See more Moti Yung articles on AOD.

Powered by
TTSReader
Share this page on
Article provided by Wikipedia


( => ( => ( => Moti Yung [pageid] => 35039652 ) =>

Mordechai M. (Moti) Yung is an Israeli-American cryptographer and computer scientist currently employed at "Snap Inc.[1]

Yung earned his Ph.D. from "Columbia University in 1988 under the supervision of "Zvi Galil.[2] In the past, he worked at the "IBM "Thomas J. Watson Research Center, was a vice president and chief scientist at "CertCo, was director of Advanced Authentication Research at "RSA Laboratories and worked at "Google until early 2016.[1] He has also held adjunct and visiting faculty appointments at Columbia through which he advised several Ph.D. students (see [2]) including "Gödel Prize winner "Matthew K. Franklin and "Jonathan Katz.

Contents

Scientific and Technical Contributions[edit]

Yung's contributions span a broad range of areas, from theory and foundations of cryptography and related areas, via systems security basic new notions and mechanisms, to actual industrial innovations contributing to the frontier of technology advancement and development.

Trust and Novel Attacks:

Basic Research and Foundations:

Yung has contributed extensively with numerous coauthors to the foundations and theory of basic cryptographic systems and protocols, and co-invented notions, constructions, and systems, some of which are very closely related to and influenced the practice of concrete cryptography and secure and private systems.

Industrial Contributions:

In addition to his extensive scientific contributions in basic and applied research, Yung has spent a career in industry working with engineers, developers, business experts, and other scientists, and concurrently contributed over the years to numerous innovative real-world constructions. These have led to practical implementations that were, in turn, deployed as part of actual systems and networks. His industrial contributions have enhanced the security and privacy of businesses infrastructure, and enabled new concrete applications. These include the following :


Systems Security, Privacy, and Anonymity Research:

Yung worked on software systems security [89][90][91] and further characterized the adversary to consider against software systems that are given to users, calling it MATE: `Man-at-the-End' attack (which became popular in the software obfuscation community[92]). Yung has contributed to anonymity and privacy as well, working on cryptographic anonymous credentials such as "Group signature,[93][94][95] as well as group encryption protocols.[96][97] Yung together with Adam L. Young cryptanalyzed the Reduced-Seat Buses Protocol for anonymous communication.[98] In the same paper they broke multiple anonymous communication protocols, such as Taxis, showing that the crucial property of key-anonymity was missing. They proposed the Drunk Motorcyclists protocol for anonymous communication and proved that it is secure under the "Decisional Diffie–Hellman assumption.

Awards[edit]

References[edit]

