Cryptographers' World
 

Moti Yung


Author's Web Page Link

115 papers and 1 book in database with 5724 citations StarStarStarStar

Editor of 10 conference proceedings books

H-number: 38

Books

 
1. Adam YoungMoti YungMalicious Cryptography: Exposing Cryptovirology. Wiley, 2004. ISBN 978-0-764-54975-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 38 times ]


Conference Proceedings

 
1. Steven M. BellovinRosario GennaroAngelos D. KeromytisMoti Yung, editors, Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Springer, 2008. ISBN 978-3-540-68913-3.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Kannan SrinathanC. Pandu RanganMoti Yung, editors, Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings. Springer, 2007. ISBN 3-540-77025-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. Jonathan KatzMoti Yung, editors, Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings. Springer, 2007. ISBN 3-540-72737-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

4. Jianying ZhouMoti YungFeng Bao, editors, Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings. Springer, 2006. ISBN 3-540-34703-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

5. Moti YungYevgeniy DodisAggelos KiayiasTal Malkin, editors, Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Springer, 2006. ISBN 3-540-33851-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

6. John IoannidisAngelos D. KeromytisMoti Yung, editors, Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings. Springer, 2005. ISBN 3-540-26223-7.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

7. Andrew S. PatrickMoti Yung, editors, Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers. Springer, 2005. ISBN 3-540-26656-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

8. Markus JakobssonMoti YungJianying Zhou, editors, Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings. Springer, 2004. ISBN 3-540-22217-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

9. Jianying ZhouMoti YungYongfei Han, editors, Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings. Springer, 2003. ISBN 3-540-20208-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

10. Moti Yung, editor, Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings. Springer, 2002. ISBN 3-540-44050-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Aggelos Kiayias,  Moti Yung,  Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice, Designs, Codes and Cryptography, Volume 43(2), pp. 61 - 78, Springer, 2007.

[Electronic Edition][Cited 2 times ]

2. Jonathan Katz,  Moti Yung,  Scalable Protocols for Authenticated Group Key Exchange, Journal of Cryptology, Volume 20(1), pp. 85 - 113, Springer, 2007.

[Cited 162 times Red StarRed Star]

3. Jonathan Katz,  Moti Yung,  Characterization of Security Notions for Probabilistic Private-Key Encryption, Journal of Cryptology, Volume 19(1), pp. 67 - 95, Springer, 2006.

[Cited 89 times Red Star]

4. Moni Naor,  Rafail Ostrovsky,  Ramarathnam Venkatesan,  Moti Yung,  Perfect Zero-Knowledge Arguments for , Journal of Cryptology, Volume 11(2), pp. 87 - 108, Springer, 1998.

[Cited 80 times Red Star]

5. Mihir Bellare,  Moti Yung,  Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation, Journal of Cryptology, Volume 9(3), pp. 149 - 166, Springer, 1996.

[Cited 35 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Seung Geol Choi,  Ariel Elbaz,  Tal Malkin,  Moti Yung,  Secure Multi-party Computation Minimizing Online Rounds, pp. 268 - 286, ASIACRYPT 2009.

[Electronic Edition][Cited 2 times ]

2. Julien Cathalo,  Benoît Libert,  Moti Yung,  Group Encryption: Non-interactive Realization in the Standard Model, pp. 179 - 196, ASIACRYPT 2009.

[Electronic Edition][Cited 4 times ]

3. Dana Dachman-Soled,  Tal Malkin,  Mariana Raykova,  Moti Yung,  Efficient Robust Private Set Intersection, pp. 125 - 142, ACNS 2009.

[Electronic Edition][Cited 10 times ]

4. Eike Kiltz,  Krzysztof Pietrzak,  Martijn Stam,  Moti Yung,  A New Randomness Extraction Paradigm for Hybrid Encryption, pp. 590 - 609, EUROCRYPT 2009.

[Electronic Edition][Cited 19 times ]

5. Jan Camenisch,  Aggelos Kiayias,  Moti Yung,  On the Portability of Generalized Schnorr Proofs, pp. 425 - 442, EUROCRYPT 2009.

[Electronic Edition][Cited 18 times ]

6. François-Xavier Standaert,  Tal Malkin,  Moti Yung,  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, pp. 443 - 461, EUROCRYPT 2009.

