Yair Frankel

According to our database1, Yair Frankel authored at least 40 papers between 1989 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2002
Adaptively secure distributed public-key systems.
Theor. Comput. Sci., 2002

2001
Adaptive Security for the Additive-Sharing Based Proactive RSA.
Proceedings of the Public Key Cryptography, 2001

Protecting Digital Rights.
Proceedings of the Financial Cryptography, 2001

2000
Exact Analysis of Exact Change: The <i>k</i>-Payment Problem.
SIAM J. Discret. Math., 2000

"Psyeudorandom Intermixing": A Tool for Shared Cryptography.
Proceedings of the Public Key Cryptography, 2000

Electronic payment technologies.
Proceedings of the CCS 2000, 2000

Sharing Block Ciphers.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Existence of Multiplicative Secret Sharing Schemes with Polynomial Share Expansion.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999

Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System.
Proceedings of the Cryptography and Coding, 1999

Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control".
Proceedings of the Financial Cryptography, 1999

Adaptively-Secure Optimal-Resilience Proactive RSA.
Proceedings of the Advances in Cryptology, 1999

1998
Robust Efficient Distributed RSA-Key Generation.
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998

On Enabling Secure Applications Through Off-Line Biometric Identification.
Proceedings of the Security and Privacy, 1998

Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless Systems.
Proceedings of the Security and Privacy, 1998

Distributed Public Key Cryptosystems.
Proceedings of the Public Key Cryptography, 1998

Beyond Identity: Warranty-Based Digital Signature Transactions.
Proceedings of the Financial Cryptography, 1998

Easy Come - Easy Go Divisible Cash.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

How to Say "YES" with Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Fair Off-Line e-cash Made Easy.
Proceedings of the Advances in Cryptology, 1998

An Attack on RSA Given a Small Fraction of the Private Key Bits.
Proceedings of the Advances in Cryptology, 1998

1997
On Characterization of Escrow Encryption Schemes.
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997

Optimal Resilience Proactive Public-Key Cryptosystems.
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997

Anonymity Control in E-Cash Systems.
Proceedings of the Financial Cryptography, 1997

1996
Proactive RSA.
IACR Cryptol. ePrint Arch., 1996

Witness-Based Cryptographic Program Checking and Robust Function Sharing.
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996

Witness-Based Cryptographic Program Checking and Applications (an Announcement).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash.
Proceedings of the Advances in Cryptology, 1996

Mis-representation of Identities in E-cash Schemes and how to Prevent it.
Proceedings of the Advances in Cryptology, 1996

1995
Security issues in a CDPD wireless network.
IEEE Wirel. Commun., 1995

Cryptanalysis of the Immunized LL Public Key Systems.
Proceedings of the Advances in Cryptology, 1995

Escrow Encryption Systems Visited: Attacks, Analysis and Designs.
Proceedings of the Advances in Cryptology, 1995

1994
Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group.
SIAM J. Discret. Math., 1994

How to share a function securely.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994

1992
Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

1991
Shared Generation of Authenticators and Signatures (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991

1989
A Practical Protocol for Large Group Oriented Networks.
Proceedings of the Advances in Cryptology, 1989

Threshold Cryptosystems.
Proceedings of the Advances in Cryptology, 1989


  Loading...