Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yvo Desmedt
@inproceedings{DBLP:conf/c2si/Desmedt23, author = {Yvo Desmedt}, editor = {Said El Hajji and Sihem Mesnager and El Mamoun Souidi}, title = {Cryptologists Should Not Ignore the History of Al-Andalusia}, booktitle = {Codes, Cryptology and Information Security - 4th International Conference, {C2SI} 2023, Rabat, Morocco, May 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13874}, pages = {3--9}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33017-9\_1}, doi = {10.1007/978-3-031-33017-9\_1}, timestamp = {Fri, 26 May 2023 22:27:21 +0200}, biburl = {https://dblp.org/rec/conf/c2si/Desmedt23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChiapputoDM23, author = {Nicolas Chiapputo and Yvo Desmedt and Kirill Morozov}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Using Untrusted and Unreliable Cloud Providers to Obtain Private Email}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {171--182}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012090700003555}, doi = {10.5220/0012090700003555}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ChiapputoDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Desmedt22, author = {Yvo Desmedt}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper)}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {436--442}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328800003283}, doi = {10.5220/0011328800003283}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Desmedt22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SehrawatYD21, author = {Vipin Singh Sehrawat and Foo Yee Yeo and Yvo Desmedt}, title = {Extremal set theory and {LWE} based access structure hiding verifiable secret sharing with malicious-majority and free verification}, journal = {Theor. Comput. Sci.}, volume = {886}, pages = {106--138}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.07.022}, doi = {10.1016/J.TCS.2021.07.022}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SehrawatYD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DesmedtMS21, author = {Yvo Desmedt and Songbao Mo and Arkadii M. Slinko}, title = {Framing in Secret Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {2836--2842}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3067468}, doi = {10.1109/TIFS.2021.3067468}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DesmedtMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/SehrawatD20, author = {Vipin Singh Sehrawat and Yvo Desmedt}, editor = {Donghyun Kim and R. N. Uma and Zhipeng Cai and Dong Hoon Lee}, title = {Access Structure Hiding Secret Sharing from Novel Set Systems and Vector Families}, booktitle = {Computing and Combinatorics - 26th International Conference, {COCOON} 2020, Atlanta, GA, USA, August 29-31, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12273}, pages = {246--261}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58150-3\_20}, doi = {10.1007/978-3-030-58150-3\_20}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/SehrawatD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-07969, author = {Vipin Singh Sehrawat and Yvo Desmedt}, title = {Access Structure Hiding Secret Sharing from Novel Set Systems and Vector Families}, journal = {CoRR}, volume = {abs/2008.07969}, year = {2020}, url = {https://arxiv.org/abs/2008.07969}, eprinttype = {arXiv}, eprint = {2008.07969}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-07969.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-14804, author = {Vipin Singh Sehrawat and Foo Yee Yeo and Yvo Desmedt}, title = {Extremal Set Theory and {LWE} Based Access Structure Hiding Verifiable Secret Sharing with Malicious Majority and Free Verification}, journal = {CoRR}, volume = {abs/2011.14804}, year = {2020}, url = {https://arxiv.org/abs/2011.14804}, eprinttype = {arXiv}, eprint = {2011.14804}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-14804.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DesmedtP19, author = {Yvo Desmedt and Fred Piper}, title = {Perfect Anonymity}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {6}, pages = {3990--3997}, year = {2019}, url = {https://doi.org/10.1109/TIT.2019.2893334}, doi = {10.1109/TIT.2019.2893334}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DesmedtP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SehrawatD19, author = {Vipin Singh Sehrawat and Yvo Desmedt}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {3--23}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_1}, doi = {10.1007/978-3-030-31578-8\_1}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/SehrawatD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DesmedtDM19, author = {Yvo Desmedt and Sabyasachi Dutta and Kirill Morozov}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Evolving Perfect Hash Families: {A} Combinatorial Viewpoint of Evolving Secret Sharing}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {291--307}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_16}, doi = {10.1007/978-3-030-31578-8\_16}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DesmedtDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DesmedtS19, author = {Yvo Desmedt and