Moti Yung - Publications

Affiliations: 
City University of New York, New York, NY, United States 
Area:
Computer Science

51 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Lee K, Lee DH, Park JH, Yung M. CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts The Computer Journal. 62: 545-562. DOI: 10.1093/Comjnl/Bxy122  0.428
2016 Libert B, Joye M, Yung M. Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares Theoretical Computer Science. 645: 1-24. DOI: 10.1016/J.Tcs.2016.02.031  0.439
2014 Young AL, Yung M. The drunk motorcyclist protocol for anonymous communication 2014 Ieee Conference On Communications and Network Security, Cns 2014. 157-165. DOI: 10.1109/CNS.2014.6997482  0.438
2012 Dachman-Soled D, Malkin T, Raykova M, Yung M. Efficient robust private set intersection International Journal of Applied Cryptography. 2: 289-303. DOI: 10.1504/Ijact.2012.048080  0.359
2011 Libert B, Yung M. Adaptively secure non-interactive threshold cryptosystems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6756: 588-600. DOI: 10.1007/978-3-642-22012-8_47  0.333
2010 Kiayias A, Yung M. Tree-homomorphic encryption and scalable hierarchical secret-ballot elections Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6052: 257-271. DOI: 10.1007/978-3-642-14577-3_20  0.562
2010 Kiayias A, Yung M. The vector-ballot approach for online voting procedures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6000: 155-174. DOI: 10.1007/978-3-642-12980-3_9  0.586
2008 Kiayias A, Yung M. Public-key traitor tracing from efficient decoding and unbounded enrollment Proceedings of the Acm Conference On Computer and Communications Security. 9-17. DOI: 10.1145/1456520.1456525  0.559
2007 Bleichenbacher D, Kiayias A, Yung M. Decoding interleaved Reed-Solomon codes over noisy channels Theoretical Computer Science. 379: 348-360. DOI: 10.1016/J.Tcs.2007.02.043  0.579
2006 Kiayias A, Yung M. Secure scalable group signature with dynamic joins and separable authorities International Journal of Security and Networks. 1: 24-45. DOI: 10.1504/Ijsn.2006.010821  0.612
2006 Katz J, Yung M. Characterization of security notions for probabilistic private-key encryption Journal of Cryptology. 19: 67-95. DOI: 10.1007/S00145-005-0310-8  0.519
2006 Kiayias A, Yung M. Efficient cryptographic protocols realizing E-markets with price discrimination Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 311-325.  0.517
2005 Kiayias A, Yung M. Cryptography and decoding reed-solomon codes as a hard problem 2005 Ieee Information Theory Workshop On Theory and Practice in Information-Theoretic Security. 2005: 48. DOI: 10.1109/ITWTPI.2005.1543956  0.567
2005 Young A, Yung M. Questionable encryption and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3715: 210-221. DOI: 10.1007/11554868_15  0.328
2005 Kiayias A, Yung M. Efficient secure group signatures with dynamic joins and keeping anonymity against group managers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3715: 151-170. DOI: 10.1007/11554868_11  0.629
2005 Kiayias A, Yung M. Group signatures with efficient concurrent join Lecture Notes in Computer Science. 3494: 198-214.  0.537
2004 Franklin M, Yung M. Secure hypergraphs: Privacy from partial broadcast Siam Journal On Discrete Mathematics. 18: 437-450. DOI: 10.1137/S0895480198335215  0.379
2004 Kiayias A, Yung M. Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3329: 401-416. DOI: 10.1007/S10623-007-9055-8  0.608
2004 Kiayias A, Yung M. The vector-ballot e-voting approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3110: 72-89.  0.508
2004 Kiayias A, Yung M. Directions in polynomial reconstruction based cryptography Ieice Transactions On Fundamentals of Electronics, Communications and Computer Sciences. 978-985.  0.517
2004 Xu S, Yung M. κ-anonymous secret handshakes with reusable credentials Proceedings of the Acm Conference On Computer and Communications Security. 158-167.  0.31
2004 Kiayias A, Yung M. DRM 2004: Proceeding of the Fourth ACM Workshop on Digital Rights Management: Foreword Drm 2004: Proceedings of the Fourth Acm Workshop On Digital Rights Management 0.503
2003 Dodis Y, Fazio N, Kiayias A, Yung M. Scalable Public-Key Tracing and Revoking Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 22: 190-199. DOI: 10.1007/S00446-004-0120-5  0.628
2003 Katz J, Yung M. Scalable protocols for authenticated group key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2729: 110-125. DOI: 10.1007/S00145-006-0361-5  0.573
