Search the dblp DataBase
Adam Young :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Adam Young , Moti Yung Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:297-311 [Conf ] Adam Young , Moti Yung Finding Length-3 Positive Cunningham Chains. [Citation Graph (0, 0)][DBLP ] ANTS, 1998, pp:289-298 [Conf ] Adam Young , Moti Yung Towards Signature-Only Signature Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:97-115 [Conf ] Adam Young , Moti Yung Bandwidth-Optimal Kleptographic Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:235-250 [Conf ] Adam Young , Moti Yung Auto-recoverable Auto-certifiable Cryptosystems (A Survey). [Citation Graph (0, 0)][DBLP ] CQRE, 1999, pp:204-218 [Conf ] Adam Young , Moti Yung The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:89-103 [Conf ] Adam Young , Moti Yung The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:264-276 [Conf ] Markus Jakobsson , David Pointcheval , Adam Young Secure Mobile Gambling. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:110-125 [Conf ] Adam Young , Moti Yung A Key Recovery System as Secure as Factoring. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:129-142 [Conf ] Adam Young , Moti Yung Malicious Cryptography: Kleptographic Aspects. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2005, pp:7-18 [Conf ] Adam Young , Moti Yung Kleptography: Using Cryptography Against Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:62-74 [Conf ] Adam Young , Moti Yung Auto-Recoverable Auto-Certifiable Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:17-31 [Conf ] Tomas Sander , Adam Young , Moti Yung Non-Interactive CryptoComputing For NC1 . [Citation Graph (0, 0)][DBLP ] FOCS, 1999, pp:554-567 [Conf ] Adam Young , Moti Yung Sliding Encryption: A Cryptographic Tool for Mobile Agents. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:230-241 [Conf ] Adam Young , Moti Yung Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:122-133 [Conf ] Adam Young Non-Zero Sum Games and Survivable Malware. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:24-29 [Conf ] Adam Young A Weakness in Smart Card PKI Certification. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:30-34 [Conf ] Adam Young , Moti Yung Hash to the Rescue: Space Minimization for PKI Directories. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:235-245 [Conf ] Adam Young Building a Cryptovirus Using Microsoft's Cryptographic API. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:389-401 [Conf ] Adam Young , Moti Yung Questionable Encryption and Its Applications. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:210-221 [Conf ] Adam Young , Moti Yung A PVSS as Hard as Discrete Log and Shareholder Separability. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:287-299 [Conf ] Adam Young , Moti Yung RSA-Based Auto-recoverable Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:326-341 [Conf ] Adam Young , Moti Yung Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:306-314 [Conf ] Adam Young , Moti Yung A Subliminal Channel in Secret Block Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:198-211 [Conf ] Adam Young , Moti Yung A Space Efficient Backdoor in RSA and Its Applications. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:128-143 [Conf ] Adam Young , Moti Yung Relationships Between Diffie-Hellman and "Index Oracles". [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:16-32 [Conf ] Adam Young , Moti Yung Cryptovirology: Extortion-Based Security Threats and Countermeasures. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:129-140 [Conf ] Adam Young , Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:224-235 [Conf ] Adam Young Cryptoviral extortion using Microsoft's Crypto API. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:2, pp:67-76 [Journal ] Adam Young , Moti Yung Hiding Information Hiding. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:161-171 [Conf ] Adam Young , Moti Yung An Elliptic Curve Backdoor Algorithm for RSASSA. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:355-374 [Conf ] Space-Efficient Kleptography Without Random Oracles. [Citation Graph (, )][DBLP ] Kleptography from Standard Assumptions and Applications. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.005secs