Moti Yung

Google Publications

  •  

    Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens

    Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung

    Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Springer, pp. 30-47

  •    

    Non-interactive CCA-Secure threshold cryptosystems with adaptive security: new framework and constructions

    Benoit Libert, Moti Yung

    Proceedings of the 9th international conference on Theory of Cryptography, Springer-Verlag, Berlin, Heidelberg (2012), pp. 75-93

  •   

    Scalable group signatures with revocation

    Benoit Libert, Thomas Peters, Moti Yung

    Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques, Springer-Verlag, Berlin, Heidelberg (2012), pp. 609-627

  •   

    A New Randomness Extraction Paradigm for Hybrid Encryption

    Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung

    EUROCRYPT '09: Proceedings of the 28th Annual International Conference on Advances in Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 590-609

  •   

    A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

    François-Xavier Standaert, Tal G. Malkin, Moti Yung

    EUROCRYPT '09: Proceedings of the 28th Annual International Conference on Advances in Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 443-461

  •   

    Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs

    Debra L. Cook, Moti Yung, Angelos Keromytis

    Information Security and Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 157-180

  •   

    Efficient and secure authenticated key exchange using weak passwords

    Jonathan Katz, Rafail Ostrovsky, Moti Yung

    J. ACM, vol. 57 (2009), pp. 1-39

  •   

    Efficient Robust Private Set Intersection

    Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung

    ACNS '09: Proceedings of the 7th International Conference on Applied Cryptography and Network Security, Springer-Verlag, Berlin, Heidelberg (2009), pp. 125-142

  •   

    Efficient Traceable Signatures in the Standard Model

    Benoît Libert, Moti Yung

    Pairing '09: Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography, Springer-Verlag, Berlin, Heidelberg (2009), pp. 187-205

  •   

    Elastic block ciphers: method, security and instantiations

    Debra L. Cook, Moti Yung, Angelos D. Keromytis

    Int. J. Inf. Secur., vol. 8 (2009), pp. 211-231

  •   

    Expecting the Unexpected: Towards Robust Credential Infrastructure

    Shouhuai Xu, Moti Yung

    Financial Cryptography and Data Security, Springer-Verlag, Berlin, Heidelberg (2009), pp. 201-221

  •   

    Key Evolution Systems in Untrusted Update Environments

    Benoît Libert, Jean-Jacques Quisquater, Moti Yung

    Information Security and Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 12-21

  •   

    On the Portability of Generalized Schnorr Proofs

    Jan Camenisch, Aggelos Kiayias, Moti Yung

    EUROCRYPT '09: Proceedings of the 28th Annual International Conference on Advances in Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 425-442

  •   

    Privacy-Preserving Information Markets for Computing Statistical Data

    Aggelos Kiayias, Bülent Yener, Moti Yung

    Financial Cryptography and Data Security, Springer-Verlag, Berlin, Heidelberg (2009), pp. 32-50

  •   

    Secure Function Collection with Sublinear Storage

    Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong-Sheng Zhou

    ICALP '09: Proceedings of the 36th Internatilonal Collogquium on Automata, Languages and Programming, Springer-Verlag, Berlin, Heidelberg (2009), pp. 534-545

  •   

    The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure

    Seung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee, Moti Yung

    Inf. Process. Lett., vol. 109 (2009), pp. 897-901

  •   

    A block cipher based pseudo random number generator secure against side-channel key recovery

    Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal G. Malkin, Moti Yung

    ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security, ACM, New York, NY, USA, pp. 56-65

  •   

    Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)

    François-Xavier Standaert, Tal G. Malkin, Moti Yung

    ICITS '08: Proceedings of the 3rd international conference on Information Theoretic Security, Springer-Verlag, Berlin, Heidelberg (2008), pp. 70-70

  •   

    Fair Traceable Multi-Group Signatures

    Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung

    Financial Cryptography, Springer-Verlag, Berlin, Heidelberg (2008), pp. 231-246

  •   

    Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers

    Debra L. Cook, Moti Yung, Angelos D. Keromytis

    ACISP '08: Proceedings of the 13th Australasian conference on Information Security and Privacy, Springer-Verlag, Berlin, Heidelberg (2008), pp. 187-202

  •   

    On the Evolution of User Authentication: Non-bilateral Factors

    Moti Yung

    Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Springer-Verlag, Berlin, Heidelberg (2008), pp. 5-10

  •   

    Privacy Preserving Data Mining within Anonymous Credential Systems

    Aggelos Kiayias, Shouhuai Xu, Moti Yung

    SCN '08: Proceedings of the 6th international conference on Security and Cryptography for Networks, Springer-Verlag, Berlin, Heidelberg (2008), pp. 57-76

  •   

    Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract

    Aggelos Kiayias, Moti Yung

    DRM '08: Proceedings of the 8th ACM workshop on Digital rights management, ACM, New York, NY, USA (2008), pp. 9-18

  •   

    Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report)

    Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung

    Financial Cryptography and Data Security, Springer-Verlag, Berlin, Heidelberg (2008), pp. 307-313

Previous Publications

  •   

    Universal forgery of the identity-based sequential aggregate signature scheme

    Jung Yeon Hwang, Dong Hoon Lee, Moti Yung

    ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ACM, New York, NY, USA (2009), pp. 157-160

  •   

    A Timing-Resistant Elliptic Curve Backdoor in RSA

    Adam L. Young, Moti Yung

    Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Springer-Verlag, Berlin, Heidelberg (2008), pp. 427-441