[Electronic Edition][Cited 92 times Red Star]

7. Petros Mol,  Moti Yung,  Recovering NTRU Secret Key from Inversion Oracles, pp. 18 - 36, PKC 2008.

[Electronic Edition][Cited 7 times ]

8. Shlomi Dolev,  Limor Lahiani,  Moti Yung,  Secret Swarm Unit Reactive k-Secret Sharing, pp. 123 - 137, INDOCRYPT 2007.

[Electronic Edition][Cited 17 times ]

9. Shouhuai Xu,  Moti Yung,  K-Anonymous Multi-party Secret Handshakes , pp. 72 - 87, FC 2007.

[Electronic Edition][Cited 1 times ]

10. Aggelos Kiayias,  Yiannis Tsiounis,  Moti Yung,  Group Encryption, pp. 181 - 199, ASIACRYPT 2007.

[Electronic Edition][Cited 13 times ]

11. Seung Geol Choi,  Ariel Elbaz,  Ari Juels,  Tal Malkin,  Moti Yung,  Two-Party Computing with Encrypted Data, pp. 298 - 314, ASIACRYPT 2007.

[Electronic Edition][Cited 4 times ]

12. Benoît Libert,  Jean-Jacques Quisquater,  Moti Yung,  Parallel Key-Insulated Public Key Encryption Without Random Oracles, pp. 298 - 314, PKC 2007.

[Electronic Edition][Cited 8 times ]

13. Moti Yung,  Yunlei Zhao,  Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model, pp. 129 - 147, EUROCRYPT 2007.

[Electronic Edition][Cited 9 times ]

14. Yevgeniy Dodis,  Aleksandr Yampolskiy,  Moti Yung,  Threshold and Proactive Pseudo-Random Permutations, pp. 542 - 560, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 4 times ]

15. Moti Yung,  Yunlei Zhao,  Interactive Zero-Knowledge with Restricted Random Oracles, pp. 21 - 40, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

16. Aggelos Kiayias,  Moti Yung,  Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination, pp. 311 - 325, FC 2006.

[Electronic Edition][Cited 1 times ]

17. Donghoon Chang,  Sangjin Lee,  Mridul Nandi,  Moti Yung,  Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding, pp. 283 - 298, ASIACRYPT 2006.

[Electronic Edition][Cited 34 times ]

18. Aggelos Kiayias,  Moti Yung,  Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers, pp. 151 - 170, MYCRYPT 2005.

[Electronic Edition][Cited 10 times ]

19. Adam Young,  Moti Yung,  Questionable Encryption and Its Applications, pp. 210 - 221, MYCRYPT 2005.

[Electronic Edition][Cited 3 times ]

20. Adam Young,  Moti Yung,  A Space Efficient Backdoor in RSA and Its Applications, pp. 128 - 143, SAC 2005.

[Electronic Edition][Cited 12 times ]

21. Aggelos Kiayias,  Moti Yung,  Group Signatures with Efficient Concurrent Join, pp. 198 - 214, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 49 times ]

22. Adam Young,  Moti Yung,  Malicious Cryptography: Kleptographic Aspects, pp. 7 - 18, CT-RSA 2005.

[Electronic Edition][Cited 8 times ]

23. Aggelos Kiayias,  Moti Yung,  Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice, pp. 401 - 416, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

24. Luke McAven,  Reihaneh Safavi-Naini,  Moti Yung,  Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption, pp. 148 - 161, INDOCRYPT 2004.

[Electronic Edition][Cited 2 times ]

25. Adam Young,  Moti Yung,  A Subliminal Channel in Secret Block Ciphers, pp. 198 - 211, SAC 2004.

[Electronic Edition][Cited 5 times ]

26. Tal Malkin,  Satoshi Obana,  Moti Yung,  The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures, pp. 306 - 322, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 32 times ]

27. Aggelos Kiayias,  Yiannis Tsiounis,  Moti Yung,  Traceable Signatures, pp. 571 - 589, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 108 times Red StarRed Star]

28. Reihaneh Safavi-Naini,  Luke McAven,  Moti Yung,  General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures", pp. 231 - 247, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

29. Aggelos Kiayias,  Moti Yung,  The Vector-Ballot e-Voting Approach, pp. 72 - 89, FC 2004.

[Electronic Edition][Cited 41 times ]

30. Elisavet Konstantinou,  Vasiliki Liagkou,  Paul G. Spirakis,  Yannis C. Stamatiou,  Moti Yung,  Electronic National Lotteries, pp. 147 - 163, FC 2004.

[Electronic Edition][Cited 4 times ]

31. Yevgeniy Dodis,  Matthew K. Franklin,  Jonathan Katz,  Atsuko Miyaji,  Moti Yung,  A Generic Construction for Intrusion-Resilient Public-Key Encryption, pp. 81 - 98, CT-RSA 2004.

[Electronic Edition][Cited 34 times ]

32. Adam Young,  Moti Yung,  A Key Recovery System as Secure as Factoring, pp. 129 - 142, CT-RSA 2004.

[Electronic Edition][No citation]

33. Jonathan Katz,  Moti Yung,  Scalable Protocols for Authenticated Group Key Exchange, pp. 110 - 125, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 231 times Red StarRed Star]

34. Aggelos Kiayias,  Moti Yung,  Extracting Group Signatures from Traitor Tracing Schemes, pp. 630 - 648, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 42 times ]

35. Yevgeniy Dodis,  Matthew K. Franklin,  Jonathan Katz,  Atsuko Miyaji,  Moti Yung,  Intrusion-Resilient Public-Key Encryption, pp. 19 - 32, CT-RSA 2003.

[Electronic Edition][Cited 66 times Red Star]

36. Shouhuai Xu,  Moti Yung,  Retrofitting Fairness on the Original RSA-Based E-cash, pp. 51 - 68, FC 2003.

[Electronic Edition][Cited 3 times ]

37. Aggelos Kiayias,  Moti Yung,  Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making, pp. 303 - 320, FC 2003.

[Electronic Edition][Cited 14 times ]

38. Moti Yung,  Trusted Computing Platforms: The Good, the Bad, and the Ugly, pp. 250 - 254, FC 2003.

[Electronic Edition][Cited 5 times ]

39. Yevgeniy Dodis,  Jonathan Katz,  Shouhuai Xu,  Moti Yung,  Strong Key-Insulated Signature Schemes, pp. 130 - 144, PKC 2003.

[Electronic Edition][Cited 151 times Red StarRed Star]

40. Moti Yung,  Crypto-integrity, pp. 567 - 573, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][No citation]

41. Jonathan Katz,  Moti Yung,  Threshold Cryptosystems Based on Factoring, pp. 192 - 205, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

42. Aggelos Kiayias,  Moti Yung,  Traitor Tracing with Constant Transmission Rate, pp. 450 - 465, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 73 times Red Star]

43. Yevgeniy Dodis,  Jonathan Katz,  Shouhuai Xu,  Moti Yung,  Key-Insulated Public Key Cryptosystems, pp. 65 - 82, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 214 times Red StarRed Star]

44. Daniel E. Geer Jr.,  Moti Yung,  Split-and-Delegate: Threshold Cryptography for the Masses, pp. 220 - 237, FC 2002.

[Electronic Edition][Cited 3 times ]

45. Shouhuai Xu,  Moti Yung,  The Dark Side of Threshold Cryptography, pp. 198 - 219, FC 2002.

[Electronic Edition][Cited 6 times ]

46. Marc Joye,  Jean-Jacques Quisquater,  Sung-Ming Yen,  Moti Yung,  Observability Analysis - Detecting When Improved Cryptosystems Fail, pp. 17 - 29, CT-RSA 2002.

[Electronic Edition][Cited 22 times ]

47. Aggelos Kiayias,  Moti Yung,  Self-tallying Elections and Perfect Ballot Secrecy, pp. 141 - 158, PKC 2002.

[Electronic Edition][Cited 65 times Red Star]

48. Aggelos Kiayias,  Moti Yung,  Self Protecting Pirates and Black-Box Traitor Tracing, pp. 63 - 79, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 49 times ]

49. Aggelos Kiayias,  Moti Yung,  Polynomial Reconstruction Based Cryptography, pp. 129 - 133, SAC 2001.

[Electronic Edition][Cited 11 times ]

50. Jonathan Katz,  Rafail Ostrovsky,  Moti Yung,  Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords, pp. 475 - 494, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 230 times Red StarRed Star]

51. Adam Young,  Moti Yung,  Bandwidth-Optimal Kleptographic Attacks, pp. 235 - 250, CHES 2001.

[Electronic Edition][Cited 8 times ]

52. Marc Joye,  Jean-Jacques Quisquater,  Moti Yung,  On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC, pp. 208 - 222, CT-RSA 2001.

