DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Moti Yung
Moti Yung
Anna Lysyanskaya Curriculum Vitae
Malicious Cryptography: Kleptographic Aspects
Chapter 2: an Implementation of Cryptoviral Extortion Using Microsoft's Crypto API∗
Cyber Security Cryptography and Machine Learning
CHURP: Dynamic-Committee Proactive Secret Sharing
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms
Cryptovirology: Extortion-Based Security Threats and Countermeasures
Malicious Cryptography Exposing Cryptovirology
Efficient Dynamic-Resharing “Verifiable Secret Sharing” Against Mobile Adversary
Multi-Authority Secret-Ballot Elections with Linear Work
Verifiable Secret Redistribution for Threshold Sharing Schemes
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum
Tal G. Malkin
Curriculum Vitae for Matt Franklin
Chapter 10: an Elliptic Curve Asymmetric Backdoor in Openssl RSA Key Generation∗
Download File
Communication-Optimal Proactive Secret Sharing for Dynamic Groups
Cryptoviral Extortion: a Virus Based Approach
Top View
Advances in Cryptology - CRYPTO 2002
The Kryptoknight Family of Light-Weight Protocols for Authentication and Key Distribution
Curriculum Vitae
Submission Data for 2017 CORE Conference Re-Ranking Process
Kleptography: the Unbearable Lightness of Being Mistrustful
Jonathan Katz Education Employment History
The Vector-Ballot E-Voting Approach
Minimum-Knowledge Interactive Proof for Decision Probleills Zvi Galil
Secure Computation Annotated Bibliography References
Brief Announcement: Proactive Secret Sharing with a Dishonest Majority
Jonathan Katz Education Employment History
Cryptovirology: Virus Approach
Proactive Secret Sharing in Dynamic Environments
Information Security and Cryptography Texts and Monographs
Curriculum Vitae
Understanding Ransomware Trajectory to Create an Informed Prediction
From Protecting a System to Protecting a Global Ecosystem
Public-Key Cryptosystems Provably Secure Against Chosen Ciphertext Attacks∗
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections
Comparing Information Without Leaking It
Lecture Notes in Computer Science for Information About Vols
Self-Tallying Elections and Perfect Ballot Secrecy
List of Published Presentation Papers of Network Security Research Institute and Cybersecurity Research Center