Yung, Moti.
Yung, Moti, 1959-....
Moti Yung Israeli computer scientist
Yung, M. (Moti)
Yung, M.
VIAF ID: 12562641 (Personal)
Permalink: http://viaf.org/viaf/12562641
Preferred Forms
- 100 0 _ ‡a Moti Yung ‡c Israeli computer scientist
- 200 _ | ‡a Yung ‡b Moti
- 100 1 _ ‡a Yung, M.
-
- 100 1 _ ‡a Yung, Moti
-
-
-
- 100 1 _ ‡a Yung, Moti
-
-
-
- 100 1 _ ‡a Yung, Moti ‡d 1959-
- 100 1 _ ‡a Yung, Moti ‡d 1959-
-
- 100 1 _ ‡a Yung, Moti, ‡d 1959-....
-
4xx's: Alternate Name Forms (11)
5xx's: Related Names (2)
Works
Title | Sources |
---|---|
ACNS 2004 | |
Advances in cryptology--CRYPTO 2002 : 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002 : proceedings | |
Advances in public-key cryptology and computer exploitation | |
Les algorithmes basés sur le logarithme discret en cryptologie | |
Applied cryptography and network security : second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings | |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts | |
A block cipher based pseudo random number generator secure against side-channel key recovery | |
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts | |
Computer security -- ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 : proceedings | |
Cryptovirology: extortion-based security threats and countermeasures | |
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005 : revised selected papers | |
Does Physical Security of Cryptographic Devices Need a Formal Study? | |
DRM 2003 : proceedings of the Third ACM Workshop on Digital Rights Management, Washington, DC, USA, October 27, 2003 | |
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption | |
FC 2005 | |
Financial cryptography and data security : 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28- March 3, 2005 : revised papers | |
Generic Semantic Security against a Kleptographic Adversary | |
Information security and cryptology : 4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 : revised selected papers | |
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers | |
Inscrypt 2011 | |
INTRUST 2009 | |
Linearly homomorphic structure-preserving signatures and their applications | |
Malicious cryptography : exposing cryptovirology | |
Non-interactive arguments of knowledge. | |
On Fundamental Limitations of Proving Data Theft | |
PKC 2006 | |
Practical leakage-resilient pseudorandom generators | |
PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES | |
Progress in cryptology : INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007 : proceedings | |
Public key cryptography, PKC 2006 : 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006 : proceedings | |
SCN 2006 | |
Secret swarm unit | |
Secure Wallet-Assisted Offline Bitcoin Payments With Double-Spender Revocation | |
Security and Privacy in Communication Networks : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II | |
Security of cryptographic protocols and data structures : design and optimisation | |
Stabilization, Safety, and Security of Distributed Systems : 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010. Proceedings | |
Try again. Fail again. Fail better : new notions of security, broken assumptions, and increased efficiency in cryptography | |
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks | |
Wiley-HEP information security series | |
WISA 2006 | |
信息安全与密码学 |