[Electronic Edition][Cited 40 times ]

53. Enrico Buonanno,  Jonathan Katz,  Moti Yung,  Incremental Unforgeable Encryption, pp. 109 - 124, FSE 2001.

[Electronic Edition][Cited 2 times ]

54. Adam Young,  Moti Yung,  A PVSS as Hard as Discrete Log and Shareholder Separability, pp. 287 - 299, PKC 2001.

[Electronic Edition][Cited 12 times ]

55. Ed Gerck,  C. Andrew Neff,  Ronald L. Rivest,  Aviel D. Rubin,  Moti Yung,  The Business of Electronic Voting, pp. 234 - 259, FC 2001.

[Electronic Edition][Cited 5 times ]

56. Yair Frankel,  Philip D. MacKenzie,  Moti Yung,  Adaptive Security for the Additive-Sharing Based Proactive RSA, pp. 240 - 263, PKC 2001.

[Electronic Edition][Cited 20 times ]

57. Adam Young,  Moti Yung,  Towards Signature-Only Signature Schemes, pp. 97 - 115, ASIACRYPT 2000.

[Electronic Edition][Cited 2 times ]

58. Jonathan Katz,  Moti Yung,  Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation, pp. 284 - 299, FSE 2000.

[Electronic Edition][Cited 62 times Red Star]

59. Moti Yung,  Payment Systems: The Next Generation, pp. 136 - 139, FC 2000.

[Electronic Edition][Cited 1 times ]

60. Tomas Sander,  Amnon Ta-Shma,  Moti Yung,  Blind, Auditable Membership Proofs, pp. 53 - 71, FC 2000.

[Electronic Edition][Cited 19 times ]

61. Ernest F. Brickell,  David Pointcheval,  Serge Vaudenay,  Moti Yung,  Design Validations for Discrete Logarithm Based Signature Schemes, pp. 276 - 292, PKC 2000.

[Electronic Edition][Cited 58 times Red Star]

62. Adam Young,  Moti Yung,  RSA-Based Auto-recoverable Cryptosystems, pp. 326 - 341, PKC 2000.

[Electronic Edition][Cited 6 times ]

63. Yair Frankel,  Philip D. MacKenzie,  Moti Yung,  "Pseudorandom Intermixing": A Tool for Shared Cryptography, pp. 306 - 325, PKC 2000.

[Electronic Edition][Cited 2 times ]

64. Yair Frankel,  Philip D. MacKenzie,  Moti Yung,  Adaptively-Secure Optimal-Resilience Proactive RSA, pp. 180 - 194, ASIACRYPT 1999.

[Electronic Edition][Cited 28 times ]

65. Markus Jakobsson,  Julien P. Stern,  Moti Yung,  Scramble All, Encrypt Small, pp. 95 - 111, FSE 1999.

[Electronic Edition][Cited 33 times ]

66. Helena Handschuh,  Yiannis Tsiounis,  Moti Yung,  Decision Oracles are Equivalent to Matching Oracles, pp. 276 - 289, PKC 1999.

[Electronic Edition][Cited 11 times ]

67. Adam Young,  Moti Yung,  Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy, pp. 306 - 314, PKC 1999.

[Electronic Edition][Cited 9 times ]

68. Yair Frankel,  Moti Yung,  Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control", pp. 241 - 252, FC 1999.

[Electronic Edition][Cited 2 times ]

69. Yair Frankel,  Yiannis Tsiounis,  Moti Yung,  Fair Off-Line e-cash Made Easy, pp. 257 - 270, ASIACRYPT 1998.

[Electronic Edition][Cited 66 times Red Star]

70. Adam Young,  Moti Yung,  Auto-Recoverable Auto-Certifiable Cryptosystems, pp. 17 - 31, EUROCRYPT 1998.

[Electronic Edition][Cited 59 times Red Star]

71. Adam Young,  Moti Yung,  Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs, pp. 122 - 133, FSE 1998.

[Electronic Edition][Cited 5 times ]

72. Yiannis Tsiounis,  Moti Yung,  On the Security of ElGamal Based Encryption, pp. 117 - 134, PKC 1998.

[Electronic Edition][Cited 223 times Red StarRed Star]

73. Markus Jakobsson,  Moti Yung,  On Assurance Structures for WWW Commerce, pp. 141 - 157, FC 1998.

[Electronic Edition][Cited 12 times ]

74. Yair Frankel,  Moti Yung,  Distributed Public Key Cryptosystems, pp. 1 - 13, PKC 1998.

[Electronic Edition][Cited 17 times ]

75. Tatsuaki Okamoto,  Moti Yung,  Lower Bounds on Term-Based Divisible Cash Systems, pp. 72 - 82, PKC 1998.

[Electronic Edition][Cited 1 times ]

76. Yair Frankel,  David W. Kravitz,  Charles T. Montgomery,  Moti Yung,  Beyond Identity: Warranty-Based Digital Signature Transactions, pp. 241 - 253, FC 1998.

[Electronic Edition][Cited 2 times ]

77. Adam Young,  Moti Yung,  The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems, pp. 264 - 276, CRYPTO 1997.

[Electronic Edition][Cited 28 times ]

78. Giovanni Di Crescenzo,  Tatsuaki Okamoto,  Moti Yung,  Keeping the SZK-Verifier Honest Unconditionally, pp. 31 - 45, CRYPTO 1997.

[Electronic Edition][Cited 7 times ]

79. Yair Frankel,  Peter Gemmell,  Philip D. MacKenzie,  Moti Yung,  Proactive RSA, pp. 440 - 454, CRYPTO 1997.

[Electronic Edition][Cited 176 times Red StarRed Star]

80. Mihir Bellare,  Markus Jakobsson,  Moti Yung,  Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function, pp. 280 - 305, EUROCRYPT 1997.

[Electronic Edition][Cited 39 times ]

81. Markus Jakobsson,  Moti Yung,  Distributed "Magic Ink" Signatures, pp. 450 - 464, EUROCRYPT 1997.

[Electronic Edition][Cited 47 times ]

82. Adam Young,  Moti Yung,  Kleptography: Using Cryptography Against Cryptography, pp. 62 - 74, EUROCRYPT 1997.

[Electronic Edition][Cited 64 times Red Star]

83. George I. Davida,  Yair Frankel,  Yiannis Tsiounis,  Moti Yung,  Anonymity Control in E-Cash Systems, pp. 1 - 16, FC 1997.

[Electronic Edition][Cited 119 times Red StarRed Star]

84. Markus Jakobsson,  Moti Yung,  Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System, pp. 217 - 238, FC 1997.

[Electronic Edition][Cited 26 times ]

85. Adam Young,  Moti Yung,  Sliding Encryption: A Cryptographic Tool for Mobile Agents, pp. 230 - 241, FSE 1997.

[Electronic Edition][Cited 48 times ]

86. Yair Frankel,  Yiannis Tsiounis,  Moti Yung,  "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash, pp. 286 - 300, ASIACRYPT 1996.

[Electronic Edition][Cited 164 times Red StarRed Star]

87. Adam Young,  Moti Yung,  The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?, pp. 89 - 103, CRYPTO 1996.

[Electronic Edition][Cited 75 times Red Star]

88. Markus Jakobsson,  Moti Yung,  Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers, pp. 186 - 200, CRYPTO 1996.

[Electronic Edition][Cited 30 times ]

89. Ronald Cramer,  Matthew K. Franklin,  Berry Schoenmakers,  Moti Yung,  Multi-Authority Secret-Ballot Elections with Linear Work, pp. 72 - 83, EUROCRYPT 1996.

[Electronic Edition][Cited 256 times Red StarRed StarRed Star]

90. Yair Frankel,  Moti Yung,  Cryptanalysis of the Immunized LL Public Key Systems, pp. 287 - 296, CRYPTO 1995.

[Electronic Edition][Cited 15 times ]

91. Amir Herzberg,  Stanislaw Jarecki,  Hugo Krawczyk,  Moti Yung,  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage, pp. 339 - 352, CRYPTO 1995.

[Electronic Edition][Cited 480 times Red StarRed StarRed Star]

92. Yair Frankel,  Moti Yung,  Escrow Encryption Systems Visited: Attacks, Analysis and Designs, pp. 222 - 235, CRYPTO 1995.

[Electronic Edition][Cited 64 times Red Star]

93. Matthew K. Franklin,  Moti Yung,  The Blinding of Weak Signatures (Extended Abstract), pp. 67 - 76, EUROCRYPT 1994.

[Electronic Edition][Cited 10 times ]

94. Rafail Ostrovsky,  Ramarathnam Venkatesan,  Moti Yung,  Interactive Hashing Simplifies Zero-Knowledge Protocol Design, pp. 267 - 273, EUROCRYPT 1993.

[Electronic Edition][Cited 34 times ]

95. Carlo Blundo,  Alfredo De Santis,  Amir Herzberg,  Shay Kutten,  Ugo Vaccaro,  Moti Yung,  Perfectly-Secure Key Distribution for Dynamic Conferences, pp. 471 - 486, CRYPTO 1992.

[Electronic Edition][Cited 786 times Red StarRed StarRed StarRed Star]

96. Moni Naor,  Rafail Ostrovsky,  Ramarathnam Venkatesan,  Moti Yung,  Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract), pp. 196 - 214, CRYPTO 1992.

[Electronic Edition][Cited 12 times ]

97. Mihir Bellare,  Moti Yung,  Certifying Cryptographic Tools: The Case of Trapdoor Permutations, pp. 442 - 460, CRYPTO 1992.

[Electronic Edition][Cited 20 times ]

98. Ray Bird,  Inder S. Gopal,  Amir Herzberg,  Philippe A. Janson,  Shay Kutten,  Refik Molva,  Moti Yung,  Systematic Design of Two-Party Authentication Protocols, pp. 44 - 61, CRYPTO 1991.

[Electronic Edition][Cited 150 times Red StarRed Star]

99. Yvo Desmedt,  Moti Yung,  Weakness of Undeniable Signature Schemes (Extended Abstract), pp. 205 - 220, EUROCRYPT 1991.

[Electronic Edition][Cited 59 times Red Star]

100. Alfredo De Santis,  Moti Yung,  On the Design of Provably Secure Cryptographic Hash Functions, pp. 412 - 431, EUROCRYPT 1990.

[Electronic Edition][Cited 25 times ]

101. Alfredo De Santis,  Moti Yung,  Cryptographic Applications of the Non-Interactive Metaproof and Many-Prover Systems, pp. 366 - 377, CRYPTO 1990.

[Electronic Edition][Cited 14 times ]

102. Yvo Desmedt,  Moti Yung,  Arbitrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract), pp. 177 - 188, CRYPTO 1990.

[Electronic Edition][Cited 27 times ]

103. Gilles Brassard,  Moti Yung,  One-Way Group Actions, pp. 94 - 107, CRYPTO 1990.

[Electronic Edition][Cited 15 times ]

104. Gilles Brassard,  Claude Crépeau,  Moti Yung,  Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract), pp. 192 - 195, EUROCRYPT 1989.

[Electronic Edition][Cited 46 times ]

105. Moti Yung,  Zero-Knowledge Proofs of Computational Power (Extended Summary), pp. 196 - 207, EUROCRYPT 1989.

[Electronic Edition][Cited 3 times ]

106. Zvi Galil,  Stuart Haber,  Moti Yung,  A Secure Public-key Authentication Scheme, pp. 3 - 15, EUROCRYPT 1989.

[Electronic Edition][Cited 2 times ]

107. Zvi Galil,  Stuart Haber,  Moti Yung,  Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model, pp. 135 - 155, CRYPTO 1987.

[Electronic Edition][Cited 4 times ]

108. Russell Impagliazzo,  Moti Yung,  Direct Minimum-Knowledge Computations, pp. 40 - 51, CRYPTO 1987.

[Electronic Edition][Cited 110 times Red StarRed Star]

109. Zvi Galil,  Stuart Haber,  Moti Yung,  Symmetric Public-Key Encryption, pp. 128 - 137, CRYPTO 1985.

[Electronic Edition][Cited 18 times ]

110. Moti Yung,  Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract), pp. 439 - 453, CRYPTO 1984.

[Electronic Edition][Cited 31 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...