Moti Yung

from Wikipedia, the free encyclopedia

Moti Yung (born May 15, 1959 ) is an Israeli-American cryptographer and computer scientist.

Yung received his PhD in Computer Science (Minimum-Knowledge Transfer Protocol) from Columbia University in 1988 with Zvi Galil . He was at the IBM Thomas J. Watson Research Center , was a vice president and chief scientist at CertCo (formerly Bankers Trust E-Commerce), was an industry consultant, and was director of advanced authentication research at RSA Laboratories. From 2007 to 2016 he was with Google and then with Snapchat .

With Adam L. Young , he coined the term cryptovirology for the interface between computer viruses and malware and cryptography and wrote a standard work on it. In 1996 they introduced the term kleptography .

He was visiting scholar and adjunct professor at Columbia University . He won the IBM Outstanding Innovation Award and the W. Wallace McDowell Award in 2018 . Yung is a Fellow of the IEEE and the Association for Computing Machinery .

Fonts

  • with Adam Young: Malicious Cryptography: Exposing Cryptovirology, Wiley 2004
  • with Adam Young: Cryptovirology: extortion-based security threats and countermeasures, IEEE Symposium on Security and Privacy, 1996, pp. 129-140
  • with Adam Young: Cryptovirology: The Birth, Neglect, and Explosion of Ransomware, Communications of the ACM, Volume 60, 2017, No. 7, pp. 24-26, online
  • with C. Blundo a. a .: Perfectly-secure key distribution for dynamic conferences, Annual International Cryptology Conference, 1992, pp. 471-486
  • with Moni Naor : Universal one-way hash functions and their cryptographic applications, Proceedings of the twenty-first annual ACM symposium on Theory of computing, 1989
  • with M. Naor: Public-key cryptosystems provably secure against chosen ciphertext attacks, Proceedings of the twenty-second annual ACM symposium on Theory of computing, 1990
  • with A. Herzberg u. a .: Proactive secret sharing or: How to cope with perpetual leakage, Annual International Cryptology Conference, 1995, pp. 339-352
  • with FX Standaert, TG Malkin: A unified framework for the analysis of side-channel key recovery attacks, Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer 2009, pp. 443-461
  • with R. Ostrovsky: How to withstand mobile virus attacks, Proceedings of the tenth annual ACM symposium on Principles of distributed computing, 1991, pp. 51-59
  • with Danny Dolev, Cynthia Dwork , Orli Waarts: Perfectly secure message transmission, Journal of the ACM, Volume 40, 1993, pp. 17-47
  • with Y. Dodis, J. Katz, S. Xu: Key-insulated public key cryptosystems, International Conference on the Theory and Applications of Cryptographic Techniques, 2002, pp. 65-82

Web links

Individual evidence

  1. Moti Yung in the Mathematics Genealogy Project (English)Template: MathGenealogyProject / Maintenance / id used
  2. ^ A. Young, M. Yung: The Dark Side of Black-Box Cryptography, or: Should we trust Capstone? , in: Neal Koblitz (Ed.), Proceedings of Crypto 96, Springer-Verlag, 1996, pp. 89-103