Moti Yung

According to our database1, Moti Yung
  • authored at least 458 papers between 1984 and 2018.
  • has a "Dijkstra number"2 of three.

Awards

ACM Fellow

ACM Fellow 2013, "For contributions to cryptography and its use in security and privacy of systems.".

IEEE Fellow

IEEE Fellow 2015, "For contributions to cryptography".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Special Issue on Advanced Persistent Threat.
Future Generation Comp. Syst., 2018

2017
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.
Theor. Comput. Sci., 2017

Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Sensors, 2017

Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions.
IACR Cryptology ePrint Archive, 2017

On Ransomware and Envisioning the Enemy of Tomorrow.
IEEE Computer, 2017

Cryptovirology: the birth, neglect, and explosion of ransomware.
Commun. ACM, 2017

Brief Announcement: Secure Self-Stabilizing Computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

The Combinatorics of Product Scanning Multiplication and Squaring.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Generic Semantic Security against a Kleptographic Adversary.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Cliptography: Post-Snowden Cryptography.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares.
Theor. Comput. Sci., 2016

Concurrent Knowledge Extraction in Public-Key Models.
J. Cryptology, 2016

Semantically Secure Anonymity: Foundations of Re-encryption.
IACR Cryptology ePrint Archive, 2016

Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
IACR Cryptology ePrint Archive, 2016

Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions.
IACR Cryptology ePrint Archive, 2016

Towards a Unified Security Model for Physically Unclonable Functions.
IACR Cryptology ePrint Archive, 2016

Proactive Secret Sharing with a Dishonest Majority.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Brief Announcement: Proactive Secret Sharing with a Dishonest Majority.
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016

Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Towards a Unified Security Model for Physically Unclonable Functions.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Practical "Signatures with Efficient Protocols" from Simple Assumptions.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack.
Proceedings of the New Codebreakers, 2016

Cliptography: Clipping the Power of Kleptographic Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Sequential aggregate signatures with short public keys without random oracles.
Theor. Comput. Sci., 2015

Cliptography: Clipping the Power of Kleptographic Attacks.
IACR Cryptology ePrint Archive, 2015

Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
IACR Cryptology ePrint Archive, 2015

Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
IACR Cryptology ePrint Archive, 2015

CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.
IACR Cryptology ePrint Archive, 2015

End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol.
IACR Cryptology ePrint Archive, 2015

Linearly homomorphic structure-preserving signatures and their applications.
Des. Codes Cryptography, 2015

Sequential Aggregate Signatures with Short Public Keys without Random Oracles.
CoRR, 2015

A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

The "Mobile Adversary" Paradigm in Distributed Computation and Systems.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015

Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Hard Invalidation of Electronic Signatures.
Proceedings of the Information Security Practice and Experience, 2015

Privacy Threats in E-Shopping (Position Paper).
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

The bright side arguments for the coming smartphones crypto war: The added value of device encryption.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
IACR Cryptology ePrint Archive, 2014

A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation.
IACR Cryptology ePrint Archive, 2014

Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Traceable Group Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

On Offline Payments with Bitcoin (Poster Abstract).
Proceedings of the Financial Cryptography and Data Security, 2014

Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

The drunk motorcyclist protocol for anonymous communication.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Order-Preserving Encryption Secure Beyond One-Wayness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Adaptively secure non-interactive threshold cryptosystems.
Theor. Comput. Sci., 2013

PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage.
IACR Cryptology ePrint Archive, 2013

Order-Preserving Encryption Secure Beyond One-Wayness.
IACR Cryptology ePrint Archive, 2013

Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
IACR Cryptology ePrint Archive, 2013

Linearly Homomorphic Structure-Preserving Signatures and Their Applications.
IACR Cryptology ePrint Archive, 2013

Sequential Aggregate Signatures Made Shorter.
IACR Cryptology ePrint Archive, 2013

Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency.
IACR Cryptology ePrint Archive, 2013

Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Resource-based corruptions and the combinatorics of hidden diversity.
Proceedings of the Innovations in Theoretical Computer Science, 2013

Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.
Proceedings of the Financial Cryptography and Data Security, 2013

Linearly Homomorphic Structure-Preserving Signatures and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Sequential Aggregate Signatures Made Shorter.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Efficient robust private set intersection.
IJACT, 2012

"Metaproofs" (and their Cryptographic Applications).
IACR Cryptology ePrint Archive, 2012

Group Signatures with Almost-for-free Revocation.
IACR Cryptology ePrint Archive, 2012

Scalable Group Signatures with Revocation.
IACR Cryptology ePrint Archive, 2012

Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.
IACR Cryptology ePrint Archive, 2012

Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.
IACR Cryptology ePrint Archive, 2012

PayTree: "Amortized Signature" for Flexible Micro-Payments.
IACR Cryptology ePrint Archive, 2012

Resource-based Corruptions and the Combinatorics of Hidden Diversity.
IACR Cryptology ePrint Archive, 2012

On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs.
IACR Cryptology ePrint Archive, 2012

Adaptive Preimage Resistance Analysis Revisited: \\ Requirements, Subtleties and Implications.
IACR Cryptology ePrint Archive, 2012

Secret swarm unit: Reactive k-secret sharing.
Ad Hoc Networks, 2012

Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

On the Centrality of Off-Line E-Cash to Concrete Partial Information Games.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Multi-location Leakage Resilient Cryptography.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

Scalable Group Signatures with Revocation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Group Signatures with Almost-for-Free Revocation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Firm Grip Handshakes: A Tool for Bidirectional Vouching.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Fully Forward-Secure Group Signatures.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Efficient traceable signatures in the standard model.
Theor. Comput. Sci., 2011

A zero-knowledge based framework for RFID privacy.
Journal of Computer Security, 2011

The Efficient Dual Receiver Cryptosystem and Its Applications.
I. J. Network Security, 2011

Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge.
IACR Cryptology ePrint Archive, 2011

Indifferentiability of the Hash Algorithm BLAKE.
IACR Cryptology ePrint Archive, 2011

Signatures Resilient to Continual Leakage on Memory and Computation.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Multifactor Authenticated Key Renewal.
Proceedings of the Trusted Systems - Third International Conference, 2011

Adaptively Secure Non-interactive Threshold Cryptosystems.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

On the Security of Hash Functions Employing Blockcipher Postprocessing.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Cryptographic Protocols: From the Abstract to the Practical to the Actual.
Proceedings of the Financial Cryptography and Data Security, 2011

Efficient Circuit-Size Independent Public Key Encryption with KDM Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Key dependent message security: recent results and applications.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

From Protecting a System to Protecting a Global Ecosystem.
Proceedings of the Communications and Multimedia Security, 2011

Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Leakage Resilient Cryptography in Practice.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Key Evolution Systems in Untrusted Update Environments.
ACM Trans. Inf. Syst. Secur., 2010

Preface.
Theor. Comput. Sci., 2010

Adaptive Concurrent Non-Malleability with Bare Public-Keys.
IACR Cryptology ePrint Archive, 2010

Concurrent Knowledge Extraction in the Public-Key Model.
IACR Cryptology ePrint Archive, 2010

Signatures Resilient to Continual Leakage on Memory and Computation.
IACR Cryptology ePrint Archive, 2010

A New Framework for RFID Privacy.
IACR Cryptology ePrint Archive, 2010

On the Security of Hash Functions Employing Blockcipher Postprocessing.
IACR Cryptology ePrint Archive, 2010

The Vector-Ballot Approach for Online Voting Procedures.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Kleptography from Standard Assumptions and Applications.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Leakage-Resilient RFID Authentication with Forward-Privacy.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Leakage Resilient Strong Key-Insulated Signatures in Public Channel.
Proceedings of the Trusted Systems - Second International Conference, 2010

Concurrent Knowledge Extraction in the Public-Key Model.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

Efficient Completely Non-malleable Public Key Encryption.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Cryptography between Wonderland and Underland.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30, 2010

A New Framework for RFID Privacy.
Proceedings of the Computer Security, 2010

Practical leakage-resilient pseudorandom generators.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Dynamic fully forward-secure group signatures.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Efficient and secure authenticated key exchange using weak passwords.
J. ACM, 2009

The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure.
Inf. Process. Lett., 2009

Elastic block ciphers: method, security and instantiations.
Int. J. Inf. Sec., 2009

Leakage Resilient Cryptography in Practice.
IACR Cryptology ePrint Archive, 2009

On the Portability of Generalized Schnorr Proofs.
IACR Cryptology ePrint Archive, 2009

Adaptive Concurrent Non-Malleability with Bare Public-Keys
CoRR, 2009

Concurrent Knowledge-Extraction in the Public-Key Model
CoRR, 2009

Efficient Traceable Signatures in the Standard Model.
Proceedings of the Pairing-Based Cryptography, 2009

SocialClouds: Concept, Security Architecture and Some Mechanisms.
Proceedings of the Trusted Systems, First International Conference, 2009

Secure Function Collection with Sublinear Storage.
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009

How to Guard the Guards Themselves.
Proceedings of the Fundamentals of Computation Theory, 17th International Symposium, 2009