  1. ^ a b Dave, Paresh (March 29, 2016), "New member on Snapchat's cybersecurity team", This week in L.A. tech, "Los Angeles Times .
  2. ^ a b Moti Yung at the "Mathematics Genealogy Project
  3. ^ Young, A.; M. Yung (1996). Cryptovirology: extortion-based security threats and countermeasures. IEEE Symposium on Security and Privacy. pp. 129–140. "doi:10.1109/SECPRI.1996.502676. "ISBN "0-8186-7417-2. 
  4. ^ Adam L. Young, Moti Yung, Cryptovirology: The Birth, Neglect, and Explosion of Ransomware, Communications of the ACM, Vol. 60 No. 7, Pages 24-26 10.1145/3097347[1]
  5. ^ Crypto Ransomware 
  6. ^ Hernandez-Castro, Julio; Cartwright, Edward; Stepanova, Anna (2017), "Economic Analysis of Ransomware", "arXiv:1703.06660Freely accessible [cs.CR] 
  7. ^ Whelan, Claire (8 October 2004), "It takes a cryptovirus to fight one", "Times Higher Education . A book review of Malicious Cryptography
  8. ^ Yes We Can't 
  9. ^ Cryptolocker has you between a back up and a hard place
  10. ^ Young, Adam; Yung, Moti (1996), "The Dark Side of "Black-Box" Cryptography or: Should We Trust Capstone?", Adam L. Young, Moti Yung: The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? CRYPTO 1996: 89-103, Lecture Notes in Computer Science, 1109, p. 89, "doi:10.1007/3-540-68697-5_8, "ISBN "978-3-540-61512-5 
  11. ^ Young, Adam; Yung, Moti (1997), "Kleptography: Using Cryptography Against Cryptography", Adam L. Young, Moti Yung: Kleptography: Using Cryptography Against Cryptography. EUROCRYPT 1997: 62-74, Lecture Notes in Computer Science, 1233, p. 62, "doi:10.1007/3-540-69053-0_6, "ISBN "978-3-540-62975-7 
  12. ^ Young, Adam; Yung, Moti (1997), "The prevalence of kleptographic attacks on discrete-log based cryptosystems", Adam L. Young, Moti Yung: The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. CRYPTO 1997: 264-276, Lecture Notes in Computer Science, 1294, p. 264, "doi:10.1007/BFb0052241, "ISBN "978-3-540-63384-6 
  13. ^ Young, Adam; Yung, Moti (1998), "Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs", Adam L. Young, Moti Yung: Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. FSE 1998: 122-133, Lecture Notes in Computer Science, 1372, p. 122, "doi:10.1007/3-540-69710-1_9, "ISBN "978-3-540-64265-7 
  14. ^ Young, Adam; Yung, Moti (2001), "Bandwidth-Optimal Kleptographic Attacks", Adam L. Young, Moti Yung: Bandwidth-Optimal Kleptographic Attacks. CHES 2001: 235-250, Lecture Notes in Computer Science, 2162, p. 235, "doi:10.1007/3-540-44709-1_20, "ISBN "978-3-540-42521-2 
  15. ^ Y. Frankel and M. Yung. Escrow Encryption Systems Visited: Attacks, Analysis and Designs. Crypto 95 Proceedings, August 1995
  16. ^ Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou: Cliptography: Clipping the Power of Kleptographic Attacks, Asiacrypt 2016, Springer LNCS 
  17. ^ The Ken Thompson Hack (reflections of trusting trust) .
  18. ^ Moni Naor, Moti Yung: Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks .STOC 1990: 427-437 
  19. ^ Jonathan Katz, Moti Yung: Complete characterization of security notions for probabilistic private-key encryption. STOC 2000: 245-254 [2]
  20. ^ Jonathan Katz, Moti Yung: Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. FSE 2000: 284-299 [3]
  21. ^ Benoît Libert, Moti Yung: Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions. TCC 2012: 75-93 [4]
  22. ^ Benoît Libert, Thomas Peters, Marc Joye, Moti Yung: Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. EUROCRYPT 2014: 514-532 [5]
