The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Adam Young: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Adam Young, Moti Yung
    Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:297-311 [Conf]
  2. Adam Young, Moti Yung
    Finding Length-3 Positive Cunningham Chains. [Citation Graph (0, 0)][DBLP]
    ANTS, 1998, pp:289-298 [Conf]
  3. Adam Young, Moti Yung
    Towards Signature-Only Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:97-115 [Conf]
  4. Adam Young, Moti Yung
    Bandwidth-Optimal Kleptographic Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:235-250 [Conf]
  5. Adam Young, Moti Yung
    Auto-recoverable Auto-certifiable Cryptosystems (A Survey). [Citation Graph (0, 0)][DBLP]
    CQRE, 1999, pp:204-218 [Conf]
  6. Adam Young, Moti Yung
    The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:89-103 [Conf]
  7. Adam Young, Moti Yung
    The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:264-276 [Conf]
  8. Markus Jakobsson, David Pointcheval, Adam Young
    Secure Mobile Gambling. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:110-125 [Conf]
  9. Adam Young, Moti Yung
    A Key Recovery System as Secure as Factoring. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:129-142 [Conf]
  10. Adam Young, Moti Yung
    Malicious Cryptography: Kleptographic Aspects. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:7-18 [Conf]
  11. Adam Young, Moti Yung
    Kleptography: Using Cryptography Against Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:62-74 [Conf]
  12. Adam Young, Moti Yung
    Auto-Recoverable Auto-Certifiable Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:17-31 [Conf]
  13. Tomas Sander, Adam Young, Moti Yung
    Non-Interactive CryptoComputing For NC1. [Citation Graph (0, 0)][DBLP]
    FOCS, 1999, pp:554-567 [Conf]
  14. Adam Young, Moti Yung
    Sliding Encryption: A Cryptographic Tool for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:230-241 [Conf]
  15. Adam Young, Moti Yung
    Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:122-133 [Conf]
  16. Adam Young
    Non-Zero Sum Games and Survivable Malware. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:24-29 [Conf]
  17. Adam Young
    A Weakness in Smart Card PKI Certification. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:30-34 [Conf]
  18. Adam Young, Moti Yung
    Hash to the Rescue: Space Minimization for PKI Directories. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:235-245 [Conf]
  19. Adam Young
    Building a Cryptovirus Using Microsoft's Cryptographic API. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:389-401 [Conf]
  20. Adam Young, Moti Yung
    Questionable Encryption and Its Applications. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:210-221 [Conf]
  21. Adam Young, Moti Yung
    A PVSS as Hard as Discrete Log and Shareholder Separability. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:287-299 [Conf]
  22. Adam Young, Moti Yung
    RSA-Based Auto-recoverable Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:326-341 [Conf]
  23. Adam Young, Moti Yung
    Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:306-314 [Conf]
  24. Adam Young, Moti Yung
    A Subliminal Channel in Secret Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:198-211 [Conf]
  25. Adam Young, Moti Yung
    A Space Efficient Backdoor in RSA and Its Applications. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:128-143 [Conf]
  26. Adam Young, Moti Yung
    Relationships Between Diffie-Hellman and "Index Oracles". [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:16-32 [Conf]
  27. Adam Young, Moti Yung
    Cryptovirology: Extortion-Based Security Threats and Countermeasures. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:129-140 [Conf]
  28. Adam Young, Moti Yung
    Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:224-235 [Conf]
  29. Adam Young
    Cryptoviral extortion using Microsoft's Crypto API. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:2, pp:67-76 [Journal]
  30. Adam Young, Moti Yung
    Hiding Information Hiding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:161-171 [Conf]
  31. Adam Young, Moti Yung
    An Elliptic Curve Backdoor Algorithm for RSASSA. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:355-374 [Conf]

  32. Space-Efficient Kleptography Without Random Oracles. [Citation Graph (, )][DBLP]


  33. Kleptography from Standard Assumptions and Applications. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002