  •   

    Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice

    Aggelos Kiayias, Moti Yung

    Des. Codes Cryptography, vol. 43 (2007), pp. 61-78

  •   

    Decoding interleaved Reed-Solomon codes over noisy channels

    Daniel Bleichenbacher, Aggelos Kiayias, Moti Yung

    Theor. Comput. Sci., vol. 379 (2007), pp. 348-360

  •   

    Elastic block ciphers: the basic design

    Debra Cook, Angelos Keromytis, Moti Yung

    ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, ACM, New York, NY, USA (2007), pp. 350-352

  •   

    Forward-secure signatures in untrusted update environments: efficient and generic constructions

    Benoît Libert, Jean-Jacques Quisquater, Moti Yung

    CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, ACM, New York, NY, USA (2007), pp. 266-275

  •   

    Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model

    Moti Yung, Yunlei Zhao

    EUROCRYPT '07: Proceedings of the 26th annual international conference on Advances in Cryptology, Springer-Verlag, Berlin, Heidelberg (2007), pp. 129-147

  •   

    Scalable Protocols for Authenticated Group Key Exchange

    Jonathan Katz, Moti Yung

    J. Cryptol., vol. 20 (2007), pp. 85-113

  •   

    The Security of Elastic Block Ciphers Against Key-Recovery Attacks

    Debra L. Cook, Moti Yung, Angelos D. Keromytis

    ISC '07: Proceedings of the 10th international conference on Information Security, Springer-Verlag, Berlin, Heidelberg (2007), pp. 89-103

  •  

    Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings (Lecture Notes in Computer Science)

    Jianying Zhou, Moti Yung, Feng Bao

    Springer-Verlag New York, Inc., Secaucus, NJ, USA (2006)

  •   

    Characterization of Security Notions for Probabilistic Private-Key Encryption

    Jonathan Katz, Moti Yung

    J. Cryptol., vol. 19 (2006), pp. 67-95

  •  

    Digital Rights Management: Technologies, Issues, Challenges and Systems (Lecture Notes in Computer Science)

    Reihaneh Safavi-Naini, Moti Yung

    Springer-Verlag New York, Inc., Secaucus, NJ, USA (2006)

  •   

    Fourth-factor authentication: somebody you know

    John Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung

    CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, ACM, New York, NY, USA (2006), pp. 168-178

  •  

    Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings (Lecture Notes in Computer Science)

    Dengguo Feng, Dongdai Lin, Moti Yung

    Springer-Verlag New York, Inc., Secaucus, NJ, USA (2006)

  •  

    Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006Beijing, China, November 29 - December 1, 2006Proceedings (Lecture Notes in Computer Science)

    Helger Lipmaa, Moti Yung, Donghai Lin

    Springer-Verlag New York, Inc., Secaucus, NJ, USA (2006)

  •  

    Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. ... (Lecture Notes in Computer Science)

    Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin

    Springer-Verlag New York, Inc., Secaucus, NJ, USA (2006)

  •   

    Secure scalable group signature with dynamic joins and separable authorities

    Aggelos Kiayias, Moti Yung

    Int. J. Secur. Netw., vol. 1 (2006), pp. 24-45

  •  

    Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings (Lecture Notes in Computer Science)

    Roberto De Prisco, Moti Yung

    Springer-Verlag New York, Inc., Secaucus, NJ, USA (2006)

  •  

    Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings (Lecture Notes in Computer Science)

    John Ioannidis, Angelos Keromytis, Moti Yung

    Springer-Verlag New York, Inc., Secaucus, NJ, USA (2005)

  •  

    Digital Signatures (Advances in Information Security)

    Moti Yung, Jonathan Katz

    Springer-Verlag New York, Inc., Secaucus, NJ, USA (2005)

  •   

    Scalable public-key tracing and revoking

    Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung

    Distrib. Comput., vol. 17 (2005), pp. 323-347

  •   

    Secure Hypergraphs: Privacy from Partial Broadcast

    Matthew Franklin, Moti Yung

    SIAM J. Discret. Math., vol. 18 (2005), pp. 437-450

  •   

    /k/-anonymous secret handshakes with reusable credentials

    Shouhuai Xu, Moti Yung

    CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, ACM, New York, NY, USA (2004), pp. 158-167

  •  

    Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings (Lecture Notes in Computer Science)

    Markus Jakobsson, Moti Yung, Jianying Zhou

    Springer-Verlag New York, Inc., Secaucus, NJ, USA (2004)

  •  

    Information Security Applications: 4th International Workshop, Wisa 2003, Jeju Island, Korea, August 2003: Revised Papers (Lecture Notes in Computer Science, 2908)

    Kijoon Chae, Moti Yung

    SpringerVerlag (2004)

  •  

    Malicious Cryptography: Exposing Cryptovirology

    Adam Young, Moti Yung

    John Wiley \& Sons (2004)

  •   

    The dual receiver cryptosystem and its applications

    Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung

    CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, ACM, New York, NY, USA (2004), pp. 330-343

  •  

    Applied Cryptography and Network Security: First International Conference, Acns 2003, Kunming, China, October 16-19, 2003: Proceedings (Lecture Notes in Computer Science, 2846)

    Jianying Zhou, Moti Yung, Yongfei Han

    SpringerVerlag (2003)

  •   

    Scalable public-key tracing and revoking

    Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung

    PODC '03: Proceedings of the twenty-second annual symposium on Principles of distributed computing, ACM, New York, NY, USA (2003), pp. 190-199

  •  

    Strong Key-Insulated Signature Schemes

    Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung

    PKC '03: Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography, Springer-Verlag, London, UK (2003), pp. 130-144

  •   

    Adaptively secure distributed public-key systems

    Yair Frankel, Philip MacKenzie, Moti Yung

    Theor. Comput. Sci., vol. 287 (2002), pp. 535-561

  •  

    Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes

    Aggelos Kiayias, Moti Yung

    ICALP '02: Proceedings of the 29th International Colloquium on Automata, Languages and Programming, Springer-Verlag, London, UK (2002), pp. 232-243

