The following pages link to Yvo G. Desmedt (Q1304978):
Displaying 50 items.
- (Q3804605) (← links)
- (Q4035739) (← links)
- (Q4036854) (← links)
- (Q4036855) (← links)
- Broadcast Interactive Proofs (Q4037453) (← links)
- Weaknesses of Undeniable Signature Schemes (Q4037467) (← links)
- Remarks on soundness of proofs (Q4204102) (← links)
- (Q4249281) (← links)
- (Q4249283) (← links)
- (Q4249285) (← links)
- (Q4249634) (← links)
- (Q4250780) (← links)
- (Q4251016) (← links)
- (Q4279572) (← links)
- (Q4279573) (← links)
- (Q4279657) (← links)
- (Q4314043) (← links)
- Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group (Q4317712) (← links)
- (Q4318723) (← links)
- (Q4341667) (← links)
- (Q4341669) (← links)
- (Q4341776) (← links)
- (Q4365747) (← links)
- (Q4375724) (← links)
- (Q4414199) (← links)
- (Q4414289) (← links)
- Computing Functions of a Shared Secret (Q4490789) (← links)
- (Q4500377) (← links)
- (Q4502504) (← links)
- (Q4502506) (← links)
- (Q4737267) (← links)
- (Q4808644) (← links)
- (Q4858454) (← links)
- Cryptanalysis of Secure Message Transmission Protocols with Feedback (Q4931676) (← links)
- (Q4950066) (← links)
- Analytical Characteristics of the DES (Q5019333) (← links)
- Perfect Anonymity (Q5224048) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311548) (← links)
- Advanced Encryption Standard – AES (Q5316679) (← links)
- Unconditionally Secure Approximate Message Authentication (Q5323012) (← links)
- Klein Bottle Routing: An Alternative to Onion Routing and Mix Network (Q5385580) (← links)
- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels (Q5385961) (← links)
- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups (Q5448626) (← links)
- Information Security and Privacy (Q5473571) (← links)
- Information Security (Q5493181) (← links)
- Hybrid Damgård Is CCA1-Secure under the DDH Assumption (Q5502748) (← links)
- A CCA Secure Hybrid Damgård’s ElGamal Encryption (Q5505459) (← links)
- ANALYZING VULNERABILITIES OF CRITICAL INFRASTRUCTURES USING FLOWS AND CRITICAL VERTICES IN AND/OR GRAPHS (Q5696968) (← links)
- Selected Areas in Cryptography (Q5713958) (← links)
- Computing and Combinatorics (Q5716933) (← links)