Scott Yilek

Associate Professor
Department of Computer and Information Sciences
University of St. Thomas

Mail: 2115 Summit Avenue # OSS-402, Saint Paul, MN 55105
Office: OSS 413
Phone: (651) 962-5395
Fax: (651) 962-5209
Email: syilek at stthomas dot edu

Research Interests

Cryptography and computer security.


Current (Fall 2022):

  • CISC 350 - Information Security
  • CISC 380 - Algorithms (2 sections)


  • CISC 130 - Introduction to Programming and Problem Solving for the Sciences (Summer 2018, Summer 2016, Spring 2016 x2, Spring 2015, Fall 2014, Spring 2014, Fall 2013, Spring 2013, Fall 2012, Spring 2012, Fall 2011 x2, Spring 2011, Fall 2010 x2)
  • CISC 131 - Introduction to Programming and Problem Solving (Spring 2017 x2, Fall 2014)
  • CISC 230 - Object-Oriented Design and Programming (Spring 2022, Fall 2021, Spring 2021x2, Spring 2020, Spring 2019, Fall 2018)
  • CISC 231 - Data Structures (Fall 2016)
  • CISC 350 (formerly 210) - Information Security (Summer 2022, Spring 2022x2, Fall 2021, Summer 2021, Fall 2020x2, Fall 2019x2, Fall 2018, Spring 2018 x2, Spring 2017, Fall 2016, Spring 2016, Fall 2015, Spring 2015, Spring 2014, Spring 2013, Spring 2012, Spring 2011)
  • CISC 380 (formerly 490) - Algorithms (Spring 2014)
  • CISC 410 - Advanced Information Security (Spring 2021, Spring 2019, Spring 2018, Fall 2014, Fall 2013, Fall 2012, Fall 2011)

Professional Activities

Program Committees: Latincrypt 2014, Latincrypt 2012, PKC 2012, Africacrypt 2011


New Algorithms and Analyses for Sum-Preserving Encryption
Sarah Miracle and Scott Yilek

Interactive History Sniffing with Dynamically-Generated QR Codes and CSS Difference Blending
Keith O'Neal and Scott Yilek
Workshop on Offensive Technologies - WOOT 2022, published in 2022 IEEE Security & Privacy Workshops (SPW)

Targeted Ciphers for Format-Preserving Encryption.
Sarah Miracle and Scott Yilek
Selected Areas in Cryptography - SAC 2018.

Cycle Slicer: An Algorithm for Building Permutations on Special Domains.
Sarah Miracle and Scott Yilek

Reverse Cycle Walking and Its Applications.
Sarah Miracle and Scott Yilek

The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries.
Thomas Ristenpart and Scott Yilek
CRYPTO 2013.

Standard Security Does Not Imply Security Against Selective-Opening.
Mihir Bellare, Rafael Dowsley, Brent Waters, and Scott Yilek

Fingerprinting Information in JavaScript Implementations.
Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham.
Web 2.0 Security and Privacy 2011 - W2SP 2011.

Identity-Based Encryption Secure Against Selective Opening Attack.
Mihir Bellare, Brent Waters, and Scott Yilek
TCC 2011.

Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.
Petros Mol and Scott Yilek.
PKC 2010. (Best Paper Award)

Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine.
Scott Yilek.
CT-RSA 2010.

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Thomas Ristenpart and Scott Yilek.
NDSS 2010.

Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, and Scott Yilek.

When Private Keys are Public: Results from the 2008 Debian OpenSSL Vulnerability.
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, and Stefan Savage.
IMC 2009.

Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening.
Mihir Bellare, Dennis Hofheinz, and Scott Yilek.
EUROCRYPT 2009. (Invited to Journal of Cryptology)

The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization.
Daniele Micciancio and Scott Yilek.
TCC 2008.

The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
Thomas Ristenpart and Scott Yilek.

Recommenders Everywhere: The WikiLens Community-Maintained Recommender System.
Dan Frankowski, Shyong K. (Tony) Lam, Shilad Sen, F. Maxwell Harper, Scott Yilek, Michael Cassano, and John Riedl.
WikiSym 2007.

About Me

I am currently an Associate Professor in the Department of Computer and Information Sciences at the University of St. Thomas in St. Paul, MN. I received a Ph.D. in Computer Science from the University of California, San Diego, where I was a member of the Security and Cryptography Group. My advisor was Daniele Micciancio.

Previously, I received an M.S. in Computer Science at UC San Diego. Before that, I received a B.S. in Computer Science from the University of Minnesota in Minneapolis, MN where I worked with GroupLens Research.