Seguir
Moti Yung
Moti Yung
Distinguished Research Scientist Google; Adjunct Research Prof. Columbia U.
Dirección de correo verificada de cs.columbia.edu - Página principal
Título
Citado por
Citado por
Año
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993
14991993
Public-key cryptosystems provably secure against chosen ciphertext attacks
M Naor, M Yung
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
13891990
Universal one-way hash functions and their cryptographic applications
M Naor, M Yung
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
13561989
Secure schemes for secret sharing and key distribution
A Beimel
PhD thesis, Israel Institute of Technology, Technion, 1996
11991996
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
11782009
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995
11761995
How to withstand mobile virus attacks
R Ostrovsky, M Yung
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
8071991
Pseudorandomness and cryptographic applications
M Luby
Princeton University Press, 1996
6531996
Efficient password-authenticated key exchange using human-memorable passwords
J Katz, R Ostrovsky, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2001
5892001
On the security of ElGamal based encryption
Y Tsiounis, M Yung
International Workshop on Public Key Cryptography, 117-134, 1998
5631998
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
5622002
Perfectly secure message transmission
D Dolev, C Dwork, O Waarts, M Yung
Journal of the ACM (JACM) 40 (1), 17-47, 1993
5561993
Multi-authority secret-ballot elections with linear work
R Cramer, M Franklin, B Schoenmakers, M Yung
International Conference on the Theory and Applications of Cryptographic …, 1996
5531996
Scalable protocols for authenticated group key exchange
J Katz, M Yung
Annual international cryptology conference, 110-125, 2003
5352003
How to share a function securely
A De Santis, Y Desmedt, Y Frankel, M Yung
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing …, 1994
4501994
Method and system for the secured distribution of multimedia titles
A Herzberg, H Krawczyk, S Kutten, AV Le, SM Matyas, M. Yung
US Patent 5,745,678, 1998
4301998
Non-interactive cryptocomputing for nc/sup 1
T Sander, A Young, M Yung
40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039 …, 1999
4261999
Lecture notes in computer science
D Kudenko
Springer, 2005
422*2005
Cryptography: Malicious Cryptography
AL Young, M Yung
Elsevier Advanced Technology 20 (5), 430, 2004
414*2004
Fourth-factor authentication: somebody you know
J Brainard, A Juels, RL Rivest, M Szydlo, M Yung
Proceedings of the 13th ACM conference on Computer and communications …, 2006
3982006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20