Mordechai M. Yung

From MaRDI portal
Person:1088397

Available identifiers

zbMath Open yung.motiWikidataQ6917668 ScholiaQ6917668MaRDI QIDQ1088397

List of research outcomes

PublicationDate of PublicationType
Anamorphic signatures: secrecy from a dictator who only permits authentication!2024-02-02Paper
Distributed computing in asynchronous networks with byzantine edges2024-01-29Paper
Scheduling task-tree with additive scales on parallel/distributed machines2023-12-12Paper
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE2023-05-12Paper
Efficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversary2023-05-08Paper
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption2023-03-21Paper
Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups2022-12-16Paper
Two-sided malicious security for private intersection-sum with cardinality2022-12-07Paper
Anamorphic encryption: private communication against a dictator2022-08-30Paper
Secure commitment against a powerful adversary2022-08-18Paper
The Combinatorics of Product Scanning Multiplication and Squaring2022-06-15Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes2021-02-23Paper
Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions2020-11-06Paper
The combinatorics of hidden diversity2020-02-20Paper
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog2020-01-28Paper
One-message statistical Zero-Knowledge Proofs and space-bounded verifier2019-12-04Paper
Short vertex disjoint paths and multiconnectivity in random graphs: Reliable network computing2019-04-29Paper
Secure and efficient off-line digital money (extended abstract)2019-03-29Paper
Stochastic graphs have short memory: Fully dynamic connectivity in poly-log expected time2019-01-10Paper
Hard invalidation of electronic signatures2018-12-07Paper
Proactive secure multiparty computation with a dishonest majority2018-10-17Paper
Semantically secure anonymity: foundations of re-encryption2018-10-17Paper
Correcting subverted random oracles2018-09-26Paper
On characterizations of escrow encryption schemes2018-07-04Paper
Sliding encryption: A cryptographic tool for mobile agents2018-05-09Paper
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs2018-05-09Paper
End-to-end design of a PUF-based privacy preserving authentication protocol2018-02-14Paper
https://portal.mardi4nfdi.de/entity/Q45981662017-12-19Paper
Brief Announcement2017-10-11Paper
Time-optimal message-efficient work performance in the presence of faults2017-09-29Paper
Coins, weights and contention in balancing networks2017-09-29Paper
Brief Announcement2017-09-29Paper
Resource-based corruptions and the combinatorics of hidden diversity2017-05-16Paper
Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and The Multi-Player Mental Poker Game (extended abstract)2017-04-10Paper
Cliptography: Clipping the Power of Kleptographic Attacks2017-01-06Paper
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs2016-10-21Paper
Proactive Secret Sharing with a Dishonest Majority2016-10-21Paper
How to share a function securely2016-09-01Paper
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares2016-08-31Paper
Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack2016-05-02Paper
Towards a Unified Security Model for Physically Unclonable Functions2016-04-08Paper
Concurrent knowledge extraction in public-key models2016-04-07Paper
Efficient and secure authenticated key exchange using weak passwords2015-12-07Paper
The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?2015-11-11Paper
Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers2015-11-11Paper
Scalable public-key tracing and revoking2015-09-04Paper
Born and raised distributively2015-09-03Paper
A Little Honesty Goes a Long Way2015-07-06Paper
How to withstand mobile virus attacks (extended abstract)2015-06-19Paper
CONNECTIVITY PROPERTIES IN RANDOM REGULAR GRAPHS WITH EDGE FAULTS2015-04-29Paper
Order-Preserving Encryption Secure Beyond One-Wayness2015-01-06Paper
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption2014-10-14Paper
Complete characterization of security notions for probabilistic private-key encryption2014-09-26Paper
On zero-knowledge proofs (extended abstract)2014-09-26Paper
Multi-Authority Secret-Ballot Elections with Linear Work2014-08-20Paper
Scalable public-key tracing and revoking2013-06-07Paper
Adaptively secure non-interactive threshold cryptosystems2013-06-06Paper
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems2013-01-07Paper
Efficient robust private set intersection2012-11-16Paper
On the Centrality of Off-Line E-Cash to Concrete Partial Information Games2012-09-25Paper
Multi-location Leakage Resilient Cryptography2012-07-20Paper
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions2012-06-15Paper
Fully Forward-Secure Group Signatures2012-06-08Paper
Leakage Resilient Strong Key-Insulated Signatures in Public Channel2011-12-07Paper
Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge2011-12-02Paper
Adaptively Secure Non-interactive Threshold Cryptosystems2011-07-07Paper
On the Security of Hash Functions Employing Blockcipher Postprocessing2011-07-07Paper
Efficient Circuit-Size Independent Public Key Encryption with KDM Security2011-05-27Paper