  23. ^ Benoît Libert, Marc Joye, Moti Yung, Thomas Peters: Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security. ASIACRYPT (2) 2014: 1-21 [6]
  24. ^ Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung: A New Randomness Extraction Paradigm for Hybrid Encryption. EUROCRYPT 2009: 590-609 [7]
  25. ^ Moni Naor, Moti Yung: Universal One-Way Hash Functions and their Cryptographic Applications .STOC 1989: 33-43 
  26. ^ Zvi Galil, Stuart Haber, Moti Yung: Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model. CRYPTO 1987: 135-155 [8]
  27. ^ Matthew K. Franklin, Moti Yung: Communication Complexity of Secure Computation (Extended Abstract). STOC 1992: 699-710 [9]
  28. ^ Rafail Ostrovsky, Moti Yung: How to Withstand Mobile Virus Attacks (Extended Abstract). PODC 1991: 51-59 [10]
  29. ^ Russell Impagliazzo, Moti Yung: Direct Minimum-Knowledge Computations. CRYPTO 1987: 40-51 [11]
  30. ^ Gilles Brassard, Claude Crépeau, Moti Yung: Constant-Round Perfect Zero-Knowledge Computationally Convincing Protocols. Theor. Comput. Sci. 84(1): 23-52 (1991)[12]
  31. ^ Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao: Concurrent Knowledge Extraction in Public-Key Models. J. Cryptology 29(1): 156-219 (2016)[13]
  32. ^ Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation. J. Cryptology 11(2): 87-108 (1998)[14]
  33. ^ Benoît Libert, Somindu C. Ramanna, Moti Yung: Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions. ICALP 2016: 30:1-30:14 [15]
  34. ^ Donghoon Chang, Mridul Nandi, Moti Yung: On the Security of Hash Functions Employing Blockcipher Postprocessing. FSE 2011: 146-166 [16]
  35. ^ Enrico Buonanno, Jonathan Katz, Moti Yung: Incremental Unforgeable Encryption. FSE 2001: 109-124 [17]
  36. ^ Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung: Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. ASIACRYPT 2006: 283-298 [18]
  37. ^ Yiannis Tsiounis, Moti Yung: On the Security of ElGamal Based Encryption. Public Key Cryptography 1998: 117-134 [19]
  38. ^ Adam L. Young, Moti Yung: Auto-Recoverable Auto-Certifiable Cryptosystems. EUROCRYPT 1998: 17-31 [20]
  39. ^ Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82 [21]
  40. ^ Tal Malkin, Isamu Teranishi, Moti Yung: Efficient Circuit-Size Independent Public Key Encryption with KDM Security. EUROCRYPT 2011: 507-526 [22]
  41. ^ Ernest F. Brickell, David Pointcheval, Serge Vaudenay, Moti Yung: Design Validations for Discrete Logarithm Based Signature Schemes. Public Key Cryptography 2000: 276-292 [23]
  42. ^ Alfredo De Santis, Yvo Desmedt, Yair Frankel, Moti Yung. How to share a function securely. in STOC 1994: 522-533 [24]
  43. ^ Sander, Tomas; Young, Adam L.; Yung, Moti. "Non-Interactive CryptoComputing For NC1". Focs1991. IEEE. 
  44. ^ R. L. Rivest, L. Adleman, and M. L. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Secure Computation, 1978.
  45. ^ Jonathan Katz, Rafail Ostrovsky, Moti Yung: Efficient and secure authenticated key exchange using weak passwords. J. ACM 57(1): 3:1-3:39 (2009) [25]
  46. ^ Zvi Galil, Stuart Haber, Moti Yung: Symmetric Public-Key Encryption. CRYPTO 1985: 128-137 [26]
  47. ^ François-Xavier Standaert, Tal Malkin, Moti Yung: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. EUROCRYPT 2009: 443-461 [27]
  48. ^ Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. CRYPTO 1992: 471-486 [28]
  49. ^ Danny Dolev, Cynthia Dwork, Orli Waarts, Moti Yung: Perfectly Secure Message Transmission. J. ACM 40(1): 17-47 (1993)[29]
