1![Published in Designs, Codes and Cryptography, 77(2):441–477, Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoˆıt Libert · Thomas Peters · Marc Joye · Moti Yung Published in Designs, Codes and Cryptography, 77(2):441–477, Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoˆıt Libert · Thomas Peters · Marc Joye · Moti Yung](https://www.pdfsearch.io/img/93a9963ef0bd57fb861680c14b9dfd19.jpg) | Add to Reading ListSource URL: joye.site88.netLanguage: English - Date: 2015-10-02 18:24:31
|
---|
2![Kurosawa-Desmedt KEM is not CCA2-secure Seung Geol Choi a , Javier Herranz b , Dennis Hofheinz c , Jung Yeon Hwang d , Eike Kiltz c,1 , Dong Hoon Lee d,2 , Moti Yung a a Department Kurosawa-Desmedt KEM is not CCA2-secure Seung Geol Choi a , Javier Herranz b , Dennis Hofheinz c , Jung Yeon Hwang d , Eike Kiltz c,1 , Dong Hoon Lee d,2 , Moti Yung a a Department](https://www.pdfsearch.io/img/16ec3c0fa111f7152563d33c402edc92.jpg) | Add to Reading ListSource URL: www.kjdf.deLanguage: English - Date: 2014-06-10 05:37:43
|
---|
3![2009 ACM Cloud Computing Security Workshop (CCSW) 13 November 2009, Hyatt Regency Chicago http://crypto.cs.stonybrook.edu/ccsw09 Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-sca 2009 ACM Cloud Computing Security Workshop (CCSW) 13 November 2009, Hyatt Regency Chicago http://crypto.cs.stonybrook.edu/ccsw09 Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-sca](https://www.pdfsearch.io/img/2df6cffd531394d19da211817e72025f.jpg) | Add to Reading ListSource URL: digitalpiglet.orgLanguage: English - Date: 2009-06-25 04:56:01
|
---|
4![Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency FC 2013 Kwangsu Lee, Dong Hoon Lee, and Moti Yung Korea University and Columbia University, Korea University, Google Inc. and Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency FC 2013 Kwangsu Lee, Dong Hoon Lee, and Moti Yung Korea University and Columbia University, Korea University, Google Inc. and](https://www.pdfsearch.io/img/70be29cdde7d76a697751b772a6e2ed3.jpg) | Add to Reading ListSource URL: fc13.ifca.aiLanguage: English - Date: 2013-04-04 03:04:00
|
---|
5![A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery Christophe Petit 1,∗, François-Xavier Standaert 1,† , Olivier Pereira 1,¦ , Tal G. Malkin 2 , Moti Yung 2,3 . UCL Crypto A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery Christophe Petit 1,∗, François-Xavier Standaert 1,† , Olivier Pereira 1,¦ , Tal G. Malkin 2 , Moti Yung 2,3 . UCL Crypto](https://www.pdfsearch.io/img/b9418d1fb9fe7defc392dd986ee27997.jpg) | Add to Reading ListSource URL: www.uclouvain.beLanguage: English - Date: 2011-12-14 05:30:39
|
---|
6![Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung† Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†](https://www.pdfsearch.io/img/bb58402a3916d6c0283c9410d6ba5620.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-04 09:17:42
|
---|
7![Actual Cryptography at the Age of Evolving Ecosystems Moti Yung, Google Actual Cryptography at the Age of Evolving Ecosystems Moti Yung, Google](https://www.pdfsearch.io/img/6787587204cf4f4e7ccd156e5d8a0575.jpg) | Add to Reading ListSource URL: www.cyber.umd.eduLanguage: English - Date: 2014-05-13 11:01:16
|
---|