Æȷοì
Moti Yung
Moti Yung
Distinguished Research Scientist Google; Adjunct Research Prof. Columbia U.
cs.columbia.eduÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Advances in Cryptology—CRYPTO¡¯92: 12th Annual International Cryptology ¡¦, 1993
15081993
Public-key cryptosystems provably secure against chosen ciphertext attacks
M Naor, M Yung
Proceedings of the twenty-second annual ACM symposium on Theory of computing ¡¦, 1990
14071990
Universal one-way hash functions and their cryptographic applications
M Naor, M Yung
Proceedings of the twenty-first annual ACM symposium on Theory of computing ¡¦, 1989
13671989
Secure schemes for secret sharing and key distribution
A Beimel
PhD thesis, Israel Institute of Technology, Technion, 1996
12221996
A unified framework for the analysis of side-channel key recovery attacks
FX Standaert, TG Malkin, M Yung
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference ¡¦, 2009
12162009
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
Advances in Cryptology—CRYPT0¡¯95: 15th Annual International Cryptology ¡¦, 1995
11931995
How to withstand mobile virus attacks
R Ostrovsky, M Yung
Proceedings of the tenth annual ACM symposium on Principles of distributed ¡¦, 1991
8181991
Pseudorandomness and cryptographic applications
M Luby
Princeton University Press, 1996
6561996
Efficient password-authenticated key exchange using human-memorable passwords
J Katz, R Ostrovsky, M Yung
International Conference on the Theory and Applications of Cryptographic ¡¦, 2001
5892001
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—EUROCRYPT 2002: International Conference on the ¡¦, 2002
5672002
On the security of ElGamal based encryption
Y Tsiounis, M Yung
International Workshop on Public Key Cryptography, 117-134, 1998
5671998
Perfectly secure message transmission
D Dolev, C Dwork, O Waarts, M Yung
Journal of the ACM (JACM) 40 (1), 17-47, 1993
5631993
Multi-authority secret-ballot elections with linear work
R Cramer, M Franklin, B Schoenmakers, M Yung
International Conference on the Theory and Applications of Cryptographic ¡¦, 1996
5601996
Scalable protocols for authenticated group key exchange
J Katz, M Yung
Annual international cryptology conference, 110-125, 2003
5382003
How to share a function securely
A De Santis, Y Desmedt, Y Frankel, M Yung
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing ¡¦, 1994
4571994
Lecture notes in computer science
D Kudenko
Springer, 2005
441*2005
Method and system for the secured distribution of multimedia titles
A Herzberg, H Krawczyk, S Kutten, AV Le, SM Matyas, M. Yung
US Patent 5,745,678, 1998
4411998
Non-interactive cryptocomputing for nc/sup 1
T Sander, A Young, M Yung
40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039 ¡¦, 1999
4281999
Cryptography: Malicious Cryptography
AL Young, M Yung
Elsevier Advanced Technology 20 (5), 430, 2004
413*2004
Fully collusion resistant traitor tracing with short ciphertexts and private keys
D Boneh, A Sahai, B Waters
Annual International Conference on the Theory and Applications of ¡¦, 2006
4052006
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20