Expecting the Unexpected: Towards Robust Credential Infrastructure.
Proceedings of the Financial Cryptography and Data Security, 2009

Privacy-Preserving Information Markets for Computing Statistical Data.
Proceedings of the Financial Cryptography and Data Security, 2009

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
Proceedings of the Advances in Cryptology, 2009

A New Randomness Extraction Paradigm for Hybrid Encryption.
Proceedings of the Advances in Cryptology, 2009

On the Portability of Generalized Schnorr Proofs.
Proceedings of the Advances in Cryptology, 2009

Universal forgery of the identity-based sequential aggregate signature scheme.
Proceedings of the 2009 ACM Symposium on Information, 2009

Reverse Public Key Encryption.
Proceedings of the BIOSIG 2009, 2009

Secure Multi-party Computation Minimizing Online Rounds.
Proceedings of the Advances in Cryptology, 2009

Group Encryption: Non-interactive Realization in the Standard Model.
Proceedings of the Advances in Cryptology, 2009

Efficient Robust Private Set Intersection.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes.
IEEE Trans. Information Theory, 2008

On Monotone Formula Composition of Perfect Zero-Knowledge Languages.
SIAM J. Comput., 2008

A New Randomness Extraction Paradigm for Hybrid Encryption.
IACR Cryptology ePrint Archive, 2008

Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs.
IACR Cryptology ePrint Archive, 2008

Fair Traceable Multi-Group Signatures.
IACR Cryptology ePrint Archive, 2008

Privacy Preserving Data Mining within Anonymous Credential Systems.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Recovering NTRU Secret Key from Inversion Oracles.
Proceedings of the Public Key Cryptography, 2008

High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk).
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Fair Traceable Multi-Group Signatures.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

Key Evolution Systems in Untrusted Update Environments.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Decoding interleaved Reed-Solomon codes over noisy channels.
Theor. Comput. Sci., 2007

Scalable Protocols for Authenticated Group Key Exchange.
J. Cryptology, 2007

A Block Cipher based PRNG Secure Against Side-Channel Key Recovery.
IACR Cryptology ePrint Archive, 2007

Cryptographic Hardness based on the Decoding of Reed-Solomon Codes.
IACR Cryptology ePrint Archive, 2007

Group Encryption.
IACR Cryptology ePrint Archive, 2007

Concurrent Knowledge-Extraction in the Public-Key Model.
Electronic Colloquium on Computational Complexity (ECCC), 2007

Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice.
Des. Codes Cryptography, 2007

Parallel Key-Insulated Public Key Encryption Without Random Oracles.
Proceedings of the Public Key Cryptography, 2007

The Security of Elastic Block Ciphers Against Key-Recovery Attacks.
Proceedings of the Information Security, 10th International Conference, 2007

Secret Swarm UnitReactive k-Secret Sharing.
Proceedings of the Progress in Cryptology, 2007

Space-Efficient Kleptography Without Random Oracles.
Proceedings of the Information Hiding, 9th International Workshop, 2007

K-Anonymous Multi-party Secret Handshakes.
Proceedings of the Financial Cryptography and Data Security, 2007

Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model.
Proceedings of the Advances in Cryptology, 2007

On the Evolution of User Authentication: Non-bilateral Factors.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

A Timing-Resistant Elliptic Curve Backdoor in RSA.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Forward-secure signatures in untrusted update environments: efficient and generic constructions.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Elastic block ciphers: the basic design.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Group Encryption.
Proceedings of the Advances in Cryptology, 2007

Two-Party Computing with Encrypted Data.
Proceedings of the Advances in Cryptology, 2007

Preimage Attack on the Parallel FFT-Hashing Function.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
On Fundamental Limitations of Proving Data Theft.
IEEE Trans. Information Forensics and Security, 2006

Characterization of Security Notions for Probabilistic Private-Key Encryption.
J. Cryptology, 2006

Secure scalable group signature with dynamic joins and separable authorities.
IJSN, 2006

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version).
IACR Cryptology ePrint Archive, 2006

Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing.
IACR Cryptology ePrint Archive, 2006

Threshold and Proactive Pseudo-Random Permutations.
IACR Cryptology ePrint Archive, 2006

Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions).
IACR Cryptology ePrint Archive, 2006

Interactive Zero-Knowledge with Restricted Random Oracles.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

Threshold and Proactive Pseudo-Random Permutations.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

Short Traceable Signatures Based on Bilinear Pairings.
Proceedings of the Advances in Information and Computer Security, 2006

An Elliptic Curve Backdoor Algorithm for RSASSA.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Hiding Information Hiding.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

A Comparative Cost/Security Analysis of Fault Attack Countermeasures.
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006

Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.
Proceedings of the Financial Cryptography and Data Security, 2006

Efficient Intrusion-Resilient Signatures Without Random Oracles.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Fourth-factor authentication: somebody you know.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.
Proceedings of the Advances in Cryptology, 2006

2005
Group Signatures with Efficient Concurrent Join.
IACR Cryptology ePrint Archive, 2005

Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model
Electronic Colloquium on Computational Complexity (ECCC), 2005

Scalable public-key tracing and revoking.
Distributed Computing, 2005

A Space Efficient Backdoor in RSA and Its Applications.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Questionable Encryption and Its Applications.
Proceedings of the Progress in Cryptology, 2005

Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
Proceedings of the Progress in Cryptology, 2005

"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience.
Proceedings of the Information Security, 8th International Conference, 2005

Cryptography and decoding Reed-Solomon codes as a hard problem.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

Group Signatures with Efficient Concurrent Join.
Proceedings of the Advances in Cryptology, 2005

Malicious Cryptography: Kleptographic Aspects.
Proceedings of the Topics in Cryptology, 2005

A Remark on Implementing the Weil Pairing.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Secure Hypergraphs: Privacy from Partial Broadcast.
SIAM J. Discrete Math., 2004

The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.
IACR Cryptology ePrint Archive, 2004

Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice.
IACR Cryptology ePrint Archive, 2004

Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
IACR Cryptology ePrint Archive, 2004

Traceable Signatures.
IACR Cryptology ePrint Archive, 2004

Scalable Public-Key Tracing and Revoking.
IACR Cryptology ePrint Archive, 2004

Elastic AES.
IACR Cryptology ePrint Archive, 2004

Elastic Block Ciphers.
IACR Cryptology ePrint Archive, 2004

Evaluation of voting systems.
Commun. ACM, 2004

Relationships Between Diffie-Hellman and "Index Oracles".
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

A Subliminal Channel in Secret Block Ciphers.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures".
Proceedings of the Public Key Cryptography, 2004

Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption.
Proceedings of the Progress in Cryptology, 2004

Electronic National Lotteries.
Proceedings of the Financial Cryptography, 2004

The Vector-Ballot e-Voting Approach.
Proceedings of the Financial Cryptography, 2004

The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.
Proceedings of the Advances in Cryptology, 2004

Traceable Signatures.
Proceedings of the Advances in Cryptology, 2004

A Key Recovery System as Secure as Factoring.
Proceedings of the Topics in Cryptology, 2004

A Generic Construction for Intrusion-Resilient Public-Key Encryption.
Proceedings of the Topics in Cryptology, 2004

k-anonymous secret handshakes with reusable credentials.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

The dual receiver cryptosystem and its applications.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Accountable Ring Signatures: A Smart Card Approach.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice.
Proceedings of the Advances in Cryptology, 2004

Unconditionally Secure Encryption Under Strong Attacks.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

Malicious cryptography - exposing cryptovirology.
Wiley, ISBN: 978-0-7645-4975-5, 2004

2003
Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy.
Proceedings of the Secure Electronic Voting, 2003

Scalable Protocols for Authenticated Group Key Exchange.
IACR Cryptology ePrint Archive, 2003

Scalable public-key tracing and revoking.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

Strong Key-Insulated Signature Schemes.
Proceedings of the Public Key Cryptography, 2003

Decoding of Interleaved Reed Solomon Codes over Noisy Data.
Proceedings of the Automata, Languages and Programming, 30th International Colloquium, 2003

The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution.
Proceedings of the IEEE Systems, 2003

Trusted Computing Platforms: The Good, the Bad, and the Ugly.
Proceedings of the Financial Cryptography, 2003

Retrofitting Fairness on the Original RSA-Based E-cash.
Proceedings of the Financial Cryptography, 2003

Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Proceedings of the Financial Cryptography, 2003

Extracting Group Signatures from Traitor Tracing Schemes.
Proceedings of the Advances in Cryptology, 2003

Idiosyncratic Signatures for Authenticated Execution of Management Code.
Proceedings of the Self-Managing Distributed Systems, 2003

Intrusion-Resilient Public-Key Encryption.
Proceedings of the Topics in Cryptology, 2003

Scalable Protocols for Authenticated Group Key Exchange.
Proceedings of the Advances in Cryptology, 2003

Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Adaptively secure distributed public-key systems.
Theor. Comput. Sci., 2002

Self-Stabilizing Symmetry Breaking in Constant Space.
SIAM J. Comput., 2002

Key-Insulated Public-Key Cryptosystems.
IACR Cryptology ePrint Archive, 2002

Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications
Electronic Colloquium on Computational Complexity (ECCC), 2002

