Подписаться
Scott Yilek
Scott Yilek
Associate Professor of Computer and Information Sciences, University of St. Thomas
Подтвержден адрес электронной почты в домене stthomas.edu - Главная страница
Название
Процитировано
Процитировано
Год
Possibility and impossibility results for encryption and commitment secure under selective opening
M Bellare, D Hofheinz, S Yilek
Annual International Conference on the Theory and Applications of …, 2009
2462009
Fingerprinting information in JavaScript implementations
K Mowery, D Bogenreif, S Yilek, H Shacham
Proceedings of W2SP 2 (11), 2011
2242011
When private keys are public: Results from the 2008 Debian OpenSSL vulnerability
S Yilek, E Rescorla, H Shacham, B Enright, S Savage
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 15-27, 2009
1862009
Hedged public-key encryption: How to protect against bad randomness
M Bellare, Z Brakerski, M Naor, T Ristenpart, G Segev, H Shacham, ...
International Conference on the Theory and Application of Cryptology and …, 2009
1652009
The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks
T Ristenpart, S Yilek
Annual International Conference on the Theory and Applications of …, 2007
1592007
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
T Ristenpart, S Yilek
NDSS, 2010
1412010
Identity-based encryption secure against selective opening attack
M Bellare, B Waters, S Yilek
Theory of Cryptography Conference, 235-252, 2011
1012011
Standard security does not imply security against selective-opening
M Bellare, R Dowsley, B Waters, S Yilek
Annual International Conference on the Theory and Applications of …, 2012
692012
Chosen-ciphertext security from slightly lossy trapdoor functions
P Mol, S Yilek
International Workshop on Public Key Cryptography, 296-311, 2010
562010
The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries
T Ristenpart, S Yilek
Annual Cryptology Conference, 392-409, 2013
442013
Encryption schemes secure under selective opening attack
M Bellare, S Yilek
Cryptology ePrint Archive, 2009
432009
Resettable public-key encryption: How to encrypt on a virtual machine
S Yilek
Cryptographers’ Track at the RSA Conference, 41-56, 2010
422010
Recommenders everywhere: the wikilens community-maintained recommender system
D Frankowski, SK Lam, S Sen, FM Harper, S Yilek, M Cassano, J Riedl
Proceedings of the 2007 international symposium on Wikis, 47-60, 2007
302007
Cycle slicer: an algorithm for building permutations on special domains
S Miracle, S Yilek
International Conference on the theory and Application of Cryptology and …, 2017
52017
The round-complexity of black-box zero-knowledge: A combinatorial characterization
D Micciancio, S Yilek
Theory of Cryptography Conference, 535-552, 2008
52008
Reverse cycle walking and its applications
S Miracle, S Yilek
International Conference on the Theory and Application of Cryptology and …, 2016
32016
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 …
M Bellare, D Hofheinz, S Yilek, A Joux
Springer-Verlag Berlin Heidelberg, 2009
32009
Targeted Ciphers for Format-Preserving Encryption
S Miracle, S Yilek
International Conference on selected Areas in cryptography, 3-26, 2018
12018
Public-key encryption secure in the presence of randomness failures
SC Yilek
University of California, San Diego, 2010
12010
Interactive History Sniffing with Dynamically-Generated QR Codes and CSS Difference Blending
K O’Neal, S Yilek
2022 IEEE Security and Privacy Workshops (SPW), 335-341, 2022
2022
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20