Department of Computer and Information Sciences
University of St. Thomas
Mail: 2115 Summit Avenue # OSS-402, Saint Paul, MN 55105
Office: OSS 413
Phone: (651) 962-5395
Fax: (651) 962-5209
Email: syilek at stthomas dot edu
Cryptography and computer security.
Current (Spring 2015):
- CISC 130 - Introduction to Programming and Problem Solving for the Natural Sciences (w/ Lab)
- CISC 210 - Information Security
- CISC 130 - Introduction to Programming and Problem Solving for the Natural Sciences (Fall 2014, Spring 2014, Fall 2013, Spring 2013, Fall 2012, Spring 2012, Fall 2011 x2, Spring 2011, Fall 2010 x2)
- CISC 131 - Introduction to Programming and Problem Solving (Fall 2014)
- CISC 210 - Information Security (Spring 2014, Spring 2013, Spring 2012, Spring 2011)
- CISC 410 - Advanced Information Security (Fall 2014, Fall 2013, Fall 2012, Fall 2011)
- CISC 490 - Topics: Algorithms (Spring 2014)
Program Committees: Latincrypt 2014, Latincrypt 2012, PKC 2012, Africacrypt 2011
The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries.
Thomas Ristenpart and Scott Yilek
Advances in Cryptology - CRYPTO 2013.
Standard Security Does Not Imply Security Against Selective-Opening.
Mihir Bellare, Rafael Dowsley, Brent Waters, and Scott Yilek
Advances in Cryptology - EUROCRYPT 2012.
Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham.
Proceedings of Web 2.0 Security and Privacy 2011 - W2SP 2011.
Identity-Based Encryption Secure Against Selective Opening Attack.
Mihir Bellare, Brent Waters, and Scott Yilek
Proceedings of the Eighth Theory of Cryptography Conference - TCC 2011.
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.
Petros Mol and Scott Yilek.
Public Key Cryptography - PKC 2010. (Best Paper Award)
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine.
Topics in Cryptology - CT-RSA 2010.
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Thomas Ristenpart and Scott Yilek.
Proceedings of the Network and Distributed System Security Symposium - NDSS 2010.
Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, and Scott Yilek.
Advances in Cryptology - ASIACRYPT 2009.
When Private Keys are Public: Results from the 2008 Debian OpenSSL Vulnerability.
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, and Stefan Savage.
Proceedings of the ACM Conference on Internet Measurement - IMC 2009.
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening.
Mihir Bellare, Dennis Hofheinz, and Scott Yilek.
Advances in Cryptology - EUROCRYPT 2009. (Invited to Journal of Cryptology)
The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization.
Daniele Micciancio and Scott Yilek.
Proceedings of the Fifth Theory of Cryptography Conference - TCC 2008.
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
Thomas Ristenpart and Scott Yilek.
Advances in Cryptology - EUROCRYPT 2007.
Recommenders Everywhere: The WikiLens Community-Maintained Recommender System.
Dan Frankowski, Shyong K. (Tony) Lam, Shilad Sen, F. Maxwell Harper, Scott Yilek, Michael Cassano, and John Riedl.
Proceedings of the 2007 International Symposium on Wikis - WikiSym 2007.
I am currently an Assistant Professor in the Department of Computer and Information Sciences at the University of St. Thomas in St. Paul, MN.
I received a Ph.D. in Computer Science from the
University of California, San Diego, where I was a member of the
Security and Cryptography Group. My advisor
was Daniele Micciancio.
Previously, I received an M.S. in Computer Science at UC San Diego. Before that,
I received a B.S. in Computer Science from the
University of Minnesota in Minneapolis, MN where I worked
with GroupLens Research.