His main research concerns Computer security, Cryptography, Theoretical computer science, Public-key cryptography and Random oracle. His Computer security study is mostly concerned with Adversary, Cryptosystem, Semantic security, Authentication protocol and Probabilistic encryption. His studies deal with areas such as Internet privacy, Discrete logarithm, Encryption, Authentication and Robustness as well as Cryptography.
His work deals with themes such as Cryptographic protocol, Hash chain, Hash function, Key derivation function and Computation, which intersect with Theoretical computer science. His study in Public-key cryptography is interdisciplinary in nature, drawing from both Homomorphic encryption and Kerberos. His Random oracle study combines topics from a wide range of disciplines, such as Digital signature, ElGamal signature scheme, Cryptographic primitive, Group signature and Standard model.
Computer security, Cryptography, Theoretical computer science, Public-key cryptography and Encryption are his primary areas of study. His Computer security study frequently draws connections between related disciplines such as Digital signature. His research investigates the connection with Cryptography and areas like Random oracle which intersect with concerns in Standard model.
His research in Theoretical computer science focuses on subjects like Zero-knowledge proof, which are connected to Discrete mathematics and Gas meter prover. Moti Yung interconnects Key generation, Signature and Server in the investigation of issues within Public-key cryptography. His Semantic security research incorporates themes from Plaintext-aware encryption and Ciphertext indistinguishability.
His primary scientific interests are in Computer security, Cryptography, Public-key cryptography, Encryption and Theoretical computer science. His Computer security research is multidisciplinary, incorporating elements of Internet privacy and Digital signature. His biological study spans a wide range of topics, including Correctness and Distributed computing.
His studies in Public-key cryptography integrate themes in fields like Ciphertext, Standard model, Server and Practical algorithm. The concepts of his Encryption study are interwoven with issues in Cloud computing and Key. He works mostly in the field of Theoretical computer science, limiting it down to topics relating to Random oracle and, in certain cases, Ring signature.
Moti Yung mostly deals with Computer security, Cryptography, Theoretical computer science, Adversary and Encryption. In his works, Moti Yung conducts interdisciplinary research on Computer security and Protocol. His work deals with themes such as Digital signature and Public-key cryptography, which intersect with Cryptography.
His study looks at the relationship between Public-key cryptography and fields such as Key generation, as well as how they intersect with chemical problems. His research integrates issues of Cloud storage and Random oracle in his study of Theoretical computer science. His Encryption research is multidisciplinary, relying on both Hash function and Cryptographic primitive.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Polynomial reconstruction based cryptography
Aggelos Kiayias;Moti Yung.
selected areas in cryptography (2001)
Advances in Cryptology - EUROCRYPT 2004
Aggelos Kiayias;Yiannis Tsiounis;Moti Yung.
Springer Berlin Heidelberg (2004)
Perfectly-Secure Key Distribution for Dynamic Conferences
Carlo Blundo;Alfredo De Santis;Amir Herzberg;Shay Kutten.
international cryptology conference (1992)
Advances in Cryptology - CRYPTO 2002
Universal one-way hash functions and their cryptographic applications
M. Naor;M. Yung.
symposium on the theory of computing (1989)
Public-key cryptosystems provably secure against chosen ciphertext attacks
M. Naor;M. Yung.
symposium on the theory of computing (1990)
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg;Stanislaw Jarecki;Stanislaw Jarecki;Hugo Krawczyk;Moti Yung.
international cryptology conference (1995)
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
François-Xavier Standaert;Tal G. Malkin;Moti Yung.
international cryptology conference (2009)
How to withstand mobile virus attacks (extended abstract)
Rafail Ostrovsky;Moti Yung.
principles of distributed computing (1991)
Multi-authority secret-ballot elections with linear work
Ronald Cramer;Matthew Franklin;Berry Schoenmakers;Moti Yung.
theory and application of cryptographic techniques (1996)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: