The following pages link to Yvo G. Desmedt (Q1304978):
Displaying 50 items.
- (Q181993) (redirect page) (← links)
- Walsh transforms and cryptographic applications in bias computing (Q276565) (← links)
- A subexponential construction of graph coloring for multiparty computation (Q490341) (← links)
- A secure and scalable group key exchange system (Q1041738) (← links)
- Divertible and subliminal-free zero-knowledge proofs for languages (Q1304980) (← links)
- A general zero-knowledge scheme (Q1364207) (← links)
- Graph coloring applied to secure computation in non-abelian groups (Q1928772) (← links)
- Edge-colored graphs with applications to homogeneous faults (Q1944099) (← links)
- Access structure hiding secret sharing from novel set systems and vector families (Q2019464) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (Q2267360) (← links)
- Bounds and constructions for key distribution schemes (Q2268257) (← links)
- Index calculation attacks on RSA signature and encryption (Q2491257) (← links)
- (Q2708621) (← links)
- (Q2724601) (← links)
- (Q2757239) (← links)
- What is the Future of Cryptography? (Q2803620) (← links)
- How to share a function securely (Q2817644) (← links)
- Efficient Multiplicative Sharing Schemes (Q2876891) (← links)
- A Brief Survey of Research Jointly with Jean-Jacques Quisquater (Q2889747) (← links)
- Active Security in Multiparty Computation over Black-Box Groups (Q2912815) (← links)
- Human Perfectly Secure Message Transmission Protocols and Their Applications (Q2912818) (← links)
- Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography (Q2953811) (← links)
- Dependence of output on input in DES: Small avalanche characteristics (Q2974491) (← links)
- Redistribution of Mechanical Secret Shares (Q2995373) (← links)
- Homogeneous Faults, Colored Edge Graphs, and Cover Free Families (Q3002102) (← links)
- Pseudo-Cryptanalysis of Luffa (Q3019925) (← links)
- Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments (Q3019928) (← links)
- General Perfectly Secure Message Transmission Using Linear Codes (Q3058672) (← links)
- Improved Distinguishing Attack on Rabbit (Q3073777) (← links)
- Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher (Q3094982) (← links)
- Secure Communication in Multicast Graphs (Q3102209) (← links)
- (Q3211251) (← links)
- Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption (Q3297610) (← links)
- Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing (Q3297627) (← links)
- Realistic versus Rational Secret Sharing (Q3297660) (← links)
- A critical analysis of the security of knapsack public-key algorithms (Q3342451) (← links)
- (Q3358225) (← links)
- (Q3374937) (← links)
- Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes (Q3404418) (← links)
- Secure Protocols with Asymmetric Trust (Q3498386) (← links)
- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders (Q3506898) (← links)
- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring (Q3507885) (← links)
- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng (Q3524132) (← links)
- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes (Q3558311) (← links)
- Revisiting Pairing Based Group Key Exchange (Q3603004) (← links)
- Perfectly Secure Message Transmission Revisited (Q3604420) (← links)
- On Secure Multi-party Computation in Black-Box Groups (Q3612572) (← links)
- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme (Q3728806) (← links)
- Propagation Characteristics of the DES (Q3728807) (← links)