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

Forward Secrecy in Password-Only Key Exchange Protocols.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

Self-tallying Elections and Perfect Ballot Secrecy.
Proceedings of the Public Key Cryptography, 2002

Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes.
Proceedings of the Automata, Languages and Programming, 29th International Colloquium, 2002

The Dark Side of Threshold Cryptography.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Split-and-Delegate: Threshold Cryptography for the Masses.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Traitor Tracing with Constant Transmission Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Key-Insulated Public Key Cryptosystems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Observability Analysis - Detecting When Improved Cryptosystems Fail.
Proceedings of the Topics in Cryptology, 2002

Breaking and Repairing Asymmetric Public-Key Traitor Tracing.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

Crypto-integrity.
Proceedings of the Advances in Cryptology, 2002

Threshold Cryptosystems Based on Factoring.
Proceedings of the Advances in Cryptology, 2002

Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Threshold Cryptosystems Based on Factoring.
IACR Cryptology ePrint Archive, 2001

Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords.
IACR Cryptology ePrint Archive, 2001

E-commerce applications of smart cards.
Computer Networks, 2001

Polynomial Reconstruction Based Cryptography.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

A PVSS as Hard as Discrete Log and Shareholder Separability.
Proceedings of the Public Key Cryptography, 2001

Adaptive Security for the Additive-Sharing Based Proactive RSA.
Proceedings of the Public Key Cryptography, 2001

DISSECT: DIStribution for SECurity Tool.
Proceedings of the Information Security, 4th International Conference, 2001

Secure Games with Polynomial Expressions.
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001

Incremental Unforgeable Encryption.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

The Business of Electronic Voting.
Proceedings of the Financial Cryptography, 2001

Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords.
Proceedings of the Advances in Cryptology, 2001

On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC.
Proceedings of the Topics in Cryptology, 2001

Self Protecting Pirates and Black-Box Traitor Tracing.
Proceedings of the Advances in Cryptology, 2001

Bandwidth-Optimal Kleptographic Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

On Crafty Pirates and Foxy Tracers.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

2000
Local and congestion-driven fairness algorithm in arbitrary topology networks.
IEEE/ACM Trans. Netw., 2000

Robust Parallel Computations through Randomization.
Theory Comput. Syst., 2000

Combined Asynchronous/Synchronous Packet Switching Architecture: QoS Guarantees for Integrated Parallel Computing and Real-Time Traffic.
J. Parallel Distrib. Comput., 2000

Eavesdropping games: a graph-theoretic approach to privacy in distributed systems.
J. ACM, 2000

Connectivity Properties in Random Regular Graphs with Edge Faults.
Int. J. Found. Comput. Sci., 2000

Complete characterization of security notions for probabilistic private-key encryption.
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

On zero-knowledge proofs (extended abstract): "from membership to decision".
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

RSA-Based Auto-recoverable Cryptosystems.
Proceedings of the Public Key Cryptography, 2000

"Psyeudorandom Intermixing": A Tool for Shared Cryptography.
Proceedings of the Public Key Cryptography, 2000

Design Validations for Discrete Logarithm Based Signature Schemes.
Proceedings of the Public Key Cryptography, 2000

Hash to the Rescue: Space Minimization for PKI Directories.
Proceedings of the Information Security and Cryptology, 2000

Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Payment Systems: The Next Generation.
Proceedings of the Financial Cryptography, 2000

Blind, Auditable Membership Proofs.
Proceedings of the Financial Cryptography, 2000

Funkspiel schemes: an alternative to conventional tamper resistance.
Proceedings of the CCS 2000, 2000

Friendly Observers Ease Off-Line E-Cash.
Proceedings of the Smart Card Research and Advanced Applications, 2000

Towards Signature-Only Signature Schemes.
Proceedings of the Advances in Cryptology, 2000

1999
Convergence routing on disjoint spanning trees.
Computer Networks, 1999

Access regulation mechanism for switch-based LAN.
Computer Networks, 1999

Self-Testing/Correcting Protocols (Extended Abstract).
Proceedings of the Distributed Computing, 1999

Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy.
Proceedings of the Public Key Cryptography, 1999

Decision Oracles are Equivalent to Matching Oracles.
Proceedings of the Public Key Cryptography, 1999

Money Conservation via Atomicity in Fair Off-Line E-Cash.
Proceedings of the Information Security, Second International Workshop, 1999

Software DisEngineering: Program Hiding Architecture and Experiments.
Proceedings of the Information Hiding, Third International Workshop, 1999