Signatures Resilient to Continual Leakage on Memory and Computation2011-05-19Paper
The Dark Side of Threshold Cryptography2011-04-20Paper
Breaking and Repairing Asymmetric Public-Key Traitor Tracing2011-03-18Paper
Efficient traceable signatures in the standard model2011-03-14Paper
Leakage-Resilient RFID Authentication with Forward-Privacy2011-01-14Paper
A New Framework for RFID Privacy2010-09-20Paper
Kleptography from Standard Assumptions and Applications2010-09-10Paper
Efficient Completely Non-malleable Public Key Encryption2010-09-07Paper
Concurrent Knowledge Extraction in the Public-Key Model2010-09-07Paper
The Vector-Ballot Approach for Online Voting Procedures2010-06-17Paper
Cryptography between Wonderland and Underland2010-06-01Paper
Computer Aided Verification2010-03-31Paper
Computer Aided Verification2010-03-31Paper
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs2010-02-24Paper
Group Encryption: Non-interactive Realization in the Standard Model2009-12-15Paper
Secure Multi-party Computation Minimizing Online Rounds2009-12-15Paper
On Monotone Formula Composition of Perfect Zero-Knowledge Languages2009-08-20Paper
Efficient Traceable Signatures in the Standard Model2009-08-18Paper
Secure Function Collection with Sublinear Storage2009-07-14Paper
Public Key Cryptography – PKC 20042009-05-14Paper
On the Portability of Generalized Schnorr Proofs2009-05-12Paper
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks2009-05-12Paper
A New Randomness Extraction Paradigm for Hybrid Encryption2009-05-12Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Key Evolution Systems in Untrusted Update Environments2009-04-29Paper
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs2009-04-29Paper
Preimage Attack on the Parallel FFT-Hashing Function2009-03-06Paper
Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes2009-02-24Paper
Fair Traceable Multi-Group Signatures2009-02-12Paper
A Timing-Resistant Elliptic Curve Backdoor in RSA2009-02-10Paper
Efficient Intrusion-Resilient Signatures Without Random Oracles2009-01-15Paper
Privacy Preserving Data Mining within Anonymous Credential Systems2008-11-20Paper
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination2008-09-09Paper
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers2008-07-08Paper
The Security of Elastic Block Ciphers Against Key-Recovery Attacks2008-06-24Paper
Group Encryption2008-05-15Paper
Two-Party Computing with Encrypted Data2008-05-15Paper
Group Signatures with Efficient Concurrent Join2008-05-06Paper
Eavesdropping games2008-05-05Paper
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding2008-04-24Paper
Secret Swarm Unit Reactive k −Secret Sharing2008-04-11Paper
K-Anonymous Multi-party Secret Handshakes2008-03-07Paper
Recovering NTRU Secret Key from Inversion Oracles2008-03-05Paper
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
A Space Efficient Backdoor in RSA and Its Applications2007-11-15Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice2007-09-20Paper
Parallel Key-Insulated Public Key Encryption Without Random Oracles2007-09-04Paper
Decoding interleaved Reed-Solomon codes over noisy channels2007-07-16Paper
Scalable protocols for authenticated group key exchange2007-05-24Paper
https://portal.mardi4nfdi.de/entity/Q34339102007-04-23Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2007-02-12Paper
Information Security and Cryptology2006-11-14Paper
Information Security2006-10-20Paper
Security in Communication Networks2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Characterization of security notions for probabilistic private-key encryption2006-08-14Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Secure Hypergraphs: Privacy from Partial Broadcast2005-09-16Paper
Information Security and Privacy2005-09-07Paper
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice2005-08-12Paper
Financial Cryptography2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q48175242004-09-24Paper
https://portal.mardi4nfdi.de/entity/Q48188702004-09-24Paper
https://portal.mardi4nfdi.de/entity/Q47395212004-08-12Paper
Incremental Unforgeable Encryption2004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47371602004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372362004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372632004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47389362004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47364272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439332004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44720612004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44525762004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44525852004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44483922004-02-18Paper
https://portal.mardi4nfdi.de/entity/Q44507572004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44491672004-02-08Paper
https://portal.mardi4nfdi.de/entity/Q44349032003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44185242003-08-10Paper
Strong Key-Insulated Signature Schemes2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44142662003-07-24Paper
Threshold Cryptosystems Based on Factoring2003-07-16Paper
Crypto-integrity2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q47977972003-03-09Paper
