Seguir
Moti Yung
Moti Yung
Distinguished Research Scientist Google; Adjunct Research Prof. Columbia U.
Dirección de correo verificada de cs.columbia.edu - Página principal
Título
Citado por
Citado por
Año
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993
14901993
Public-key cryptosystems provably secure against chosen ciphertext attacks
M Naor, M Yung
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
13621990
Universal one-way hash functions and their cryptographic applications
M Naor, M Yung
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
13381989
Secure schemes for secret sharing and key distribution
A Beimel
Technion-Israel Institute of technology, Faculty of computer science, 1996
11721996
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995
11611995
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
11502009
How to withstand mobile virus attacks
R Ostrovsky, M Yung
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
7991991
Pseudorandomness and cryptographic applications
MG Luby
Princeton University Press, 1996
6441996
Efficient password-authenticated key exchange using human-memorable passwords
J Katz, R Ostrovsky, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2001
5762001
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
5612002
Perfectly secure message transmission
D Dolev, C Dwork, O Waarts, M Yung
Journal of the ACM (JACM) 40 (1), 17-47, 1993
5531993
On the security of ElGamal based encryption
Y Tsiounis, M Yung
International Workshop on Public Key Cryptography, 117-134, 1998
5481998
Multi-authority secret-ballot elections with linear work
R Cramer, M Franklin, B Schoenmakers, M Yung
International Conference on the Theory and Applications of Cryptographic …, 1996
5471996
Scalable protocols for authenticated group key exchange
J Katz, M Yung
Annual international cryptology conference, 110-125, 2003
5262003
How to share a function securely
A De Santis, Y Desmedt, Y Frankel, M Yung
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing …, 1994
4331994
Non-interactive cryptocomputing for nc/sup 1
T Sander, A Young, M Yung
40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039 …, 1999
4241999
Method and system for the secured distribution of multimedia titles
A Herzberg, H Krawczyk, S Kutten, AV Le, SM Matyas, M. Yung
US Patent 5,745,678, 1998
4151998
Cryptography: Malicious Cryptography
AL Young, M Yung
Elsevier Advanced Technology 20 (5), 430, 2004
407*2004
Proactive public key and signature systems
A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
3951997
Fourth-factor authentication: somebody you know
J Brainard, A Juels, RL Rivest, M Szydlo, M Yung
Proceedings of the 13th ACM conference on Computer and communications …, 2006
3922006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20