Moti Yung
Orcid: 0000-0003-0848-0873Affiliations:
- Google Inc., New York, NY, USA
- Columbia University, New York City, USA
According to our database1,
Moti Yung
authored at least 466 papers
between 1984 and 2025.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2013, "For contributions to cryptography and its use in security and privacy of systems.".
IEEE Fellow
IEEE Fellow 2015, "For contributions to cryptography".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
Proc. Priv. Enhancing Technol., 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE.
IACR Cryptol. ePrint Arch., 2024
Exploiting the Data Gap: Utilizing Non-ignorable Missingness to Manipulate Model Learning.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography.
Proc. Priv. Enhancing Technol., October, 2023
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption.
Proc. Priv. Enhancing Technol., January, 2023
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
IACR Cryptol. ePrint Arch., 2023
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition.
IACR Cryptol. ePrint Arch., 2023
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
HBSS: (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version).
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE.
Computer, 2022
An Adversarial Perspective on Accuracy, Robustness, Fairness, and Privacy: Multilateral-Tradeoffs in Trustworthy ML.
IEEE Access, 2022
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.
Proceedings of the 31st USENIX Security Symposium, 2022
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.
Proceedings of the Information Security - 25th International Conference, 2022
One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous Crowds.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE.
IACR Cryptol. ePrint Arch., 2021
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings.
IACR Cryptol. ePrint Arch., 2021
What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad.
Proceedings of the AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions.
J. Cryptol., 2020
Int. J. Inf. Sec., 2020
IACR Cryptol. ePrint Arch., 2020
Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures.
IACR Cryptol. ePrint Arch., 2020
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups.
IACR Cryptol. ePrint Arch., 2020
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes.
IACR Cryptol. ePrint Arch., 2020
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2020
Secure Computation Protocol: A Technology for Our Time.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.
IACR Cryptol. ePrint Arch., 2019
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications.
IACR Cryptol. ePrint Arch., 2019
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.
Comput. J., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation.
Proceedings of the From Database to Cyber Security, 2018
2017
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.
Theor. Comput. Sci., 2017
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Sensors, 2017
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares.
Theor. Comput. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2016
Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack.
Proceedings of the New Codebreakers, 2016
2015
Theor. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2015
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
The bright side arguments for the coming smartphones crypto war: The added value of device encryption.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
IACR Cryptol. ePrint Arch., 2014
A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
IACR Cryptol. ePrint Arch., 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2012
Adaptive Preimage Resistance Analysis Revisited: \\ Requirements, Subtleties and Implications.
IACR Cryptol. ePrint Arch., 2012
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Int. J. Netw. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
ACM Trans. Inf. Syst. Secur., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Inf. Process. Lett., 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009
Proceedings of the Fundamentals of Computation Theory, 17th International Symposium, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
IEEE Trans. Inf. Theory, 2008
SIAM J. Comput., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Public Key Cryptography, 2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008
A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Theor. Comput. Sci., 2007
IACR Cryptol. ePrint Arch., 2007
Electron. Colloquium Comput. Complex., 2007
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice.
Des. Codes Cryptogr., 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Forward-secure signatures in untrusted update environments: efficient and generic constructions.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
IEEE Trans. Inf. Forensics Secur., 2006
J. Cryptol., 2006
Int. J. Secur. Networks, 2006
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version).
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions).
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.
Proceedings of the Advances in Cryptology, 2006
2005
Electron. Colloquium Comput. Complex., 2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Proceedings of the Progress in Cryptology, 2005
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
Proceedings of the Progress in Cryptology, 2005
"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience.
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Proceedings of the Topics in Cryptology, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures".
Proceedings of the Public Key Cryptography, 2004
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption.
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Topics in Cryptology, 2004
Proceedings of the Topics in Cryptology, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Malicious cryptography - exposing cryptovirology.
Wiley, ISBN: 978-0-7645-4975-5, 2004
2003
Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy.
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Automata, Languages and Programming, 30th International Colloquium, 2003
The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution.
Proceedings of the IEEE Systems, 2003
Proceedings of the Financial Cryptography, 2003
Proceedings of the Financial Cryptography, 2003
Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Proceedings of the Financial Cryptography, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Self-Managing Distributed Systems, 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Electron. Colloquium Comput. Complex., 2002
Proceedings of the First International IEEE Security in Storage Workshop, 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Topics in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001
2000
IEEE/ACM Trans. Netw., 2000
Combined Asynchronous/Synchronous Packet Switching Architecture: QoS Guarantees for Integrated Parallel Computing and Real-Time Traffic.
J. Parallel Distributed Comput., 2000
J. ACM, 2000
Int. J. Found. Comput. Sci., 2000
Complete characterization of security notions for probabilistic private-key encryption.
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Information Security and Cryptology, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Financial Cryptography, 2000
Proceedings of the CCS 2000, 2000
Friendly Observers Ease Off-Line E-Cash.
