Moti Yung

Results: 7



#Item
1

Published in Designs, Codes and Cryptography, 77(2):441–477, Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoˆıt Libert · Thomas Peters · Marc Joye · Moti Yung

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2015-10-02 18:24:31
    2

    Kurosawa-Desmedt KEM is not CCA2-secure Seung Geol Choi a , Javier Herranz b , Dennis Hofheinz c , Jung Yeon Hwang d , Eike Kiltz c,1 , Dong Hoon Lee d,2 , Moti Yung a a Department

    Add to Reading List

    Source URL: www.kjdf.de

    Language: English - Date: 2014-06-10 05:37:43
      3Computing / Cloud computing / Cloud infrastructure / Moti Yung / Cloud

      2009 ACM Cloud Computing Security Workshop (CCSW) 13 November 2009, Hyatt Regency Chicago http://crypto.cs.stonybrook.edu/ccsw09 Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-sca

      Add to Reading List

      Source URL: digitalpiglet.org

      Language: English - Date: 2009-06-25 04:56:01
      4

      Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency FC 2013 Kwangsu Lee, Dong Hoon Lee, and Moti Yung Korea University and Columbia University, Korea University, Google Inc. and

      Add to Reading List

      Source URL: fc13.ifca.ai

      Language: English - Date: 2013-04-04 03:04:00
        5

        A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery Christophe Petit 1,∗, François-Xavier Standaert 1,† , Olivier Pereira 1,¦ , Tal G. Malkin 2 , Moti Yung 2,3 . UCL Crypto

        Add to Reading List

        Source URL: www.uclouvain.be

        Language: English - Date: 2011-12-14 05:30:39
          6Semantic security / RSA / ElGamal encryption / Cipher / Index of cryptography articles / Cryptography / Public-key cryptography / Ciphertext indistinguishability

          Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2006-12-04 09:17:42
          7Secure communication / Knowledge / Cryptography / Science / Cryptographic software

          Actual Cryptography at the Age of Evolving Ecosystems Moti Yung, Google

          Add to Reading List

          Source URL: www.cyber.umd.edu

          Language: English - Date: 2014-05-13 11:01:16
          UPDATE