Adam L. Young

According to our database1, Adam L. Young authored at least 43 papers between 1996 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
On Ransomware and Envisioning the Enemy of Tomorrow.
Computer, 2017

Cryptovirology: the birth, neglect, and explosion of ransomware.
Commun. ACM, 2017

The Combinatorics of Product Scanning Multiplication and Squaring.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2016
Semantically Secure Anonymity: Foundations of Re-encryption.
IACR Cryptol. ePrint Arch., 2016

Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack.
Proceedings of the New Codebreakers, 2016

2014
The drunk motorcyclist protocol for anonymous communication.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2010
Kleptography from Standard Assumptions and Applications.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2007
Space-Efficient Kleptography Without Random Oracles.
Proceedings of the Information Hiding, 9th International Workshop, 2007

A Timing-Resistant Elliptic Curve Backdoor in RSA.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
On Fundamental Limitations of Proving Data Theft.
IEEE Trans. Inf. Forensics Secur., 2006

Cryptoviral extortion using Microsoft's Crypto API.
Int. J. Inf. Sec., 2006

An Elliptic Curve Backdoor Algorithm for RSASSA.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Hiding Information Hiding.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Distributed Phishing Attacks.
IACR Cryptol. ePrint Arch., 2005

A Space Efficient Backdoor in RSA and Its Applications.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Questionable Encryption and Its Applications.
Proceedings of the Progress in Cryptology, 2005

Building a Cryptovirus Using Microsoft's Cryptographic API.
Proceedings of the Information Security, 8th International Conference, 2005

Malicious Cryptography: Kleptographic Aspects.
Proceedings of the Topics in Cryptology, 2005

2004
Relationships Between Diffie-Hellman and "Index Oracles".
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

A Subliminal Channel in Secret Block Ciphers.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

A Key Recovery System as Secure as Factoring.
Proceedings of the Topics in Cryptology, 2004

Malicious cryptography - exposing cryptovirology.
Wiley, ISBN: 978-0-7645-4975-5, 2004

2003
A Weakness in Smart Card PKI Certification.
Proceedings of the IEEE Systems, 2003

Non-Zero Sum Games and Survivable Malware.
Proceedings of the IEEE Systems, 2003

Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2001
A PVSS as Hard as Discrete Log and Shareholder Separability.
Proceedings of the Public Key Cryptography, 2001

Secure Mobile Gambling.
Proceedings of the Topics in Cryptology, 2001

Bandwidth-Optimal Kleptographic Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
RSA-Based Auto-recoverable Cryptosystems.
Proceedings of the Public Key Cryptography, 2000

Hash to the Rescue: Space Minimization for PKI Directories.
Proceedings of the Information Security and Cryptology, 2000

Towards Signature-Only Signature Schemes.
Proceedings of the Advances in Cryptology, 2000

1999
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy.
Proceedings of the Public Key Cryptography, 1999

Non-Interactive CryptoComputing For NC<sup>1</sup>.
Proceedings of the 40th Annual Symposium on Foundations of Computer Science, 1999

Auto-recoverable Auto-certifiable Cryptosystems (A Survey).
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1998
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Auto-Recoverable Auto-Certifiable Cryptosystems.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

Finding Length-3 Positive Cunningham Chains.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998

1997
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Sliding Encryption: A Cryptographic Tool for Mobile Agents.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Kleptography: Using Cryptography Against Cryptography.
Proceedings of the Advances in Cryptology, 1997

The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems.
Proceedings of the Advances in Cryptology, 1997

1996
Cryptovirology: Extortion-Based Security Threats and Countermeasures.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
Proceedings of the Advances in Cryptology, 1996


  Loading...