Search filters

Authors whose works are in public domain in at least one jurisdiction

List of works by Moti Yung

A Comparative Cost/Security Analysis of Fault Attack Countermeasures

A New Randomness Extraction Paradigm for Hybrid Encryption

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

article

A block cipher based pseudo random number generator secure against side-channel key recovery

scientific article published in 2008

Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts

Bandwidth-Optimal Kleptographic Attacks

Blind, Auditable Membership Proofs

CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts

scientific article published in 2018

Characterization of Security Notions for Probabilistic Private-Key Encryption

scientific article published in 2008

Communication complexity of secure computation (extended abstract)

scholarly article published 1992

Correcting Subverted Random Oracles

Cryptography: Malicious Cryptography – Exposing Cryptovirology

scientific article published in 2004

Cryptovirology: extortion-based security threats and countermeasures

Deniable password snatching: on the possibility of evasive electronic espionage

Design Validations for Discrete Logarithm Based Signature Schemes

article by Ernest Brickell et al published 2000 in Lecture Notes in Computer Science

Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)

Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption

scientific article published in 2023

Elastic block ciphers: method, security and instantiations

scientific article published in 2009

Electronic National Lotteries

Fourth-factor authentication

scholarly article published 2006

Generic Semantic Security against a Kleptographic Adversary

Kleptography: Using Cryptography Against Cryptography

scholarly article by Adam Young & Moti Yung published 1997 in Lecture Notes in Computer Science

Leakage Resilient Cryptography in Practice

scholarly article by François-Xavier Standaert et al published 2010 in Information Security and Cryptography

Linearly homomorphic structure-preserving signatures and their applications

scientific article published in 2015

Maintenance of a minimum spanning forest in a dynamic plane graph

Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs

Multi-Authority Secret-Ballot Elections with Linear Work

article

Non-interactive cryptocomputing for NC/sup 1/

On Fundamental Limitations of Proving Data Theft

scientific article published in 2006

On Offline Payments with Bitcoin (Poster Abstract)

conference paper published in 2014

PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES

scientific article published in 2021

Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange

scientific article

Practical leakage-resilient pseudorandom generators

Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers

Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks

scientific article

Secret swarm unit

Secure Wallet-Assisted Offline Bitcoin Payments With Double-Spender Revocation

conference paper published in 2017

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

scientific article published in 2017

Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files

scientific article published on 10 June 2024

Systematic Design of Two-Party Authentication Protocols

scholarly article

The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?

scholarly article by Adam Young & Moti Yung published 1996 in Lecture Notes in Computer Science

The Kurosawa–Desmedt key encapsulation is not chosen-ciphertext secure

The local detection paradigm and its applications to self-stabilization

The prevalence of kleptographic attacks on discrete-log based cryptosystems

Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation