What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yvo Desmedt
Google Scholar
103
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Poster: Byzantine Discrepancy Attacks against Calendar, Set-intersection and Nations.
Yvo Desmedt
Alireza Kavousi
Aydin Abadi
2021
journals/tifs
Framing in Secret Sharing.
Yvo Desmedt
Songbao Mo
Arkadii M. Slinko
2019
conf/iwsec
VSS Made Simpler.
Yvo Desmedt
Kirill Morozov
2019
conf/cans
Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing.
Yvo Desmedt
Sabyasachi Dutta
Kirill Morozov
2019
conf/cans
Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption.
Vipin Singh Sehrawat
Yvo Desmedt
2017
conf/fc
Economically Optimal Variable Tag Length Message Authentication.
Reihaneh Safavi-Naini
Viliam Lisý
Yvo Desmedt
2017
conf/fc
Controlled Homomorphic Encryption: Definition and Construction.
Yvo Desmedt
Vincenzo Iovino
Giuseppe Persiano
Ivan Visconti
2017
conf/cans
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin.
Mayur Punekar
Qutaibah M. Malluhi
Yvo Desmedt
Yongge Wang
2016
conf/ccs
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor.
Yvo Desmedt
Arash Shaghaghi
2013
conf/fc
How to Attack Two-Factor Authentication Internet Banking.
Manal T. Adham
Amir Azodi
Yvo Desmedt
Ioannis Karaolis
2012
journals/joc
Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
Yvo Desmedt
Josef Pieprzyk
Ron Steinfeld
Xiaoming Sun
Christophe Tartary
Huaxiong Wang
Andrew Chi-Chih Yao
2012
conf/esorics
Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System.
Yvo Desmedt
Pyrros Chaidos
2011
conf/ccs
Poster: preliminary analysis of Google+'s privacy.
Shah Mahmood
Yvo Desmedt
2011
conf/asiacrypt
Secure Communication in Multicast Graphs.
Qiushi Yang
Yvo Desmedt
2010
journals/joc
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack.
Yvo Desmedt
Rosario Gennaro
Kaoru Kurosawa
Victor Shoup
2010
conf/uss
Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example.
Saghar Estehghari
Yvo Desmedt
2010
conf/icisc
Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher.
Yi Lu
Yvo Desmedt
2010
conf/asiacrypt
General Perfectly Secure Message Transmission Using Linear Codes.
Qiushi Yang
Yvo Desmedt
2010
conf/africacrypt
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes.
Yvo Desmedt
Stelios Erotokritou
Reihaneh Safavi-Naini
2008
conf/fc
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Jon Callas
Yvo Desmedt
Daniel Nagy
Akira Otsuka
Jean-Jacques Quisquater
Moti Yung
2008
conf/fc
Revisiting Pairing Based Group Key Exchange.
Yvo Desmedt
Tanja Lange
2008
conf/provsec
A CCA Secure Hybrid Damgård's ElGamal Encryption.
Yvo Desmedt
Duong Hieu Phan
2008
conf/cans
Hybrid Damgård Is CCA1-Secure under the DDH Assumption.
Yvo Desmedt
Helger Lipmaa
Duong Hieu Phan
2007
conf/ccs
Unconditionally secure ring authentication.
Reihaneh Safavi-Naini
Shuhong Wang
Yvo Desmedt
2007
conf/crypto
On Secure Multi-party Computation in Black-Box Groups.
Yvo Desmedt
Josef Pieprzyk
Ron Steinfeld
Huaxiong Wang
2007
conf/fc
Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.
Yvo Desmedt
2007
conf/fc
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.
Yvo Desmedt
Tanja Lange
Mike Burmester
2007
conf/ctrsa
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels.
Yvo Desmedt
Goce Jakimoski
2007
conf/asiacrypt
Secure Protocols with Asymmetric Trust.
Ivan Damgård
Yvo Desmedt
Matthias Fitzi
Jesper Buus Nielsen
2006
conf/fc
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng.
Yvo Desmedt
Tanja Lange
2006
conf/icisc
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network.
Kun Peng
Juan Manuel González Nieto
Yvo Desmedt
Ed Dawson
2005
conf/acisp
Potential Impacts of a Growing Gap Between Theory and Practice in Information Security.
Yvo Desmedt
2004
conf/sec
Identity-based Key Infrastructures (IKI).
Yvo Desmedt
Mike Burmester
2004
conf/crypto
A New Paradigm of Hybrid Encryption Scheme.
Kaoru Kurosawa
Yvo Desmedt
2003
conf/sacrypt
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants.
Goce Jakimoski
Yvo Desmedt
2002
journals/istr
Is there a Need for Survivable Computation in Critical Infrastructures?
Yvo Desmedt
2002
conf/fc
Redistribution of Mechanical Secret Shares.
Yvo Desmedt
Reihaneh Safavi-Naini
Huaxiong Wang
2002
conf/ih
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection.
Tri Van Le
Yvo Desmedt
2002
conf/eurocrypt
Perfectly Secure Message Transmission Revisited.
Yvo Desmedt
Yongge Wang
2001
journals/joc
Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question.
Yongge Wang
Yvo Desmedt
2001
conf/pkc
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow.
Yvo Desmedt
Mike Burmester
Jennifer Seberry
2000
conf/ccs
Which PKI (public key infrastructure) is the right one? (panel session).
Carlisle M. Adams
Mike Burmester
Yvo Desmedt
Michael K. Reiter
Philip R. Zimmermann
2000
conf/ccs
Moiré cryptography.
Yvo Desmedt
Tri Van Le
2000
conf/pkc
A Structured ElGamal-Type Multisignature Scheme.
Mike Burmester
Yvo Desmedt
Hiroshi Doi
Masahiro Mambo
Eiji Okamoto
Mitsuru Tada
Yuko Yoshifuji
2000
conf/eurocrypt
How to Break a Practical MIX and Design a New One.
Yvo Desmedt
Kaoru Kurosawa
2000
conf/acsac
Enabling Secure On-Line DNS Dynamic Update.
Xunhua Wang
Yih Huang
Yvo Desmedt
David Rine
1999
journals/joc
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages.
Mike Burmester
Yvo Desmedt
Toshiya Itoh
Kouichi Sakurai
Hiroki Shizuya
1999
conf/ih
Nonbinary Audio Cryptography.
Yvo Desmedt
Tri Van Le
Jean-Jacques Quisquater
1999
conf/eurocrypt
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question.
Yongge Wang
Yvo Desmedt
1999
conf/asiacrypt
Secure Communication in an Unknown Network Using Certificates.
Mike Burmester
Yvo Desmedt
1999
conf/asiacrypt
Approximation Hardness and Secure Communication in Broadcast Channels.
Yvo Desmedt
Yongge Wang
1998
conf/acisp
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group.
Yvo Desmedt
Brian King
Wataru Kishimoto
Kaoru Kurosawa
1998
conf/ih
Cerebral Cryptography.
Yvo Desmedt
Shuang Hou
Jean-Jacques Quisquater
1998
conf/eurocrypt
Optimum Traitor Tracing and Asymmetric Schemes.
Kaoru Kurosawa
Yvo Desmedt
1998
conf/asiacrypt
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically).
Mike Burmester
Yvo Desmedt
Jennifer Seberry
1998
conf/asiacrypt
Some Bounds and a Construction for Secure Broadcast Encryption.
Kaoru Kurosawa
Takuya Yoshida
Yvo Desmedt
Mike Burmester
1998
conf/asiacrypt
Audio and Optical Cryptography.
Yvo Desmedt
Shuang Hou
Jean-Jacques Quisquater
1996
conf/ih
A Progress Report on Subliminal-Free Channels.
Mike Burmester
Yvo Desmedt
Toshiya Itoh
Kouichi Sakurai
Hiroki Shizuya
Moti Yung
1996
conf/ih
Establishing Big Broth Using Covert Channals and Other Covert Techniques.
Yvo Desmedt
1996
conf/eurocrypt
Efficient Multiplicative Sharing Schemes.
Simon R. Blackburn
Mike Burmester
Yvo Desmedt
Peter R. Wild
1995
conf/eurocrypt
Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract).
Yvo Desmedt
1994
conf/eurocrypt
A Secure and Efficient Conference Key Distribution System (Extended Abstract).
Mike Burmester
Yvo Desmedt
1994
conf/asiacrypt
Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography.
Yvo Desmedt
Giovanni Di Crescenzo
Mike Burmester
1993
conf/ccs
Towards Practical "Proven Secure" Authenticated Key Distribution.
Yvo Desmedt
Mike Burmester
1993
conf/nspw
Computer security by redefining what a computer is.