2003 Kiayias A, Yung M. Non-interactive zero-sharing with applications to private distributed decision making Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2742: 303-320.  0.51
2003 Kiayias A, Yung M. Extracting group signatures from traitor tracing schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2656: 630-648.  0.558
2003 Kiayias A, Yung M. Breaking and repairing asymmetric public-key traitor tracing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 32-50.  0.513
2003 Xu S, Yung M. Retrofitting fairness on the original RSA-based E-cash Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2742: 51-68.  0.311
2002 Kiayias A, Yung M. Cryptographic hardness based on the decoding of Reed-Solomon Codes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2380: 232-243. DOI: 10.1109/Tit.2008.921876  0.612
2002 Frankel Y, MacKenzie P, Yung M. Adaptively secure distributed public-key systems Theoretical Computer Science. 287: 535-561. DOI: 10.1016/S0304-3975(01)00260-2  0.395
2002 Kiayias A, Yung M. On crafty pirates and foxy tracers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2320: 22-39. DOI: 10.1007/3-540-47870-1_3  0.611
2002 Kiayias A, Yung M. Self-tallying elections and perfect ballot secrecy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2274: 141-158. DOI: 10.1007/3-540-45664-3_10  0.6
2002 Katz J, Yung M. Threshold cryptosystems based on factoring Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2501: 192-205. DOI: 10.1007/3-540-36178-2_12  0.319
2002 Kiayias A, Yung M. Traitor tracing with constant transmission rate Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2332: 450-465.  0.623
2001 Young A, Yung M. A PVSS as hard as discrete log and shareholder separability Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1992: 287-299.  0.336
2001 Kiayias A, Yung M. Self protecting pirates and black-box traitor tracing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 63-79.  0.497
2001 Kiayias A, Yung M. Secure games with polynomial expressions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2076: 939-950.  0.613
2001 Kiayias A, Yung M. Polynomial reconstruction based cryptography (A short survey) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2259: 129-133.  0.599
2000 Franklin M, Galil Z, Yung M. Eavesdropping games: a graph-theoretic approach to privacy in distributed systems Journal of the Acm. 47: 225-243. DOI: 10.1145/333979.333980  0.307
2000 Young A, Yung M. Towards signature-only signature schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1976: 97-115.  0.329
2000 Katz J, Yung M. Complete characterization of security notions for probabilistic private-key encryption Conference Proceedings of the Annual Acm Symposium On Theory of Computing. 245-254.  0.306
1999 Young A, Yung M. Auto-recoverable auto-certifiable cryptosystems (A survey) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1740: 204-218. DOI: 10.1007/BFb0054114  0.319
1998 Tsiounis Y, Yung M. On the security of eigamal based encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1431: 117-134. DOI: 10.1007/BFb0054019  0.34
1997 Frankel Y, Yung M. On characterizations of escrow encryption schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1256: 705-715.  0.323
1996 Bellare M, Yung M. Certifying Permutations: Noninteractive zero-knowledge based on any trapdoor permutation Journal of Cryptology. 9: 149-166. DOI: 10.1007/Bf00208000  0.308
1995 Bird R, Gopal I, Herzberg A, Janson P, Kutten S, Molva R, Yung M. The KryptoKnight family of light-weight protocols for authentication and key distribution Ieee Acm Transactions On Networking. 3: 31-41. DOI: 10.1109/90.365435  0.369
1995 Frankel Y, Yung M. Cryptanalysis of the immunized LL public key systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 963: 287-296. DOI: 10.1007/3-540-44750-4_23  0.33
1993 Dolev D, Dwork C, Waarts O, Yung M. Perfectly secure message transmission Journal of the Acm. 40: 17-47. DOI: 10.1145/138027.138036  0.348
1991 Brassard G, Crépeau C, Yung M. Constant-round perfect zero-knowledge computationally convincing protocols Theoretical Computer Science. 84: 23-52. DOI: 10.1016/0304-3975(91)90259-5  0.362
1989 Galil Z, Haber S, Yung M. Minimum-knowledge interactive proofs for decision problems Siam Journal On Computing. 18: 711-739. DOI: 10.1137/0218049  0.645
1987 Galil Z, Yung M. Partitioned encryption and achieving simultaneity by partitioning Information Processing Letters. 26: 81-88. DOI: 10.1016/0020-0190(87)90042-1  0.656
Show low-probability matches.