Yvo Desmedt

From MaRDI portal
(Redirected from Person:1304978)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
VSS Made Simpler
 
2024-03-14Paper
Cryptologists should not ignore the history of Al-Andalusia
Codes, Cryptology and Information Security
2023-10-04Paper
Computational aspects of ideal \((t, n)\)-threshold scheme of Chen, Laing, and Martin
Cryptology and Network Security
2023-08-02Paper
Analytical characteristics of the DES
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
2022-01-08Paper
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
Theoretical Computer Science
2021-10-06Paper
Access structure hiding secret sharing from novel set systems and vector families
 
2021-04-21Paper
Breaking the traditional computer security research barriers
Computer Security — ESORICS 92
2021-04-07Paper
Economically optimal variable tag length message authentication
Financial Cryptography and Data Security
2021-03-17Paper
Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious-Majority and Free Verification
 
2020-11-30Paper
Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption
Cryptology and Network Security
2020-07-20Paper
Evolving perfect hash families: a combinatorial viewpoint of evolving secret sharing
Cryptology and Network Security
2020-07-20Paper
Realistic versus rational secret sharing
Lecture Notes in Computer Science
2020-07-20Paper
Perfect anonymity
IEEE Transactions on Information Theory
2019-07-19Paper
Dependence of output on input in DES: small avalanche characteristics
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
2017-04-10Paper
Private visual share-homomorphic computation and randomness reduction in visual cryptography
Lecture Notes in Computer Science
2017-01-06Paper
How to share a function securely
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94
2016-09-01Paper
Walsh transforms and cryptographic applications in bias computing
Cryptography and Communications
2016-05-04Paper
What is the Future of Cryptography?
The New Codebreakers
2016-05-02Paper
A subexponential construction of graph coloring for multiparty computation
Journal of Mathematical Cryptology
2015-01-22Paper
Efficient Multiplicative Sharing Schemes
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Edge-colored graphs with applications to homogeneous faults
Information Processing Letters
2013-04-04Paper
Graph coloring applied to secure computation in non-abelian groups
Journal of Cryptology
2013-01-04Paper
Active security in multiparty computation over black-box groups
Lecture Notes in Computer Science
2012-09-25Paper
Human Perfectly Secure Message Transmission Protocols and Their Applications
Lecture Notes in Computer Science
2012-09-25Paper
A Brief Survey of Research Jointly with Jean-Jacques Quisquater
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Secure communication in multicast graphs
Lecture Notes in Computer Science
2011-12-02Paper
Bias analysis of a certain problem with applications to E0 and Shannon cipher
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Redesigning group key exchange protocol based on bilinear pairing suitable for various environ\-ments
Information Security and Cryptology
2011-07-29Paper
Pseudo-cryptanalysis of Luffa
Information Security and Cryptology
2011-07-29Paper
Homogeneous faults, colored edge graphs, and cover free families
Lecture Notes in Computer Science
2011-05-19Paper
Redistribution of mechanical secret shares
Financial Cryptography
2011-04-20Paper
Improved distinguishing attack on Rabbit
Lecture Notes in Computer Science
2011-02-11Paper
General perfectly secure message transmission using linear codes
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Cryptanalysis of secure message transmission protocols with feedback
Lecture Notes in Computer Science
2010-09-29Paper
Simple and communication complexity efficient almost secure and perfectly secure message transmission schemes
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Bounds and constructions for key distribution schemes
Advances in Mathematics of Communications
2010-03-10Paper
A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack
Journal of Cryptology
2010-03-01Paper
Error correcting and complexity aspects of linear secret sharing schemes
Lecture Notes in Computer Science
2010-02-09Paper
A secure and scalable group key exchange system
Information Processing Letters
2009-12-04Paper
Unconditionally Secure Approximate Message Authentication
Lecture Notes in Computer Science
2009-07-23Paper
On Secure Multi-party Computation in Black-Box Groups
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Perfectly Secure Message Transmission Revisited
IEEE Transactions on Information Theory
2009-02-24Paper
Revisiting Pairing Based Group Key Exchange
Financial Cryptography and Data Security
2009-02-12Paper
A CCA Secure Hybrid Damgård’s ElGamal Encryption
Provable Security
2009-01-27Paper
Hybrid Damgård Is CCA1-Secure under the DDH Assumption
Cryptology and Network Security
2009-01-09Paper
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng
Financial Cryptography and Data Security
2008-09-09Paper
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring
Lecture Notes in Computer Science
2008-06-24Paper
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders
Lecture Notes in Computer Science
2008-06-17Paper
Secure Protocols with Asymmetric Trust
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels
Lecture Notes in Computer Science
2008-04-17Paper
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Financial Cryptography and Data Security
2008-03-07Paper
Algorithms and Computation
Lecture Notes in Computer Science
2006-11-14Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Index calculation attacks on RSA signature and encryption
Designs, Codes and Cryptography
2006-05-29Paper
How to break a practical MIX and design a new one
 
2006-03-01Paper
Computing and Combinatorics
Lecture Notes in Computer Science
2006-01-11Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
ANALYZING VULNERABILITIES OF CRITICAL INFRASTRUCTURES USING FLOWS AND CRITICAL VERTICES IN AND/OR GRAPHS
International Journal of Foundations of Computer Science
2005-10-19Paper
Advanced Encryption Standard – AES
Lecture Notes in Computer Science
2005-09-14Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 2089979 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 2086727 (Why is no real title available?)
 
2004-08-11Paper
Secure communication in multicast channels: The answer to Franklin and Wright's question
Journal of Cryptology
2003-12-21Paper
scientific article; zbMATH DE number 1952907 (Why is no real title available?)
 
2003-07-24Paper
scientific article; zbMATH DE number 1952757 (Why is no real title available?)
 
2003-07-23Paper
scientific article; zbMATH DE number 1618055 (Why is no real title available?)
 
2002-05-05Paper
scientific article; zbMATH DE number 1676639 (Why is no real title available?)
 
2001-11-25Paper
scientific article; zbMATH DE number 1588474 (Why is no real title available?)
 
2001-07-13Paper
scientific article; zbMATH DE number 1302809 (Why is no real title available?)
 
2001-03-18Paper
scientific article; zbMATH DE number 1504555 (Why is no real title available?)
 
2000-09-12Paper
scientific article; zbMATH DE number 1504553 (Why is no real title available?)
 
2000-09-12Paper
scientific article; zbMATH DE number 1501630 (Why is no real title available?)
 
2000-09-04Paper
Computing Functions of a Shared Secret
SIAM Journal on Discrete Mathematics
2000-07-20Paper
scientific article; zbMATH DE number 697826 (Why is no real title available?)
 
2000-06-21Paper
scientific article; zbMATH DE number 1440075 (Why is no real title available?)
 
2000-05-07Paper
scientific article; zbMATH DE number 1304089 (Why is no real title available?)
 
2000-03-07Paper
scientific article; zbMATH DE number 1302808 (Why is no real title available?)
 
1999-10-06Paper
Divertible and subliminal-free zero-knowledge proofs for languages
Journal of Cryptology
1999-09-22Paper
scientific article; zbMATH DE number 1303119 (Why is no real title available?)
 
1999-09-09Paper
scientific article; zbMATH DE number 1302811 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1304291 (Why is no real title available?)
 
1999-06-17Paper
A general zero-knowledge scheme
Designs, Codes and Cryptography
1998-12-28Paper
scientific article; zbMATH DE number 1113955 (Why is no real title available?)
 
1998-07-19Paper
scientific article; zbMATH DE number 1088922 (Why is no real title available?)
 
1998-01-26Paper
scientific article; zbMATH DE number 1024082 (Why is no real title available?)
 
1997-10-06Paper
scientific article; zbMATH DE number 1023996 (Why is no real title available?)
 
1997-08-10Paper
scientific article; zbMATH DE number 1023994 (Why is no real title available?)
 
1997-08-10Paper
scientific article; zbMATH DE number 826068 (Why is no real title available?)
 
1995-12-13Paper
scientific article; zbMATH DE number 708831 (Why is no real title available?)
 
1995-04-04Paper
Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group
SIAM Journal on Discrete Mathematics
1994-12-20Paper
scientific article; zbMATH DE number 503324 (Why is no real title available?)
 
1994-03-10Paper
scientific article; zbMATH DE number 503250 (Why is no real title available?)
 
1994-03-07Paper
scientific article; zbMATH DE number 503249 (Why is no real title available?)
 
1994-03-07Paper
scientific article; zbMATH DE number 176567 (Why is no real title available?)
 
1993-05-18Paper
Weaknesses of Undeniable Signature Schemes
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 177019 (Why is no real title available?)
 
1993-05-18Paper
Broadcast Interactive Proofs
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 177018 (Why is no real title available?)
 
1993-05-18Paper
scientific article; zbMATH DE number 4211486 (Why is no real title available?)
 
1990-01-01Paper
scientific article; zbMATH DE number 4191562 (Why is no real title available?)
 
1990-01-01Paper
Remarks on soundness of proofs
Electronics Letters
1989-01-01Paper
scientific article; zbMATH DE number 4072863 (Why is no real title available?)
 
1988-01-01Paper
Propagation Characteristics of the DES
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
1985-01-01Paper
Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
1985-01-01Paper
A critical analysis of the security of knapsack public-key algorithms
IEEE Transactions on Information Theory
1984-01-01Paper


Research outcomes over time


This page was built for person: Yvo Desmedt