Scott Yilek

Associate Professor
Department of Computer and Information Sciences
University of St. Thomas

Mail: 2115 Summit Avenue # OSS-402, Saint Paul, MN 55105
Office: OSS 413
Phone: (651) 962-5395
Fax: (651) 962-5209
Email: syilek at stthomas dot edu

Research Interests

Cryptography and computer security.


Current (Fall 2017):

None - On Sabbatical


  • CISC 130 - Introduction to Programming and Problem Solving for the Natural Sciences (Summer 2016, Spring 2016 x2, Spring 2015, Fall 2014, Spring 2014, Fall 2013, Spring 2013, Fall 2012, Spring 2012, Fall 2011 x2, Spring 2011, Fall 2010 x2)
  • CISC 131 - Introduction to Programming and Problem Solving (Spring 2017, Fall 2014)
  • CISC 210 - Information Security (Spring 2017, Fall 2016, Spring 2016, Fall 2015, Spring 2015, Spring 2014, Spring 2013, Spring 2012, Spring 2011)
  • CISC 231 - Data Structures (Fall 2016)
  • CISC 410 - Advanced Information Security (Fall 2014, Fall 2013, Fall 2012, Fall 2011)
  • CISC 490 - Topics: Algorithms (Spring 2014)

Professional Activities

Program Committees: Latincrypt 2014, Latincrypt 2012, PKC 2012, Africacrypt 2011


Cycle Slicer: An Algorithm for Building Permutations on Special Domains.
Sarah Miracle and Scott Yilek
To appear in ASIACRYPT 2017.

Reverse Cycle Walking and Its Applications.
Sarah Miracle and Scott Yilek

The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries.
Thomas Ristenpart and Scott Yilek
CRYPTO 2013.

Standard Security Does Not Imply Security Against Selective-Opening.
Mihir Bellare, Rafael Dowsley, Brent Waters, and Scott Yilek

Fingerprinting Information in JavaScript Implementations.
Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham.
Web 2.0 Security and Privacy 2011 - W2SP 2011.

Identity-Based Encryption Secure Against Selective Opening Attack.
Mihir Bellare, Brent Waters, and Scott Yilek
TCC 2011.

Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.
Petros Mol and Scott Yilek.
PKC 2010. (Best Paper Award)

Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine.
Scott Yilek.
CT-RSA 2010.

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Thomas Ristenpart and Scott Yilek.
NDSS 2010.

Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, and Scott Yilek.

When Private Keys are Public: Results from the 2008 Debian OpenSSL Vulnerability.
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, and Stefan Savage.
IMC 2009.

Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening.
Mihir Bellare, Dennis Hofheinz, and Scott Yilek.
EUROCRYPT 2009. (Invited to Journal of Cryptology)

The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization.
Daniele Micciancio and Scott Yilek.
TCC 2008.

The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
Thomas Ristenpart and Scott Yilek.

Recommenders Everywhere: The WikiLens Community-Maintained Recommender System.
Dan Frankowski, Shyong K. (Tony) Lam, Shilad Sen, F. Maxwell Harper, Scott Yilek, Michael Cassano, and John Riedl.
WikiSym 2007.

About Me

I am currently an Associate Professor in the Department of Computer and Information Sciences at the University of St. Thomas in St. Paul, MN. I received a Ph.D. in Computer Science from the University of California, San Diego, where I was a member of the Security and Cryptography Group. My advisor was Daniele Micciancio.

Previously, I received an M.S. in Computer Science at UC San Diego. Before that, I received a B.S. in Computer Science from the University of Minnesota in Minneapolis, MN where I worked with GroupLens Research.