Yvo Desmedt
1992
journals/compsec
Passports and visas versus IDs.
George I. Davida
Yvo Desmedt
1992
conf/crypto
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract).
Yair Frankel
Yvo Desmedt
Mike Burmester
1992
conf/esorics
Breaking the Traditional Computer Security Barriers.
Yvo Desmedt
1992
conf/eurocrypt
Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract).
Yair Frankel
Yvo Desmedt
1992
conf/eurocrypt
The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel).
Yvo Desmedt
Peter Landrock
Arjen K. Lenstra
Kevin S. McCurley
Andrew M. Odlyzko
Rainer A. Rueppel
Miles E. Smid
1992
conf/asiacrypt
Treshold Cryptosystems (invited talk).
Yvo Desmedt
1992
conf/asiacrypt
Practical Proven Secure Authentication with Arbitration.
Yvo Desmedt
Jennifer Seberry
1991
journals/joc
Secure Implementations of Identification Systems.
Samy Bengio
Gilles Brassard
Yvo Desmedt
Claude Goutier
Jean-Jacques Quisquater
1991
conf/crypto
Shared Generation of Authenticators and Signatures (Extended Abstract).
Yvo Desmedt
Yair Frankel
1991
conf/eurocrypt
Broadcast Interactive Proofs (Extended Abstract).
Mike Burmester
Yvo Desmedt
1991
conf/eurocrypt
Weakness of Undeniable Signature Schemes (Extended Abstract).
Yvo Desmedt
Moti Yung
1991
conf/asiacrypt
An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers.
Yvo Desmedt
Mike Burmester
1990
conf/crypto
Identification Tokens - or: Solving the Chess Grandmaster Problem.
Thomas Beth
Yvo Desmedt
1990
conf/crypto
Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract).
Yvo Desmedt
Moti Yung
1990
conf/eurocrypt
On the Importance of Memory Resources in the Security of Key Exchange Protocols.
George I. Davida
Yvo Desmedt
René Peralta
1989
conf/crypto
Threshold Cryptosystems.
Yvo Desmedt
Yair Frankel
1989
conf/crypto
Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context.
Yvo Desmedt
1989
conf/sp
Defending Systems against Viruses through Cryptographic Authentication.
George I. Davida
Yvo Desmedt
Brian J. Matt
1989
conf/eurocrypt
A Key Distribution System Based On Any One-Way Function (Extended Abstract).
George I. Davida
Yvo Desmedt
René Peralta
1989
conf/eurocrypt
A General Zero-Knowledge Scheme (Extended Abstract).
Mike Burmester
Yvo Desmedt
Fred Piper
Michael Walker
1988
conf/crypto
Abuses in Cryptography and How to Fight Them.
Yvo Desmedt
1988
conf/eurocrypt
Subliminal-Free Authentication and Signature (Extended Abstract).
Yvo Desmedt
1988
conf/eurocrypt
Passports and Visas Versus IDS (Extended Abstract).
George I. Davida
Yvo Desmedt
1987
conf/crypto
Special Uses and Abuses of the Fiat-Shamir Passport Protocol.
Yvo Desmedt
Claude Goutier
Samy Bengio
1987
conf/crypto
Society and Group Oriented Cryptography: A New Concept.
Yvo Desmedt
1986
conf/crypto
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?).
Yvo Desmedt
Jean-Jacques Quisquater
1986
conf/crypto
Is There an ultimate Use of Cryptography?
Yvo Desmedt
1986
conf/eurocrypt
Several Exhaustive Key Search Machines and DES.
Yvo Desmedt
Frank Hoornaert
Jean-Jacques Quisquater
1986
conf/eurocrypt
Additional Properties in the S-Boxes of the DES.
Henri Cloetens
Yvo Desmedt
Luc Bierens
Joos Vandewalle
René Govaerts
1985
conf/crypto
A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes.
Yvo Desmedt
Andrew M. Odlyzko
1985
conf/crypto
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys).
Jean-Jacques Quisquater
Yvo Desmedt
Marc Davio
1985
conf/crypto
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences.
Yvo Desmedt
1984
conf/crypto
Dependence of Output on Input in DES: Small Avalanche Characteristics.
Yvo Desmedt
Jean-Jacques Quisquater
Marc Davio
1984
conf/crypto
Efficient Hardware and Software Implementations for the DES.
