Possibility and impossibility results for encryption and commitment secure under selective opening M Bellare, D Hofheinz, S Yilek Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 252 | 2009 |
Fingerprinting information in JavaScript implementations K Mowery, D Bogenreif, S Yilek, H Shacham Proceedings of W2SP 2 (11), 2011 | 233 | 2011 |
When private keys are public: Results from the 2008 Debian OpenSSL vulnerability S Yilek, E Rescorla, H Shacham, B Enright, S Savage Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 15-27, 2009 | 194 | 2009 |
The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks T Ristenpart, S Yilek Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007 | 171 | 2007 |
Hedged public-key encryption: How to protect against bad randomness M Bellare, Z Brakerski, M Naor, T Ristenpart, G Segev, H Shacham, ... Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 168 | 2009 |
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography. T Ristenpart, S Yilek NDSS, 2010 | 145 | 2010 |
Identity-Based Encryption Secure against Selective Opening Attack. M Bellare, B Waters, S Yilek TCC 6597, 235-252, 2011 | 102 | 2011 |
Standard security does not imply security against selective-opening M Bellare, R Dowsley, B Waters, S Yilek Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012 | 74 | 2012 |
Chosen-ciphertext security from slightly lossy trapdoor functions P Mol, S Yilek Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010 | 57 | 2010 |
The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries T Ristenpart, S Yilek Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 46 | 2013 |
Resettable public-key encryption: How to encrypt on a virtual machine S Yilek Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010 | 44 | 2010 |
Encryption schemes secure under selective opening attack M Bellare, S Yilek Cryptology ePrint Archive, 2009 | 44 | 2009 |
Recommenders everywhere: the wikilens community-maintained recommender system D Frankowski, SK Lam, S Sen, FM Harper, S Yilek, M Cassano, J Riedl Proceedings of the 2007 international symposium on Wikis, 47-60, 2007 | 33 | 2007 |
Cycle slicer: an algorithm for building permutations on special domains S Miracle, S Yilek Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017 | 5 | 2017 |
The round-complexity of black-box zero-knowledge: A combinatorial characterization D Micciancio, S Yilek Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008 …, 2008 | 5 | 2008 |
Reverse cycle walking and its applications S Miracle, S Yilek Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 3 | 2016 |
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 … M Bellare, D Hofheinz, S Yilek, A Joux Springer-Verlag Berlin Heidelberg, 2009 | 3 | 2009 |
Targeted Ciphers for Format-Preserving Encryption S Miracle, S Yilek Selected Areas in Cryptography–SAC 2018: 25th International Conference …, 2019 | 1 | 2019 |
Public-key encryption secure in the presence of randomness failures SC Yilek University of California, San Diego, 2010 | 1 | 2010 |
Resettable public-key encryption: How to encrypt on a virtual machine S Yilek Cryptology ePrint Archive, 2009 | 1 | 2009 |