Seguir
Moti Yung
Moti Yung
Distinguished Research Scientist Google; Adjunct Research Prof. Columbia U.
Dirección de correo verificada de cs.columbia.edu - Página principal
Título
Citado por
Citado por
Año
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993
14921993
Public-key cryptosystems provably secure against chosen ciphertext attacks
M Naor, M Yung
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
13721990
Universal one-way hash functions and their cryptographic applications
M Naor, M Yung
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
13451989
Secure schemes for secret sharing and key distribution
A Beimel
Technion-Israel Institute of technology, Faculty of computer science, 1996
11821996
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995
11721995
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
11602009
How to withstand mobile virus attacks
R Ostrovsky, M Yung
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
8001991
Pseudorandomness and cryptographic applications
M Luby
Princeton University Press, 1996
6451996
Efficient password-authenticated key exchange using human-memorable passwords
J Katz, R Ostrovsky, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2001
5782001
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
5632002
Perfectly secure message transmission
D Dolev, C Dwork, O Waarts, M Yung
Journal of the ACM (JACM) 40 (1), 17-47, 1993
5561993
Multi-authority secret-ballot elections with linear work
R Cramer, M Franklin, B Schoenmakers, M Yung
International Conference on the Theory and Applications of Cryptographic …, 1996
5521996
On the security of ElGamal based encryption
Y Tsiounis, M Yung
International Workshop on Public Key Cryptography, 117-134, 1998
5501998
Scalable protocols for authenticated group key exchange
J Katz, M Yung
Annual international cryptology conference, 110-125, 2003
5272003
How to share a function securely
A De Santis, Y Desmedt, Y Frankel, M Yung
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing …, 1994
4391994
Non-interactive cryptocomputing for nc/sup 1
T Sander, A Young, M Yung
40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039 …, 1999
4271999
Method and system for the secured distribution of multimedia titles
A Herzberg, H Krawczyk, S Kutten, AV Le, SM Matyas, M. Yung
US Patent 5,745,678, 1998
4181998
Cryptography: Malicious Cryptography
AL Young, M Yung
Elsevier Advanced Technology 20 (5), 430, 2004
409*2004
Proactive public key and signature systems
A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
3971997
Fourth-factor authentication: somebody you know
J Brainard, A Juels, RL Rivest, M Szydlo, M Yung
Proceedings of the 13th ACM conference on Computer and communications …, 2006
3942006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20