2008 |
36 | EE | Yacov Yacobi:
Content identification.
Digital Rights Management Workshop 2008: 51-52 |
35 | EE | Yacov Yacobi,
Gideon Yaniv:
Counterfeiting and anti-counterfeitingof software and content.
Digital Rights Management Workshop 2008: 53-58 |
34 | EE | Raghav Bhaskar,
K. Chandrasekaran,
Satyanarayana V. Lokam,
P. L. Montgomery,
R. Venkatesan,
Yacov Yacobi:
Vulnerabilities in Anonymous Credential Systems.
Electr. Notes Theor. Comput. Sci. 197(2): 141-148 (2008) |
2006 |
33 | EE | Oded Yacobi,
Yacov Yacobi:
A New Related Message Attack on RSA.
Essays in Memory of Shimon Even 2006: 187-195 |
2005 |
32 | EE | Oded Yacobi,
Yacov Yacobi:
A New Related Message Attack on RSA.
Public Key Cryptography 2005: 1-8 |
2004 |
31 | EE | Yacov Yacobi:
On the economics of anti-counterfeiting.
ACM Conference on Electronic Commerce 2004: 248-249 |
30 | EE | Darko Kirovski,
Henrique S. Malvar,
Yacov Yacobi:
A Dual Watermark-Fingerprint System.
IEEE MultiMedia 11(3): 59-73 (2004) |
2002 |
29 | EE | Darko Kirovski,
Henrique S. Malvar,
Yacov Yacobi:
Multimedia content screening using a dual watermarking and fingerprinting system.
ACM Multimedia 2002: 372-381 |
2001 |
28 | EE | Yacov Yacobi:
A Few Thoughts on E-Commerce.
ACISP 2001: 1-2 |
27 | EE | Yacov Yacobi:
Improved Boneh-Shaw Content Fingerprinting.
CT-RSA 2001: 378-391 |
1999 |
26 | EE | Yacov Yacobi:
Risk Management for E-Cash Systems with Partial Real-Time Audit.
Financial Cryptography 1999: 62-71 |
1998 |
25 | | Yacov Yacobi:
Fast Exponentiation Using Data Compression.
SIAM J. Comput. 28(2): 700-703 (1998) |
1997 |
24 | | Yacov Yacobi:
On the Continuum Between On-line and Off-line E-cash Systems - 1.
Financial Cryptography 1997: 193-202 |
23 | | Yacov Yacobi,
Michael J. Beller:
Batch Diffie-Hellman Key Agreement Systems.
J. Cryptology 10(2): 89-96 (1997) |
1996 |
22 | | Ueli M. Maurer,
Yacov Yacobi:
A Non-interactive Public-Key Distribution System.
Des. Codes Cryptography 9(3): 305-316 (1996) |
1995 |
21 | EE | Arjen K. Lenstra,
Peter Winkler,
Yacov Yacobi:
A Key Escrow System with Warrant Bounds.
CRYPTO 1995: 197-207 |
1994 |
20 | | Yacov Yacobi:
Efficient Electronic Money (Extended Abstract).
ASIACRYPT 1994: 153-163 |
1993 |
19 | | Michael J. Beller,
Li-Fung Chang,
Yacov Yacobi:
Privacy and Authentication on a Portable Communications System.
IEEE Journal on Selected Areas in Communications 11(6): 821-829 (1993) |
18 | | Arjen K. Lenstra,
Yacov Yacobi:
User Impersonation in Key Certification Schemes.
J. Cryptology 6(4): 225-232 (1993) |
1992 |
17 | EE | Michael J. Beller,
Yacov Yacobi:
Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications.
EUROCRYPT 1992: 208-220 |
16 | EE | Ueli M. Maurer,
Yacov Yacobi:
A Remark on a Non-interactive Public-Key Distribution System.
EUROCRYPT 1992: 458-460 |
1991 |
15 | | Yacov Yacobi:
Complexity Theoretic Analysis of Crypto-Protcols - Overview.
CSFW 1991: 230-233 |
14 | EE | Ueli M. Maurer,
Yacov Yacobi:
Non-interactive Public-Key Cryptography.
EUROCRYPT 1991: 498-507 |
1990 |
13 | EE | Yacov Yacobi:
A Key Distribution "Paradox".
CRYPTO 1990: 268-273 |
12 | EE | Yacov Yacobi:
Discrete-Log With Compressible Exponents.
CRYPTO 1990: 639-643 |
11 | EE | Yacov Yacobi:
Exponentiating Faster with Addition Chains.
EUROCRYPT 1990: 222-229 |
1989 |
10 | EE | Yacov Yacobi,
Zahava Shmuely:
On Key Distribution Systems.
CRYPTO 1989: 344-355 |
1987 |
9 | EE | Ernest F. Brickell,
Pil Joong Lee,
Yacov Yacobi:
Secure Audio Teleconference.
CRYPTO 1987: 418-426 |
8 | EE | Yacov Yacobi:
Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme.
CRYPTO 1987: 429-433 |
7 | EE | Ernest F. Brickell,
Yacov Yacobi:
On Privacy Homomorphisms (Extended Abstract).
EUROCRYPT 1987: 117-125 |
1985 |
6 | EE | Shimon Even,
Alan L. Selman,
Yacov Yacobi:
Hard-Core Theorems for Complexity Classes
J. ACM 32(1): 205-217 (1985) |
1984 |
5 | | Shimon Even,
Alan L. Selman,
Yacov Yacobi:
The Complexity of Promise Problems with Applications to Public-Key Cryptography
Information and Control 61(2): 159-173 (1984) |
1982 |
4 | | Alan L. Selman,
Yacov Yacobi:
The Complexity of Promise Problems.
ICALP 1982: 502-509 |
3 | | Shimon Even,
Timothy J. Long,
Yacov Yacobi:
A Note on Deterministic and Nondeterministic Time Complexity
Information and Control 55(1-3): 117-124 (1982) |
1980 |
2 | | Shimon Even,
Yacov Yacobi:
Cryptocomplexity and NP-Completeness.
ICALP 1980: 195-207 |
1 | | Shimon Even,
Yacov Yacobi:
An Observation Concerning the Complexity of Problems with Few Solutions and its Application to Cryptography.
WG 1980: 270-278 |