  •  

    Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case

    Yevgeniy Dodis, Moti Yung

    SISW '02: Proceedings of the First International IEEE Security in Storage Workshop, IEEE Computer Society, Washington, DC, USA (2002), pp. 45

  •  

    Incremental Unforgeable Encryption

    Enrico Buonanno, Jonathan Katz, Moti Yung

    FSE '01: Revised Papers from the 8th International Workshop on Fast Software Encryption, Springer-Verlag, London, UK (2002), pp. 109-124

  •  

    Key-Insulated Public Key Cryptosystems

    Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung

    EUROCRYPT '02: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Springer-Verlag, London, UK (2002), pp. 65-82

  •  

    Observability Analysis - Detecting When Improved Cryptosystems Fail

    Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung

    CT-RSA '02: Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology, Springer-Verlag, London, UK (2002), pp. 17-29

  •  

    On Crafty Pirates and Foxy Tracers

    Aggelos Kiayias, Moti Yung

    DRM '01: Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, Springer-Verlag, London, UK (2002), pp. 22-39

  •  

    Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing

    Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung

    ACISP '02: Proceedings of the 7th Australian Conference on Information Security and Privacy, Springer-Verlag, London, UK (2002), pp. 482-496

  •   

    Self-Stabilizing Symmetry Breaking in Constant Space

    Alain Mayer, Rafail Ostrovsky, Yoram Ofek, Moti Yung

    SIAM J. Comput., vol. 31 (2002), pp. 1571-1595

  •  

    Self-tallying Elections and Perfect Ballot Secrecy

    Aggelos Kiayias, Moti Yung

    PKC '02: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems, Springer-Verlag, London, UK (2002), pp. 141-158

  •  

    The Business of Electronic Voting

    Ed Gerck, C. Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, Moti Yung

    FC '01: Proceedings of the 5th International Conference on Financial Cryptography, Springer-Verlag, London, UK (2002), pp. 243-268

  •  

    Threshold Cryptosystems Based on Factoring

    Jonathan Katz, Moti Yung

    ASIACRYPT '02: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag, London, UK (2002), pp. 192-205

  •  

    Traitor Tracing with Constant Transmission Rate

    Aggelos Kiayias, Moti Yung

    EUROCRYPT '02: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Springer-Verlag, London, UK (2002), pp. 450-465

  •  

    Adaptive Security for the Additive-Sharing Based Proactive RSA

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    PKC '01: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (2001), pp. 240-263

  •  

    Bandwidth-Optimal Kleptographic Attacks

    Adam Young, Moti Yung

    CHES '01: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, London, UK (2001), pp. 235-250

  •  

    Blind, Auditable Membership Proofs

    Tomas Sander, Amnon Ta-Shma, Moti Yung

    FC '00: Proceedings of the 4th International Conference on Financial Cryptography, Springer-Verlag, London, UK (2001), pp. 53-71

  •  

    DISSECT: DIStribution for SECurity Tool

    Enriquillo Valdez, Moti Yung

    ISC '01: Proceedings of the 4th International Conference on Information Security, Springer-Verlag, London, UK (2001), pp. 125-143

  •  

    Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords

    Jonathan Katz, Rafail Ostrovsky, Moti Yung

    EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Springer-Verlag, London, UK (2001), pp. 475-494

  •  

    Friendly observers ease off-line e-cash

    Shouhuai Xu, Moti Yung, Gendu Zhang

    Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, Kluwer Academic Publishers, Norwell, MA, USA (2001), pp. 3-18

  •  

    Hash to the Rescue: Space Minimization for PKI Directories

    Adam Young, Moti Yung

    ICISC '00: Proceedings of the Third International Conference on Information Security and Cryptology, Springer-Verlag, London, UK (2001), pp. 235-245

  •  

    On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC

    Marc Joye, Jean-Jacques Quisquater, Moti Yung

    CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology, Springer-Verlag, London, UK, pp. 208-222

  •  

    Polynomial Reconstruction Based Cryptography

    Aggelos Kiayias, Moti Yung

    SAC '01: Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography, Springer-Verlag, London, UK (2001), pp. 129-133

  •  

    Secure Games with Polynomial Expressions

    Aggelos Kiayias, Moti Yung

    ICALP '01: Proceedings of the 28th International Colloquium on Automata, Languages and Programming,, Springer-Verlag, London, UK (2001), pp. 939-950

  •  

    Self Protecting Pirates and Black-Box Traitor Tracing

    Aggelos Kiayias, Moti Yung

    CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (2001), pp. 63-79

  •  

    Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation

    Jonathan Katz, Moti Yung

    FSE '00: Proceedings of the 7th International Workshop on Fast Software Encryption, Springer-Verlag, London, UK (2001), pp. 284-299

  •  

    "Psyeudorandom Intermixing": A Tool for Shared Cryptography

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    PKC '00: Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (2000), pp. 306-325

  •   

    Combined asynchronous/synchronous packet switching architecture: QoS guarantees for integrated parallel computing and real-time traffic

    Yoram Ofek, Moti Yung

    J. Parallel Distrib. Comput., vol. 60 (2000), pp. 275-295

  •   

    Complete characterization of security notions for probabilistic private-key encryption

    Jonathan Katz, Moti Yung

    STOC '00: Proceedings of the thirty-second annual ACM symposium on Theory of computing, ACM, New York, NY, USA (2000), pp. 245-254

