BibTeX records: Yvo Desmedt

download as .bib file

@inproceedings{DBLP:conf/c2si/Desmedt23,
  author       = {Yvo Desmedt},
  editor       = {Said El Hajji and
                  Sihem Mesnager and
                  El Mamoun Souidi},
  title        = {Cryptologists Should Not Ignore the History of Al-Andalusia},
  booktitle    = {Codes, Cryptology and Information Security - 4th International Conference,
                  {C2SI} 2023, Rabat, Morocco, May 29-31, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13874},
  pages        = {3--9},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33017-9\_1},
  doi          = {10.1007/978-3-031-33017-9\_1},
  timestamp    = {Fri, 26 May 2023 22:27:21 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/Desmedt23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChiapputoDM23,
  author       = {Nicolas Chiapputo and
                  Yvo Desmedt and
                  Kirill Morozov},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Using Untrusted and Unreliable Cloud Providers to Obtain Private Email},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {171--182},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012090700003555},
  doi          = {10.5220/0012090700003555},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChiapputoDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Desmedt22,
  author       = {Yvo Desmedt},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position
                  Paper)},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {436--442},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328800003283},
  doi          = {10.5220/0011328800003283},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Desmedt22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SehrawatYD21,
  author       = {Vipin Singh Sehrawat and
                  Foo Yee Yeo and
                  Yvo Desmedt},
  title        = {Extremal set theory and {LWE} based access structure hiding verifiable
                  secret sharing with malicious-majority and free verification},
  journal      = {Theor. Comput. Sci.},
  volume       = {886},
  pages        = {106--138},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.07.022},
  doi          = {10.1016/J.TCS.2021.07.022},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/SehrawatYD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DesmedtMS21,
  author       = {Yvo Desmedt and
                  Songbao Mo and
                  Arkadii M. Slinko},
  title        = {Framing in Secret Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {2836--2842},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3067468},
  doi          = {10.1109/TIFS.2021.3067468},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DesmedtMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/SehrawatD20,
  author       = {Vipin Singh Sehrawat and
                  Yvo Desmedt},
  editor       = {Donghyun Kim and
                  R. N. Uma and
                  Zhipeng Cai and
                  Dong Hoon Lee},
  title        = {Access Structure Hiding Secret Sharing from Novel Set Systems and
                  Vector Families},
  booktitle    = {Computing and Combinatorics - 26th International Conference, {COCOON}
                  2020, Atlanta, GA, USA, August 29-31, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12273},
  pages        = {246--261},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58150-3\_20},
  doi          = {10.1007/978-3-030-58150-3\_20},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/SehrawatD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-07969,
  author       = {Vipin Singh Sehrawat and
                  Yvo Desmedt},
  title        = {Access Structure Hiding Secret Sharing from Novel Set Systems and
                  Vector Families},
  journal      = {CoRR},
  volume       = {abs/2008.07969},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.07969},
  eprinttype    = {arXiv},
  eprint       = {2008.07969},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-07969.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-14804,
  author       = {Vipin Singh Sehrawat and
                  Foo Yee Yeo and
                  Yvo Desmedt},
  title        = {Extremal Set Theory and {LWE} Based Access Structure Hiding Verifiable
                  Secret Sharing with Malicious Majority and Free Verification},
  journal      = {CoRR},
  volume       = {abs/2011.14804},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.14804},
  eprinttype    = {arXiv},
  eprint       = {2011.14804},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-14804.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DesmedtP19,
  author       = {Yvo Desmedt and
                  Fred Piper},
  title        = {Perfect Anonymity},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {6},
  pages        = {3990--3997},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2019.2893334},
  doi          = {10.1109/TIT.2019.2893334},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/DesmedtP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SehrawatD19,
  author       = {Vipin Singh Sehrawat and
                  Yvo Desmedt},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_1},
  doi          = {10.1007/978-3-030-31578-8\_1},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SehrawatD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DesmedtDM19,
  author       = {Yvo Desmedt and
                  Sabyasachi Dutta and
                  Kirill Morozov},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Evolving Perfect Hash Families: {A} Combinatorial Viewpoint of Evolving
                  Secret Sharing},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {291--307},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_16},
  doi          = {10.1007/978-3-030-31578-8\_16},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/DesmedtDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DesmedtS19,
  author       = {Yvo Desmedt and
                  Arkadii Slinko},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Realistic versus Rational Secret Sharing},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {152--163},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_10},
  doi          = {10.1007/978-3-030-32430-8\_10},
  timestamp    = {Wed, 23 Oct 2019 12:50:25 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/DesmedtS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DesmedtM19,
  author       = {Yvo Desmedt and
                  Kirill Morozov},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {{VSS} Made Simpler},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {329--342},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_19},
  doi          = {10.1007/978-3-030-26834-3\_19},
  timestamp    = {Wed, 07 Aug 2019 14:48:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DesmedtM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-07581,
  author       = {Yvo Desmedt and
                  Arkadii Slinko},
  title        = {Realistic versus Rational Secret Sharing},
  journal      = {CoRR},
  volume       = {abs/1908.07581},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.07581},
  eprinttype    = {arXiv},
  eprint       = {1908.07581},
  timestamp    = {Mon, 26 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-07581.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-09032,
  author       = {Vipin Singh Sehrawat and
                  Yvo Desmedt},
  title        = {Bi-Homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption},
  journal      = {CoRR},
  volume       = {abs/1908.09032},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.09032},
  eprinttype    = {arXiv},
  eprint       = {1908.09032},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-09032.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/DesmedtS18,
  author       = {Yvo Desmedt and
                  Arash Shaghaghi},
  editor       = {Pierangela Samarati and
                  Indrajit Ray and
                  Indrakshi Ray},
  title        = {Function-Based Access Control {(FBAC):} Towards Preventing Insider
                  Threats in Organizations},
  booktitle    = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
                  on the Occasion of His 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {11170},
  pages        = {143--165},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04834-1\_8},
  doi          = {10.1007/978-3-030-04834-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/DesmedtS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdc/PunekarMWD17,
  author       = {Mayur Punekar and
                  Qutaibah M. Malluhi and
                  Yongge Wang and
                  Yvo Desmedt},
  editor       = {Ashiq Anjum and
                  Alan Sill and
                  Xinghui Zhao and
                  Mohsen M. Farid and
                  Shrideep Pallickara and
                  Jiannong Cao},
  title        = {Candidate {MDS} Array Codes for Tolerating Three Disk Failures in
                  {RAID-7} Architectures},
  booktitle    = {Proceedings of the Fourth {IEEE/ACM} International Conference on Big
                  Data Computing, Applications and Technologies, {BDCAT} 2017, Austin,
                  TX, USA, December 05 - 08, 2017},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3148055.3148056},
  doi          = {10.1145/3148055.3148056},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bdc/PunekarMWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/PunekarMDW17,
  author       = {Mayur Punekar and
                  Qutaibah M. Malluhi and
                  Yvo Desmedt and
                  Yongge Wang},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing,
                  and Martin},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {470--481},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_22},
  doi          = {10.1007/978-3-030-02641-7\_22},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/PunekarMDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DesmedtIPV17,
  author       = {Yvo Desmedt and
                  Vincenzo Iovino and
                  Giuseppe Persiano and
                  Ivan Visconti},
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {Controlled Homomorphic Encryption: Definition and Construction},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  pages        = {107--129},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0\_7},
  doi          = {10.1007/978-3-319-70278-0\_7},
  timestamp    = {Tue, 16 Aug 2022 23:04:23 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DesmedtIPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Safavi-NainiLD17,
  author       = {Reihaneh Safavi{-}Naini and
                  Viliam Lis{\'{y}} and
                  Yvo Desmedt},
  editor       = {Aggelos Kiayias},
  title        = {Economically Optimal Variable Tag Length Message Authentication},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {204--223},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_11},
  doi          = {10.1007/978-3-319-70972-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Safavi-NainiLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdcc/Desmedt17,
  author       = {Yvo Desmedt},
  editor       = {Hani Hamdan and
                  Djallel Eddine Boubiche and
                  Homero Toral{-}Cruz and
                  Sedat Akleylek and
                  Hamid Mcheick},
  title        = {"Need to know" to defend one's home, or should one buy a
                  wifi enabled thermostat?},
  booktitle    = {Proceedings of the Second International Conference on Internet of
                  things and Cloud Computing, {ICC} 2017, Cambridge, United Kingdom,
                  March 22-23, 2017},
  pages        = {201:1--201:4},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3018896.3152307},
  doi          = {10.1145/3018896.3152307},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/iotdcc/Desmedt17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LuD16,
  author       = {Yi Lu and
                  Yvo Desmedt},
  title        = {Walsh transforms and cryptographic applications in bias computing},
  journal      = {Cryptogr. Commun.},
  volume       = {8},
  number       = {3},
  pages        = {435--453},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12095-015-0155-4},
  doi          = {10.1007/S12095-015-0155-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LuD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Desmedt16,
  author       = {Yvo Desmedt},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {What is the Future of Cryptography?},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {109--122},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_7},
  doi          = {10.1007/978-3-662-49301-4\_7},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Desmedt16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DesmedtS16,
  author       = {Yvo Desmedt and
                  Arash Shaghaghi},
  editor       = {Ilsun You and
                  Elisa Bertino},
  title        = {Function-Based Access Control {(FBAC):} From Access Control Matrix
                  to Access Control Tensor},
  booktitle    = {Proceedings of the 8th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October
                  28, 2016},
  pages        = {89--92},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2995974},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DesmedtS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DArcoPD16,
  author       = {Paolo D'Arco and
                  Roberto De Prisco and
                  Yvo Desmedt},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Private Visual Share-Homomorphic Computation and Randomness Reduction
                  in Visual Cryptography},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {95--113},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_5},
  doi          = {10.1007/978-3-319-49175-2\_5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DArcoPD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DesmedtS16,
  author       = {Yvo Desmedt and
                  Arash Shaghaghi},
  title        = {Function-Based Access Control {(FBAC):} From Access Control Matrix
                  to Access Control Tensor},
  journal      = {CoRR},
  volume       = {abs/1609.04514},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.04514},
  eprinttype    = {arXiv},
