Moti Yung


Ontology type: schema:Person     


Person Info

NAME

Moti

SURNAME

Yung

Publications in SciGraph latest 50 shown

  • 2019 A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions in ADVANCES IN CYBER SECURITY: PRINCIPLES, TECHNIQUES, AND APPLICATIONS
  • 2018-08-03 Proactive Secure Multiparty Computation with a Dishonest Majority in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2018-08-03 Semantically Secure Anonymity: Foundations of Re-encryption in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2018-07-24 Correcting Subverted Random Oracles in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2018 Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs in CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING
  • 2018 Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation in FROM DATABASE TO CYBER SECURITY
  • 2017 The Combinatorics of Product Scanning Multiplication and Squaring in CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING
  • 2016 On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2016 Towards a Unified Security Model for Physically Unclonable Functions in TOPICS IN CRYPTOLOGY - CT-RSA 2016
  • 2016 Privacy Threats in E-Shopping (Position Paper) in DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE
  • 2016-01 Concurrent Knowledge Extraction in Public-Key Models in JOURNAL OF CRYPTOLOGY
  • 2016 Proactive Secret Sharing with a Dishonest Majority in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2016 Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack in THE NEW CODEBREAKERS
  • 2016 Cliptography: Clipping the Power of Kleptographic Attacks in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2016
  • 2015-12 Linearly homomorphic structure-preserving signatures and their applications in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-03-17 Secure Efficient History-Hiding Append-Only Signatures in the Standard Model in PUBLIC-KEY CRYPTOGRAPHY -- PKC 2015
  • 2015 A Little Honesty Goes a Long Way in THEORY OF CRYPTOGRAPHY
  • 2015 End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS -- CHES 2015
  • 2015 Hard Invalidation of Electronic Signatures in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2015 Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2015 Compactly Hiding Linear Spans in ADVANCES IN CRYPTOLOGY -- ASIACRYPT 2015
  • 2014 Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2014 Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2014 Order-Preserving Encryption Secure Beyond One-Wayness in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2014 Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2014
  • 2014 On Offline Payments with Bitcoin (Poster Abstract) in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2014 Traceable Group Encryption in PUBLIC-KEY CRYPTOGRAPHY – PKC 2014
  • 2013 Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013
  • 2013 Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies in PUBLIC-KEY CRYPTOGRAPHY – PKC 2013
  • 2013 Linearly Homomorphic Structure-Preserving Signatures and Their Applications in ADVANCES IN CRYPTOLOGY – CRYPTO 2013
  • 2013 Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2013 Sequential Aggregate Signatures Made Shorter in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2012 Scalable Group Signatures with Revocation in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2012
  • 2012 Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions in THEORY OF CRYPTOGRAPHY
  • 2012 Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems in INFORMATION SECURITY AND CRYPTOLOGY
  • 2012 Firm Grip Handshakes: A Tool for Bidirectional Vouching in CRYPTOLOGY AND NETWORK SECURITY
  • 2012 On the Centrality of Off-Line E-Cash to Concrete Partial Information Games in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2012 Multi-location Leakage Resilient Cryptography in PUBLIC KEY CRYPTOGRAPHY – PKC 2012
  • 2012 Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens in ROBOCUP 2005: ROBOT SOCCER WORLD CUP IX
  • 2012 Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions in AUTOMATA, LANGUAGES, AND PROGRAMMING
  • 2012 Fully Forward-Secure Group Signatures in CRYPTOGRAPHY AND SECURITY: FROM THEORY TO APPLICATIONS
  • 2012 Cryptographic Protocols: From the Abstract to the Practical to the Actual in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2012 Group Signatures with Almost-for-Free Revocation in ADVANCES IN CRYPTOLOGY – CRYPTO 2012
  • 2012 Multifactor Authenticated Key Renewal in TRUSTED SYSTEMS
  • 2011 Leakage Resilient Strong Key-Insulated Signatures in Public Channel in TRUSTED SYSTEMS
  • 2011 Efficient Circuit-Size Independent Public Key Encryption with KDM Security in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2011
  • 2011 Signatures Resilient to Continual Leakage on Memory and Computation in THEORY OF CRYPTOGRAPHY
  • 2011 Adaptively Secure Non-interactive Threshold Cryptosystems in AUTOMATA, LANGUAGES AND PROGRAMMING
  • 2011 Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2011 Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications in ROBOCUP 2005: ROBOT SOCCER WORLD CUP IX
  • Affiliations

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.21729.3f", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Yung", 
        "givenName": "Moti", 
        "id": "sg:person.016677435253.49", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016677435253.49"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:53", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1667.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.016677435253.49'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.016677435253.49'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.016677435253.49'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.016677435253.49'


     




    Preview window. Press ESC to close (or click here)


    ...