  •  

    Design Validations for Discrete Logarithm Based Signature Schemes

    Ernest F. Brickell, David Pointcheval, Serge Vaudenay, Moti Yung

    PKC '00: Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (2000), pp. 276-292

  •   

    Eavesdropping games: a graph-theoretic approach to privacy in distributed systems

    Matthew Franklin, Zvi Galil, Moti Yung

    J. ACM, vol. 47 (2000), pp. 225-243

  •   

    Funkspiel schemes: an alternative to conventional tamper resistance

    Johan H{\aa}stad, Jakob Jonsson, Ari Juels, Moti Yung

    CCS '00: Proceedings of the 7th ACM conference on Computer and communications security, ACM, New York, NY, USA (2000), pp. 125-133

  •  

    How to Say \"YES\" with Smart Cards

    Yair Frankel, Moti Yung

    CARDIS '98: Proceedings of the The International Conference on Smart Card Research and Applications, Springer-Verlag, London, UK (2000), pp. 203-212

  •   

    Local and congestion-driven fairness algorithm in arbitrary topology networks

    Alain Mayer, Yoram Ofek, Moti Yung

    IEEE/ACM Trans. Netw., vol. 8 (2000), pp. 362-372

  •  

    On Threshold RSA-Signing with no Dealer

    Shingo Miyazaki, Kouichi Sakurai, Moti Yung

    ICISC '99: Proceedings of the Second International Conference on Information Security and Cryptology, Springer-Verlag, London, UK (2000), pp. 197-207

  •   

    On zero-knowledge proofs (extended abstract): ``from membership to decision''

    Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung

    STOC '00: Proceedings of the thirty-second annual ACM symposium on Theory of computing, ACM, New York, NY, USA (2000), pp. 255-264

  •  

    RSA-Based Auto-recoverable Cryptosystems

    Adam Young, Moti Yung

    PKC '00: Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (2000), pp. 326-341

  •  

    Self-Escrowed Public-Key Infrastructures

    Pascal Paillier, Moti Yung

    ICISC '99: Proceedings of the Second International Conference on Information Security and Cryptology, Springer-Verlag, London, UK (2000), pp. 257-268

  •  

    Software DisEngineering: Program Hiding Architecture and Experiments

    Enriquillo Valdez, Moti Yung

    IH '99: Proceedings of the Third International Workshop on Information Hiding, Springer-Verlag, London, UK (2000), pp. 379-394

  •  

    Towards Signature-Only Signature Schemes

    Adam Young, Moti Yung

    ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag, London, UK (2000), pp. 97-115

  •  

    Adaptively-Secure Distributed Public-Key Systems

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    ESA '99: Proceedings of the 7th Annual European Symposium on Algorithms, Springer-Verlag, London, UK (1999), pp. 4-27

  •  

    Adaptively-Secure Optimal-Resilience Proactive RSA

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    ASIACRYPT '99: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, Springer-Verlag, London, UK (1999), pp. 180-194

  •  

    Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy

    Adam Young, Moti Yung

    PKC '99: Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (1999), pp. 306-314

  •  

    Auto-recoverable Auto-certifiable Cryptosystems (A Survey)

    Adam Young, Moti Yung

    Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99, Springer-Verlag, London, UK (1999), pp. 204-218

  •  

    Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control"

    Yair Frankel, Moti Yung

    FC '99: Proceedings of the Third International Conference on Financial Cryptography, Springer-Verlag, London, UK (1999), pp. 241-252

  •  

    Decision Oracles are Equivalent to Matching Oracles

    Helena Handschuh, Yiannis Tsiounis, Moti Yung

    PKC '99: Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (1999), pp. 276-289

  •  

    Electronic Payments: Where Do We Go from Here?

    Markus Jakobsson, David M'Ra\"{\i}hi, Yiannis Tsiounis, Moti Yung

    Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99, Springer-Verlag, London, UK (1999), pp. 43-63

  •  

    Money Conservation via Atomicity in Fair Off-Line E-Cash

    Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu

    ISW '99: Proceedings of the Second International Workshop on Information Security, Springer-Verlag, London, UK (1999), pp. 14-31

  •  

    Non-Interactive CryptoComputing For NC1

    Tomas Sander, Adam Young, Moti Yung

    FOCS '99: Proceedings of the 40th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, Washington, DC, USA (1999), pp. 554

  •  

    Scramble All, Encrypt Small

    Markus Jakobsson, Julien P. Stern, Moti Yung

    FSE '99: Proceedings of the 6th International Workshop on Fast Software Encryption, Springer-Verlag, London, UK (1999), pp. 95-111

  •   

    Secure protocol transformation via ``expansion'': from two-party to groups

    Alain Mayer, Moti Yung

    CCS '99: Proceedings of the 6th ACM conference on Computer and communications security, ACM, New York, NY, USA (1999), pp. 83-92

  •  

    Self-Testing/Correcting Protocols (Extended Abstract)

    Matthew K. Franklin, Juan A. Garay, Moti Yung

    Proceedings of the 13th International Symposium on Distributed Computing, Springer-Verlag, London, UK (1999), pp. 269-283

  •  

    Beyond Identity: Warranty-Based Digital Signature Transactions

    Yair Frankel, David W. Kravitz, Charles T. Montgomery, Moti Yung

    FC '98: Proceedings of the Second International Conference on Financial Cryptography, Springer-Verlag, London, UK (1998), pp. 241-253

  •  

    Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it

    Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung

    ISAAC '98: Proceedings of the 9th International Symposium on Algorithms and Computation, Springer-Verlag, London, UK (1998), pp. 59-68