  50. ^ Yvo Desmedt, Yair Frankel, Moti Yung: Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback. INFOCOM 1992: 2045-2054 [30]
  51. ^ Aggelos Kiayias, Moti Yung: Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes. IEEE Trans. Information Theory 54(6): 2752-2769 (2008)[31]
  52. ^ Daniel Bleichenbacher, Aggelos Kiayias, Moti Yung: Decoding interleaved Reed-Solomon codes over noisy channels. Theor. Comput. Sci. 379(3): 348-360 (2007)[32]
  53. ^ Josh Cohen Benaloh, Moti Yung: Distributing the Power of a Government to Enhance the Privacy of Voters (Extended Abstract). PODC 1986: 52-62 [33]
  54. ^ Ronald Cramer, Matthew K. Franklin, Berry Schoenmakers, Moti Yung: Multi-Autority Secret-Ballot Elections with Linear Work. EUROCRYPT 1996: 72-83 [34]
  55. ^ Aggelos Kiayias, Moti Yung: Self-tallying Elections and Perfect Ballot Secrecy. Public Key Cryptography 2002: 141-158 [35]
  56. ^ Michael O. Rabin, Yishay Mansour, S. Muthukrishnan, Moti Yung: Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions. ICALP (1) 2012: 738-749 [36]
  57. ^ Matthew K. Franklin, Moti Yung: Secure and Efficient Off-Line Digital Money (Extended Abstract). ICALP 1993: 265-276 [37]
  58. ^ Alexandra Dmitrienko, David Noack, Moti Yung: Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation. AsiaCCS 2017: 520-531 [38]
  59. ^ Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung: Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. "Applied Cryptography and Network Security, 2011: 130-146 [39]
  60. ^ Aggelos Kiayias, Bülent Yener, Moti Yung: Privacy-Preserving Information Markets for Computing Statistical Data. Financial Cryptography 2009: 32-50 [40]
  61. ^ Aggelos Kiayias, Moti Yung: Self Protecting Pirates and Black-Box Traitor Tracing. CRYPTO 2001: 63-79 [41]
  62. ^ Aggelos Kiayias, Moti Yung: Traitor Tracing with Constant Transmission Rate. EUROCRYPT 2002: 450-465 [42]
  63. ^ Matthew K. Franklin, Zvi Galil, Moti Yung: Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. J. ACM 47(2): 225-243 (2000) [43]
  64. ^ Xiangdong Yu, Moti Yung: Agent Rendezvous: A Dynamic Symmetry-Breaking Problem. ICALP 1996: 610-621 [44]
  65. ^ William Aiello, Ramarathnam Venkatesan, Moti Yung: Coins, Weights and Contention in Balancing Networks. PODC 1994: 193-205 [45]
  66. ^ Zvi Galil, Alain J. Mayer, Moti Yung: Resolving Message Complexity of Byzantine Agreement and beyond. FOCS 1995: 724-733 [46]
  67. ^ Spyros C. Kontogiannis, Grammati E. Pantziou, Paul G. Spirakis, Moti Yung: "Dynamic-Fault-Prone BSP": A Paradigm for Robust Computations in Changing Environments. SPAA 1998: 37-46 [47]
  68. ^ Yehuda Afek, Shay Kutten, Moti Yung: The Local Detection Paradigm and Its Application to Self-Stabilization. Theor. Comput. Sci. 186(1-2): 199-229 (1997)[48]
  69. ^ Bird, Ray; Gopal, Inder; Herzberg, Amir; Janson, Phil; Kutten, Shay; Molva, Refik; Yung, Moti (1992), "Systematic Design of Two-Party Authentication Protocols", Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of Two-Party Authentication Protocols. CRYPTO 1991: 44-61, Lecture Notes in Computer Science, 576, p. 44, "doi:10.1007/3-540-46766-1_3, "ISBN "978-3-540-55188-1 
  70. ^ Y. Frankel, A. Herzberg, P. A. Karger, H. Krawczyk, C. A. Kunzinger, M. Yung: Security issues in a CDPD wireless network. IEEE Personal Commun. 2(4): 16-27 (1995) .
  71. ^ Visa and Mastercard have just announced the selection of two companies -- CertCo and Spyrus, 05/20/97 .
