Search the dblp DataBase
Yacov Yacobi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yacov Yacobi A Few Thoughts on E-Commerce. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:1-2 [Conf ] Yacov Yacobi Efficient Electronic Money (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:153-163 [Conf ] Oded Yacobi , Yacov Yacobi A New Related Message Attack on RSA. [Citation Graph (0, 0)][DBLP ] Essays in Memory of Shimon Even, 2006, pp:187-195 [Conf ] Ernest F. Brickell , Pil Joong Lee , Yacov Yacobi Secure Audio Teleconference. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:418-426 [Conf ] Arjen K. Lenstra , Peter Winkler , Yacov Yacobi A Key Escrow System with Warrant Bounds. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:197-207 [Conf ] Yacov Yacobi Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:429-433 [Conf ] Yacov Yacobi A Key Distribution "Paradox". [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:268-273 [Conf ] Yacov Yacobi Discrete-Log With Compressible Exponents. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:639-643 [Conf ] Yacov Yacobi , Zahava Shmuely On Key Distribution Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:344-355 [Conf ] Yacov Yacobi Complexity Theoretic Analysis of Crypto-Protcols - Overview. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:230-233 [Conf ] Yacov Yacobi Improved Boneh-Shaw Content Fingerprinting. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:378-391 [Conf ] Michael J. Beller , Yacov Yacobi Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:208-220 [Conf ] Ernest F. Brickell , Yacov Yacobi On Privacy Homomorphisms (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1987, pp:117-125 [Conf ] Ueli M. Maurer , Yacov Yacobi Non-interactive Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:498-507 [Conf ] Ueli M. Maurer , Yacov Yacobi A Remark on a Non-interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:458-460 [Conf ] Yacov Yacobi Exponentiating Faster with Addition Chains. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:222-229 [Conf ] Yacov Yacobi On the Continuum Between On-line and Off-line E-cash Systems - 1. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:193-202 [Conf ] Yacov Yacobi Risk Management for E-Cash Systems with Partial Real-Time Audit. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:62-71 [Conf ] Shimon Even , Yacov Yacobi Cryptocomplexity and NP-Completeness. [Citation Graph (0, 0)][DBLP ] ICALP, 1980, pp:195-207 [Conf ] Alan L. Selman , Yacov Yacobi The Complexity of Promise Problems. [Citation Graph (0, 0)][DBLP ] ICALP, 1982, pp:502-509 [Conf ] Darko Kirovski , Henrique S. Malvar , Yacov Yacobi Multimedia content screening using a dual watermarking and fingerprinting system. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2002, pp:372-381 [Conf ] Oded Yacobi , Yacov Yacobi A New Related Message Attack on RSA. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:1-8 [Conf ] Yacov Yacobi On the economics of anti-counterfeiting. [Citation Graph (0, 0)][DBLP ] ACM Conference on Electronic Commerce, 2004, pp:248-249 [Conf ] Shimon Even , Yacov Yacobi An Observation Concerning the Complexity of Problems with Few Solutions and its Application to Cryptography. [Citation Graph (0, 0)][DBLP ] WG, 1980, pp:270-278 [Conf ] Ueli M. Maurer , Yacov Yacobi A Non-interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:9, n:3, pp:305-316 [Journal ] Shimon Even , Timothy J. Long , Yacov Yacobi A Note on Deterministic and Nondeterministic Time Complexity [Citation Graph (0, 0)][DBLP ] Information and Control, 1982, v:55, n:1-3, pp:117-124 [Journal ] Shimon Even , Alan L. Selman , Yacov Yacobi The Complexity of Promise Problems with Applications to Public-Key Cryptography [Citation Graph (0, 0)][DBLP ] Information and Control, 1984, v:61, n:2, pp:159-173 [Journal ] Darko Kirovski , Henrique S. Malvar , Yacov Yacobi A Dual Watermark-Fingerprint System. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2004, v:11, n:3, pp:59-73 [Journal ] Shimon Even , Alan L. Selman , Yacov Yacobi Hard-Core Theorems for Complexity Classes [Citation Graph (0, 0)][DBLP ] J. ACM, 1985, v:32, n:1, pp:205-217 [Journal ] Arjen K. Lenstra , Yacov Yacobi User Impersonation in Key Certification Schemes. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1993, v:6, n:4, pp:225-232 [Journal ] Yacov Yacobi , Michael J. Beller Batch Diffie-Hellman Key Agreement Systems. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1997, v:10, n:2, pp:89-96 [Journal ] Michael J. Beller , Li-Fung Chang , Yacov Yacobi Privacy and Authentication on a Portable Communications System. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:6, pp:821-829 [Journal ] Yacov Yacobi Fast Exponentiation Using Data Compression. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1998, v:28, n:2, pp:700-703 [Journal ] Counterfeiting and anti-counterfeitingof software and content. [Citation Graph (, )][DBLP ] Content identification. [Citation Graph (, )][DBLP ] Vulnerabilities in Anonymous Credential Systems. [Citation Graph (, )][DBLP ] Search in 0.047secs, Finished in 0.050secs