Moti Yung
Columbia University in the City of New York
H-index: 121
North America-United States
Top articles of Moti Yung
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files | arXiv preprint arXiv:2404.05106 | Aleksandr Dolgavin Mark Yampolskiy Moti Yung | 2024/4/7 |
Anamorphic signatures: Secrecy from a dictator who only permits authentication! | Mirosław Kutyłowski Giuseppe Persiano Duong Hieu Phan Moti Yung Marcin Zawada | 2023/8/9 | |
Anamorphic cryptography: How can we ensure private communication? | Research Outreach | Moti Yung | 2023 |
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning | Deniz Koyuncu Alex Gittens Bülent Yener Moti Yung | 2023/8/6 | |
RSA Blind Signatures with Public Metadata | Cryptology ePrint Archive | Ghous Amjad Kevin Yeo Moti Yung | 2023 |
HBSS:(Simple) Hash-Based Stateless Signatures–Hash All the Way to the Rescue! (Preliminary Version) | Shlomi Dolev Avraam Yagudaev Moti Yung | 2023/6/21 | |
The self-anti-censorship nature of encryption: On the prevalence of anamorphic cryptography | Cryptology ePrint Archive | Mirek Kutylowski Giuseppe Persiano Duong Hieu Phan Moti Yung Marcin Zawada | 2023 |
Midgame Attacks and Defense Against Them | Donghoon Chang Moti Yung | 2023/6/21 | |
Standard model time-lock puzzles: Defining security and constructing via composition | Cryptology ePrint Archive | Karim Eldefrawy Sashidhar Jakkamsetti Ben Terner Moti Yung | 2023 |
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions | Yi Wang Rongmao Chen Xinyi Huang Moti Yung | 2023/12/4 | |
Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11–13, 2022, Revised Selected Papers | Yi Deng Moti Yung | 2023/2/18 | |
Device independent secure messaging | 2022/8/9 | ||
Anamorphic encryption: private communication against a dictator | Giuseppe Persiano Duong Hieu Phan Moti Yung | 2022/5/25 | |
AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) Security | Mark Yampolskiy Moti Yung | 2022/11/7 | |
Privacy guarantees of bluetooth low energy contact tracing: A case study on covidwise | Computer | Salman Ahmed Ya Xiao Taejoong Tijay Chung Carol Fung Moti Yung | 2022/2/16 |
An adversarial perspective on accuracy, robustness, fairness, and privacy: Multilateral-tradeoffs in trustworthy ml | IEEE Access | Alex Gittens Bülent Yener Moti Yung | 2022/11/1 |
Differentially-private “draw and discard” machine learning: Training distributed model from enormous crowds | Vasyl Pihur Aleksandra Korolova Frederick Liu Subhash Sankuratripati Moti Yung | 2022/6/23 | |
{End-to-Same-End} Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage | Long Chen Ya-Nan Li Qiang Tang Moti Yung | 2022 | |
POSTER: Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE | Salman Ahmed Ya Xiao Taejoong Chung Carol Fung Moti Yung | 2022/5/30 | |
Eddystone-EID: Secure and private infrastructural protocol for BLE beacons | IEEE Transactions on Information Forensics and Security | Liron David Avinatan Hassidim Yossi Matias Moti Yung Alon Ziv | 2022/10/12 |