  72. ^ Konstantinou, Elisavet; Liagkou, Vasiliki; Spirakis, Paul; Stamatiou, Yannis C.; Yung, Moti (2004), "Electronic National Lotteries", Elisavet Konstantinou, Vasiliki Liagkou, Paul Spirakis, Yannis, C. Stamatiou, Moti Yung, Electronic National Lotteries, Financial Cryptography 2004, Springer LNCS 3110, Lecture Notes in Computer Science, 3110, p. 147, "doi:10.1007/978-3-540-27809-2_18, "ISBN "978-3-540-22420-4 .
  73. ^ Commerce Bank signs for RSA anti-phishing system, 09 August 2006 
  74. ^ Applying Context to Web Authentication: RSA position paper, 03/2006 .
  75. ^ John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung: Fourth-factor authentication: somebody you know. ACM Conference on Computer and Communications Security 2006: 168-178 [49]
  76. ^ How to Use ‘Trusted Contacts’ to Recover a Hacked Facebook Account [50]
  77. ^ Patent US 8532620: Trusted mobile device based security, 05/17/11 
  78. ^ Schneier on Security: RSA Security, Inc Hacked
  79. ^ Searchengineland: Anonymizing Google’s Server Log Data — How’s It Going?[51]
  80. ^ Transparency, choice and control — now complete with a Dashboard! November 5, 2009 
  81. ^ Patent US 9189638: Yung et al., Systems and methods for multi-function and multi-purpose cryptography,25 Aug 2013 
  82. ^ Patent US 8909711: System and method for generating privacy-enhanced aggregate statistics,27 April 2011 
  83. ^ Growing Eddystone with Ephemeral Identifiers: A Privacy Aware & Secure Open Beacon Format April 14, 2016 
  84. ^ My Eyes Only 
  85. ^ RWC2017:My Eyes Only 
  86. ^ Yung, Moti (2015). From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?. ACM SIGSAC Conference on Computer and Communications Security. pp. 1–2. 
  87. ^ Patent US 9641332: Yung et al., Privacy-preserving measurements of a campaign, Jan 30, 2013 
  88. ^ Google starts tracking offline shopping
  89. ^ Enriquillo Valdez, Moti Yung: Software DisEngineering: Program Hiding Architecture and Experiments. Information Hiding 1999: 379-394 [52]
  90. ^ US patent 5745678: Method and system for the secured distribution of multimedia titles, 1994 [53]
  91. ^ Mario Baldi, Yoram Ofek, Moti Yung: Idiosyncratic Signatures for Authenticated Execution of Management Code. DSOM 2003: 204-206 [54]
  92. ^ C. Collberg, Engineering Code Obfuscation (Eurocrypt 2016 invited talk).[55]
  93. ^ Aggelos Kiayias, Moti Yung: Extracting Group Signatures from Traitor Tracing Schemes. EUROCRYPT 2003: 630-648 [56]
  94. ^ Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung: Fair Traceable Multi-Group Signatures. Financial Cryptography 2008: 231-246 [57]
  95. ^ Benoît Libert, Thomas Peters, Moti Yung: Group Signatures with Almost-for-Free Revocation. CRYPTO 2012: 571-589 [58]
  96. ^ Aggelos Kiayias, Yiannis Tsiounis, Moti Yung: Group Encryption. ASIACRYPT 2007: 181-199 [59]
  97. ^ Julien Cathalo, Benoît Libert, Moti Yung: Group Encryption: Non-interactive Realization in the Standard Model. ASIACRYPT 2009: 179-196 [60]
  98. ^ Young, A.; M. Yung (2014). The drunk motorcyclist protocol for anonymous communication. IEEE Conference on Communications and Network Security. pp. 157–165. 
  99. ^ IACR Distinguished Lectures, retrieved 2012-03-11
  100. ^ ACM Names Fellows for Computing Advances that Are Transforming Science and Society, "Association for Computing Machinery, accessed 2013-12-10
  101. ^ Google research Blog, accessed 2013-12-11
  102. ^ IACR Moti Yung, IACR Fellow, 2014
  103. ^ http://homepages.laas.fr/esorics/ Esorics Awards
  104. ^ http://www.sigsac.org/award/sigsac-awards.html SIGSAC Awards
  105. ^ [61] IEEE fellows 2015
  106. ^ [62] EATCS fellows

External links[edit]

) )