Moti Yung

From Wikipedia, the free encyclopedia

Mordechai M. (Moti) Yung is an Israeli-American cryptographer and computer scientist, an employee of Google Inc..

Yung earned his Ph.D. from Columbia University in 1988 under the supervision of Zvi Galil.[1] He has worked at the IBM Thomas J. Watson Research Center, been vice president and chief scientist at CertCo[2] and been director of Advanced Authentication Research at RSA Laboratories,[3] He has also held adjunct and visiting faculty appointments at Columbia, through which he has advised several Ph.D. students including Gödel Prize winner Matthew K. Franklin.[1]

In a 1996 publication with Adam Young, Yung coined the term cryptovirology for the use of cryptography by computer viruses and other malware .[4] Young and Yung are the author of the book Malicious Cryptography: Exposing Cryptovirology (John Wiley & Sons, 2004).[5] There, the term Kleptography was introduced to describe the employment of cryptographic systems inside other cryptographic systems as attack tools by designers and manufacturers.

Yung has contributed extensively to the foundations of basic cryptographic systems and protocols (such as to the notion of chosen-ciphertext security which is currently a major requirement from public-key encryption schemes operating on the Internet), as well as to constructions leading to practical use and implementations in systems and networks. He was the Distinguished Lecturer of the International Association for Cryptologic Research at Eurocrypt 2010.[6] In 2013 he became a fellow of the Association for Computing Machinery.[7]

References

  1. 1.0 1.1 Moti Yung at the Mathematics Genealogy Project
  2. Pruitt, Scarlet (October 18, 2001), "Snail Mail Squeezed by Anthrax Anxiety", PCWorld .
  3. "Stevens, Columbia and IBM to Hold Security & Privacy Day", California Science & Technology News, November 8, 2005 .
  4. Kassner, Michael (January 26, 2010), Ransomware: Extortion via the Internet, ZDNet .
  5. Whelan, Claire (8 October 2004), "It takes a cryptovirus to fight one", Times Higher Education . A book review of Malicious Cryptography.
  6. IACR Distinguished Lectures, retrieved 2012-03-11.
  7. ACM Names Fellows for Computing Advances that Are Transforming Science and Society, Association for Computing Machinery, accessed 2013-12-10.

External links

This article is issued from Wikipedia. The text is available under the Creative Commons Attribution/Share Alike; additional terms may apply for the media files.