Self-Escrowed Public-Key Infrastructures.
Proceedings of the Information Security and Cryptology, 1999

On Threshold RSA-Signing with no Dealer.
Proceedings of the Information Security and Cryptology, 1999

Scramble All, Encrypt Small.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Non-Interactive CryptoComputing For NC1.
Proceedings of the 40th Annual Symposium on Foundations of Computer Science, 1999

Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control".
Proceedings of the Financial Cryptography, 1999

Adaptively-Secure Distributed Public-Key Systems.
Proceedings of the Algorithms, 1999

Auto-recoverable Auto-certifiable Cryptosystems (A Survey).
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

Electronic Payments: Where Do We Go from Here?.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

Secure Protocol Transformation via "Expansion": From Two-Party to Groups.
Proceedings of the CCS '99, 1999

Adaptively-Secure Optimal-Resilience Proactive RSA.
Proceedings of the Advances in Cryptology, 1999

1998
Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation.
J. Cryptology, 1998

Perfectly Secure Key Distribution for Dynamic Conferences.
Inf. Comput., 1998

VarietyCash: A Multi-Purpose Electronic Payment System.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Robust Efficient Distributed RSA-Key Generation.
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998

Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols.
Proceedings of the STACS 98, 1998

"Dynamic-Fault-Prone BSP": A Paradigm for Robust Computations in Changing Environments.
SPAA, 1998

Robust Efficient Distributed RSA-Key Generation.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

On the Security of ElGamal Based Encryption.
Proceedings of the Public Key Cryptography, 1998

Lower Bounds on Term-Based Divisible Cash Systems.
Proceedings of the Public Key Cryptography, 1998

Distributed Public Key Cryptosystems.
Proceedings of the Public Key Cryptography, 1998

Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it.
Proceedings of the Algorithms and Computation, 9th International Symposium, 1998

Image Density is Complete for Non-Interactive-SZK (Extended Abstract).
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998

Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

On Assurance Structures for WWW Commerce.
Proceedings of the Financial Cryptography, 1998

Beyond Identity: Warranty-Based Digital Signature Transactions.
Proceedings of the Financial Cryptography, 1998

Auto-Recoverable Auto-Certifiable Cryptosystems.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

How to Say "YES" with Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Fair Off-Line e-cash Made Easy.
Proceedings of the Advances in Cryptology, 1998

Finding Length-3 Positive Cunningham Chains.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998

1997
Combinatorial design of congestion-free networks.
IEEE/ACM Trans. Netw., 1997

Scheduling Task-Trees with Additive Scales on Parallel/Distributed Machines.
Theor. Comput. Sci., 1997

The Local Detection Paradigm and Its Application to Self-Stabilization.
Theor. Comput. Sci., 1997

Concurrent Asynchronous Broadcast on the MetaNet.
IEEE Trans. Computers, 1997

Fault-Tolerant Convergence Routing.
J. Parallel Distrib. Comput., 1997

Efficient On-Line Call Control Algorithms.
J. Algorithms, 1997

Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function.
IACR Cryptology ePrint Archive, 1997

Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Scalability and Flexibility in Authentication Services: The KryptoKnight Approach.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

Zero-knowledge proofs of decision power: new protocols and optimal round-complexity.
Proceedings of the Information and Communication Security, First International Conference, 1997

On Characterization of Escrow Encryption Schemes.
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997

Sliding Encryption: A Cryptographic Tool for Mobile Agents.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Optimal Resilience Proactive Public-Key Cryptosystems.
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997

Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System.
Proceedings of the Financial Cryptography, 1997

Anonymity Control in E-Cash Systems.
Proceedings of the Financial Cryptography, 1997

Kleptography: Using Cryptography Against Cryptography.
Proceedings of the Advances in Cryptology, 1997

Distributed "Magic Ink" Signatures.
Proceedings of the Advances in Cryptology, 1997

Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function.
Proceedings of the Advances in Cryptology, 1997

The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems.
Proceedings of the Advances in Cryptology, 1997

Proactive RSA.
Proceedings of the Advances in Cryptology, 1997

Keeping the SZK-Verifier Honest Unconditionally.
Proceedings of the Advances in Cryptology, 1997

Proactive Public Key and Signature Systems.
Proceedings of the CCS '97, 1997

1996
Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation.
J. Cryptology, 1996

Proactive RSA.
IACR Cryptology ePrint Archive, 1996

Witness-Based Cryptographic Program Checking and Robust Function Sharing.
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996

Cryptovirology: Extortion-Based Security Threats and Countermeasures.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Self-Stabilizing Algorithms for Synchronous Unidirectional Rings.
Proceedings of the Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 1996