  eprint       = {1609.04514},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DesmedtS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuD16,
  author       = {Yi Lu and
                  Yvo Desmedt},
  title        = {Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/DesmedtM15,
  author       = {Yvo Desmedt and
                  Kirill Morozov},
  title        = {Parity Check based redistribution of secret shares},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {959--963},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282597},
  doi          = {10.1109/ISIT.2015.7282597},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/DesmedtM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/DesmedtE15,
  author       = {Yvo Desmedt and
                  Stelios Erotokritou},
  editor       = {Rolf Haenni and
                  Reto E. Koenig and
                  Douglas Wikstr{\"{o}}m},
  title        = {Making Code Voting Secure Against Insider Threats Using Unconditionally
                  Secure {MIX} Schemes and Human {PSMT} Protocols},
  booktitle    = {E-Voting and Identity - 5th International Conference, VoteID 2015,
                  Bern, Switzerland, September 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9269},
  pages        = {110--126},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22270-7\_7},
  doi          = {10.1007/978-3-319-22270-7\_7},
  timestamp    = {Thu, 27 Feb 2020 12:57:39 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/DesmedtE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2013,
  editor       = {Yvo Desmedt},
  title        = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27659-5},
  doi          = {10.1007/978-3-319-27659-5},
  isbn         = {978-3-319-27658-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DesmedtE15,
  author       = {Yvo Desmedt and
                  Stelios Erotokritou},
  title        = {Making Code Voting Secure against Insider Threats using Unconditionally
                  Secure {MIX} Schemes and Human {PSMT} Protocols},
  journal      = {CoRR},
  volume       = {abs/1506.04429},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.04429},
  eprinttype    = {arXiv},
  eprint       = {1506.04429},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DesmedtE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AsgharDPS14,
  author       = {Hassan Jameel Asghar and
                  Yvo Desmedt and
                  Josef Pieprzyk and
                  Ron Steinfeld},
  title        = {A subexponential construction of graph coloring for multiparty computation},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {4},
  pages        = {363--403},
  year         = {2014},
  url          = {http://www.degruyter.com/view/j/jmc.2014.8.issue-4/jmc-2013-0035/jmc-2013-0035.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/AsgharDPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/WangD14,
  author       = {Yongge Wang and
                  Yvo Desmedt},
  title        = {Efficient secret sharing schemes achieving optimal information rate},
  booktitle    = {2014 {IEEE} Information Theory Workshop, {ITW} 2014, Hobart, Tasmania,
                  Australia, November 2-5, 2014},
  pages        = {516--520},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ITW.2014.6970885},
  doi          = {10.1109/ITW.2014.6970885},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itw/WangD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Desmedt14,
  author       = {Yvo Desmedt},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On the Key Role Intelligence Agencies Can Play to Restore Our Democratic
                  Institutions},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {276--285},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_27},
  doi          = {10.1007/978-3-319-12400-1\_27},
  timestamp    = {Mon, 05 Feb 2024 20:35:15 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Desmedt14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Desmedt14a,
  author       = {Yvo Desmedt},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On the Key Role Intelligence Agencies Can Play to Restore Our Democratic
                  Institutions (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {286--299},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_28},
  doi          = {10.1007/978-3-319-12400-1\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Desmedt14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharDPS14,
  author       = {Hassan Jameel Asghar and
                  Yvo Desmedt and
                  Josef Pieprzyk and
                  Ron Steinfeld},
  title        = {A Subexponential Construction of Graph Coloring for Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharDPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DesmedtIPV14,
  author       = {Yvo Desmedt and
                  Vincenzo Iovino and
                  Giuseppe Persiano and
                  Ivan Visconti},
  title        = {Controlled Homomorphic Encryption: Definition and Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DesmedtIPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/MahmoodD13,
  author       = {Shah Mahmood and
                  Yvo Desmedt},
  title        = {Two new economic models for privacy},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {40},
  number       = {4},
  pages        = {84--89},
  year         = {2013},
  url          = {https://doi.org/10.1145/2479942.2479953},
  doi          = {10.1145/2479942.2479953},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/MahmoodD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AdhamADK13,
  author       = {Manal T. Adham and
                  Amir Azodi and
                  Yvo Desmedt and
                  Ioannis Karaolis},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {How to Attack Two-Factor Authentication Internet Banking},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {322--328},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_27},
  doi          = {10.1007/978-3-642-39884-1\_27},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AdhamADK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/0002D13,
  author       = {Yi Lu and
                  Yvo Desmedt},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Improved Davies-Murphy's Attack on {DES} Revisited},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {264--271},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_16},
  doi          = {10.1007/978-3-319-05302-8\_16},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/0002D13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DesmedtPSSTWY12,
  author       = {Yvo Desmedt and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Xiaoming Sun and
                  Christophe Tartary and
                  Huaxiong Wang and
                  Andrew Chi{-}Chih Yao},
  title        = {Graph Coloring Applied to Secure Computation in Non-Abelian Groups},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {4},
  pages        = {557--600},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-011-9104-3},
  doi          = {10.1007/S00145-011-9104-3},
  timestamp    = {Wed, 26 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DesmedtPSSTWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Desmedt12,
  author       = {Yvo Desmedt},
  editor       = {David Naccache},
  title        = {A Brief Survey of Research Jointly with Jean-Jacques Quisquater},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {8--12},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_3},
  doi          = {10.1007/978-3-642-28368-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Desmedt12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DesmedtC12,
  author       = {Yvo Desmedt and
                  Pyrros Chaidos},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Applying Divertibility to Blind Ballot Copying in the Helios Internet
                  Voting System},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {433--450},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_25},
  doi          = {10.1007/978-3-642-33167-1\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DesmedtC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/MahmoodD12,
  author       = {Shah Mahmood and
                  Yvo Desmedt},
  title        = {Your Facebook deactivated friend or a cloaked spy},
  booktitle    = {Tenth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland,
                  Workshop Proceedings},
  pages        = {367--373},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PerComW.2012.6197512},
  doi          = {10.1109/PERCOMW.2012.6197512},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/MahmoodD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MahmoodD12,
  author       = {Shah Mahmood and
                  Yvo Desmedt},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {374--375},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_19},
  doi          = {10.1007/978-3-642-33338-5\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MahmoodD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DesmedtPS12,
  author       = {Yvo Desmedt and
                  Josef Pieprzyk and
                  Ron Steinfeld},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Active Security in Multiparty Computation over Black-Box Groups},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {503--521},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_28},
  doi          = {10.1007/978-3-642-32928-9\_28},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DesmedtPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ErotokritouD12,
  author       = {Stelios Erotokritou and
                  Yvo Desmedt},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Human Perfectly Secure Message Transmission Protocols and Their Applications},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {540--558},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_30},
  doi          = {10.1007/978-3-642-32928-9\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ErotokritouD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MahmoodD12,
  author       = {Shah Mahmood and
                  Yvo Desmedt},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Usable Privacy by Visual and Interactive Control of Information Flow},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {181--188},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_20},
  doi          = {10.1007/978-3-642-35694-0\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MahmoodD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-4043,
  author       = {Shah Mahmood and
                  Yvo Desmedt},
  title        = {Your Facebook Deactivated Friend or a Cloaked Spy (Extended Abstract)},
  journal      = {CoRR},
  volume       = {abs/1203.4043},
  year         = {2012},
  url          = {http://arxiv.org/abs/1203.4043},
  eprinttype    = {arXiv},
  eprint       = {1203.4043},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1203-4043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-5439,
  author       = {Yongge Wang and
                  Yvo Desmedt},
  title        = {Edge-Colored Graphs with Applications To Homogeneous Faults},
  journal      = {CoRR},
  volume       = {abs/1207.5439},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.5439},
  eprinttype    = {arXiv},
  eprint       = {1207.5439},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-5439.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/WangD11,
  author       = {Yongge Wang and
                  Yvo Desmedt},
  title        = {Edge-colored graphs with applications to homogeneous faults},
  journal      = {Inf. Process. Lett.},
  volume       = {111},
  number       = {13},
  pages        = {634--641},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ipl.2011.03.017},
  doi          = {10.1016/J.IPL.2011.03.017},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/WangD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YangD11,
  author       = {Qiushi Yang and
                  Yvo Desmedt},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Secure Communication in Multicast Graphs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {538--555},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_29},
  doi          = {10.1007/978-3-642-25385-0\_29},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YangD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MahmoodD11,
  author       = {Shah Mahmood and
                  Yvo Desmedt},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: preliminary analysis of Google+'s privacy},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {809--812},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093499},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MahmoodD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/WangD11,
  author       = {Yongge Wang and
                  Yvo Desmedt},
  editor       = {Serge Fehr},
  title        = {Homogeneous Faults, Colored Edge Graphs, and Cover Free Families},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {58--72},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_6},
  doi          = {10.1007/978-3-642-20728-0\_6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/WangD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Access Structure},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_313},
  doi          = {10.1007/978-1-4419-5906-5\_313},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/DesmedtJ11,
  author       = {Yvo Desmedt and
                  Goce Jakimoski},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Broadcast Authentication from an Information Theoretic Perspective},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {170--171},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_885},
  doi          = {10.1007/978-1-4419-5906-5\_885},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/DesmedtJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11a,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Covert Channels},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {265--266},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_315},
  doi          = {10.1007/978-1-4419-5906-5\_315},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11b,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Deniable Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {322--323},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_316},
