Scott Yilek

Email. syilek (at) cs . ucsd . edu

NOTE: I am now an Assistant Professor at the University of St. Thomas. To go to my homepage at St. Thomas click here.

About Me

I received a Ph.D. in Computer Science at the University of California, San Diego, where I was a member of the Security and Cryptography Group.

Previously, I received an M.S. in Computer Science at UCSD. Before that, I received a B.S. in Computer Science from the University of Minnesota in Minneapolis, MN where I worked at GroupLens Research. While at Minnesota, I also was part of the team that created Chipmark, an open-source, online bookmark service.

Publications (As of September 1, 2010)

Petros Mol and Scott Yilek.
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.
Public Key Cryptography - PKC 2010. (Best Paper Award)

Scott Yilek.
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine.
Topics in Cryptology - CT-RSA 2010.

Thomas Ristenpart and Scott Yilek.
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Proceedings of the Network and Distributed System Security Symposium - NDSS 2010.

Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, and Scott Yilek.
Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Advances in Cryptology - ASIACRYPT 2009.

Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, and Stefan Savage.
When Private Keys are Public: Results from the 2008 Debian OpenSSL Vulnerability.
Proceedings of the ACM Conference on Internet Measurement - IMC 2009.

Mihir Bellare, Dennis Hofheinz, and Scott Yilek.
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening.
Advances in Cryptology - EUROCRYPT 2009. (Invited to Journal of Cryptology)

Daniele Micciancio and Scott Yilek.
The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization.
Proceedings of the Fifth Theory of Cryptography Conference - TCC 2008.

Thomas Ristenpart and Scott Yilek.
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
Advances in Cryptology - EUROCRYPT 2007.

Dan Frankowski, Shyong K. (Tony) Lam, Shilad Sen, F. Maxwell Harper, Scott Yilek, Michael Cassano, and John Riedl.
Recommenders Everywhere: The WikiLens Community-Maintained Recommender System.
Proceedings of the 2007 International Symposium on Wikis - WikiSym 2007.

Mihir Bellare, Brent Waters, and Scott Yilek
Identity-Based Encryption Secure under Selective Opening Attack.
Manuscript. IACR ePrint Archive Report 2010/159.