Yvo Desmedt
Orcid: 0000-0002-6679-7484Affiliations:
- University College London, UK
According to our database1,
Yvo Desmedt
authored at least 217 papers
between 1983 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Poster: Byzantine Discrepancy Attacks against Calendar, Set-intersection and Nations.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the Codes, Cryptology and Information Security, 2023
2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
2021
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification.
Theor. Comput. Sci., 2021
2020
Proceedings of the Computing and Combinatorics - 26th International Conference, 2020
2019
Proceedings of the Advances in Information and Computer Security, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations.
Proceedings of the From Database to Cyber Security, 2018
2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures.
Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Cryptogr. Commun., 2016
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
2015
Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols.
Proceedings of the E-Voting and Identity - 5th International Conference, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
2014
J. Math. Cryptol., 2014
IACR Cryptol. ePrint Arch., 2014
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions.
Proceedings of the Security Protocols XXII, 2014
Proceedings of the 2014 IEEE Information Theory Workshop, 2014
2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
2012
J. Cryptol., 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Inf. Process. Lett., 2011
Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack.
J. Cryptol., 2010
Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010
Proceedings of the Proceedings 11th ACM Conference on Electronic Commerce (EC-2010), 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes.
Proceedings of the Progress in Cryptology, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels.
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Advances in Cryptology, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Des. Codes Cryptogr., 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Critical Information Infrastructures Security, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Security Protocols, 2005
Proceedings of the Information Security, 8th International Conference, 2005
A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback.
Proceedings of the Algorithms and Computation, 16th International Symposium, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005
Potential Impacts of a Growing Gap Between Theory and Practice in Information Security.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs.
Int. J. Found. Comput. Sci., 2004
Commun. ACM, 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004
2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
Inf. Secur. Tech. Rep., 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the Electronic Government, First International Conference, 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002
2001
Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question.
J. Cryptol., 2001
Proceedings of the Public Key Cryptography, 2001
2000
Fundam. Informaticae, 2000
Future Gener. Comput. Syst., 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the CCS 2000, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
J. Cryptol., 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
Proceedings of the IEEE International Conference on Networks 1999, 1999
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question.
Proceedings of the Advances in Cryptology, 1999
Verifiable Democracy.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Algorithms and Theory of Computation Handbook., 1999
Proceedings of the Algorithms and Theory of Computation Handbook., 1999
1998
Proceedings of the Randomization and Approximation Techniques in Computer Science, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically).
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Proceedings of the Information Security, First International Workshop, 1997
1996
Proceedings of the Security Protocols, 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996
1995
Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract).
Proceedings of the Advances in Cryptology, 1995
1994
SIAM J. Discret. Math., 1994
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994
Proceedings of the Advances in Cryptology, 1994
Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993
Proceedings of the CCS '93, 1993
1992
Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992
Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token.
Proceedings of the Education and Society, 1992
Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Computer Security, 1992
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers.
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990
Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract).
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context.
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the Advances in Cryptology, 1988
Proceedings of the Advances in Cryptology, 1988
Proceedings of the Advances in Cryptology, 1988
1987
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987
1986
Several Exhaustive Key Search Machines and DES.
EUROCRYPT, 1986
Additional Properties in the S-Boxes of the DES.
EUROCRYPT, 1986
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?).
Proceedings of the Advances in Cryptology, 1986
Proceedings of the Advances in Cryptology, 1986
1985
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys).
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Advances in Cryptology, 1985
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences.
Proceedings of the Advances in Cryptology, 1985
1984
IEEE Trans. Inf. Theory, 1984
Cryptography: How to Attack, What to Protect?
Proceedings of the IEEE International Conference on Communications: Links for the Future, 1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984
Proceedings of the Advances in Cryptology, 1984
Proceedings of the Advances in Cryptology, 1984
Proceedings of the Advances in Cryptology, 1984
1983
Analytical Characteristics of the DES.
Proceedings of the Advances in Cryptology, 1983