  doi          = {10.1007/978-1-4419-5906-5\_316},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11c,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {ElGamal Public Key Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {396},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_318},
  doi          = {10.1007/978-1-4419-5906-5\_318},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11d,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature
                  Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {457--458},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_319},
  doi          = {10.1007/978-1-4419-5906-5\_319},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11e,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Knapsack Cryptographic Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {695--704},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_323},
  doi          = {10.1007/978-1-4419-5906-5\_323},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11f,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Man-in-the-Middle Attack},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {759},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_324},
  doi          = {10.1007/978-1-4419-5906-5\_324},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/DesmedtY11,
  author       = {Yvo Desmedt and
                  Qiushi Yang},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Perfectly Secure Message Transmission},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {922--924},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_326},
  doi          = {10.1007/978-1-4419-5906-5\_326},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/DesmedtY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11g,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Relay Attack},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1042},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_327},
  doi          = {10.1007/978-1-4419-5906-5\_327},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11h,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Station-to-Station Protocol},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1256},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_328},
  doi          = {10.1007/978-1-4419-5906-5\_328},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/DesmedtJ11a,
  author       = {Yvo Desmedt and
                  Goce Jakimoski},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Stream and Multicast Authentication},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1260--1263},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_329},
  doi          = {10.1007/978-1-4419-5906-5\_329},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/DesmedtJ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11i,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Threshold Cryptography},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1288--1293},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_330},
  doi          = {10.1007/978-1-4419-5906-5\_330},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt11j,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Trojan Horses, Computer Viruses, and Worms},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1319--1320},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_331},
  doi          = {10.1007/978-1-4419-5906-5\_331},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt11j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-3530,
  author       = {Shah Mahmood and
                  Yvo Desmedt},
  title        = {Preliminary Analysis of Google+'s Privacy},
  journal      = {CoRR},
  volume       = {abs/1111.3530},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.3530},
  eprinttype    = {arXiv},
  eprint       = {1111.3530},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-3530.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangD11,
  author       = {Qiushi Yang and
                  Yvo Desmedt},
  title        = {Efficient 2-Round General Perfectly Secure Message Transmission: {A}
                  Minor Correction to Yang and Desmedt's Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DesmedtGKS10,
  author       = {Yvo Desmedt and
                  Rosario Gennaro and
                  Kaoru Kurosawa and
                  Victor Shoup},
  title        = {A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext
                  Attack},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {1},
  pages        = {91--120},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-009-9051-4},
  doi          = {10.1007/S00145-009-9051-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DesmedtGKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/DesmedtES10,
  author       = {Yvo Desmedt and
                  Stelios Erotokritou and
                  Reihaneh Safavi{-}Naini},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Simple and Communication Complexity Efficient Almost Secure and Perfectly
                  Secure Message Transmission Schemes},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {166--183},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_11},
  doi          = {10.1007/978-3-642-12678-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/DesmedtES10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YangD10,
  author       = {Qiushi Yang and
                  Yvo Desmedt},
  editor       = {Masayuki Abe},
  title        = {General Perfectly Secure Message Transmission Using Linear Codes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {448--465},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_26},
  doi          = {10.1007/978-3-642-17373-8\_26},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YangD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/JiaDHW10,
  author       = {Keting Jia and
                  Yvo Desmedt and
                  Lidong Han and
                  Xiaoyun Wang},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Pseudo-Cryptanalysis of Luffa},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {187--198},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_14},
  doi          = {10.1007/978-3-642-21518-6\_14},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/JiaDHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/DesmedtM10,
  author       = {Yvo Desmedt and
                  Atsuko Miyaji},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Redesigning Group Key Exchange Protocol Based on Bilinear Pairing
                  Suitable for Various Environments},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {236--254},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_17},
  doi          = {10.1007/978-3-642-21518-6\_17},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/DesmedtM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LuD10,
  author       = {Yi Lu and
                  Yvo Desmedt},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {Bias Analysis of a Certain Problem with Applications to {E0} and Shannon
                  Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {16--28},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_2},
  doi          = {10.1007/978-3-642-24209-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LuD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LuD10,
  author       = {Yi Lu and
                  Yvo Desmedt},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Improved Distinguishing Attack on Rabbit},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {17--23},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_2},
  doi          = {10.1007/978-3-642-18178-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LuD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/DesmedtE10,
  author       = {Yvo Desmedt and
                  Edith Elkind},
  editor       = {David C. Parkes and
                  Chrysanthos Dellarocas and
                  Moshe Tennenholtz},
  title        = {Equilibria of plurality voting with abstentions},
  booktitle    = {Proceedings 11th {ACM} Conference on Electronic Commerce (EC-2010),
                  Cambridge, Massachusetts, USA, June 7-11, 2010},
  pages        = {347--356},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1807342.1807398},
  doi          = {10.1145/1807342.1807398},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/DesmedtE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EstehghariD10,
  author       = {Saghar Estehghari and
                  Yvo Desmedt},
  editor       = {Douglas W. Jones and
                  Jean{-}Jacques Quisquater and
                  Eric Rescorla},
  title        = {Exploiting the Client Vulnerabilities in Internet E-voting Systems:
                  Hacking Helios 2.0 as an Example},
  booktitle    = {2010 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '10, Washington, D.C., USA, August 9-10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/evtwote-10/exploiting-client-vulnerabilities-internet-e-voting-systems-hacking-helios-20},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EstehghariD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-4939,
  author       = {Yvo Desmedt and
                  Edith Elkind},
  title        = {Equilibria of Plurality Voting with Abstentions},
  journal      = {CoRR},
  volume       = {abs/1001.4939},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.4939},
  eprinttype    = {arXiv},
  eprint       = {1001.4939},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-4939.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/DesmedtDTW09,
  author       = {Yvo Desmedt and
                  Niels Duif and
                  Henk van Tilborg and
                  Huaxiong Wang},
  title        = {Bounds and constructions for key distribution schemes},
  journal      = {Adv. Math. Commun.},
  volume       = {3},
  number       = {3},
  pages        = {273--293},
  year         = {2009},
  url          = {https://doi.org/10.3934/amc.2009.3.273},
  doi          = {10.3934/AMC.2009.3.273},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/DesmedtDTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codcry/TonienSND09,
  author       = {Dongvu Tonien and
                  Reihaneh Safavi{-}Naini and
                  Peter Nickolas and
                  Yvo Desmedt},
  editor       = {Yeow Meng Chee and
                  Chao Li and
                  San Ling and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Unconditionally Secure Approximate Message Authentication},
  booktitle    = {Coding and Cryptology, Second International Workshop, {IWCC} 2009,
                  Zhangjiajie, China, June 1-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5557},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01877-0\_19},
  doi          = {10.1007/978-3-642-01877-0\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codcry/TonienSND09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/YangD09,
  author       = {Qiushi Yang and
                  Yvo Desmedt},
  editor       = {Kaoru Kurosawa},
  title        = {Cryptanalysis of Secure Message Transmission Protocols with Feedback},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {159--176},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_14},
  doi          = {10.1007/978-3-642-14496-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/YangD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2007,
  editor       = {Yvo Desmedt},
  title        = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10230-1},
  doi          = {10.1007/978-3-642-10230-1},
  isbn         = {978-3-642-10229-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiaDHW09,
  author       = {Keting Jia and
                  Yvo Desmedt and
                  Lidong Han and
                  Xiaoyun Wang},
  title        = {Pseudo-Cryptanalysis of Luffa},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiaDHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangD09,
  author       = {Qiushi Yang and
                  Yvo Desmedt},
  title        = {Cryptanalysis of Secure Message Transmission Protocols with Feedback},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WangD08,
  author       = {Yongge Wang and
                  Yvo Desmedt},
  title        = {Perfectly Secure Message Transmission Revisited},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {6},
  pages        = {2582--2595},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.921676},
  doi          = {10.1109/TIT.2008.921676},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/WangD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DesmedtLP08,
  author       = {Yvo Desmedt and
                  Helger Lipmaa and
                  Duong Hieu Phan},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Hybrid Damg{\aa}rd Is CCA1-Secure under the {DDH} Assumption},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {18--30},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_2},
  doi          = {10.1007/978-3-540-89641-8\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/DesmedtLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DesmedtL08,
  author       = {Yvo Desmedt and
                  Tanja Lange},
  editor       = {Gene Tsudik},
  title        = {Revisiting Pairing Based Group Key Exchange},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_5},
  doi          = {10.1007/978-3-540-85230-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DesmedtL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CallasDNOQY08,
  author       = {Jon Callas and
                  Yvo Desmedt and
                  Daniel Nagy and
                  Akira Otsuka and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Gene Tsudik},
  title        = {Real Electronic Cash Versus Academic Electronic Cash Versus Paper
                  Cash (Panel Report)},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {307--313},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_28},
  doi          = {10.1007/978-3-540-85230-8\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CallasDNOQY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DesmedtKS08,
  author       = {Yvo Desmedt and
                  Brian King and
                  Berry Schoenmakers},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Revisiting the Karnin, Greene and Hellman Bounds},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_18},
  doi          = {10.1007/978-3-540-85093-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DesmedtKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DesmedtP08,
  author       = {Yvo Desmedt and
