Computer Science · Physical Sciences
18h-index1.7kcitations56works0.02yr avg
Accepting Students?
No reports yet. Know if this professor is taking students?
Research Topics
Cryptography and Data Security(34), Cryptographic Implementations and Security(30), Chaos-based Image/Signal Encryption(19), Internet Traffic Analysis and Secure E-voting(13), Advanced Malware Detection Techniques(11)
Publications56 total
Lecture notes in computer science·2018· 2 cited
Computer·2017· 11 cited
Communications of the ACM·2017· 66 cited
Lecture notes in computer science·2017
Quality assessment summary of findings
2016· 1 cited
Semantically Secure Anonymity: Foundations of Re-encryption.
IACR Cryptology ePrint Archive·2016· 2 cited
Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack.
2016· 2 cited
Lecture notes in computer science·2016· 4 cited
Chapter 4: Implementing Perfect Questionable Encryptions∗
2014
Chapter 8: An Implementation of Tagged Private Information Retrieval
2014
Lecture notes in computer science·2010· 28 cited
Lecture notes in computer science·2008· 6 cited
YYGen: A Backdoor-Resistant RSA Key Generator
2007· 2 cited
Lecture notes in computer science·2007· 15 cited
YYPKS: A Simple Public Key Stegosystem
2007
Lecture notes in computer science·2007· 6 cited
Lecture notes in computer science·2007· 1 cited
IEEE Transactions on Information Forensics and Security·2006· 5 cited
page 1 of 3Next →
Frequent Co-authors
Moti Yung(42), Markus Jakobsson(2), Tomas Sander(1), David Pointcheval(1), N.K. Cicovic(1), David Chadwick(1), Matt Stevenson(1), Rachel Archer(1), Jonathan Tosh(1), Emma Simpson(1), Emma Everson-Hock(1), John Stevens(1), Mónica Hernández Alava(1), Suzy Paisley(1), Kath Dickinson(1), D. Scott(1), Allan Wailoo(1)