Prati
Moti Yung
Moti Yung
Research Scientist Google; Adjunct Research Prof. Columbia U.
Potvrđena adresa e-pošte na cs.columbia.edu - Početna stranica
Naslov
Citirano
Citirano
Godina
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993
14731993
Universal one-way hash functions and their cryptographic applications
M Naor, M Yung
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
12951989
Public-key cryptosystems provably secure against chosen ciphertext attacks
M Naor, M Yung
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
12911990
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995
10881995
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
10782009
Secure schemes for secret sharing and key distribution
A Beimel
Technion-Israel Institute of technology, Faculty of computer science, 1996
10131996
How to withstand mobile virus attacks
R Ostrovsky, M Yung
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
7491991
Pseudorandomness and cryptographic applications
MG Luby, M Luby
Princeton University Press, 1996
6161996
Efficient password-authenticated key exchange using human-memorable passwords
J Katz, R Ostrovsky, M Yung
Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001
5572001
Perfectly secure message transmission
D Dolev, C Dwork, O Waarts, M Yung
Journal of the ACM (JACM) 40 (1), 17-47, 1993
5431993
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
5382002
Multi-authority secret-ballot elections with linear work
R Cramer, M Franklin, B Schoenmakers, M Yung
Eurocrypt 96, 72-83, 1996
5311996
On the security of ElGamal based encryption
Y Tsiounis, M Yung
Public Key Cryptography: First International Workshop on Practice and Theory …, 2006
5192006
Scalable protocols for authenticated group key exchange
J Katz, M Yung
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
5142003
How to share a function securely
A De Santis, Y Desmedt, Y Frankel, M Yung
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing …, 1994
4091994
Non-interactive cryptocomputing for nc/sup 1
T Sander, A Young, M Yung
40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039 …, 1999
4071999
Proactive public key and signature systems
A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
3861997
Method and system for the secured distribution of multimedia titles
A Herzberg, H Krawczyk, S Kutten, AV Le, SM Matyas, M. Yung
US Patent 5,745,678, 1998
3771998
Fully collusion resistant traitor tracing with short ciphertexts and private keys
D Boneh, A Sahai, B Waters
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
3752006
A simplified approach to threshold and proactive RSA
T Rabin
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
3711998
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20