                  Duong Hieu Phan},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {A {CCA} Secure Hybrid Damg{\aa}rd's ElGamal Encryption},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {68--82},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_5},
  doi          = {10.1007/978-3-540-88733-1\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/DesmedtP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardDFN07,
  author       = {Ivan Damg{\aa}rd and
                  Yvo Desmedt and
                  Matthias Fitzi and
                  Jesper Buus Nielsen},
  editor       = {Kaoru Kurosawa},
  title        = {Secure Protocols with Asymmetric Trust},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {357--375},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_22},
  doi          = {10.1007/978-3-540-76900-2\_22},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DamgardDFN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Safavi-NainiWD07,
  author       = {Reihaneh Safavi{-}Naini and
                  Shuhong Wang and
                  Yvo Desmedt},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Unconditionally secure ring authentication},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {173--181},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229310},
  doi          = {10.1145/1229285.1229310},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Safavi-NainiWD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtPSW07,
  author       = {Yvo Desmedt and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Huaxiong Wang},
  editor       = {Alfred Menezes},
  title        = {On Secure Multi-party Computation in Black-Box Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {591--612},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_33},
  doi          = {10.1007/978-3-540-74143-5\_33},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtPSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DesmedtJ07,
  author       = {Yvo Desmedt and
                  Goce Jakimoski},
  editor       = {Masayuki Abe},
  title        = {Non-degrading Erasure-Tolerant Information Authentication with an
                  Application to Multicast Stream Authentication over Lossy Channels},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {324--338},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_21},
  doi          = {10.1007/11967668\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DesmedtJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Desmedt07,
  author       = {Yvo Desmedt},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Position Statement in {RFID} S{\&}P Panel: From Relative Security
                  to Perceived Secure},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {53--56},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_8},
  doi          = {10.1007/978-3-540-77366-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Desmedt07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DesmedtLB07,
  author       = {Yvo Desmedt and
                  Tanja Lange and
                  Mike Burmester},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_12},
  doi          = {10.1007/978-3-540-77366-5\_12},
  timestamp    = {Mon, 25 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DesmedtLB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DesmedtK07,
  author       = {Yvo Desmedt and
                  Kaoru Kurosawa},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {A Generalization and a Variant of Two Threshold Cryptosystems Based
                  on Factoring},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {351--361},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_23},
  doi          = {10.1007/978-3-540-75496-1\_23},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/DesmedtK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CoronNDOS06,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Yvo Desmedt and
                  Andrew M. Odlyzko and
                  Julien P. Stern},
  title        = {Index Calculation Attacks on {RSA} Signature and Encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {41--53},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-004-5660-y},
  doi          = {10.1007/S10623-004-5660-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CoronNDOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/DesmedtWB06,
  author       = {Yvo Desmedt and
                  Yongge Wang and
                  Mike Burmester},
  editor       = {Javier L{\'{o}}pez},
  title        = {Revisiting Colored Networks and Privacy Preserving Censorship},
  booktitle    = {Critical Information Infrastructures Security, First International
                  Workshop, {CRITIS} 2006, Samos, Greece, August 31 - September 1, 2006,
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4347},
  pages        = {140--150},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11962977\_12},
  doi          = {10.1007/11962977\_12},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/critis/DesmedtWB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DesmedtL06,
  author       = {Yvo Desmedt and
                  Tanja Lange},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Pairing Based Threshold Cryptography Improving on Libert-Quisquater
                  and Baek-Zheng},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {154--159},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_12},
  doi          = {10.1007/11889663\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DesmedtL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengNDD06,
  author       = {Kun Peng and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Yvo Desmedt and
                  Ed Dawson},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Klein Bottle Routing: An Alternative to Onion Routing and Mix Network},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {296--309},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_25},
  doi          = {10.1007/11927587\_25},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengNDD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DesmedtPSW06,
  author       = {Yvo Desmedt and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Huaxiong Wang},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {A Non-malleable Group Key Exchange Protocol Robust Against Active
                  Insiders},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {459--475},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_33},
  doi          = {10.1007/11836810\_33},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/DesmedtPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakimoskiD06,
  author       = {Goce Jakimoski and
                  Yvo Desmedt},
  title        = {A Tree-based Model of Unicast Stream Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakimoskiD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DesmedtLB06,
  author       = {Yvo Desmedt and
                  Tanja Lange and
                  Mike Burmester},
  title        = {Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DesmedtLB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BurmesterD05,
  author       = {Mike Burmester and
                  Yvo Desmedt},
  title        = {A secure and scalable Group Key Exchange system},
  journal      = {Inf. Process. Lett.},
  volume       = {94},
  number       = {3},
  pages        = {137--143},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.ipl.2005.01.003},
  doi          = {10.1016/J.IPL.2005.01.003},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BurmesterD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Desmedt05,
  author       = {Yvo Desmedt},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Potential Impacts of a Growing Gap Between Theory and Practice in
                  Information Security},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {532--536},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_44},
  doi          = {10.1007/11506157\_44},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Desmedt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/DesmedtWSW05,
  author       = {Yvo Desmedt and
                  Yongge Wang and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Lusheng Wang},
  title        = {Radio Networks with Reliable Communication},
  booktitle    = {Computing and Combinatorics, 11th Annual International Conference,
                  {COCOON} 2005, Kunming, China, August 16-29, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3595},
  pages        = {156--166},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11533719\_18},
  doi          = {10.1007/11533719\_18},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cocoon/DesmedtWSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/KingD05,
  author       = {Brian King and
                  Yvo Desmedt},
  title        = {Securing Abstention in an Electronic Legislature},
  booktitle    = {38th Hawaii International Conference on System Sciences {(HICSS-38}
                  2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/HICSS.2005.532},
  doi          = {10.1109/HICSS.2005.532},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/KingD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Desmedt05,
  author       = {Yvo Desmedt},
  title        = {Unconditionally private and reliable communication in an untrusted
                  network},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {38--41},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543954},
  doi          = {10.1109/ITWTPI.2005.1543954},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Desmedt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/DesmedtWB05,
  author       = {Yvo Desmedt and
                  Yongge Wang and
                  Mike Burmester},
  editor       = {Xiaotie Deng and
                  Ding{-}Zhu Du},
  title        = {A Complete Characterization of Tolerable Adversary Structures for
                  Secure Point-to-Point Transmissions Without Feedback},
  booktitle    = {Algorithms and Computation, 16th International Symposium, {ISAAC}
                  2005, Sanya, Hainan, China, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3827},
  pages        = {277--287},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602613\_29},
  doi          = {10.1007/11602613\_29},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isaac/DesmedtWB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DesmedtK05,
  author       = {Yvo Desmedt and
                  Kaoru Kurosawa},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Electronic Voting: Starting Over?},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {329--343},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_24},
  doi          = {10.1007/11556992\_24},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DesmedtK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Desmedt05,
  author       = {Yvo Desmedt},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Understanding Why Some Network Protocols Are User-Unfriendly},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {215--219},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_26},
  doi          = {10.1007/978-3-540-77156-2\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Desmedt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Desmedt05a,
  author       = {Yvo Desmedt},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Understanding Why Some Network Protocols Are User-Unfriendly},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {220--227},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_27},
  doi          = {10.1007/978-3-540-77156-2\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Desmedt05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2005,
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371},
  doi          = {10.1007/11599371},
  isbn         = {3-540-30849-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {Access structure},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_4},
  doi          = {10.1007/0-387-23483-7\_4},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05a,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {Covert Channels},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_82},
  doi          = {10.1007/0-387-23483-7\_82},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05b,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {Deniable encryption},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_101},
  doi          = {10.1007/0-387-23483-7\_101},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05c,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {ElGamal Public Key Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_129},
  doi          = {10.1007/0-387-23483-7\_129},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05d,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature
                  Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_162},
  doi          = {10.1007/0-387-23483-7\_162},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05e,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {Knapsack cryptographic schemes},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_223},
  doi          = {10.1007/0-387-23483-7\_223},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05f,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {Man-in-the-Middle Attack},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_241},
  doi          = {10.1007/0-387-23483-7\_241},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05g,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {Relay Attack},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_352},
  doi          = {10.1007/0-387-23483-7\_352},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05h,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {Station-to-Station Protocol},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_411},
  doi          = {10.1007/0-387-23483-7\_411},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05i,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {Threshold Cryptography},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_428},
  doi          = {10.1007/0-387-23483-7\_428},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Desmedt05j,
  author       = {Yvo Desmedt},
  editor       = {Henk C. A. van Tilborg},
  title        = {Trojan Horses, Computer Viruses and Worms},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_438},
