Department of Computer and Information Sciences
University of St. Thomas
Mail: 2115 Summit Avenue # OSS-402, Saint Paul, MN 55105
Office: OSS 413
Phone: (651) 962-5395
Fax: (651) 962-5209
Email: syilek at stthomas dot edu
Cryptography and computer security.
Current (Fall 2017):
None - On Sabbatical
- CISC 130 - Introduction to Programming and Problem Solving for the Natural Sciences (Summer 2016, Spring 2016 x2, Spring 2015, Fall 2014, Spring 2014, Fall 2013, Spring 2013, Fall 2012, Spring 2012, Fall 2011 x2, Spring 2011, Fall 2010 x2)
- CISC 131 - Introduction to Programming and Problem Solving (Spring 2017, Fall 2014)
- CISC 210 - Information Security (Spring 2017, Fall 2016, Spring 2016, Fall 2015, Spring 2015, Spring 2014, Spring 2013, Spring 2012, Spring 2011)
- CISC 231 - Data Structures (Fall 2016)
- CISC 410 - Advanced Information Security (Fall 2014, Fall 2013, Fall 2012, Fall 2011)
- CISC 490 - Topics: Algorithms (Spring 2014)
Program Committees: Latincrypt 2014, Latincrypt 2012, PKC 2012, Africacrypt 2011
Reverse Cycle Walking and Its Applications.
Sarah Miracle and Scott Yilek
Advances in Cryptology - ASIACRYPT 2016.
The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries.
Thomas Ristenpart and Scott Yilek
Advances in Cryptology - CRYPTO 2013.
Standard Security Does Not Imply Security Against Selective-Opening.
Mihir Bellare, Rafael Dowsley, Brent Waters, and Scott Yilek
Advances in Cryptology - EUROCRYPT 2012.
Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham.
Proceedings of Web 2.0 Security and Privacy 2011 - W2SP 2011.
Identity-Based Encryption Secure Against Selective Opening Attack.
Mihir Bellare, Brent Waters, and Scott Yilek
Proceedings of the Eighth Theory of Cryptography Conference - TCC 2011.
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.
Petros Mol and Scott Yilek.
Public Key Cryptography - PKC 2010. (Best Paper Award)
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine.
Topics in Cryptology - CT-RSA 2010.
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Thomas Ristenpart and Scott Yilek.
Proceedings of the Network and Distributed System Security Symposium - NDSS 2010.
Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, and Scott Yilek.
Advances in Cryptology - ASIACRYPT 2009.
When Private Keys are Public: Results from the 2008 Debian OpenSSL Vulnerability.
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, and Stefan Savage.
Proceedings of the ACM Conference on Internet Measurement - IMC 2009.
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening.
Mihir Bellare, Dennis Hofheinz, and Scott Yilek.
Advances in Cryptology - EUROCRYPT 2009. (Invited to Journal of Cryptology)
The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization.
Daniele Micciancio and Scott Yilek.
Proceedings of the Fifth Theory of Cryptography Conference - TCC 2008.
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
Thomas Ristenpart and Scott Yilek.
Advances in Cryptology - EUROCRYPT 2007.
Recommenders Everywhere: The WikiLens Community-Maintained Recommender System.
Dan Frankowski, Shyong K. (Tony) Lam, Shilad Sen, F. Maxwell Harper, Scott Yilek, Michael Cassano, and John Riedl.
Proceedings of the 2007 International Symposium on Wikis - WikiSym 2007.
I am currently an Associate Professor in the Department of Computer and Information Sciences at the University of St. Thomas in St. Paul, MN.
I received a Ph.D. in Computer Science from the
University of California, San Diego, where I was a member of the
Security and Cryptography Group. My advisor
was Daniele Micciancio.
Previously, I received an M.S. in Computer Science at UC San Diego. Before that,
I received a B.S. in Computer Science from the
University of Minnesota in Minneapolis, MN where I worked
with GroupLens Research.