|
Search the dblp DataBase
Yair Frankel:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ernest F. Brickell, Giovanni Di Crescenzo, Yair Frankel
Sharing Block Ciphers. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:457-470 [Conf]
- Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis
Mis-representation of Identities in E-cash Schemes and how to Prevent it. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1996, pp:276-285 [Conf]
- Dan Boneh, Glenn Durfee, Yair Frankel
An Attack on RSA Given a Small Fraction of the Private Key Bits. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:25-34 [Conf]
- Yair Frankel, Philip D. MacKenzie, Moti Yung
Adaptively-Secure Optimal-Resilience Proactive RSA. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:180-194 [Conf]
- Yair Frankel, Yiannis Tsiounis, Moti Yung
"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1996, pp:286-300 [Conf]
- Yair Frankel, Yiannis Tsiounis, Moti Yung
Fair Off-Line e-cash Made Easy. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:257-270 [Conf]
- Yair Frankel, Moti Yung
How to Say "YES" with Smart Cards. [Citation Graph (0, 0)][DBLP] CARDIS, 1998, pp:203-212 [Conf]
- Yair Frankel
Electronic payment technologies. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:- [Conf]
- Yvo Desmedt, Yair Frankel
Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP] CRYPTO, 1989, pp:307-315 [Conf]
- Yvo Desmedt, Yair Frankel
Shared Generation of Authenticators and Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP] CRYPTO, 1991, pp:457-469 [Conf]
- Yair Frankel, Yvo Desmedt, Mike Burmester
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract). [Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:549-557 [Conf]
- Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
Proactive RSA. [Citation Graph (0, 0)][DBLP] CRYPTO, 1997, pp:440-454 [Conf]
- Yair Frankel, Moti Yung
Escrow Encryption Systems Visited: Attacks, Analysis and Designs. [Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:222-235 [Conf]
- Yair Frankel, Moti Yung
Cryptoanalysis of the Immunized LL Public Key Systems. [Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:287-296 [Conf]
- Yair Frankel, Philip D. MacKenzie, Moti Yung
Adaptively-Secure Distributed Public-Key Systems. [Citation Graph (0, 0)][DBLP] ESA, 1999, pp:4-27 [Conf]
- Agnes Hui Chan, Yair Frankel, Yiannis Tsiounis
Easy Come - Easy Go Divisible Cash. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:561-575 [Conf]
- Yair Frankel
A Practical Protocol for Large Group Oriented Networks. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1989, pp:56-61 [Conf]
- Yair Frankel, Yvo Desmedt
Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1992, pp:25-34 [Conf]
- Yair Frankel, Moti Yung
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1999, pp:241-252 [Conf]
- George I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung
Anonymity Control in E-Cash Systems. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1997, pp:1-16 [Conf]
- Yair Frankel
Protecting Digital Rights. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2001, pp:42-44 [Conf]
- Yair Frankel, David W. Kravitz, Charles T. Montgomery, Moti Yung
Beyond Identity: Warranty-Based Digital Signature Transactions. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1998, pp:241-253 [Conf]
- Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
Optimal Resilience Proactive Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP] FOCS, 1997, pp:384-393 [Conf]
- Yair Frankel, Moti Yung
On Characterization of Escrow Encryption Schemes. [Citation Graph (0, 0)][DBLP] ICALP, 1997, pp:705-715 [Conf]
- George I. Davida, Yair Frankel
Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 1999, pp:104-113 [Conf]
- Yvo Desmedt, Yair Frankel, Moti Yung
Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback. [Citation Graph (0, 0)][DBLP] INFOCOM, 1992, pp:2045-2054 [Conf]
- Yair Frankel, Philip D. MacKenzie, Moti Yung
"Psyeudorandom Intermixing": A Tool for Shared Cryptography. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2000, pp:306-325 [Conf]
- Yair Frankel, Philip D. MacKenzie, Moti Yung
Adaptive Security for the Additive-Sharing Based Proactive RSA. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2001, pp:240-263 [Conf]
- Yair Frankel, Moti Yung
Distributed Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:1-13 [Conf]
- Yair Frankel, Peter Gemmell, Moti Yung
Witness-Based Cryptographic Program Checking and Applications (an Announcement). [Citation Graph (0, 0)][DBLP] PODC, 1996, pp:211- [Conf]
- Yair Frankel, Philip D. MacKenzie, Moti Yung
Robust Efficient Distributed RSA-Key Generation. [Citation Graph (0, 0)][DBLP] PODC, 1998, pp:320- [Conf]
- Giovanni Di Crescenzo, Yair Frankel
Existence of Multiplicative Secret Sharing Schemes with Polynomial Share Expansion. [Citation Graph (0, 0)][DBLP] SODA, 1999, pp:895-896 [Conf]
- Yair Frankel, Peter Gemmell, Moti Yung
Witness-Based Cryptographic Program Checking and Robust Function Sharing. [Citation Graph (0, 0)][DBLP] STOC, 1996, pp:499-508 [Conf]
- Yair Frankel, Philip D. MacKenzie, Moti Yung
Robust Efficient Distributed RSA-Key Generation. [Citation Graph (0, 0)][DBLP] STOC, 1998, pp:663-672 [Conf]
- Alfredo De Santis, Yvo Desmedt, Yair Frankel, Moti Yung
How to share a function securely. [Citation Graph (0, 0)][DBLP] STOC, 1994, pp:522-533 [Conf]
- Yvo Desmedt, Yair Frankel
Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group. [Citation Graph (0, 0)][DBLP] SIAM J. Discrete Math., 1994, v:7, n:4, pp:667-679 [Journal]
- Boaz Patt-Shamir, Yiannis Tsiounis, Yair Frankel
Exact Analysis of Exact Change: The k-Payment Problem. [Citation Graph (0, 0)][DBLP] SIAM J. Discrete Math., 2000, v:13, n:4, pp:436-453 [Journal]
- Yair Frankel, Philip D. MacKenzie, Moti Yung
Adaptively secure distributed public-key systems. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2002, v:287, n:2, pp:535-561 [Journal]
Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless Systems. [Citation Graph (, )][DBLP]
On Enabling Secure Applications Through Off-Line Biometric Identification. [Citation Graph (, )][DBLP]
Search in 0.027secs, Finished in 0.330secs
|