-215 - [c324]Adam L. Young, Moti Yung:
Semantically Secure Anonymity: Foundations of Re-encryption. SCN 2018: 255-273 - [e59]Xiaofeng Chen, Dongdai Lin, Moti Yung:
Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10726, Springer 2018, ISBN 978-3-319-75159-7 [contents] - [e58]Feng Liu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11287, Springer 2018, ISBN 978-3-030-03025-4 [contents] - [i67]Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng:
Differentially-Private "Draw and Discard" Machine Learning. CoRR abs/1807.04369 (2018) - 2017
- [j66]Adam L. Young, Moti Yung:
Cryptovirology: the birth, neglect, and explosion of ransomware. Commun. ACM 60(7): 24-26 (2017) - [j65]Adam L. Young, Moti Yung:
On Ransomware and Envisioning the Enemy of Tomorrow. Computer 50(11): 82-85 (2017) - [j64]Alexandra Rivero-García, Iván Santos-González, Candelaria Hernández-Goya, Pino Caballero-Gil, Moti Yung:
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange. Sensors 17(4): 733 (2017) - [j63]Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency. Theor. Comput. Sci. 667: 51-92 (2017) - [c323]Alexandra Dmitrienko, David Noack, Moti Yung:
Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation. AsiaCCS 2017: 520-531 - [c322]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Generic Semantic Security against a Kleptographic Adversary. CCS 2017: 907-922 - [c321]Qiang Tang, Moti Yung:
Cliptography: Post-Snowden Cryptography. CCS 2017: 2615-2616 - [c320]Adam L. Young, Moti Yung:
The Combinatorics of Product Scanning Multiplication and Squaring. CSCML 2017: 99-114 - [c319]Shlomi Dolev, Karim Eldefrawy, Juan A. Garay, Muni Venkateswarlu Kumaramangalam, Rafail Ostrovsky, Moti Yung:
Brief Announcement: Secure Self-Stabilizing Computation. PODC 2017: 415-417 - [e57]Kefei Chen, Dongdai Lin, Moti Yung:
Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10143, Springer 2017, ISBN 978-3-319-54704-6 [contents] - [e56]Raphael C.-W. Phan, Moti Yung:
Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10311, Springer 2017, ISBN 978-3-319-61272-0 [contents] - [i66]Mihaela Ion, Ben Kreuter, Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung:
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions. IACR Cryptol. ePrint Arch. 2017: 738 (2017) - 2016
- [j62]