  •  

    Distributed Public Key Cryptosystems

    Yair Frankel, Moti Yung

    PKC '98: Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (1998), pp. 1-13

  •  

    Fair Off-Line e-cash Made Easy

    Yair Frankel, Yiannis Tsiounis, Moti Yung

    ASIACRYPT '98: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, Springer-Verlag, London, UK (1998), pp. 257-270

  •  

    Finding Length-3 Positive Cunningham Chains

    Adam Young, Moti Yung

    ANTS-III: Proceedings of the Third International Symposium on Algorithmic Number Theory, Springer-Verlag, London, UK (1998), pp. 289-298

  •  

    Image Density is Complete for Non-Interactive-SZK (Extended Abstract)

    Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, Moti Yung

    ICALP '98: Proceedings of the 25th International Colloquium on Automata, Languages and Programming, Springer-Verlag, London, UK (1998), pp. 784-795

  •  

    Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs

    Adam Young, Moti Yung

    FSE '98: Proceedings of the 5th International Workshop on Fast Software Encryption, Springer-Verlag, London, UK (1998), pp. 122-133

  •  

    On Assurance Structures for WWW Commerce

    Markus Jakobsson, Moti Yung

    FC '98: Proceedings of the Second International Conference on Financial Cryptography, Springer-Verlag, London, UK (1998), pp. 141-157

  •  

    On the Security of ElGamal Based Encryption

    Yiannis Tsiounis, Moti Yung

    PKC '98: Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, London, UK (1998), pp. 117-134

  •  

    Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols

    Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung

    STACS '98: Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science, Springer-Verlag, London, UK (1998), pp. 511-521

  •   

    Robust efficient distributed RSA-key generation

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    PODC '98: Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, ACM, New York, NY, USA (1998), pp. 320

  •   

    Robust efficient distributed RSA-key generation

    Yair Frankel, Philip D. MacKenzie, Moti Yung

    STOC '98: Proceedings of the thirtieth annual ACM symposium on Theory of computing, ACM, New York, NY, USA (1998), pp. 663-672

  •  

    VarietyCash: a multi-purpose electronic payment system

    M. Bellare, J. Garay, C. Jutla, M. Yung

    WOEC'98: Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce, USENIX Association, Berkeley, CA, USA (1998), pp. 2-2

  •   

    ``Dynamic-fault-prone BSP'': a paradigm for robust computations in changing environments

    Spyros C. Kontogiannis, Grammati E. Pantziou, Paul G. Spirakis, Moti Yung

    SPAA '98: Proceedings of the tenth annual ACM symposium on Parallel algorithms and architectures, ACM, New York, NY, USA (1998), pp. 37-46

  •  

    Anonymity Control in E-Cash Systems

    George I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung

    FC '97: Proceedings of the First International Conference on Financial Cryptography, Springer-Verlag, London, UK (1997), pp. 1-16

  •  

    Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System

    Markus Jakobsson, Moti Yung

    FC '97: Proceedings of the First International Conference on Financial Cryptography, Springer-Verlag, London, UK (1997), pp. 217-238

  •   

    Combinatorial design of congestion-free networks

    Bülent Yener, Yoram Ofek, Moti Yung

    IEEE/ACM Trans. Netw., vol. 5 (1997), pp. 989-1000

  •   

    Concurrent Asynchronous Broadcast on the MetaNet

    Yoram Ofek, Bülent Yener, Moti Yung

    IEEE Trans. Comput., vol. 46 (1997), pp. 737-748

  •  

    Deniable password snatching: on the possibility of evasive electronic espionage

    A. Young, Moti Yung

    SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, pp. 224

  •   

    Efficient on-line call control algorithms

    Juan A. Garay, Inder S. Gopal, Shay Kutten, Yishay Mansour, Moti Yung

    J. Algorithms, vol. 23 (1997), pp. 180-194

  •   

    Fault-tolerant convergence routing

    Bülent Yener, Inderpal Bhandari, Yoram Ofek, Moti Yung

    J. Parallel Distrib. Comput., vol. 42 (1997), pp. 173-183

  •  

    Keeping the SZK-Verifier Honest Unconditionally

    Giovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung

    CRYPTO '97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1997), pp. 31-45

  •  

    On Characterization of Escrow Encryption Schemes

    Yair Frankel, Moti Yung

    ICALP '97: Proceedings of the 24th International Colloquium on Automata, Languages and Programming, Springer-Verlag, London, UK (1997), pp. 705-715

  •  

    Optimal-resilience proactive public-key cryptosystems

    Y. Frankel, P. Gemmell, P. D. MacKenzie, Moti Yung

    FOCS '97: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, Washington, DC, USA (1997), pp. 384

  •  

    Proactive RSA

    Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung

    CRYPTO '97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1997), pp. 440-454

  •   

    Proactive public key and signature systems

    Amir Herzberg, Markus Jakobsson, Stanisl\law Jarecki, Hugo Krawczyk, Moti Yung

    CCS '97: Proceedings of the 4th ACM conference on Computer and communications security, ACM, New York, NY, USA (1997), pp. 100-110

  •   

    Scheduling task-trees with additive scales on parallel/distributed machines

    Xiangdong Yu, Moti Yung

    Theor. Comput. Sci., vol. 181 (1997), pp. 357-378

  •  

    Sliding Encryption: A Cryptographic Tool for Mobile Agents

    Adam Young, Moti Yung

    FSE '97: Proceedings of the 4th International Workshop on Fast Software Encryption, Springer-Verlag, London, UK (1997), pp. 230-241

  •  

    The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems

    Adam Young, Moti Yung

    CRYPTO '97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1997), pp. 264-276

  •   

    The local detection paradigm and its applications to self-stabilization

    Yehuda Afek, Shay Kutten, Moti Yung

    Theor. Comput. Sci., vol. 186 (1997), pp. 199-229

  •  

    Zero-knowledge proofs of decision power: new protocols and optimal round-complexity

    Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung

    ICICS '97: Proceedings of the First International Conference on Information and Communication Security, Springer-Verlag, London, UK (1997), pp. 17-27

  •  

    "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash

    Yair Frankel, Yiannis Tsiounis, Moti Yung

    ASIACRYPT '96: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, Springer-Verlag, London, UK (1996), pp. 286-300

  •  

    A Progress Report on Subliminal-Free Channels

    Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung

    Proceedings of the First International Workshop on Information Hiding, Springer-Verlag, London, UK (1996), pp. 157-168

  •  

    Agent Rendezvous: A Dynamic Symmetry-Breaking Problem

    Xiangdong Yu, Moti Yung

    ICALP '96: Proceedings of the 23rd International Colloquium on Automata, Languages and Programming, Springer-Verlag, London, UK (1996), pp. 610-621

  •  

    Cryptovirology: Extortion-Based Security Threats and Countermeasures

    Adam Young, Moti Yung

    SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, pp. 129

  •  

    Distributed Computing in Asynchronous Networks with Byzantine Edges

    Vasant Shanbhogue, Moti Yung

    COCOON '96: Proceedings of the Second Annual International Conference on Computing and Combinatorics, Springer-Verlag, London, UK (1996), pp. 352-360

  •  

    Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers

    Markus Jakobsson, Moti Yung

    CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1996), pp. 186-200

  •   

    Revokable and versatile electronic money (extended abstract)

    Markus Jakobsson, Moti Yung

    CCS '96: Proceedings of the 3rd ACM conference on Computer and communications security, ACM, New York, NY, USA (1996), pp. 76-87

  •  

    Self-stabilizing algorithms for synchronous unidirectional rings

    Alain Mayer, Rafail Ostrovsky, Moti Yung

    SODA '96: Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms, Society for Industrial and Applied Mathematics, Philadelphia, PA, USA (1996), pp. 564-573

  •  

    The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?

    Adam Young, Moti Yung

    CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1996), pp. 89-103

  •   

    Witness-based cryptographic program checking and applications (an announcement)

    Yair Frankel, Peter Gemmell, Moti Yung

    PODC '96: Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing, ACM, New York, NY, USA (1996), pp. 211

  •   

    Witness-based cryptographic program checking and robust function sharing

    Yair Frankel, Peter Gemmell, Moti Yung

    STOC '96: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, ACM, New York, NY, USA (1996), pp. 499-508

  •  

    Cryptoanalysis of the Immunized LL Public Key Systems

    Yair Frankel, Moti Yung

    CRYPTO '95: Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1995), pp. 287-296

  •  

    Efficient Dynamic-Resharing "Verifiable Secret Sharing" Against Mobile Adversary

    Noga Alon, Zvi Galil, Moti Yung

    ESA '95: Proceedings of the Third Annual European Symposium on Algorithms, Springer-Verlag, London, UK (1995), pp. 523-537

  •  

    Escrow Encryption Systems Visited: Attacks, Analysis and Designs

    Yair Frankel, Moti Yung

    CRYPTO '95: Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1995), pp. 222-235

  •  

    Local fairness in general-topology networks with convergence routing

    A. Mayer, Y. Ofek, M. Yung

    INFOCOM '95: Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 2)-Volume, IEEE Computer Society, Washington, DC, USA (1995), pp. 891

  •   

    METANET: principles of an arbitrary topology LAN

    Yoram Ofek, Moti Yung

    IEEE/ACM Trans. Netw., vol. 3 (1995), pp. 169-180

  •  

    Multi-authority secret-ballot elections with linear work

    Ronald J.F. Cramer, Matthew Franklin, L. A.M. Schoenmakers, Moti Yung

    CWI (Centre for Mathematics and Computer Science), Amsterdam, The Netherlands, The Netherlands (1995)

  •  

    Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

    Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung

    CRYPTO '95: Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1995), pp. 339-352

  •  

    Resolving message complexity of Byzantine Agreement and beyond

    Z. Galil, A. Mayer, Moti Yung

    FOCS '95: Proceedings of the 36th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, Washington, DC, USA (1995), pp. 724

  •  

    Scheduling Task-Tree with Additive Scales on Parallel / Distributed Machines

    Xiangdong Yu, Moti Yung

    COCOON '95: Proceedings of the First Annual International Conference on Computing and Combinatorics, Springer-Verlag, London, UK (1995), pp. 607-616

  •   

    Secure hypergraphs: privacy from partial broadcast

    Matthew Franklin, Moti Yung

    STOC '95: Proceedings of the twenty-seventh annual ACM symposium on Theory of computing, ACM, New York, NY, USA (1995), pp. 36-44

  •  

    Stocastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time

    Sotiris E. Nikoletseas, John H. Reif, Paul G. Spirakis, Moti Yung

    ICALP '95: Proceedings of the 22nd International Colloquium on Automata, Languages and Programming, Springer-Verlag, London, UK (1995), pp. 159-170

  •   

    The KryptoKnight family of light-weight protocols for authentication and key distribution

    Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, Moti Yung

    IEEE/ACM Trans. Netw., vol. 3 (1995), pp. 31-41

  •  

    Topological design of loss-free switch-based LANs

    B. Yener, Y. Ofek, M. Yung

    INFOCOM '95: Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 1)-Volume, IEEE Computer Society, Washington, DC, USA (1995), pp. 88

  •   

    Coins, weights and contention in balancing networks

    William Aiello, Ramarathnam Venkatesan, Moti Yung

    PODC '94: Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing, ACM, New York, NY, USA (1994), pp. 193-205

  •   

    How to share a function securely

    Alfredo De Santis, Yvo Desmedt, Yair Frankel, Moti Yung

    STOC '94: Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, ACM, New York, NY, USA (1994), pp. 522-533

  •  

    Interactive hashing simplifies zero-knowledge protocol design

    Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung

    EUROCRYPT '93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, Springer-Verlag New York, Inc., Secaucus, NJ, USA (1994), pp. 267-273

  •  

    Non-Exploratory Self-Stabilization for Constant-Space Symmetry-Breaking

    Giuseppe Parlati, Moti Yung

    ESA '94: Proceedings of the Second Annual European Symposium on Algorithms, Springer-Verlag, London, UK (1994), pp. 183-201

  •  

    Privacy from partial broadcast

    Matthew Franklin, Moti Yung

    CWI (Centre for Mathematics and Computer Science), Amsterdam, The Netherlands, The Netherlands (1994)

  •   

    Routing and flow control on the MetaNet: an overview

    Yoram Ofek, Moti Yung

    Comput. Netw. ISDN Syst., vol. 26 (1994), pp. 859-872

  •  

    Short Vertex Disjoint Paths and Multiconnectivity in Random Graphs: Reliable Network Computing

    Sotiris E. Nikoletseas, Krishna V. Palem, Paul G. Spirakis, Moti Yung

    ICALP '94: Proceedings of the 21st International Colloquium on Automata, Languages and Programming, Springer-Verlag, London, UK (1994), pp. 508-519

  •   

    Time-optimal message-efficient work performance in the presence of faults

    Roberto De Prisco, Alain Mayer, Moti Yung

    PODC '94: Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing, ACM, New York, NY, USA (1994), pp. 161-172

  •  

    Certifying Cryptographic Tools: The Case of Trapdoor Permutations

    Mihir Bellare, Moti Yung

    CRYPTO '92: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1993), pp. 442-460

  •  

    Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract)

    Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung

    CRYPTO '92: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1993), pp. 196-214

  •   

    Perfectly secure message transmission

    Danny Dolev, Cynthia Dwork, Orli Waarts, Moti Yung

    J. ACM, vol. 40 (1993), pp. 17-47

  •  

    Perfectly-Secure Key Distribution for Dynamic Conferences

    Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung

    CRYPTO '92: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1993), pp. 471-486

  •  

    Secure and Efficient Off-Line Digital Money (Extended Abstract)

    Matthew K. Franklin, Moti Yung

    ICALP '93: Proceedings of the 20th International Colloquium on Automata, Languages and Programming, Springer-Verlag, London, UK (1993), pp. 265-276

  •   

    Communication complexity of secure computation (extended abstract)

    Matthew Franklin, Moti Yung

    STOC '92: Proceedings of the twenty-fourth annual ACM symposium on Theory of computing, ACM, New York, NY, USA (1992), pp. 699-710

  •   

    Criticizing solutions to relaxed models yields powerful admissible heuristics

    Othar Hansson, Andrew Mayer, Moti Yung

    Inf. Sci., vol. 63 (1992), pp. 207-227

  •  

    Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback

    Yvo Desmedt, Yair Frankel, Moti Yung

    IEEE INFOCOM '92: Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3), IEEE Computer Society Press, Los Alamitos, CA, USA (1992), pp. 2045-2054

  •  

    One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier

    Alfredo De Santis, Giuseppe Persiano, Moti Yung

    ICALP '92: Proceedings of the 19th International Colloquium on Automata, Languages and Programming, Springer-Verlag, London, UK (1992), pp. 28-40

  •  

    Secure Commitment Against A Powerful Adversary

    Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung

    STACS '92: Proceedings of the 9th Annual Symposium on Theoretical Aspects of Computer Science, Springer-Verlag, London, UK (1992), pp. 439-448

  •   

    Self-stabilizing symmetry breaking in constant-space (extended abstract)

    Alain Mayer, Yoram Ofek, Rafail Ostrovsky, Moti Yung

    STOC '92: Proceedings of the twenty-fourth annual ACM symposium on Theory of computing, ACM, New York, NY, USA (1992), pp. 667-678

  •  

    Systematic Design of Two-Party Authentication Protocols

    Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung

    CRYPTO '91: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1992), pp. 44-61

  •  

    Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract)

    Yvo Desmedt, Moti Yung

    CRYPTO '90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1991), pp. 177-188

  •   

    Constant-round perfect zero-knowledge computationally convincing protocols

    Gilles Brassard, Claude Cr\'{e}peau, Moti Yung

    Theor. Comput. Sci., vol. 84 (1991), pp. 23-52

  •  

    Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems

    Alfredo De Santis, Moti Yung

    CRYPTO '90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1991), pp. 366-377

  •  

    Efficient Mechanism for Fairness and Deadlock-Avoidance in High-Speed Networks

    Yoram Ofek, Moti Yung

    WDAG '90: Proceedings of the 4th International Workshop on Distributed Algorithms, Springer-Verlag, London, UK (1991), pp. 192-212

  •  

    Efficient mechanism for fairness and deadlock-avoidance in high-speed networks

    Yoram Ofek, Moti Yung

    Proceedings of the 4th international workshop on Distributed algorithms, Springer-Verlag New York, Inc., New York, NY, USA (1991), pp. 192-212

  •  

    Efficient sequential and parallel algorithms for computing recovery points in trees and paths

    Marek Chrobak, David Eppstein, Giuseppe F. Italiano, Moti Yung

    SODA '91: Proceedings of the second annual ACM-SIAM symposium on Discrete algorithms, Society for Industrial and Applied Mathematics, Philadelphia, PA, USA (1991), pp. 158-167