  doi          = {10.1007/0-387-23483-7\_438},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Desmedt05j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakimoskiD05,
  author       = {Goce Jakimoski and
                  Yvo Desmedt},
  title        = {On Resistance of {DES} to Related-Key Differential Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakimoskiD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BurmesterD04,
  author       = {Mike Burmester and
                  Yvo Desmedt},
  title        = {Is hierarchical public-key certification the next target for hackers?},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {8},
  pages        = {68--74},
  year         = {2004},
  url          = {https://doi.org/10.1145/1012037.1012038},
  doi          = {10.1145/1012037.1012038},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BurmesterD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/DesmedtW04,
  author       = {Yvo Desmedt and
                  Yongge Wang},
  title        = {Analyzing Vulnerabilities Of Critical Infrastructures Using Flows
                  And Critical Vertices In And/Or Graphs},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {15},
  number       = {1},
  pages        = {107--125},
  year         = {2004},
  url          = {https://doi.org/10.1142/S0129054104002339},
  doi          = {10.1142/S0129054104002339},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijfcs/DesmedtW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/LeSWD04,
  author       = {Tri Van Le and
                  R{\"{u}}diger Sparr and
                  Ralph Wernsdorf and
                  Yvo Desmedt},
  editor       = {Hans Dobbertin and
                  Vincent Rijmen and
                  Aleksandra Sowa},
  title        = {Complementation-Like and Cyclic Properties of {AES} Round Functions},
  booktitle    = {Advanced Encryption Standard - AES, 4th International Conference,
                  {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3373},
  pages        = {128--141},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11506447\_11},
  doi          = {10.1007/11506447\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/LeSWD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KurosawaD04,
  author       = {Kaoru Kurosawa and
                  Yvo Desmedt},
  editor       = {Matthew K. Franklin},
  title        = {A New Paradigm of Hybrid Encryption Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {426--442},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_26},
  doi          = {10.1007/978-3-540-28628-8\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KurosawaD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DesmedtB04,
  author       = {Yvo Desmedt and
                  Mike Burmester},
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Identity-based Key Infrastructures {(IKI)}},
  booktitle    = {Security and Protection in Information Processing Systems, {IFIP}
                  18th WorldComputer Congress, {TC11} 19th International Information
                  Security Conference, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {147},
  pages        = {167--176},
  publisher    = {Kluwer / Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8143-X\_11},
  doi          = {10.1007/1-4020-8143-X\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DesmedtB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BurmesterDWY04,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Rebecca N. Wright and
                  Alec Yasinsac},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Accountable Privacy},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {83--95},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_10},
  doi          = {10.1007/11861386\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BurmesterDWY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DesmedtKL03,
  author       = {Yvo Desmedt and
                  Kaoru Kurosawa and
                  Tri Van Le},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {396--407},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_30},
  doi          = {10.1007/10958513\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DesmedtKL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JakimoskiD03,
  author       = {Goce Jakimoski and
                  Yvo Desmedt},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {Related-Key Differential Cryptanalysis of 192-bit Key {AES} Variants},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {208--221},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_15},
  doi          = {10.1007/978-3-540-24654-1\_15},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JakimoskiD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Desmedt02,
  author       = {Yvo Desmedt},
  title        = {Is there a Need for Survivable Computation in Critical Infrastructures?},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {7},
  number       = {2},
  pages        = {11--21},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1363-4127(02)02003-4},
  doi          = {10.1016/S1363-4127(02)02003-4},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Desmedt02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/DesmedtW02,
  author       = {Yvo Desmedt and
                  Yongge Wang},
  editor       = {Oscar H. Ibarra and
                  Louxin Zhang},
  title        = {Maximum Flows and Critical Vertices in {AND/OR} Graphs},
  booktitle    = {Computing and Combinatorics, 8th Annual International Conference,
                  {COCOON} 2002, Singapore, August 15-17, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2387},
  pages        = {238--248},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45655-4\_27},
  doi          = {10.1007/3-540-45655-4\_27},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cocoon/DesmedtW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egov/DesmedtK02,
  author       = {Yvo Desmedt and
                  Brian King},
  editor       = {Klaus Lenk and
                  Roland Traunm{\"{u}}ller},
  title        = {Verifiable Democracy a Protocol to Secure an Electronic Legislature},
  booktitle    = {Electronic Government, First International Conference, {EGOV} 2002,
                  Aix-en-Provence, France, September 2-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2456},
  pages        = {460--463},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46138-8\_74},
  doi          = {10.1007/3-540-46138-8\_74},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/egov/DesmedtK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DesmedtW02,
  author       = {Yvo Desmedt and
                  Yongge Wang},
  editor       = {Lars R. Knudsen},
  title        = {Perfectly Secure Message Transmission Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {502--517},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_33},
  doi          = {10.1007/3-540-46035-7\_33},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DesmedtW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DesmedtSW02,
  author       = {Yvo Desmedt and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Matt Blaze},
  title        = {Redistribution of Mechanical Secret Shares},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {238--252},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_17},
  doi          = {10.1007/3-540-36504-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DesmedtSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LeD02,
  author       = {Tri Van Le and
                  Yvo Desmedt},
  editor       = {Fabien A. P. Petitcolas},
  title        = {Cryptanalysis of {UCLA} Watermarking Schemes for Intellectual Property
                  Protection},
  booktitle    = {Information Hiding, 5th International Workshop, {IH} 2002, Noordwijkerhout,
                  The Netherlands, October 7-9, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2578},
  pages        = {213--225},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36415-3\_14},
  doi          = {10.1007/3-540-36415-3\_14},
  timestamp    = {Sun, 02 Oct 2022 16:07:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LeD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DesmedtW02,
  author       = {Yvo Desmedt and
                  Yongge Wang},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Efficient Zero-Knowledge Proofs for Some Practical Graph Problems},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {290--302},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_21},
  doi          = {10.1007/3-540-36413-7\_21},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/DesmedtW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2003,
  editor       = {Yvo Desmedt},
  title        = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36288-6},
  doi          = {10.1007/3-540-36288-6},
  isbn         = {3-540-00324-X},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0208041,
  author       = {Yvo Desmedt and
                  Yongge Wang},
  title        = {Perfectly Secure Message Transmission Revisited},
  journal      = {CoRR},
  volume       = {cs.CR/0208041},
  year         = {2002},
  url          = {https://arxiv.org/abs/cs/0208041},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0208041.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DesmedtW02,
  author       = {Yvo Desmedt and
                  Yongge Wang},
  title        = {Perfectly Secure Message Transmission Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DesmedtW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DesmedtSWBCP01,
  author       = {Yvo Desmedt and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Lynn Margaret Batten and
                  Chris Charnes and
                  Josef Pieprzyk},
  title        = {Broadcast anti-jamming systems},
  journal      = {Comput. Networks},
  volume       = {35},
  number       = {2-3},
  pages        = {223--236},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1389-1286(00)00169-9},
  doi          = {10.1016/S1389-1286(00)00169-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/DesmedtSWBCP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/WangD01,
  author       = {Yongge Wang and
                  Yvo Desmedt},
  title        = {Secure Communication in Multicast Channels: The Answer to Franklin
                  and Wright's Question},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {2},
  pages        = {121--135},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0002-y},
  doi          = {10.1007/S00145-001-0002-Y},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/WangD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DesmedtBS01,
  author       = {Yvo Desmedt and
                  Mike Burmester and
                  Jennifer Seberry},
  editor       = {Kwangjo Kim},
  title        = {Equitability in Retroactive Data Confiscation versus Proactive Key
                  Escrow},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {277--286},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_20},
  doi          = {10.1007/3-540-44586-2\_20},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DesmedtBS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AlexandrisBCD00,
  author       = {Nikos Alexandris and
                  Mike Burmester and
                  Vassilios Chrissikopoulos and
                  Yvo Desmedt},
  title        = {Secure linking of customers, merchants and banks in electronic commerce},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {16},
  number       = {4},
  pages        = {393--401},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-739X(99)00063-1},
  doi          = {10.1016/S0167-739X(99)00063-1},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AlexandrisBCD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/WangDB00,
  author       = {Yongge Wang and
                  Yvo Desmedt and
                  Mike Burmester},
  title        = {Models For Dependable Computation with Multiple Inputs and Some Hardness
                  Results},
  journal      = {Fundam. Informaticae},
  volume       = {42},
  number       = {1},
  pages        = {61--73},
  year         = {2000},
  url          = {https://doi.org/10.3233/FI-2000-42103},
  doi          = {10.3233/FI-2000-42103},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fuin/WangDB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/BeimelBDK00,
  author       = {Amos Beimel and
                  Mike Burmester and
                  Yvo Desmedt and
                  Eyal Kushilevitz},
  title        = {Computing Functions of a Shared Secret},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {13},
  number       = {3},
  pages        = {324--345},
  year         = {2000},
  url          = {https://doi.org/10.1137/S0895480195288819},
  doi          = {10.1137/S0895480195288819},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/BeimelBDK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuangRWD00,
  author       = {Xunhua Wang and
                  Yih Huang and
                  Yvo Desmedt and
                  David Rine},
  title        = {Enabling Secure On-Line {DNS} Dynamic Update},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {52},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898857},
  doi          = {10.1109/ACSAC.2000.898857},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HuangRWD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AdamsBDRZ00,
  author       = {Carlisle M. Adams and
                  Mike Burmester and
                  Yvo Desmedt and
                  Michael K. Reiter and
                  Philip Zimmermann},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Which {PKI} (public key infrastructure) is the right one? (panel session)},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {98--101},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352615},
  doi          = {10.1145/352600.352615},
  timestamp    = {Tue, 10 Nov 2020 20:00:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AdamsBDRZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DesmedtL00,
  author       = {Yvo Desmedt and
                  Tri Van Le},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Moir{\'{e}} cryptography},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {116--124},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352618},
  doi          = {10.1145/352600.352618},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DesmedtL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DesmedtK00,
  author       = {Yvo Desmedt and
                  Kaoru Kurosawa},