Marc Davio
Yvo Desmedt
Jo Goubert
Frank Hoornaert
Jean-Jacques Quisquater
1984
conf/crypto
Efficient Hardware Implementation of the DES.
Frank Hoornaert
Jo Goubert
Yvo Desmedt
1984
conf/eurocrypt
Propagation Characteristics of the DES.
Marc Davio
Yvo Desmedt
Jean-Jacques Quisquater
1984
conf/eurocrypt
Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme.
Philippe Delsarte
Yvo Desmedt
Andrew M. Odlyzko
Philippe Piret
1983
conf/crypto
Analytical Characteristics of the DES.
Marc Davio
Yvo Desmedt
Marc Fosseprez
René Govaerts
Jan Hulsbosch
Patrik Neutjens
Philippe Piret
Jean-Jacques Quisquater
Joos Vandewalle
Pascal Wouters
Coauthors
Akira Otsuka
(1)
Alireza Kavousi
(1)
Amir Azodi
(1)
Andrew Chi-Chih Yao
(1)
Andrew M. Odlyzko
(3)
Arash Shaghaghi
(1)
Arjen K. Lenstra
(1)
Arkadii M. Slinko
(1)
Aydin Abadi
(1)
Brian J. Matt
(1)
Brian King
(1)
Carlisle M. Adams
(1)
Christophe Tartary
(1)
Claude Goutier
(2)
Daniel Nagy
(1)
David Rine
(1)
Duong Hieu Phan
(2)
Ed Dawson
(1)
Eiji Okamoto
(1)
Frank Hoornaert
(3)
Fred Piper
(1)
George I. Davida
(5)
Gilles Brassard
(1)
Giovanni Di Crescenzo
(1)
Giuseppe Persiano
(1)
Goce Jakimoski
(2)
Helger Lipmaa
(1)
Henri Cloetens
(1)
Hiroki Shizuya
(2)
Hiroshi Doi
(1)
Huaxiong Wang
(3)
Ioannis Karaolis
(1)
Ivan Damgård
(1)
Ivan Visconti
(1)
Jan Hulsbosch
(1)
Jean-Jacques Quisquater
(12)
Jennifer Seberry
(3)
Jesper Buus Nielsen
(1)
Jo Goubert
(2)
Jon Callas
(1)
Joos Vandewalle
(2)
Josef Pieprzyk
(2)
Juan Manuel González Nieto
(1)
Kaoru Kurosawa
(6)
Kevin S. McCurley
(1)
Kirill Morozov
(2)
Kouichi Sakurai
(2)
Kun Peng
(1)
Luc Bierens
(1)
Manal T. Adham
(1)
Marc Davio
(5)
Marc Fosseprez
(1)
Masahiro Mambo
(1)
Matthias Fitzi
(1)
Mayur Punekar
(1)
Michael K. Reiter
(1)
Michael Walker
(1)
Mike Burmester
(18)
Miles E. Smid
(1)
Mitsuru Tada
(1)
Moti Yung
(4)
Pascal Wouters
(1)
Patrik Neutjens
(1)
Peter Landrock
(1)
Peter R. Wild
(1)
Philip R. Zimmermann
(1)
Philippe Delsarte
(1)
Philippe Piret
(2)
Pyrros Chaidos
(1)
Qiushi Yang
(2)
Qutaibah M. Malluhi
(1)
Rainer A. Rueppel
(1)
Reihaneh Safavi-Naini
(4)
René Govaerts
(2)
René Peralta
(2)
Ron Steinfeld
(2)
Rosario Gennaro
(1)
Sabyasachi Dutta
(1)
Saghar Estehghari
(1)
Samy Bengio
(2)
Shah Mahmood
(1)
Shuang Hou
(2)
Shuhong Wang
(1)
Simon R. Blackburn
(1)
Songbao Mo
(1)
Stelios Erotokritou
(1)
Takuya Yoshida
(1)
Tanja Lange
(3)
Thomas Beth
(1)
Toshiya Itoh
(2)
Tri Van Le
(3)
Victor Shoup
(1)
Viliam Lisý
(1)
Vincenzo Iovino
(1)
Vipin Singh Sehrawat
(1)
Wataru Kishimoto
(1)
Xiaoming Sun
(1)
Xunhua Wang
(1)
Yair Frankel
(4)
Yi Lu
(1)
Yih Huang
(1)
Yongge Wang
(5)
Yuko Yoshifuji
(1)
Yvo Desmedt
(103)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to