Witness-Based Cryptographic Program Checking and Applications (an Announcement).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

Approximating Max-Min Fair Rates via Distributed Local Scheduling with Partial Information.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996

"Time-Driven Priority" Flow Control for Real-Time Heterogeneous Internetworking.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996

A Progress Report on Subliminal-Free Channels.
Proceedings of the Information Hiding, First International Workshop, Cambridge, U.K., May 30, 1996

Agent Rendezvous: A Dynamic Symmetry-Breaking Problem.
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996

Multi-Autority Secret-Ballot Elections with Linear Work.
Proceedings of the Advances in Cryptology, 1996

The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
Proceedings of the Advances in Cryptology, 1996

Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers.
Proceedings of the Advances in Cryptology, 1996

Distributed Computing in Asynchronous Networks with Byzantine Edges.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

Revokable and Versatile Electronic Money (extended abstract).
Proceedings of the CCS '96, 1996

"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash.
Proceedings of the Advances in Cryptology, 1996

1995
Security issues in a CDPD wireless network.
IEEE Personal Commun., 1995

METANET principles of an arbitrary topology LAN.
IEEE/ACM Trans. Netw., 1995

The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw., 1995

Secure hypergraphs: privacy from partial broadcast (Extended Abstract).
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995

Topological Design of Loss-Free Switch-Based LANs.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995

Local Fairness in General-Topology Networks with Convergence Routing.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995

Stochastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time.
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995

Resolving Message Complexity of Byzantine Agreement and beyond.
Proceedings of the 36th Annual Symposium on Foundations of Computer Science, 1995

Efficient Dynamic-Resharing "Verifiable Secret Sharing" Against Mobile Adversary.
Proceedings of the Algorithms, 1995

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Proceedings of the Advances in Cryptology, 1995

Cryptanalysis of the Immunized LL Public Key Systems.
Proceedings of the Advances in Cryptology, 1995

Escrow Encryption Systems Visited: Attacks, Analysis and Designs.
Proceedings of the Advances in Cryptology, 1995

Scheduling Task-Tree with Additive Scales on Parallel / Distributed Machines.
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995

1994
Routing and Flow Control on the MetaNet: An Overview.
Computer Networks and ISDN Systems, 1994

Secure Distributed Computing: Theory and Practice.
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994

How to share a function securely.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994

Time-Optimal Message-Efficient Work Performance in the Presence of Faults (Extended Summary).
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

Coins, Weights and Contention in Balancing Networks.
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

The Integrated MetaNet Architecture: A Switch-Based Multimedia LAN for Parallel Computing and Real-Time Traffic.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

Fault-tolerant convergence routing.
Proceedings of the 1994 International Conference on Network Protocols, 1994

Short Vertex Disjoint Paths and Multiconnectivity in Random Graphs: Reliable Network Computing.
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994

On Monotone Formula Closure of SZK
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994

The Blinding of Weak Signatures (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994

Non-Exploratory Self-Stabilization for Constant-Space Symmetry-Breaking.
Proceedings of the Algorithms, 1994

Space Lower-Bounds for Pseudorandom-Generators.
Proceedings of the Ninth Annual Structure in Complexity Theory Conference, Amsterdam, The Netherlands, June 28, 1994

1993
Systematic Design of a Family of Attack-Resistant Authentication Protocols.
IEEE Journal on Selected Areas in Communications, 1993

Corrigendum: Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph.
J. Algorithms, 1993

Perfectly Secure Message Transmission.
J. ACM, 1993

Configuration and performance issues in the MetaNet design.
Proceedings of the 18th Conference on Local Computer Networks, 1993

Efficient On-Line Call Control Algorithms.
Proceedings of the Second Israel Symposium on Theory of Computing Systems, 1993

Secure and Efficient Off-Line Digital Money (Extended Abstract).
Proceedings of the Automata, Languages and Programming, 20nd International Colloquium, 1993

Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems
Proceedings of the 34th Annual Symposium on Foundations of Computer Science, 1993

Interactive Hashing Simplifies Zero-Knowledge Protocol Design.
Proceedings of the Advances in Cryptology, 1993

1992
Maintenance of a Minimum Spanning Forest in a Dynamic Plane Graph.
J. Algorithms, 1992

Criticizing solutions to relaxed models yields powerful admissible heuristics.
Inf. Sci., 1992

Self-Stabilizing Symmetry Breaking in Constant-Space (Extended Abstract)
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992

Communication Complexity of Secure Computation (Extended Abstract)
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992

Secure Commitment Against A Powerful Adversary.
Proceedings of the STACS 92, 1992

Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier.
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992

Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

Perfectly-Secure Key Distribution for Dynamic Conferences.
Proceedings of the Advances in Cryptology, 1992

Certifying Cryptographic Tools: The Case of Trapdoor Permutations.
Proceedings of the Advances in Cryptology, 1992

1991
Constant-Round Perfect Zero-Knowledge Computationally Convincing Protocols.
Theor. Comput. Sci., 1991

Efficient Sequential and Parallel Algorithms for Computing Recovery Points in Trees and Paths.
Proceedings of the Second Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, 1991

How to Withstand Mobile Virus Attacks (Extended Abstract).
Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, 1991

Lossless Asynchronous Broadcast-with-Feedback on the MetaNet Architecture.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

Weakness of Undeniable Signature Schemes (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991

Systematic Design of Two-Party Authentication Protocols.
Proceedings of the Advances in Cryptology, 1991

1990
The Power of Multimedia: Combining Point-to-Point and Multiaccess Networks
Inf. Comput., January, 1990

Efficient Mechanism for Fairness and Deadlock-Avoidance in High-Speed Networks.
Proceedings of the Distributed Algorithms, 4th International Workshop, 1990

Memory-Efficient Self Stabilizing Protocols for General Networks.
Proceedings of the Distributed Algorithms, 4th International Workshop, 1990

Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990

Maintenance of a Minimum Spanning Forest in a Dynamic Planar Graph.
Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms, 1990

Principle for High Speed Network Control: Congestion- and Deadlock-Freeness, Self-Routing, and a Single Buffer per Link.
Proceedings of the Ninth Annual ACM Symposium on Principles of Distributed Computing, 1990

Perfectly Secure Message Transmission
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990

On the Design of Provably Secure Cryptographic Hash Functions.
Proceedings of the Advances in Cryptology, 1990

Fair Games against an All-Powerful Adversary.
Proceedings of the Advances In Computational Complexity Theory, 1990

Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems.
Proceedings of the Advances in Cryptology, 1990

Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract).
Proceedings of the Advances in Cryptology, 1990

One-Way Group Actions.
Proceedings of the Advances in Cryptology, 1990

1989
Minimum-Knowledge Interactive Proofs for Decision Problems.
SIAM J. Comput., 1989

Divide and Conquer under Global Constraints: A Solution to the N-Queens Problem.
J. Parallel Distrib. Comput., 1989

Fast Algorithms for Edge-Coloring Planar Graphs.
J. Algorithms, 1989

Universal One-Way Hash Functions and their Cryptographic Applications
Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 1989

Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds.
Proceedings of the Automata, Languages and Programming, 16th International Colloquium, 1989

Lower Bounds for Pseudorandom Number Generators
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989

Zero-Knowledge Proofs of Computational Power (Extended Summary).
Proceedings of the Advances in Cryptology, 1989

A Secure Public-key Authentication Scheme.
Proceedings of the Advances in Cryptology, 1989

Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989

On Necessary Conditions for Secure Distributed Computation.
Proceedings of the Distributed Computing And Cryptography, 1989

Security against Replay Chosen-Ciphertext Attack.
Proceedings of the Distributed Computing And Cryptography, 1989

1988
The Power of Multimedia: Combining Point-to Point and Multi-Access Networks.
Proceedings of the Seventh Annual ACM Symposium on Principles of Distributed Computing, 1988

Fast Parallel and Sequential Algorithms for Edge-Coloring Planar Graphs.
Proceedings of the VLSI Algorithms and Architectures, 3rd Aegean Workshop on Computing, 1988

1987
Distributed Algorithms in Synchronous Broadcasting Networks.
Theor. Comput. Sci., 1987

Partitioned Encryption and Achieving Simultaneity by Partitioning.
Inf. Process. Lett., 1987

Direct Minimum-Knowledge Computations.
Proceedings of the Advances in Cryptology, 1987

Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model.
Proceedings of the Advances in Cryptology, 1987

1986
Distributing the Power of a Government to Enhance the Privacy of Voters (Extended Abstract).
Proceedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing, 1986

Construction Through Decomposition: A Divide-and-Conquer Algoithm for the N-Queens Problem.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986

1985
A Secure and Useful 'Keyless Cryptosystem'.
Inf. Process. Lett., 1985

Distributed Algorithms in Synchronous Broadcasting Networks (Extended Abstract).
Proceedings of the Automata, 1985

A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems (Extended Abstract)
Proceedings of the 26th Annual Symposium on Foundations of Computer Science, 1985

Symmetric Public-Key Encryption.
Proceedings of the Advances in Cryptology, 1985

1984
Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract).
Proceedings of the Advances in Cryptology, 1984


  Loading...