The SCEAS System
Navigation Menu

Search the dblp DataBase


Yacov Yacobi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yacov Yacobi
    A Few Thoughts on E-Commerce. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:1-2 [Conf]
  2. Yacov Yacobi
    Efficient Electronic Money (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:153-163 [Conf]
  3. Oded Yacobi, Yacov Yacobi
    A New Related Message Attack on RSA. [Citation Graph (0, 0)][DBLP]
    Essays in Memory of Shimon Even, 2006, pp:187-195 [Conf]
  4. Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi
    Secure Audio Teleconference. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:418-426 [Conf]
  5. Arjen K. Lenstra, Peter Winkler, Yacov Yacobi
    A Key Escrow System with Warrant Bounds. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:197-207 [Conf]
  6. Yacov Yacobi
    Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:429-433 [Conf]
  7. Yacov Yacobi
    A Key Distribution "Paradox". [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:268-273 [Conf]
  8. Yacov Yacobi
    Discrete-Log With Compressible Exponents. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:639-643 [Conf]
  9. Yacov Yacobi, Zahava Shmuely
    On Key Distribution Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:344-355 [Conf]
  10. Yacov Yacobi
    Complexity Theoretic Analysis of Crypto-Protcols - Overview. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:230-233 [Conf]
  11. Yacov Yacobi
    Improved Boneh-Shaw Content Fingerprinting. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:378-391 [Conf]
  12. Michael J. Beller, Yacov Yacobi
    Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:208-220 [Conf]
  13. Ernest F. Brickell, Yacov Yacobi
    On Privacy Homomorphisms (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1987, pp:117-125 [Conf]
  14. Ueli M. Maurer, Yacov Yacobi
    Non-interactive Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:498-507 [Conf]
  15. Ueli M. Maurer, Yacov Yacobi
    A Remark on a Non-interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:458-460 [Conf]
  16. Yacov Yacobi
    Exponentiating Faster with Addition Chains. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:222-229 [Conf]
  17. Yacov Yacobi
    On the Continuum Between On-line and Off-line E-cash Systems - 1. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:193-202 [Conf]
  18. Yacov Yacobi
    Risk Management for E-Cash Systems with Partial Real-Time Audit. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:62-71 [Conf]
  19. Shimon Even, Yacov Yacobi
    Cryptocomplexity and NP-Completeness. [Citation Graph (0, 0)][DBLP]
    ICALP, 1980, pp:195-207 [Conf]
  20. Alan L. Selman, Yacov Yacobi
    The Complexity of Promise Problems. [Citation Graph (0, 0)][DBLP]
    ICALP, 1982, pp:502-509 [Conf]
  21. Darko Kirovski, Henrique S. Malvar, Yacov Yacobi
    Multimedia content screening using a dual watermarking and fingerprinting system. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2002, pp:372-381 [Conf]
  22. Oded Yacobi, Yacov Yacobi
    A New Related Message Attack on RSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:1-8 [Conf]
  23. Yacov Yacobi
    On the economics of anti-counterfeiting. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2004, pp:248-249 [Conf]
  24. Shimon Even, Yacov Yacobi
    An Observation Concerning the Complexity of Problems with Few Solutions and its Application to Cryptography. [Citation Graph (0, 0)][DBLP]
    WG, 1980, pp:270-278 [Conf]
  25. Ueli M. Maurer, Yacov Yacobi
    A Non-interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:9, n:3, pp:305-316 [Journal]
  26. Shimon Even, Timothy J. Long, Yacov Yacobi
    A Note on Deterministic and Nondeterministic Time Complexity [Citation Graph (0, 0)][DBLP]
    Information and Control, 1982, v:55, n:1-3, pp:117-124 [Journal]
  27. Shimon Even, Alan L. Selman, Yacov Yacobi
    The Complexity of Promise Problems with Applications to Public-Key Cryptography [Citation Graph (0, 0)][DBLP]
    Information and Control, 1984, v:61, n:2, pp:159-173 [Journal]
  28. Darko Kirovski, Henrique S. Malvar, Yacov Yacobi
    A Dual Watermark-Fingerprint System. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2004, v:11, n:3, pp:59-73 [Journal]
  29. Shimon Even, Alan L. Selman, Yacov Yacobi
    Hard-Core Theorems for Complexity Classes [Citation Graph (0, 0)][DBLP]
    J. ACM, 1985, v:32, n:1, pp:205-217 [Journal]
  30. Arjen K. Lenstra, Yacov Yacobi
    User Impersonation in Key Certification Schemes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1993, v:6, n:4, pp:225-232 [Journal]
  31. Yacov Yacobi, Michael J. Beller
    Batch Diffie-Hellman Key Agreement Systems. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1997, v:10, n:2, pp:89-96 [Journal]
  32. Michael J. Beller, Li-Fung Chang, Yacov Yacobi
    Privacy and Authentication on a Portable Communications System. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:6, pp:821-829 [Journal]
  33. Yacov Yacobi
    Fast Exponentiation Using Data Compression. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1998, v:28, n:2, pp:700-703 [Journal]

  34. Counterfeiting and anti-counterfeitingof software and content. [Citation Graph (, )][DBLP]

  35. Content identification. [Citation Graph (, )][DBLP]

  36. Vulnerabilities in Anonymous Credential Systems. [Citation Graph (, )][DBLP]

Search in 0.047secs, Finished in 0.050secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002