default search action
Yacov Yacobi
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [i6]Yacov Yacobi:
A Fast Attribute Based Encryption. IACR Cryptol. ePrint Arch. 2016: 304 (2016) - 2010
- [i5]Yacov Yacobi:
Towards a Theory of Trust Based Collaborative Search. IACR Cryptol. ePrint Arch. 2010: 245 (2010) - [i4]Mariusz H. Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi:
Quantifying Trust. IACR Cryptol. ePrint Arch. 2010: 246 (2010)
2000 – 2009
- 2008
- [c28]Yacov Yacobi:
Content identification. Digital Rights Management Workshop 2008: 51-52 - [c27]Yacov Yacobi, Gideon Yaniv:
Counterfeiting and anti-counterfeitingof software and content. Digital Rights Management Workshop 2008: 53-58 - [i3]Yacov Yacobi:
On the economic payoff of forensic systems when used to trace Counterfeited Software and content. IACR Cryptol. ePrint Arch. 2008: 243 (2008) - [i2]Raghav Bhaskar, K. Chandrasekaran, Satyanarayana V. Lokam, Peter L. Montgomery, Ramarathnam Venkatesan, Yacov Yacobi:
On The Diffie-Hellman Assumption. IACR Cryptol. ePrint Arch. 2008: 525 (2008) - 2007
- [c26]Raghav Bhaskar, K. Chandrasekaran, Satyanarayana V. Lokam, Peter L. Montgomery, Ramarathnam Venkatesan, Yacov Yacobi:
Vulnerabilities in Anonymous Credential Systems. STM@ESORICS 2007: 141-148 - 2006
- [c25]Oded Yacobi, Yacov Yacobi:
A New Related Message Attack on RSA. Essays in Memory of Shimon Even 2006: 187-195 - 2005
- [c24]Oded Yacobi, Yacov Yacobi:
A New Related Message Attack on RSA. Public Key Cryptography 2005: 1-8 - 2004
- [j10]Darko Kirovski, Henrique S. Malvar, Yacov Yacobi:
A Dual Watermark-Fingerprint System. IEEE Multim. 11(3): 59-73 (2004) - [j9]Thomas Y. C. Woo, Yacov Yacobi:
Topics in wireless security. IEEE Wirel. Commun. 11(1): 6-7 (2004) - [c23]Yacov Yacobi:
On the economics of anti-counterfeiting. EC 2004: 248-249 - 2002
- [c22]Darko Kirovski, Henrique S. Malvar, Yacov Yacobi:
Multimedia content screening using a dual watermarking and fingerprinting system. ACM Multimedia 2002: 372-381 - [i1]Yacov Yacobi:
A Note on the Bilinear Diffie-Hellman Assumption. IACR Cryptol. ePrint Arch. 2002: 113 (2002) - 2001
- [c21]Yacov Yacobi:
A Few Thoughts on E-Commerce. ACISP 2001: 1-2 - [c20]Yacov Yacobi:
Improved Boneh-Shaw Content Fingerprinting. CT-RSA 2001: 378-391
1990 – 1999
- 1999
- [c19]Yacov Yacobi:
Risk Management for E-Cash Systems with Partial Real-Time Audit. Financial Cryptography 1999: 62-71 - 1998
- [j8]Yacov Yacobi:
Fast Exponentiation Using Data Compression. SIAM J. Comput. 28(2): 700-703 (1998) - 1997
- [j7]Yacov Yacobi, Michael J. Beller:
Batch Diffie-Hellman Key Agreement Systems. J. Cryptol. 10(2): 89-96 (1997) - [c18]Yacov Yacobi:
On the Continuum Between On-line and Off-line E-cash Systems - 1. Financial Cryptography 1997: 193-202 - 1996
- [j6]Ueli M. Maurer, Yacov Yacobi:
A Non-interactive Public-Key Distribution System. Des. Codes Cryptogr. 9(3): 305-316 (1996) - 1995
- [c17]Arjen K. Lenstra, Peter Winkler, Yacov Yacobi:
A Key Escrow System with Warrant Bounds. CRYPTO 1995: 197-207 - 1994
- [c16]Yacov Yacobi:
Efficient Electronic Money (Extended Abstract). ASIACRYPT 1994: 153-163 - 1993
- [j5]Arjen K. Lenstra, Yacov Yacobi:
User Impersonation in Key Certification Schemes. J. Cryptol. 6(4): 225-232 (1993) - [j4]Michael J. Beller, Li-Fung Chang, Yacov Yacobi:
Privacy and Authentication on a Portable Communications System. IEEE J. Sel. Areas Commun. 11(6): 821-829 (1993) - 1992
- [c15]Michael J. Beller, Yacov Yacobi:
Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. EUROCRYPT 1992: 208-220 - [c14]Ueli M. Maurer, Yacov Yacobi:
A Remark on a Non-interactive Public-Key Distribution System. EUROCRYPT 1992: 458-460 - [c13]Michael J. Beller, Li-Fung Chang, Yacov Yacobi:
Security for personal communications services: public-key vs. private key approaches. PIMRC 1992: 26-31 - 1991
- [c12]Yacov Yacobi:
Complexity Theoretic Analysis of Crypto-Protcols - Overview. CSFW 1991: 230-233 - [c11]Ueli M. Maurer, Yacov Yacobi:
Non-interactive Public-Key Cryptography. EUROCRYPT 1991: 498-507 - 1990
- [c10]Yacov Yacobi:
A Key Distribution "Paradox". CRYPTO 1990: 268-273 - [c9]Yacov Yacobi:
Discrete-Log With Compressible Exponents. CRYPTO 1990: 639-643 - [c8]Yacov Yacobi:
Exponentiating Faster with Addition Chains. EUROCRYPT 1990: 222-229
1980 – 1989
- 1989
- [c7]Yacov Yacobi, Zahava Shmuely:
On Key Distribution Systems. CRYPTO 1989: 344-355 - 1987
- [c6]Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi:
Secure Audio Teleconference. CRYPTO 1987: 418-426 - [c5]Yacov Yacobi:
Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme. CRYPTO 1987: 429-433 - [c4]Ernest F. Brickell, Yacov Yacobi:
On Privacy Homomorphisms (Extended Abstract). EUROCRYPT 1987: 117-125 - 1985
- [j3]Shimon Even, Alan L. Selman, Yacov Yacobi:
Hard-Core Theorems for Complexity Classes. J. ACM 32(1): 205-217 (1985) - 1984
- [j2]Shimon Even, Alan L. Selman, Yacov Yacobi:
The Complexity of Promise Problems with Applications to Public-Key Cryptography. Inf. Control. 61(2): 159-173 (1984) - 1982
- [j1]Shimon Even, Timothy J. Long, Yacov Yacobi:
A Note on Deterministic and Nondeterministic Time Complexity. Inf. Control. 55(1-3): 117-124 (1982) - [c3]Alan L. Selman, Yacov Yacobi:
The Complexity of Promise Problems. ICALP 1982: 502-509 - 1980
- [c2]Shimon Even, Yacov Yacobi:
Cryptocomplexity and NP-Completeness. ICALP 1980: 195-207 - [c1]Shimon Even, Yacov Yacobi:
An Observation Concerning the Complexity of Problems with Few Solutions and its Application to Cryptography. WG 1980: 270-278
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint