Name
Papers
Collaborators
YAIR FRANKEL
39
23
Citations 
PageRank 
Referers 
1308
147.78
1671
Referees 
References 
261
413
Search Limit
1001000
Title
Citations
PageRank
Year
Efficient encryption and storage of close distance messages with applications to cloud storage00.342012
Adaptively secure distributed public-key systems231.112002
Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings212.982002
Adaptive Security for the Additive-Sharing Based Proactive RSA170.722001
Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings334.872001
Protecting Digital Rights00.342001
Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings173.992001
Sharing Block Ciphers121.522000
Exact Analysis of Exact Change: The k-Payment Problem10.772000
"Psyeudorandom Intermixing": A Tool for Shared Cryptography20.402000
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control"20.381999
Existence of multiplicative secret sharing schemes with polynomial share expansion10.431999
Adaptively-Secure Optimal-Resilience Proactive RSA220.911999
Adaptively-secure distributed public-key systems20.361999
On Enabling Secure Applications Through Off-Line Biometric Identification.16828.621998
Easy Come - Easy Go Divisible Cash1026.861998
Distributed Public Key Cryptosystems120.871998
Fair Off-Line e-cash Made Easy381.441998
Efficient key distribution for slow computing devices: achieving fast over the air activation for wireless systems30.691998
An Attack on RSA Given a Small Fraction of the Private Key Bits865.831998
How to Say "YES" with Smart Cards00.341998
Robust efficient distributed RSA-key generation746.961998
Beyond Identity: Warranty-Based Digital Signature Transactions20.501998
On Characterization of Escrow Encryption Schemes30.581997
Exact Analysis of Exact Change20.691997
Anonymity Control in E-Cash Systems543.081997
Proactive RSA.799.721997
Mis-representation of Identities in E-cash Schemes and how to Prevent it121.301996
Witness-based cryptographic program checking and applications (an announcement)52.971996
"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash835.681996
Witness-based cryptographic program checking and robust function sharing417.051996
Escrow Encryption Systems Visited: Attacks, Analysis and Designs342.961995
Cryptoanalysis of the Immunized LL Public Key Systems71.581995
Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group503.351994
How to share a function securely14620.081994
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract)70.641992
Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract)10.371992
Shared Generation of Authenticators and Signatures (Extended Abstract)988.511991
A practical protocol for large group oriented networks487.981989