  editor       = {Bart Preneel},
  title        = {How to Break a Practical {MIX} and Design a New One},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {557--572},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_39},
  doi          = {10.1007/3-540-45539-6\_39},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DesmedtK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BurmesterDDMOTY00,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Hiroshi Doi and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Mitsuru Tada and
                  Yuko Yoshifuji},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Structured ElGamal-Type Multisignature Scheme},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {466--483},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_31},
  doi          = {10.1007/978-3-540-46588-1\_31},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BurmesterDDMOTY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BurmesterDISS99,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Toshiya Itoh and
                  Kouichi Sakurai and
                  Hiroki Shizuya},
  title        = {Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {197--223},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900053},
  doi          = {10.1007/S001459900053},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BurmesterDISS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DesmedtW99,
  author       = {Yvo Desmedt and
                  Yongge Wang},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Approximation Hardness and Secure Communication in Broadcast Channels},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {247--257},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_20},
  doi          = {10.1007/978-3-540-48000-6\_20},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DesmedtW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BurmesterD99,
  author       = {Mike Burmester and
                  Yvo Desmedt},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Secure Communication in an Unknown Network Using Certificates},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {274--287},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_22},
  doi          = {10.1007/978-3-540-48000-6\_22},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BurmesterD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/DesmedtK99,
  author       = {Yvo Desmedt and
                  Brian King},
  editor       = {Bart Preneel},
  title        = {Verifiable Democracy},
  booktitle    = {Secure Information Networks: Communications and Multimedia Security,
                  {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
                  Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {152},
  pages        = {53--70},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Mon, 14 Oct 2002 12:00:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/DesmedtK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WangD99,
  author       = {Yongge Wang and
                  Yvo Desmedt},
  editor       = {Jacques Stern},
  title        = {Secure Communication in Broadcast Channels: The Answer to Franklin
                  and Wright's Question},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {446--458},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_31},
  doi          = {10.1007/3-540-48910-X\_31},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WangD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/DesmedtSWCP99,
  author       = {Yvo Desmedt and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Chris Charnes and
                  Josef Pieprzyk},
  title        = {Broadcast anti-jamming systems},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networks 1999,
                  {ICON} 1999, Brisbane, Queensland, Australia, September 28 - October
                  1, 1999},
  pages        = {349--355},
  publisher    = {{IEEE}},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICON.1999.796197},
  doi          = {10.1109/ICON.1999.796197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/DesmedtSWCP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DesmedtLQ99,
  author       = {Yvo Desmedt and
                  Tri Van Le and
                  Jean{-}Jacques Quisquater},
  editor       = {Andreas Pfitzmann},
  title        = {Nonbinary Audio Cryptography},
  booktitle    = {Information Hiding, Third International Workshop, IH'99, Dresden,
                  Germany, September 29 - October 1, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1768},
  pages        = {478--489},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719724\_33},
  doi          = {10.1007/10719724\_33},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DesmedtLQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/99/Desmedt99,
  author       = {Yvo Desmedt},
  editor       = {Mikhail J. Atallah},
  title        = {Cryptographic Foundations},
  booktitle    = {Algorithms and Theory of Computation Handbook},
  series       = {Chapman {\&} Hall/CRC Applied Algorithms and Data Structures series},
  publisher    = {{CRC} Press},
  year         = {1999},
  url          = {https://doi.org/10.1201/9781420049503-c39},
  doi          = {10.1201/9781420049503-C39},
  timestamp    = {Fri, 17 Jul 2020 16:12:44 +0200},
  biburl       = {https://dblp.org/rec/books/crc/99/Desmedt99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/99/Desmedt99a,
  author       = {Yvo Desmedt},
  editor       = {Mikhail J. Atallah},
  title        = {Encryption Schemes},
  booktitle    = {Algorithms and Theory of Computation Handbook},
  series       = {Chapman {\&} Hall/CRC Applied Algorithms and Data Structures series},
  publisher    = {{CRC} Press},
  year         = {1999},
  url          = {https://doi.org/10.1201/9781420049503-c40},
  doi          = {10.1201/9781420049503-C40},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/crc/99/Desmedt99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DesmedtKKK98,
  author       = {Yvo Desmedt and
                  Brian King and
                  Wataru Kishimoto and
                  Kaoru Kurosawa},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A Comment on the Efficiency of Secret Sharing Scheme over Any Finite
                  Abelian Group},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {391--402},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053750},
  doi          = {10.1007/BFB0053750},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DesmedtKKK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BurmesterDS98,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Jennifer Seberry},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Equitable Key Escrow with Limited Time Span (or, How to Enforce Time
                  Expiration Cryptographically)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {380--391},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_30},
  doi          = {10.1007/3-540-49649-1\_30},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BurmesterDS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DesmedtHQ98,
  author       = {Yvo Desmedt and
                  Shuang Hou and
                  Jean{-}Jacques Quisquater},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Audio and Optical Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {392--404},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_31},
  doi          = {10.1007/3-540-49649-1\_31},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DesmedtHQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaYDB98,
  author       = {Kaoru Kurosawa and
                  Takuya Yoshida and
                  Yvo Desmedt and
                  Mike Burmester},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Some Bounds and a Construction for Secure Broadcast Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {420--433},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_33},
  doi          = {10.1007/3-540-49649-1\_33},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaYDB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaD98,
  author       = {Kaoru Kurosawa and
                  Yvo Desmedt},
  editor       = {Kaisa Nyberg},
  title        = {Optimum Traitor Tracing and Asymmetric Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {145--157},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054123},
  doi          = {10.1007/BFB0054123},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DesmedtHQ98,
  author       = {Yvo Desmedt and
                  Shuang Hou and
                  Jean{-}Jacques Quisquater},
  editor       = {David Aucsmith},
  title        = {Cerebral Cryptography},
  booktitle    = {Information Hiding, Second International Workshop, Portland, Oregon,
                  USA, April 14-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1525},
  pages        = {62--72},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49380-8\_5},
  doi          = {10.1007/3-540-49380-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DesmedtHQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/random/BurmesterDW98,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Yongge Wang},
  editor       = {Michael Luby and
                  Jos{\'{e}} D. P. Rolim and
                  Maria J. Serna},
  title        = {Using Approximation Hardness to Achieve Dependable Computation},
  booktitle    = {Randomization and Approximation Techniques in Computer Science, Second
                  International Workshop, RANDOM'98, Barcelona, Spain, October 8-10,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1518},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49543-6\_15},
  doi          = {10.1007/3-540-49543-6\_15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/random/BurmesterDW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BurmesterDPW97,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Fred Piper and
                  Michael Walker},
  title        = {A General Zero-Knowledge Scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {12},
  number       = {1},
  pages        = {13--37},
  year         = {1997},
  url          = {https://doi.org/10.1023/A:1008237708202},
  doi          = {10.1023/A:1008237708202},
  timestamp    = {Tue, 12 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BurmesterDPW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Desmedt97,
  author       = {Yvo Desmedt},
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {Some Recent Research Aspects of Threshold Cryptography},
  booktitle    = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030418},
  doi          = {10.1007/BFB0030418},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Desmedt97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Desmedt96,
  author       = {Yvo Desmedt},
  title        = {Simmons' protocol is not free of subliminal channels},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {170--175},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503702},
  doi          = {10.1109/CSFW.1996.503702},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Desmedt96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BurmesterDK96,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Gregory Kabatianskii},
  editor       = {Rebecca N. Wright and
                  Peter G. Neumann},
  title        = {Trust and security: {A} new look at the Byzantine generals problem},
  booktitle    = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4,
                  1996},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {38},
  pages        = {75--83},
  publisher    = {{DIMACS/AMS}},
  year         = {1996},
  url          = {https://doi.org/10.1090/dimacs/038/08},
  doi          = {10.1090/DIMACS/038/08},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/BurmesterDK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlackburnBDW96,
  author       = {Simon R. Blackburn and
                  Mike Burmester and
                  Yvo Desmedt and
                  Peter R. Wild},
  editor       = {Ueli M. Maurer},
  title        = {Efficient Multiplicative Sharing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {107--118},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_10},
  doi          = {10.1007/3-540-68339-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlackburnBDW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Desmedt96,
  author       = {Yvo Desmedt},
  editor       = {Ross J. Anderson},
  title        = {Establishing Big Broth Using Covert Channals and Other Covert Techniques},
  booktitle    = {Information Hiding, First International Workshop, Cambridge, UK, May
                  30 - June 1, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1174},
  pages        = {65--71},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61996-8\_32},
  doi          = {10.1007/3-540-61996-8\_32},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Desmedt96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BurmesterDISSY96,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Toshiya Itoh and
                  Kouichi Sakurai and
                  Hiroki Shizuya and
                  Moti Yung},
  editor       = {Ross J. Anderson},
  title        = {A Progress Report on Subliminal-Free Channels},
  booktitle    = {Information Hiding, First International Workshop, Cambridge, UK, May
                  30 - June 1, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1174},
  pages        = {157--168},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61996-8\_39},
  doi          = {10.1007/3-540-61996-8\_39},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BurmesterDISSY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BurmesterD96,
  author       = {Mike Burmester and
                  Yvo Desmedt},
  editor       = {T. Mark A. Lomas},
  title        = {Efficient and Secure Conference-Key Distribution},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {119--129},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_12},
  doi          = {10.1007/3-540-62494-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BurmesterD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Desmedt95,
  author       = {Yvo Desmedt},
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {Securing Traceability of Ciphertexts - Towards a Secure Software Key
                  Escrow System (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  pages        = {147--157},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X\_12},
