Moti Yung
Affiliations: | City University of New York, New York, NY, United States |
Area:
Computer ScienceGoogle:
"Moti Yung"
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Lee K, Lee DH, Park JH, et al. (2018) CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts The Computer Journal. 62: 545-562 |
Libert B, Joye M, Yung M. (2016) Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares Theoretical Computer Science. 645: 1-24 |
Young AL, Yung M. (2014) The drunk motorcyclist protocol for anonymous communication 2014 Ieee Conference On Communications and Network Security, Cns 2014. 157-165 |
Dachman-Soled D, Malkin T, Raykova M, et al. (2012) Efficient robust private set intersection International Journal of Applied Cryptography. 2: 289-303 |
Libert B, Yung M. (2011) Adaptively secure non-interactive threshold cryptosystems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6756: 588-600 |
Kiayias A, Yung M. (2010) Tree-homomorphic encryption and scalable hierarchical secret-ballot elections Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6052: 257-271 |
Kiayias A, Yung M. (2010) The vector-ballot approach for online voting procedures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6000: 155-174 |
Kiayias A, Yung M. (2008) Public-key traitor tracing from efficient decoding and unbounded enrollment Proceedings of the Acm Conference On Computer and Communications Security. 9-17 |
Bleichenbacher D, Kiayias A, Yung M. (2007) Decoding interleaved Reed-Solomon codes over noisy channels Theoretical Computer Science. 379: 348-360 |
Kiayias A, Yung M. (2006) Secure scalable group signature with dynamic joins and separable authorities International Journal of Security and Networks. 1: 24-45 |