The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yair Frankel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ernest F. Brickell, Giovanni Di Crescenzo, Yair Frankel
    Sharing Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:457-470 [Conf]
  2. Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis
    Mis-representation of Identities in E-cash Schemes and how to Prevent it. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:276-285 [Conf]
  3. Dan Boneh, Glenn Durfee, Yair Frankel
    An Attack on RSA Given a Small Fraction of the Private Key Bits. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:25-34 [Conf]
  4. Yair Frankel, Philip D. MacKenzie, Moti Yung
    Adaptively-Secure Optimal-Resilience Proactive RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:180-194 [Conf]
  5. Yair Frankel, Yiannis Tsiounis, Moti Yung
    "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:286-300 [Conf]
  6. Yair Frankel, Yiannis Tsiounis, Moti Yung
    Fair Off-Line e-cash Made Easy. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:257-270 [Conf]
  7. Yair Frankel, Moti Yung
    How to Say "YES" with Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:203-212 [Conf]
  8. Yair Frankel
    Electronic payment technologies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:- [Conf]
  9. Yvo Desmedt, Yair Frankel
    Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:307-315 [Conf]
  10. Yvo Desmedt, Yair Frankel
    Shared Generation of Authenticators and Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:457-469 [Conf]
  11. Yair Frankel, Yvo Desmedt, Mike Burmester
    Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:549-557 [Conf]
  12. Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
    Proactive RSA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:440-454 [Conf]
  13. Yair Frankel, Moti Yung
    Escrow Encryption Systems Visited: Attacks, Analysis and Designs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:222-235 [Conf]
  14. Yair Frankel, Moti Yung
    Cryptoanalysis of the Immunized LL Public Key Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:287-296 [Conf]
  15. Yair Frankel, Philip D. MacKenzie, Moti Yung
    Adaptively-Secure Distributed Public-Key Systems. [Citation Graph (0, 0)][DBLP]
    ESA, 1999, pp:4-27 [Conf]
  16. Agnes Hui Chan, Yair Frankel, Yiannis Tsiounis
    Easy Come - Easy Go Divisible Cash. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:561-575 [Conf]
  17. Yair Frankel
    A Practical Protocol for Large Group Oriented Networks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:56-61 [Conf]
  18. Yair Frankel, Yvo Desmedt
    Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:25-34 [Conf]
  19. Yair Frankel, Moti Yung
    Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:241-252 [Conf]
  20. George I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung
    Anonymity Control in E-Cash Systems. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:1-16 [Conf]
  21. Yair Frankel
    Protecting Digital Rights. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:42-44 [Conf]
  22. Yair Frankel, David W. Kravitz, Charles T. Montgomery, Moti Yung
    Beyond Identity: Warranty-Based Digital Signature Transactions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:241-253 [Conf]
  23. Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
    Optimal Resilience Proactive Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    FOCS, 1997, pp:384-393 [Conf]
  24. Yair Frankel, Moti Yung
    On Characterization of Escrow Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ICALP, 1997, pp:705-715 [Conf]
  25. George I. Davida, Yair Frankel
    Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:104-113 [Conf]
  26. Yvo Desmedt, Yair Frankel, Moti Yung
    Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1992, pp:2045-2054 [Conf]
  27. Yair Frankel, Philip D. MacKenzie, Moti Yung
    "Psyeudorandom Intermixing": A Tool for Shared Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:306-325 [Conf]
  28. Yair Frankel, Philip D. MacKenzie, Moti Yung
    Adaptive Security for the Additive-Sharing Based Proactive RSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:240-263 [Conf]
  29. Yair Frankel, Moti Yung
    Distributed Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:1-13 [Conf]
  30. Yair Frankel, Peter Gemmell, Moti Yung
    Witness-Based Cryptographic Program Checking and Applications (an Announcement). [Citation Graph (0, 0)][DBLP]
    PODC, 1996, pp:211- [Conf]
  31. Yair Frankel, Philip D. MacKenzie, Moti Yung
    Robust Efficient Distributed RSA-Key Generation. [Citation Graph (0, 0)][DBLP]
    PODC, 1998, pp:320- [Conf]
  32. Giovanni Di Crescenzo, Yair Frankel
    Existence of Multiplicative Secret Sharing Schemes with Polynomial Share Expansion. [Citation Graph (0, 0)][DBLP]
    SODA, 1999, pp:895-896 [Conf]
  33. Yair Frankel, Peter Gemmell, Moti Yung
    Witness-Based Cryptographic Program Checking and Robust Function Sharing. [Citation Graph (0, 0)][DBLP]
    STOC, 1996, pp:499-508 [Conf]
  34. Yair Frankel, Philip D. MacKenzie, Moti Yung
    Robust Efficient Distributed RSA-Key Generation. [Citation Graph (0, 0)][DBLP]
    STOC, 1998, pp:663-672 [Conf]
  35. Alfredo De Santis, Yvo Desmedt, Yair Frankel, Moti Yung
    How to share a function securely. [Citation Graph (0, 0)][DBLP]
    STOC, 1994, pp:522-533 [Conf]
  36. Yvo Desmedt, Yair Frankel
    Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1994, v:7, n:4, pp:667-679 [Journal]
  37. Boaz Patt-Shamir, Yiannis Tsiounis, Yair Frankel
    Exact Analysis of Exact Change: The k-Payment Problem. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2000, v:13, n:4, pp:436-453 [Journal]
  38. Yair Frankel, Philip D. MacKenzie, Moti Yung
    Adaptively secure distributed public-key systems. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:287, n:2, pp:535-561 [Journal]

  39. Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless Systems. [Citation Graph (, )][DBLP]


  40. On Enabling Secure Applications Through Off-Line Biometric Identification. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002