  •   

    How to withstand mobile virus attacks (extended abstract)

    Rafail Ostrovsky, Moti Yung

    PODC '91: Proceedings of the tenth annual ACM symposium on Principles of distributed computing, ACM, New York, NY, USA (1991), pp. 51-59

  •  

    Memory-Efficient Self Stabilizing Protocols for General Networks

    Yehuda Afek, Shay Kutten, Moti Yung

    WDAG '90: Proceedings of the 4th International Workshop on Distributed Algorithms, Springer-Verlag, London, UK (1991), pp. 15-28

  •  

    Memory-efficient self stabilizing protocols for general networks

    Yehuda Afek, Shay Kutten, Moti Yung

    Proceedings of the 4th international workshop on Distributed algorithms, Springer-Verlag New York, Inc., New York, NY, USA (1991), pp. 15-28

  •  

    On the design of provably-secure cryptographic hash functions

    Alfredo De Santis, Moti Yung

    EUROCRYPT '90: Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology, Springer-Verlag New York, Inc., New York, NY, USA (1991), pp. 412-431

  •  

    One-Way Group Actions

    Gilles Brassard, Moti Yung

    CRYPTO '90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK (1991), pp. 94-107

  •  

    Everything in NP can be argued in perfect zero-knowledge in a bounded number of rounds (extended abstract)

    Gilles Brassard, Claude Cr\'{e}peau, Moti Yung

    EUROCRYPT '89: Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology, Springer-Verlag New York, Inc., New York, NY, USA (1990), pp. 192-195

  •   

    Principle for high speed network control: congestion-and deadlock-freeness, self-routing, and a single buffer per link

    Yoram Ofek, Moti Yung

    PODC '90: Proceedings of the ninth annual ACM symposium on Principles of distributed computing, ACM, New York, NY, USA (1990), pp. 161-175

  •   

    Public-key cryptosystems provably secure against chosen ciphertext attacks

    M. Naor, M. Yung

    STOC '90: Proceedings of the twenty-second annual ACM symposium on Theory of computing, ACM, New York, NY, USA (1990), pp. 427-437

  •   

    The power of multimedia: combining point-to-point and multiaccess networks

    Y. Afek, M. Landau, B. Schieber, M. Yung

    Inf. Comput., vol. 84 (1990), pp. 97-118

  •  

    Zero-knowledge proofs of computational power (extended summary)

    Moti Yung

    EUROCRYPT '89: Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology, Springer-Verlag New York, Inc., New York, NY, USA (1990), pp. 196-207

  •   

    Divide and conquer under global constraints: a solution to the /N/-queens problem

    Bruce Abramson, Moti Yung

    J. Parallel Distrib. Comput., vol. 6 (1989), pp. 649-662

  •   

    Fast algorithms for edge-coloring planar graphs

    Marek Chrobak, Moti Yung

    J. Algorithms, vol. 10 (1989), pp. 35-51

  •   

    Minimum-knowledge interactive proofs for decision problems

    Zvi Galil, Stuart Haber, Moti Yung

    SIAM J. Comput., vol. 18 (1989), pp. 711-739

  •   

    Universal one-way hash functions and their cryptographic applications

    M. Naor, M. Yung

    STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computing, ACM, New York, NY, USA (1989), pp. 33-43

  •  

    Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model

    Zvi Galil, Stuart Haber, Moti Yung

    CRYPTO '87: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer-Verlag, London, UK (1988), pp. 135-155

  •  

    Direct Minimum-Knowledge Computations

    Russell Impagliazzo, Moti Yung

    CRYPTO '87: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer-Verlag, London, UK (1988), pp. 40-51

  •  

    Fast Parallel and Sequential Algorithms for Edge-Coloring Planar Graphs

    Marek Chrobak, Moti Yung

    AWOC '88: Proceedings of the 3rd Aegean Workshop on Computing, Springer-Verlag, London, UK (1988), pp. 11-23

  •  

    Fast parallel and sequential algorithms for edge-coloring planar graphs (extended abstract)

    M. Chrobak, M. Yung

    VLSI Algorithms and Architectures, Springer-Verlag, London, UK (1988), pp. 11-23

  •   

    The power of multimedia: combining point-to point and multi-access networks

    Yehuda Afek, Gad M. Landau, Baruch Schieber, Moti Yung

    PODC '88: Proceedings of the seventh annual ACM Symposium on Principles of distributed computing, ACM, New York, NY, USA (1988), pp. 90-104

  •  

    Distributed algorithms in synchronous broadcasting networks

    Z. Galil, G. M. Landau, M. M. Yung

    Theor. Comput. Sci., vol. 49 (1987), pp. 178-184

  •   

    Partitioned encryption and achieving simultaneity by partitioning

    Zvi Galil, Moti Yung

    Inf. Process. Lett., vol. 26 (1987), pp. 81-88

  •   

    Distributing the power of a government to enhance the privacy of voters

    Josh C Benaloh, Moti Yung

    PODC '86: Proceedings of the fifth annual ACM symposium on Principles of distributed computing, ACM, New York, NY, USA (1986), pp. 52-62

  •  

    Symmetric Public-Key Encryption

    Zvi Galil, Stuart Haber, Moti Yung

    CRYPTO '85: Advances in Cryptology, Springer-Verlag, London, UK (1986), pp. 128-137

  •  

    Symmetric public-key encryption

    Zvi Galil, Stuart Haber, Moti Yung

    Lecture notes in computer sciences; 218 on Advances in cryptology--CRYPTO 85, Springer-Verlag New York, Inc., New York, NY, USA (1986), pp. 128-137