Moti Yung [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Correcting Subverted Random Oracles Crypto2018-2018 - Santa Barbara, USA
Memories for Your Eyes Only RWC-2017 - new york city,usa
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security AsiaCrypt-2014 - kaohsiung,taiwan
Order-Preserving Encryption Secure Beyond One-Wayness AsiaCrypt-2014 - kaohsiung,taiwan
Technical session 17: Secret Sharing AsiaCrypt-2014 - kaohsiung,taiwan
The Drunk Motorcyclist Protocol for Anonymous Communication CNS-2014 - san francisco,usa
Post-Snowden Cryptography EuroCrypt-2014 - copenhagen,denmark
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures EuroCrypt-2014 - copenhagen,denmark
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency asiacrypt-2013 - Bengalore,India
Applied Cryptography and Network Security 10 years in the past and 10 years in the future 10th International Conference on Applied Cryptography and Network Security-2012 - Singapore Security
Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens 10th International Conference on Applied Cryptography and Network Security-2012 - Singapore
Applied Cryptography and Network Security – 10 years in the past and 10 years in the future ACNS-2013 - Alberta,Canada Security
Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens ACNS-2013 - Alberta,Canada
From Protecting a System to Protecting the Global Ecosystem CMS-2011 - Ghent, Belgium Security
“Yes We Can’T!” - On Kleptography And Cryptovirology Chaos Communication Congress-26 - Berlin, Germany Security Cryptography Malware