Year |
Citation |
Score |
2018 |
Lee K, Lee DH, Park JH, Yung M. CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts The Computer Journal. 62: 545-562. DOI: 10.1093/Comjnl/Bxy122 |
0.428 |
|
2016 |
Libert B, Joye M, Yung M. Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares Theoretical Computer Science. 645: 1-24. DOI: 10.1016/J.Tcs.2016.02.031 |
0.439 |
|
2014 |
Young AL, Yung M. The drunk motorcyclist protocol for anonymous communication 2014 Ieee Conference On Communications and Network Security, Cns 2014. 157-165. DOI: 10.1109/CNS.2014.6997482 |
0.438 |
|
2012 |
Dachman-Soled D, Malkin T, Raykova M, Yung M. Efficient robust private set intersection International Journal of Applied Cryptography. 2: 289-303. DOI: 10.1504/Ijact.2012.048080 |
0.359 |
|
2011 |
Libert B, Yung M. Adaptively secure non-interactive threshold cryptosystems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6756: 588-600. DOI: 10.1007/978-3-642-22012-8_47 |
0.333 |
|
2010 |
Kiayias A, Yung M. Tree-homomorphic encryption and scalable hierarchical secret-ballot elections Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6052: 257-271. DOI: 10.1007/978-3-642-14577-3_20 |
0.562 |
|
2010 |
Kiayias A, Yung M. The vector-ballot approach for online voting procedures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6000: 155-174. DOI: 10.1007/978-3-642-12980-3_9 |
0.586 |
|
2008 |
Kiayias A, Yung M. Public-key traitor tracing from efficient decoding and unbounded enrollment Proceedings of the Acm Conference On Computer and Communications Security. 9-17. DOI: 10.1145/1456520.1456525 |
0.559 |
|
2007 |
Bleichenbacher D, Kiayias A, Yung M. Decoding interleaved Reed-Solomon codes over noisy channels Theoretical Computer Science. 379: 348-360. DOI: 10.1016/J.Tcs.2007.02.043 |
0.579 |
|
2006 |
Kiayias A, Yung M. Secure scalable group signature with dynamic joins and separable authorities International Journal of Security and Networks. 1: 24-45. DOI: 10.1504/Ijsn.2006.010821 |
0.612 |
|
2006 |
Katz J, Yung M. Characterization of security notions for probabilistic private-key encryption Journal of Cryptology. 19: 67-95. DOI: 10.1007/S00145-005-0310-8 |
0.519 |
|
2006 |
Kiayias A, Yung M. Efficient cryptographic protocols realizing E-markets with price discrimination Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 311-325. |
0.517 |
|
2005 |
Kiayias A, Yung M. Cryptography and decoding reed-solomon codes as a hard problem 2005 Ieee Information Theory Workshop On Theory and Practice in Information-Theoretic Security. 2005: 48. DOI: 10.1109/ITWTPI.2005.1543956 |
0.567 |
|
2005 |
Young A, Yung M. Questionable encryption and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3715: 210-221. DOI: 10.1007/11554868_15 |
0.328 |
|
2005 |
Kiayias A, Yung M. Efficient secure group signatures with dynamic joins and keeping anonymity against group managers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3715: 151-170. DOI: 10.1007/11554868_11 |
0.629 |
|
2005 |
Kiayias A, Yung M. Group signatures with efficient concurrent join Lecture Notes in Computer Science. 3494: 198-214. |
0.537 |
|
2004 |
Franklin M, Yung M. Secure hypergraphs: Privacy from partial broadcast Siam Journal On Discrete Mathematics. 18: 437-450. DOI: 10.1137/S0895480198335215 |
0.379 |
|
2004 |
Kiayias A, Yung M. Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3329: 401-416. DOI: 10.1007/S10623-007-9055-8 |
0.608 |
|
2004 |
Kiayias A, Yung M. The vector-ballot e-voting approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3110: 72-89. |
0.508 |
|
2004 |
Kiayias A, Yung M. Directions in polynomial reconstruction based cryptography Ieice Transactions On Fundamentals of Electronics, Communications and Computer Sciences. 978-985. |
0.517 |
|
2004 |
Xu S, Yung M. κ-anonymous secret handshakes with reusable credentials Proceedings of the Acm Conference On Computer and Communications Security. 158-167. |
0.31 |
|
2004 |
Kiayias A, Yung M. DRM 2004: Proceeding of the Fourth ACM Workshop on Digital Rights Management: Foreword Drm 2004: Proceedings of the Fourth Acm Workshop On Digital Rights Management. |
0.503 |
|
2003 |
Dodis Y, Fazio N, Kiayias A, Yung M. Scalable Public-Key Tracing and Revoking Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 22: 190-199. DOI: 10.1007/S00446-004-0120-5 |
0.628 |
|
2003 |
Katz J, Yung M. Scalable protocols for authenticated group key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2729: 110-125. DOI: 10.1007/S00145-006-0361-5 |
0.573 |
|
2003 |
Kiayias A, Yung M. Non-interactive zero-sharing with applications to private distributed decision making Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2742: 303-320. |
0.51 |
|
2003 |
Kiayias A, Yung M. Extracting group signatures from traitor tracing schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2656: 630-648. |
0.558 |
|
2003 |
Kiayias A, Yung M. Breaking and repairing asymmetric public-key traitor tracing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 32-50. |
0.513 |
|
2003 |
Xu S, Yung M. Retrofitting fairness on the original RSA-based E-cash Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2742: 51-68. |
0.311 |
|
2002 |
Kiayias A, Yung M. Cryptographic hardness based on the decoding of Reed-Solomon Codes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2380: 232-243. DOI: 10.1109/Tit.2008.921876 |
0.612 |
|
2002 |
Frankel Y, MacKenzie P, Yung M. Adaptively secure distributed public-key systems Theoretical Computer Science. 287: 535-561. DOI: 10.1016/S0304-3975(01)00260-2 |
0.395 |
|
2002 |
Kiayias A, Yung M. On crafty pirates and foxy tracers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2320: 22-39. DOI: 10.1007/3-540-47870-1_3 |
0.611 |
|
2002 |
Kiayias A, Yung M. Self-tallying elections and perfect ballot secrecy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2274: 141-158. DOI: 10.1007/3-540-45664-3_10 |
0.6 |
|
2002 |
Katz J, Yung M. Threshold cryptosystems based on factoring Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2501: 192-205. DOI: 10.1007/3-540-36178-2_12 |
0.319 |
|
2002 |
Kiayias A, Yung M. Traitor tracing with constant transmission rate Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2332: 450-465. |
0.623 |
|
2001 |
Young A, Yung M. A PVSS as hard as discrete log and shareholder separability Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1992: 287-299. |
0.336 |
|
2001 |
Kiayias A, Yung M. Self protecting pirates and black-box traitor tracing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 63-79. |
0.497 |
|
2001 |
Kiayias A, Yung M. Secure games with polynomial expressions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2076: 939-950. |
0.613 |
|
2001 |
Kiayias A, Yung M. Polynomial reconstruction based cryptography (A short survey) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2259: 129-133. |
0.599 |
|
2000 |
Franklin M, Galil Z, Yung M. Eavesdropping games: a graph-theoretic approach to privacy in distributed systems Journal of the Acm. 47: 225-243. DOI: 10.1145/333979.333980 |
0.307 |
|
2000 |
Young A, Yung M. Towards signature-only signature schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1976: 97-115. |
0.329 |
|
2000 |
Katz J, Yung M. Complete characterization of security notions for probabilistic private-key encryption Conference Proceedings of the Annual Acm Symposium On Theory of Computing. 245-254. |
0.306 |
|
1999 |
Young A, Yung M. Auto-recoverable auto-certifiable cryptosystems (A survey) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1740: 204-218. DOI: 10.1007/BFb0054114 |
0.319 |
|
1998 |
Tsiounis Y, Yung M. On the security of eigamal based encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1431: 117-134. DOI: 10.1007/BFb0054019 |
0.34 |
|
1997 |
Frankel Y, Yung M. On characterizations of escrow encryption schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1256: 705-715. |
0.323 |
|
1996 |
Bellare M, Yung M. Certifying Permutations: Noninteractive zero-knowledge based on any trapdoor permutation Journal of Cryptology. 9: 149-166. DOI: 10.1007/Bf00208000 |
0.308 |
|
1995 |
Bird R, Gopal I, Herzberg A, Janson P, Kutten S, Molva R, Yung M. The KryptoKnight family of light-weight protocols for authentication and key distribution Ieee Acm Transactions On Networking. 3: 31-41. DOI: 10.1109/90.365435 |
0.369 |
|
1995 |
Frankel Y, Yung M. Cryptanalysis of the immunized LL public key systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 963: 287-296. DOI: 10.1007/3-540-44750-4_23 |
0.33 |
|
1993 |
Dolev D, Dwork C, Waarts O, Yung M. Perfectly secure message transmission Journal of the Acm. 40: 17-47. DOI: 10.1145/138027.138036 |
0.348 |
|
1991 |
Brassard G, Crépeau C, Yung M. Constant-round perfect zero-knowledge computationally convincing protocols Theoretical Computer Science. 84: 23-52. DOI: 10.1016/0304-3975(91)90259-5 |
0.362 |
|
1989 |
Galil Z, Haber S, Yung M. Minimum-knowledge interactive proofs for decision problems Siam Journal On Computing. 18: 711-739. DOI: 10.1137/0218049 |
0.645 |
|
1987 |
Galil Z, Yung M. Partitioned encryption and achieving simultaneity by partitioning Information Processing Letters. 26: 81-88. DOI: 10.1016/0020-0190(87)90042-1 |
0.656 |
|
Show low-probability matches. |