https://portal.mardi4nfdi.de/entity/Q45362722003-03-07Paper
Adaptively secure distributed public-key systems.2003-01-21Paper
https://portal.mardi4nfdi.de/entity/Q47837202002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45362872002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q45362922002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q27245992002-10-21Paper
https://portal.mardi4nfdi.de/entity/Q31496752002-09-30Paper
Self-Stabilizing Symmetry Breaking in Constant Space2002-09-29Paper
https://portal.mardi4nfdi.de/entity/Q45425902002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q27244392002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q44960642002-07-10Paper
https://portal.mardi4nfdi.de/entity/Q45361982002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q45350742002-06-12Paper
https://portal.mardi4nfdi.de/entity/Q49412012002-04-21Paper
https://portal.mardi4nfdi.de/entity/Q27074072002-03-06Paper
https://portal.mardi4nfdi.de/entity/Q27629102002-01-13Paper
https://portal.mardi4nfdi.de/entity/Q27246022001-07-12Paper
Perfect zero-knowledge arguments for NP using any one-way permutation2001-05-20Paper
Robust parallel computations through randomization2001-04-17Paper
https://portal.mardi4nfdi.de/entity/Q49387692001-01-29Paper
https://portal.mardi4nfdi.de/entity/Q45024972000-09-12Paper
https://portal.mardi4nfdi.de/entity/Q49500532000-08-28Paper
https://portal.mardi4nfdi.de/entity/Q49418062000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q42492712000-06-29Paper
https://portal.mardi4nfdi.de/entity/Q49500512000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q49500542000-05-07Paper
Combined asynchronous/synchronous packet switching architecture: QoS guarantees for integrated parallel computing and real-time traffic2000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q42527582000-04-26Paper
https://portal.mardi4nfdi.de/entity/Q42634422000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q42634442000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q49347112000-01-31Paper
Auto-recoverable auto-certifiable cryptosystems1999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q43186941999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q42340491999-07-22Paper
https://portal.mardi4nfdi.de/entity/Q42285051999-05-18Paper
Perfectly secure key distribution for dynamic conferences1999-03-30Paper
https://portal.mardi4nfdi.de/entity/Q43813991999-01-10Paper
https://portal.mardi4nfdi.de/entity/Q38400801998-12-14Paper
Scheduling task-trees with additive scales on parallel/distributed machines1998-07-22Paper
The local detection paradigm and its applications to self-stabilization1998-06-30Paper
https://portal.mardi4nfdi.de/entity/Q43736081998-06-11Paper
https://portal.mardi4nfdi.de/entity/Q43645411998-02-10Paper
https://portal.mardi4nfdi.de/entity/Q38400731998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38400861998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38401711998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43434421997-12-01Paper
https://portal.mardi4nfdi.de/entity/Q43657291997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43645571997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43645691997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43434371997-07-06Paper
https://portal.mardi4nfdi.de/entity/Q43434461997-07-06Paper
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation1997-05-19Paper
Efficient On-Line Call Control Algorithms1997-04-27Paper
https://portal.mardi4nfdi.de/entity/Q48752311996-10-07Paper
https://portal.mardi4nfdi.de/entity/Q48584561996-05-27Paper
https://portal.mardi4nfdi.de/entity/Q48584571996-05-21Paper
https://portal.mardi4nfdi.de/entity/Q43187141995-08-08Paper
https://portal.mardi4nfdi.de/entity/Q43187161995-07-16Paper
https://portal.mardi4nfdi.de/entity/Q42795661994-09-20Paper
https://portal.mardi4nfdi.de/entity/Q42873621994-04-12Paper
https://portal.mardi4nfdi.de/entity/Q42795731994-03-07Paper
Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems1994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q31388711994-01-02Paper
https://portal.mardi4nfdi.de/entity/Q31389501993-10-20Paper
https://portal.mardi4nfdi.de/entity/Q40368971993-05-18Paper
Weaknesses of Undeniable Signature Schemes1993-05-18Paper
Perfectly secure message transmission1993-05-16Paper
Maintenance of a minimum spanning forest in a dynamic plane graph1992-06-28Paper
https://portal.mardi4nfdi.de/entity/Q57519361991-01-01Paper
Constant-round perfect zero-knowledge computationally convincing protocols1991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101441991-01-01Paper
The power of multimedia: Combining point-to-point and multi-access networks1990-01-01Paper
Fast algorithms for edge-coloring planar graphs1989-01-01Paper
Minimum-Knowledge Interactive Proofs for Decision Problems1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38068311988-01-01Paper
Distributed algorithms in synchronous broadcasting networks1987-01-01Paper
Partitioned encryption and achieving simultaneity by partitioning1987-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37534601985-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Mordechai M. Yung