Scott Yilek
Scott Yilek
Associate Professor of Computer and Information Sciences, University of St. Thomas
Bestätigte E-Mail-Adresse bei stthomas.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Possibility and impossibility results for encryption and commitment secure under selective opening
M Bellare, D Hofheinz, S Yilek
Annual International Conference on the Theory and Applications of …, 2009
2022009
Fingerprinting information in JavaScript implementations
K Mowery, D Bogenreif, S Yilek, H Shacham
Proceedings of W2SP 2 (11), 2011
1842011
When private keys are public: Results from the 2008 Debian OpenSSL vulnerability
S Yilek, E Rescorla, H Shacham, B Enright, S Savage
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 15-27, 2009
1612009
Hedged public-key encryption: How to protect against bad randomness
M Bellare, Z Brakerski, M Naor, T Ristenpart, G Segev, H Shacham, ...
International Conference on the Theory and Application of Cryptology and …, 2009
1442009
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
T Ristenpart, S Yilek
NDSS, 2010
1202010
The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks
T Ristenpart, S Yilek
Annual International Conference on the Theory and Applications of …, 2007
1092007
Identity-based encryption secure against selective opening attack
M Bellare, B Waters, S Yilek
Theory of Cryptography Conference, 235-252, 2011
952011
Standard security does not imply security against selective-opening
M Bellare, R Dowsley, B Waters, S Yilek
Annual International Conference on the Theory and Applications of …, 2012
552012
Chosen-ciphertext security from slightly lossy trapdoor functions
P Mol, S Yilek
International Workshop on Public Key Cryptography, 296-311, 2010
512010
Resettable public-key encryption: How to encrypt on a virtual machine
S Yilek
Cryptographers’ Track at the RSA Conference, 41-56, 2010
382010
The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries
T Ristenpart, S Yilek
Annual Cryptology Conference, 392-409, 2013
362013
Encryption Schemes Secure under Selective Opening Attack.
M Bellare, S Yilek
IACR Cryptol. ePrint Arch. 2009, 101, 2009
352009
Recommenders everywhere: the wikilens community-maintained recommender system
D Frankowski, SK Lam, S Sen, FM Harper, S Yilek, M Cassano, J Riedl
Proceedings of the 2007 international symposium on Wikis, 47-60, 2007
252007
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 …
M Bellare, D Hofheinz, S Yilek, A Joux
Springer-Verlag Berlin Heidelberg, 2009
8*2009
The round-complexity of black-box zero-knowledge: A combinatorial characterization
D Micciancio, S Yilek
Theory of Cryptography Conference, 535-552, 2008
52008
Cycle slicer: an algorithm for building permutations on special domains
S Miracle, S Yilek
International Conference on the Theory and Application of Cryptology and …, 2017
42017
Reverse cycle walking and its applications
S Miracle, S Yilek
International Conference on the Theory and Application of Cryptology and …, 2016
32016
Traceable Anonymous Pseudonyms with One TTP
S Yilek, STK Lam
1
Targeted Ciphers for Format-Preserving Encryption
S Miracle, S Yilek
International Conference on Selected Areas in Cryptography, 3-26, 2018
2018
Public-key encryption secure in the presence of randomness failures
SC Yilek
UC San Diego, 2010
2010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20