Moti Yung

Results: 7



#Item
1Published in Designs, Codes and Cryptography, 77(2):441–477, Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoˆıt Libert · Thomas Peters · Marc Joye · Moti Yung

Published in Designs, Codes and Cryptography, 77(2):441–477, Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoˆıt Libert · Thomas Peters · Marc Joye · Moti Yung

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2015-10-02 18:24:31
    2Kurosawa-Desmedt KEM is not CCA2-secure Seung Geol Choi a , Javier Herranz b , Dennis Hofheinz c , Jung Yeon Hwang d , Eike Kiltz c,1 , Dong Hoon Lee d,2 , Moti Yung a a Department

    Kurosawa-Desmedt KEM is not CCA2-secure Seung Geol Choi a , Javier Herranz b , Dennis Hofheinz c , Jung Yeon Hwang d , Eike Kiltz c,1 , Dong Hoon Lee d,2 , Moti Yung a a Department

    Add to Reading List

    Source URL: www.kjdf.de

    Language: English - Date: 2014-06-10 05:37:43
      32009 ACM Cloud Computing Security Workshop (CCSW) 13 November 2009, Hyatt Regency Chicago http://crypto.cs.stonybrook.edu/ccsw09 Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-sca

      2009 ACM Cloud Computing Security Workshop (CCSW) 13 November 2009, Hyatt Regency Chicago http://crypto.cs.stonybrook.edu/ccsw09 Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-sca

      Add to Reading List

      Source URL: digitalpiglet.org

      Language: English - Date: 2009-06-25 04:56:01
      4Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency FC 2013 Kwangsu Lee, Dong Hoon Lee, and Moti Yung Korea University and Columbia University, Korea University, Google Inc. and

      Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency FC 2013 Kwangsu Lee, Dong Hoon Lee, and Moti Yung Korea University and Columbia University, Korea University, Google Inc. and

      Add to Reading List

      Source URL: fc13.ifca.ai

      Language: English - Date: 2013-04-04 03:04:00
        5A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery Christophe Petit 1,∗, François-Xavier Standaert 1,† , Olivier Pereira 1,¦ , Tal G. Malkin 2 , Moti Yung 2,3 . UCL Crypto

        A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery Christophe Petit 1,∗, François-Xavier Standaert 1,† , Olivier Pereira 1,¦ , Tal G. Malkin 2 , Moti Yung 2,3 . UCL Crypto

        Add to Reading List

        Source URL: www.uclouvain.be

        Language: English - Date: 2011-12-14 05:30:39
          6Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

          Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2006-12-04 09:17:42
          7Actual Cryptography at the Age of Evolving Ecosystems Moti Yung, Google

          Actual Cryptography at the Age of Evolving Ecosystems Moti Yung, Google

          Add to Reading List

          Source URL: www.cyber.umd.edu

          Language: English - Date: 2014-05-13 11:01:16