Proceedings of the Smart Card Research and Advanced Applications, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Distributed Computing, 1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the 40th Annual Symposium on Foundations of Computer Science, 1999
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control".
Proceedings of the Financial Cryptography, 1999
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
Proceedings of the CCS '99, 1999
Proceedings of the Advances in Cryptology, 1999
1998
J. Cryptol., 1998
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols.
Proceedings of the STACS 98, 1998
"Dynamic-Fault-Prone BSP": A Paradigm for Robust Computations in Changing Environments.
Proceedings of the Tenth Annual ACM Symposium on Parallel Algorithms and Architectures, 1998
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Public Key Cryptography, 1998
Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it.
Proceedings of the Algorithms and Computation, 9th International Symposium, 1998
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Financial Cryptography, 1998
Proceedings of the Financial Cryptography, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998
1997
Theor. Comput. Sci., 1997
Theor. Comput. Sci., 1997
IACR Cryptol. ePrint Arch., 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the Compression and Complexity of SEQUENCES 1997, 1997
Proceedings of the Proceedings IEEE INFOCOM '97, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997
Proceedings of the Financial Cryptography, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Advances in Cryptology, 1997
1996
Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation.
J. Cryptol., 1996
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Proceedings of the Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 1996
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996
Approximating Max-Min Fair Rates via Distributed Local Scheduling with Partial Information.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996
Proceedings of the Proceedings IEEE INFOCOM '96, 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996
Proceedings of the CCS '96, 1996
Proceedings of the Advances in Cryptology, 1996
1995
The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw., 1995
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
Proceedings of the Proceedings IEEE INFOCOM '95, 1995
Local Fairness in General-Topology Networks with Convergence Routing.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995
Stochastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time.
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995
Proceedings of the 36th Annual Symposium on Foundations of Computer Science, 1995
Proceedings of the Algorithms, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995
1994
Comput. Networks ISDN Syst., 1994
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994
Time-Optimal Message-Efficient Work Performance in the Presence of Faults (Extended Summary).
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994
The Integrated MetaNet Architecture: A Switch-Based Multimedia LAN for Parallel Computing and Real-Time Traffic.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994
Short Vertex Disjoint Paths and Multiconnectivity in Random Graphs: Reliable Network Computing.
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Algorithms, 1994
Proceedings of the Ninth Annual Structure in Complexity Theory Conference, Amsterdam, The Netherlands, June 28, 1994
1993
IEEE J. Sel. Areas Commun., 1993
Corrigendum: Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph.
J. Algorithms, 1993
Proceedings of the 18th Conference on Local Computer Networks, 1993
Proceedings of the Automata, Languages and Programming, 20nd International Colloquium, 1993
Proceedings of the Advances in Cryptology, 1993
1992
J. Algorithms, 1992
Inf. Sci., 1992
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992
Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Theor. Comput. Sci., 1991
Efficient Sequential and Parallel Algorithms for Computing Recovery Points in Trees and Paths.
Proceedings of the Second Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, 1991
Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, 1991
Proceedings of the Proceedings IEEE INFOCOM '91, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Inf. Comput., January, 1990
Proceedings of the Distributed Algorithms, 4th International Workshop, 1990
Proceedings of the Distributed Algorithms, 4th International Workshop, 1990
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990
Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms, 1990
Principle for High Speed Network Control: Congestion- and Deadlock-Freeness, Self-Routing, and a Single Buffer per Link.
Proceedings of the Ninth Annual ACM Symposium on Principles of Distributed Computing, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances In Computational Complexity Theory, 1990
Proceedings of the Advances in Cryptology, 1990
Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract).
Proceedings of the Advances in Cryptology, 1990
1989
J. Parallel Distributed Comput., 1989
Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 1989
Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds.
Proceedings of the Automata, Languages and Programming, 16th International Colloquium, 1989
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
Everything in NP can be Argued in <i>Perfect</i> Zero-Knowledge in a <i>Bounded</i> Number of Rounds (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Distributed Computing And Cryptography, 1989
Proceedings of the Distributed Computing And Cryptography, 1989
1988
Proceedings of the Seventh Annual ACM Symposium on Principles of Distributed Computing, 1988
Proceedings of the VLSI Algorithms and Architectures, 3rd Aegean Workshop on Computing, 1988
1987
Theor. Comput. Sci., 1987
Inf. Process. Lett., 1987
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987
1986
Distributing the Power of a Government to Enhance the Privacy of Voters (Extended Abstract).
Proceedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing, 1986
Construction Through Decomposition: A Divide-and-Conquer Algoithm for the N-Queens Problem.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986
1985
Proceedings of the Automata, 1985
A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems (Extended Abstract)
Proceedings of the 26th Annual Symposium on Foundations of Computer Science, 1985
1984
Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract).
Proceedings of the Advances in Cryptology, 1984