  doi          = {10.1007/3-540-49264-X\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Desmedt95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/Desmedt94,
  author       = {Yvo Desmedt},
  title        = {Threshold cryptography},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {5},
  number       = {4},
  pages        = {449--458},
  year         = {1994},
  url          = {https://doi.org/10.1002/ett.4460050407},
  doi          = {10.1002/ETT.4460050407},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/Desmedt94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/DesmedtF94,
  author       = {Yvo Desmedt and
                  Yair Frankel},
  title        = {Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite
                  Abelian Group},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {7},
  number       = {4},
  pages        = {667--679},
  year         = {1994},
  url          = {https://doi.org/10.1137/S0895480192224713},
  doi          = {10.1137/S0895480192224713},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/DesmedtF94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DesmedtCB94,
  author       = {Yvo Desmedt and
                  Giovanni Di Crescenzo and
                  Mike Burmester},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Multiplicative Non-abelian Sharing Schemes and their Application to
                  Threshold Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000421},
  doi          = {10.1007/BFB0000421},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DesmedtCB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BurmesterD94,
  author       = {Mike Burmester and
                  Yvo Desmedt},
  editor       = {Alfredo De Santis},
  title        = {A Secure and Efficient Conference Key Distribution System (Extended
                  Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {275--286},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053443},
  doi          = {10.1007/BFB0053443},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BurmesterD94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/SantisDFY94,
  author       = {Alfredo De Santis and
                  Yvo Desmedt and
                  Yair Frankel and
                  Moti Yung},
  editor       = {Frank Thomson Leighton and
                  Michael T. Goodrich},
  title        = {How to share a function securely},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of
                  Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  pages        = {522--533},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/195058.195405},
  doi          = {10.1145/195058.195405},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/SantisDFY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1994,
  editor       = {Yvo Desmedt},
  title        = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5},
  doi          = {10.1007/3-540-48658-5},
  isbn         = {3-540-58333-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/1994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DesmedtB93,
  author       = {Yvo Desmedt and
                  Mike Burmester},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu and
                  Victoria Ashby},
  title        = {Towards Practical "Proven Secure" Authenticated Key Distribution},
  booktitle    = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  pages        = {228--231},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168588.168616},
  doi          = {10.1145/168588.168616},
  timestamp    = {Tue, 10 Nov 2020 20:00:40 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DesmedtB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Desmedt93,
  author       = {Yvo Desmedt},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Computer security by redefining what a computer is},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {160--166},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283834},
  doi          = {10.1145/283751.283834},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Desmedt93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BurmesterDB92,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Thomas Beth},
  title        = {Efficient Zero-Knowledge Identification Schemes for Smart Cards},
  journal      = {Comput. J.},
  volume       = {35},
  number       = {1},
  pages        = {21--29},
  year         = {1992},
  url          = {https://doi.org/10.1093/comjnl/35.1.21},
  doi          = {10.1093/COMJNL/35.1.21},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/BurmesterDB92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DavidaD92,
  author       = {George I. Davida and
                  Yvo Desmedt},
  title        = {Passports and visas versus IDs},
  journal      = {Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {253--258},
  year         = {1992},
  url          = {https://doi.org/10.1016/0167-4048(92)90205-6},
  doi          = {10.1016/0167-4048(92)90205-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DavidaD92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Desmedt92,
  author       = {Yvo Desmedt},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {Treshold Cryptosystems (invited talk)},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_47},
  doi          = {10.1007/3-540-57220-1\_47},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Desmedt92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DesmedtS92,
  author       = {Yvo Desmedt and
                  Jennifer Seberry},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {Practical Proven Secure Authentication with Arbitration},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {27--32},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_49},
  doi          = {10.1007/3-540-57220-1\_49},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DesmedtS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FrankelDB92,
  author       = {Yair Frankel and
                  Yvo Desmedt and
                  Mike Burmester},
  editor       = {Ernest F. Brickell},
  title        = {Non-Existence of Homomorphic General Sharing Schemes for Some Key
                  Spaces (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {549--557},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_39},
  doi          = {10.1007/3-540-48071-4\_39},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FrankelDB92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Desmedt92,
  author       = {Yvo Desmedt},
  editor       = {Yves Deswarte and
                  G{\'{e}}rard Eizenberg and
                  Jean{-}Jacques Quisquater},
  title        = {Breaking the Traditional Computer Security Barriers},
  booktitle    = {Computer Security - {ESORICS} 92, Second European Symposium on Research
                  in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {648},
  pages        = {125--138},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/BFb0013895},
  doi          = {10.1007/BFB0013895},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Desmedt92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FrankelD92,
  author       = {Yair Frankel and
                  Yvo Desmedt},
  editor       = {Rainer A. Rueppel},
  title        = {Classification of Ideal Homomorphic Threshold Schemes over Finite
                  Abelian Groups (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {25--34},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_2},
  doi          = {10.1007/3-540-47555-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FrankelD92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DesmedtLLMORS92,
  author       = {Yvo Desmedt and
                  Peter Landrock and
                  Arjen K. Lenstra and
                  Kevin S. McCurley and
                  Andrew M. Odlyzko and
                  Rainer A. Rueppel and
                  Miles E. Smid},
  editor       = {Rainer A. Rueppel},
  title        = {The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli
                  (Panel)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {194--199},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_17},
  doi          = {10.1007/3-540-47555-9\_17},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DesmedtLLMORS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/BurmesterD92,
  author       = {Mike Burmester and
                  Yvo Desmedt},
  editor       = {Robert M. Aiken},
  title        = {Zero-Knowledge Based Identification: From a Theoretical Concept Towards
                  a Practical Token},
  booktitle    = {Education and Society - Information Processing '92, Volume 2, Proceedings
                  of the {IFIP} 12th World Computer Congress, Madrid, Spain, 7-11 September
                  1992},
  series       = {{IFIP} Transactions},
  volume       = {{A-13}},
  pages        = {479--485},
  publisher    = {North-Holland},
  year         = {1992},
  timestamp    = {Fri, 20 Sep 2002 13:29:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/BurmesterD92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/DesmedtFY92,
  author       = {Yvo Desmedt and
                  Yair Frankel and
                  Moti Yung},
  title        = {Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated
                  Multicast/Feedback},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '92, The Conference on Computer Communications,
                  Eleventh Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, One World through Communications, Florence, Italy, May
                  4-8, 1992},
  pages        = {2045--2054},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/INFCOM.1992.263476},
  doi          = {10.1109/INFCOM.1992.263476},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/DesmedtFY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/QuisquaterD91,
  author       = {Jean{-}Jacques Quisquater and
                  Yvo Desmedt},
  title        = {Chinese Lotto as an Exhaustive Code-Breaking Machine},
  journal      = {Computer},
  volume       = {24},
  number       = {11},
  pages        = {14--22},
  year         = {1991},
  url          = {https://doi.org/10.1109/2.116847},
  doi          = {10.1109/2.116847},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/QuisquaterD91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Desmedt91,
  author       = {Yvo Desmedt},
  title        = {The "a" Cipher Does not necessarily Strengthen Security},
  journal      = {Cryptologia},
  volume       = {15},
  number       = {3},
  pages        = {203--206},
  year         = {1991},
  url          = {https://doi.org/10.1080/0161-119191865867},
  doi          = {10.1080/0161-119191865867},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Desmedt91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BengioBDGQ91,
  author       = {Samy Bengio and
                  Gilles Brassard and
                  Yvo Desmedt and
                  Claude Goutier and
                  Jean{-}Jacques Quisquater},
  title        = {Secure Implementations of Identification Systems},
  journal      = {J. Cryptol.},
  volume       = {4},
  number       = {3},
  pages        = {175--183},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF00196726},
  doi          = {10.1007/BF00196726},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BengioBDGQ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DesmedtB91,
  author       = {Yvo Desmedt and
                  Mike Burmester},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based
                  on Smooth Numbers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {360--367},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_31},
  doi          = {10.1007/3-540-57332-1\_31},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DesmedtB91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtF91,
  author       = {Yvo Desmedt and
                  Yair Frankel},
  editor       = {Joan Feigenbaum},
  title        = {Shared Generation of Authenticators and Signatures (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {457--469},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_37},
  doi          = {10.1007/3-540-46766-1\_37},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtF91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BurmesterD91,
  author       = {Mike Burmester and
                  Yvo Desmedt},
  editor       = {Donald W. Davies},
  title        = {Broadcast Interactive Proofs (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_7},
  doi          = {10.1007/3-540-46416-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BurmesterD91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DesmedtY91,
  author       = {Yvo Desmedt and
                  Moti Yung},
  editor       = {Donald W. Davies},
  title        = {Weakness of Undeniable Signature Schemes (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {205--220},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_19},
  doi          = {10.1007/3-540-46416-6\_19},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DesmedtY91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/DavidaD90,
  author       = {George I. Davida and
                  Yvo Desmedt},
  title        = {Cryptography Based Data Security},
  journal      = {Adv. Comput.},
  volume       = {30},
  pages        = {171--222},
  year         = {1990},
  url          = {https://doi.org/10.1016/S0065-2458(08)60300-9},
  doi          = {10.1016/S0065-2458(08)60300-9},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/DavidaD90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BethD90,
  author       = {Thomas Beth and
                  Yvo Desmedt},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Identification Tokens - or: Solving the Chess Grandmaster Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {169--177},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_12},
  doi          = {10.1007/3-540-38424-3\_12},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BethD90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtY90,
  author       = {Yvo Desmedt and
                  Moti Yung},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Abritrated Unconditionally Secure Authentication Can Be Unconditionally
                  Protected Against Arbiter's Attacks (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {177--188},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_13},
  doi          = {10.1007/3-540-38424-3\_13},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DavidaDP90,
  author       = {George I. Davida and
                  Yvo Desmedt and
                  Ren{\'{e}} Peralta},
  editor       = {Ivan Damg{\aa}rd},
  title        = {On the Importance of Memory Resources in the Security of Key Exchange
                  Protocols},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {11--15},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_2},
  doi          = {10.1007/3-540-46877-3\_2},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DavidaDP90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Desmedt89,
  author       = {Yvo Desmedt},
  editor       = {Gilles Brassard},
  title        = {Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free
                  in a General Context},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {6--16},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_2},
  doi          = {10.1007/0-387-34805-0\_2},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Desmedt89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtF89,
  author       = {Yvo Desmedt and
                  Yair Frankel},
  editor       = {Gilles Brassard},
  title        = {Threshold Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {307--315},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_28},
  doi          = {10.1007/0-387-34805-0\_28},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtF89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DavidaDP89,
  author       = {George I. Davida and
                  Yvo Desmedt and
                  Ren{\'{e}} Peralta},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {A Key Distribution System Based On Any One-Way Function (Extended
                  Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {75--79},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_10},
  doi          = {10.1007/3-540-46885-4\_10},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DavidaDP89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BurmesterDPW89,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Fred Piper and
                  Michael Walker},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {A General Zero-Knowledge Scheme (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {122--133},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_15},
  doi          = {10.1007/3-540-46885-4\_15},
  timestamp    = {Tue, 12 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BurmesterDPW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DavidaDM89,
  author       = {George I. Davida and
                  Yvo Desmedt and
                  Brian J. Matt},
  title        = {Defending Systems against Viruses through Cryptographic Authentication},
  booktitle    = {Proceedings of the 1989 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 1-3, 1989},
  pages        = {312--318},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SECPRI.1989.36305},
  doi          = {10.1109/SECPRI.1989.36305},
  timestamp    = {Thu, 21 Sep 2023 15:57:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DavidaDM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Desmedt88,
  author       = {Yvo Desmedt},
  editor       = {Shafi Goldwasser},
  title        = {Abuses in Cryptography and How to Fight Them},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {375--389},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_29},
  doi          = {10.1007/0-387-34799-2\_29},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Desmedt88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Desmedt88,
  author       = {Yvo Desmedt},
  editor       = {Christoph G. G{\"{u}}nther},
  title        = {Subliminal-Free Authentication and Signature (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Davos, Switzerland, May
                  25-27, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {330},
  pages        = {23--33},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-45961-8\_3},
  doi          = {10.1007/3-540-45961-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Desmedt88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DavidaD88,
  author       = {George I. Davida and
                  Yvo Desmedt},
  editor       = {Christoph G. G{\"{u}}nther},
  title        = {Passports and Visas Versus {IDS} (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Davos, Switzerland, May
                  25-27, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {330},
  pages        = {183--188},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-45961-8\_16},
  doi          = {10.1007/3-540-45961-8\_16},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DavidaD88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtGB87,
  author       = {Yvo Desmedt and
                  Claude Goutier and
                  Samy Bengio},
  editor       = {Carl Pomerance},
  title        = {Special Uses and Abuses of the Fiat-Shamir Passport Protocol},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {21--39},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_3},
  doi          = {10.1007/3-540-48184-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtGB87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Desmedt87,
  author       = {Yvo Desmedt},
  editor       = {Carl Pomerance},
  title        = {Society and Group Oriented Cryptography: {A} New Concept},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {120--127},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_8},
  doi          = {10.1007/3-540-48184-2\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Desmedt87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtQ86,
  author       = {Yvo Desmedt and
                  Jean{-}Jacques Quisquater},
  editor       = {Andrew M. Odlyzko},
  title        = {Public-Key Systems Based on the Difficulty of Tampering (Is There
                  a Difference Between {DES} and RSA?)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California,
                  USA, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {263},
  pages        = {111--117},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-47721-7\_9},
  doi          = {10.1007/3-540-47721-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtQ86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Desmedt86,
  author       = {Yvo Desmedt},
  editor       = {Andrew M. Odlyzko},
  title        = {Is There an ultimate Use of Cryptography?},
  booktitle    = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California,
                  USA, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {263},
  pages        = {459--463},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-47721-7\_34},
  doi          = {10.1007/3-540-47721-7\_34},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Desmedt86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DesmedtHQ86,
  author       = {Yvo Desmedt and
                  Frank Hoornaert and
                  Jean{-}Jacques Quisquater},
  title        = {Several Exhaustive Key Search Machines and {DES}},
  booktitle    = {{EUROCRYPT}},
  pages        = {17--19},
  year         = {1986},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DesmedtHQ86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CloetensDBVG86,
  author       = {Henri Cloetens and
                  Yvo Desmedt and
                  Luc Bierens and
                  Joos Vandewalle and
                  Ren{\'{e}} Govaerts},
  title        = {Additional Properties in the S-Boxes of the {DES}},
  booktitle    = {{EUROCRYPT}},
  pages        = {20},
  year         = {1986},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CloetensDBVG86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Desmedt85,
  author       = {Yvo Desmedt},
  editor       = {Hugh C. Williams},
  title        = {Unconditionally Secure Authentication Schemes and Practical and Theoretical
                  Consequences},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {42--55},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_6},
  doi          = {10.1007/3-540-39799-X\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Desmedt85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtO85,
  author       = {Yvo Desmedt and
                  Andrew M. Odlyzko},
  editor       = {Hugh C. Williams},
  title        = {A Chosen Text Attack on the {RSA} Cryptosystem and Some Discrete Logarithm
                  Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {516--522},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_40},
  doi          = {10.1007/3-540-39799-X\_40},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtO85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuisquaterDD85,
  author       = {Jean{-}Jacques Quisquater and
                  Yvo Desmedt and
                  Marc Davio},
  editor       = {Hugh C. Williams},
  title        = {The Importance of "Good" Key Scheduling Schemes (How to
                  Make a Secure {DES} Scheme with {\textless}= 48 Bit Keys)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {537--542},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_43},
  doi          = {10.1007/3-540-39799-X\_43},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/QuisquaterDD85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DesmedtVG84,
  author       = {Yvo Desmedt and
                  Joos Vandewalle and
                  Ren{\'{e}} Govaerts},
  title        = {A critical analysis of the security of knapsack public-key algorithms},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {30},
  number       = {4},
  pages        = {601--610},
  year         = {1984},
  url          = {https://doi.org/10.1109/TIT.1984.1056932},
  doi          = {10.1109/TIT.1984.1056932},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/DesmedtVG84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DavioDGHQ84,
  author       = {Marc Davio and
                  Yvo Desmedt and
                  Jo Goubert and
                  Frank Hoornaert and
                  Jean{-}Jacques Quisquater},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {Efficient Hardware and Software Implementations for the {DES}},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {144--146},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_14},
  doi          = {10.1007/3-540-39568-7\_14},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DavioDGHQ84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoornaertGD84,
  author       = {Frank Hoornaert and
                  Jo Goubert and
                  Yvo Desmedt},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {Efficient Hardware Implementation of the {DES}},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {147--173},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_15},
  doi          = {10.1007/3-540-39568-7\_15},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoornaertGD84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtQD84,
  author       = {Yvo Desmedt and
                  Jean{-}Jacques Quisquater and
                  Marc Davio},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {Dependence of Output on Input in {DES:} Small Avalanche Characteristics},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {359--376},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_28},
  doi          = {10.1007/3-540-39568-7\_28},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtQD84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DavioDQ84,
  author       = {Marc Davio and
                  Yvo Desmedt and
                  Jean{-}Jacques Quisquater},
  editor       = {Thomas Beth and
                  Norbert Cot and
                  Ingemar Ingemarsson},
  title        = {Propagation Characteristics of the {DES}},
  booktitle    = {Advances in Cryptology: Proceedings of {EUROCRYPT} 84, {A} Workshop
                  on the Theory and Application of of Cryptographic Techniques, Paris,
                  France, April 9-11, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {209},
  pages        = {62--73},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39757-4\_7},
  doi          = {10.1007/3-540-39757-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DavioDQ84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DelsarteDOP84,
  author       = {Philippe Delsarte and
                  Yvo Desmedt and
                  Andrew M. Odlyzko and
                  Philippe Piret},
  editor       = {Thomas Beth and
                  Norbert Cot and
                  Ingemar Ingemarsson},
  title        = {Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme},
  booktitle    = {Advances in Cryptology: Proceedings of {EUROCRYPT} 84, {A} Workshop
                  on the Theory and Application of of Cryptographic Techniques, Paris,
                  France, April 9-11, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {209},
  pages        = {142--149},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39757-4\_14},
  doi          = {10.1007/3-540-39757-4\_14},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DelsarteDOP84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GovaertsDV84,
  author       = {Ren{\'{e}} Govaerts and
                  Yvo Desmedt and
                  Joos Vandewalle},
  title        = {Cryptography: How to Attack, What to Protect?},
  booktitle    = {{IEEE} International Conference on Communications: Links for the Future
                  - Science, Systems {\&} Services for Communications, {ICC} 1984,
                  Amsterdam, The Netherlands, May 14-17, 1984, Proceedings},
  pages        = {175--178},
  publisher    = {Elsevier},
  year         = {1984},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GovaertsDV84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WoutersVQPNHGFDD83,
  author       = {Marc Davio and
                  Yvo Desmedt and
                  Marc Fosseprez and
                  Ren{\'{e}} Govaerts and
                  Jan Hulsbosch and
                  Patrik Neutjens and
                  Philippe Piret and
                  Jean{-}Jacques Quisquater and
                  Joos Vandewalle and
                  Pascal Wouters},
  editor       = {David Chaum},
  title        = {Analytical Characteristics of the {DES}},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '83, Santa Barbara,
                  California, USA, August 21-24, 1983},
  pages        = {171--202},
  publisher    = {Plenum Press, New York},
  year         = {1983},
  timestamp    = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/WoutersVQPNHGFDD83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics