| 2008 |
| 36 | EE | Yacov Yacobi:
Content identification.
Digital Rights Management Workshop 2008: 51-52 |
| 35 | EE | Yacov Yacobi,
Gideon Yaniv:
Counterfeiting and anti-counterfeitingof software and content.
Digital Rights Management Workshop 2008: 53-58 |
| 34 | EE | Raghav Bhaskar,
K. Chandrasekaran,
Satyanarayana V. Lokam,
P. L. Montgomery,
R. Venkatesan,
Yacov Yacobi:
Vulnerabilities in Anonymous Credential Systems.
Electr. Notes Theor. Comput. Sci. 197(2): 141-148 (2008) |
| 2006 |
| 33 | EE | Oded Yacobi,
Yacov Yacobi:
A New Related Message Attack on RSA.
Essays in Memory of Shimon Even 2006: 187-195 |
| 2005 |
| 32 | EE | Oded Yacobi,
Yacov Yacobi:
A New Related Message Attack on RSA.
Public Key Cryptography 2005: 1-8 |
| 2004 |
| 31 | EE | Yacov Yacobi:
On the economics of anti-counterfeiting.
ACM Conference on Electronic Commerce 2004: 248-249 |
| 30 | EE | Darko Kirovski,
Henrique S. Malvar,
Yacov Yacobi:
A Dual Watermark-Fingerprint System.
IEEE MultiMedia 11(3): 59-73 (2004) |
| 2002 |
| 29 | EE | Darko Kirovski,
Henrique S. Malvar,
Yacov Yacobi:
Multimedia content screening using a dual watermarking and fingerprinting system.
ACM Multimedia 2002: 372-381 |
| 2001 |
| 28 | EE | Yacov Yacobi:
A Few Thoughts on E-Commerce.
ACISP 2001: 1-2 |
| 27 | EE | Yacov Yacobi:
Improved Boneh-Shaw Content Fingerprinting.
CT-RSA 2001: 378-391 |
| 1999 |
| 26 | EE | Yacov Yacobi:
Risk Management for E-Cash Systems with Partial Real-Time Audit.
Financial Cryptography 1999: 62-71 |
| 1998 |
| 25 | | Yacov Yacobi:
Fast Exponentiation Using Data Compression.
SIAM J. Comput. 28(2): 700-703 (1998) |
| 1997 |
| 24 | | Yacov Yacobi:
On the Continuum Between On-line and Off-line E-cash Systems - 1.
Financial Cryptography 1997: 193-202 |
| 23 | | Yacov Yacobi,
Michael J. Beller:
Batch Diffie-Hellman Key Agreement Systems.
J. Cryptology 10(2): 89-96 (1997) |
| 1996 |
| 22 | | Ueli M. Maurer,
Yacov Yacobi:
A Non-interactive Public-Key Distribution System.
Des. Codes Cryptography 9(3): 305-316 (1996) |
| 1995 |
| 21 | EE | Arjen K. Lenstra,
Peter Winkler,
Yacov Yacobi:
A Key Escrow System with Warrant Bounds.
CRYPTO 1995: 197-207 |
| 1994 |
| 20 | | Yacov Yacobi:
Efficient Electronic Money (Extended Abstract).
ASIACRYPT 1994: 153-163 |
| 1993 |
| 19 | | Michael J. Beller,
Li-Fung Chang,
Yacov Yacobi:
Privacy and Authentication on a Portable Communications System.
IEEE Journal on Selected Areas in Communications 11(6): 821-829 (1993) |
| 18 | | Arjen K. Lenstra,
Yacov Yacobi:
User Impersonation in Key Certification Schemes.
J. Cryptology 6(4): 225-232 (1993) |
| 1992 |
| 17 | EE | Michael J. Beller,
Yacov Yacobi:
Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications.
EUROCRYPT 1992: 208-220 |
| 16 | EE | Ueli M. Maurer,
Yacov Yacobi:
A Remark on a Non-interactive Public-Key Distribution System.
EUROCRYPT 1992: 458-460 |
| 1991 |
| 15 | | Yacov Yacobi:
Complexity Theoretic Analysis of Crypto-Protcols - Overview.
CSFW 1991: 230-233 |
| 14 | EE | Ueli M. Maurer,
Yacov Yacobi:
Non-interactive Public-Key Cryptography.
EUROCRYPT 1991: 498-507 |
| 1990 |
| 13 | EE | Yacov Yacobi:
A Key Distribution "Paradox".
CRYPTO 1990: 268-273 |
| 12 | EE | Yacov Yacobi:
Discrete-Log With Compressible Exponents.
CRYPTO 1990: 639-643 |
| 11 | EE | Yacov Yacobi:
Exponentiating Faster with Addition Chains.
EUROCRYPT 1990: 222-229 |
| 1989 |
| 10 | EE | Yacov Yacobi,
Zahava Shmuely:
On Key Distribution Systems.
CRYPTO 1989: 344-355 |
| 1987 |
| 9 | EE | Ernest F. Brickell,
Pil Joong Lee,
Yacov Yacobi:
Secure Audio Teleconference.
CRYPTO 1987: 418-426 |
| 8 | EE | Yacov Yacobi:
Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme.
CRYPTO 1987: 429-433 |
| 7 | EE | Ernest F. Brickell,
Yacov Yacobi:
On Privacy Homomorphisms (Extended Abstract).
EUROCRYPT 1987: 117-125 |
| 1985 |
| 6 | EE | Shimon Even,
Alan L. Selman,
Yacov Yacobi:
Hard-Core Theorems for Complexity Classes
J. ACM 32(1): 205-217 (1985) |
| 1984 |
| 5 | | Shimon Even,
Alan L. Selman,
Yacov Yacobi:
The Complexity of Promise Problems with Applications to Public-Key Cryptography
Information and Control 61(2): 159-173 (1984) |
| 1982 |
| 4 | | Alan L. Selman,
Yacov Yacobi:
The Complexity of Promise Problems.
ICALP 1982: 502-509 |
| 3 | | Shimon Even,
Timothy J. Long,
Yacov Yacobi:
A Note on Deterministic and Nondeterministic Time Complexity
Information and Control 55(1-3): 117-124 (1982) |
| 1980 |
| 2 | | Shimon Even,
Yacov Yacobi:
Cryptocomplexity and NP-Completeness.
ICALP 1980: 195-207 |
| 1 | | Shimon Even,
Yacov Yacobi:
An Observation Concerning the Complexity of Problems with Few Solutions and its Application to Cryptography.
WG 1980: 270-278 |