Arkadii Slinko}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Realistic versus Rational Secret Sharing}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {152--163}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_10}, doi = {10.1007/978-3-030-32430-8\_10}, timestamp = {Wed, 23 Oct 2019 12:50:25 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/DesmedtS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DesmedtM19, author = {Yvo Desmedt and Kirill Morozov}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {{VSS} Made Simpler}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {329--342}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_19}, doi = {10.1007/978-3-030-26834-3\_19}, timestamp = {Wed, 07 Aug 2019 14:48:42 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DesmedtM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-07581, author = {Yvo Desmedt and Arkadii Slinko}, title = {Realistic versus Rational Secret Sharing}, journal = {CoRR}, volume = {abs/1908.07581}, year = {2019}, url = {http://arxiv.org/abs/1908.07581}, eprinttype = {arXiv}, eprint = {1908.07581}, timestamp = {Mon, 26 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-07581.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-09032, author = {Vipin Singh Sehrawat and Yvo Desmedt}, title = {Bi-Homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption}, journal = {CoRR}, volume = {abs/1908.09032}, year = {2019}, url = {http://arxiv.org/abs/1908.09032}, eprinttype = {arXiv}, eprint = {1908.09032}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-09032.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/DesmedtS18, author = {Yvo Desmedt and Arash Shaghaghi}, editor = {Pierangela Samarati and Indrajit Ray and Indrakshi Ray}, title = {Function-Based Access Control {(FBAC):} Towards Preventing Insider Threats in Organizations}, booktitle = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {11170}, pages = {143--165}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04834-1\_8}, doi = {10.1007/978-3-030-04834-1\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/DesmedtS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdc/PunekarMWD17, author = {Mayur Punekar and Qutaibah M. Malluhi and Yongge Wang and Yvo Desmedt}, editor = {Ashiq Anjum and Alan Sill and Xinghui Zhao and Mohsen M. Farid and Shrideep Pallickara and Jiannong Cao}, title = {Candidate {MDS} Array Codes for Tolerating Three Disk Failures in {RAID-7} Architectures}, booktitle = {Proceedings of the Fourth {IEEE/ACM} International Conference on Big Data Computing, Applications and Technologies, {BDCAT} 2017, Austin, TX, USA, December 05 - 08, 2017}, pages = {33--42}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3148055.3148056}, doi = {10.1145/3148055.3148056}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bdc/PunekarMWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/PunekarMDW17, author = {Mayur Punekar and Qutaibah M. Malluhi and Yvo Desmedt and Yongge Wang}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {470--481}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_22}, doi = {10.1007/978-3-030-02641-7\_22}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/PunekarMDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DesmedtIPV17, author = {Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti}, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Controlled Homomorphic Encryption: Definition and Construction}, booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, pages = {107--129}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0\_7}, doi = {10.1007/978-3-319-70278-0\_7}, timestamp = {Tue, 16 Aug 2022 23:04:23 +0200}, biburl = {https://dblp.org/rec/conf/fc/DesmedtIPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Safavi-NainiLD17, author = {Reihaneh Safavi{-}Naini and Viliam Lis{\'{y}} and Yvo Desmedt}, editor = {Aggelos Kiayias}, title = {Economically Optimal Variable Tag Length Message Authentication}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {204--223}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_11}, doi = {10.1007/978-3-319-70972-7\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Safavi-NainiLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotdcc/Desmedt17, author = {Yvo Desmedt}, editor = {Hani Hamdan and Djallel Eddine Boubiche and Homero Toral{-}Cruz and Sedat Akleylek and Hamid Mcheick}, title = {"Need to know" to defend one's home, or should one buy a wifi enabled thermostat?}, booktitle = {Proceedings of the Second International Conference on Internet of things and Cloud Computing, {ICC} 2017, Cambridge, United Kingdom, March 22-23, 2017}, pages = {201:1--201:4}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3018896.3152307}, doi = {10.1145/3018896.3152307}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/iotdcc/Desmedt17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuD16, author = {Yi Lu and Yvo Desmedt}, title = {Walsh transforms and cryptographic applications in bias computing}, journal = {Cryptogr. Commun.}, volume = {8}, number = {3}, pages = {435--453}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0155-4}, doi = {10.1007/S12095-015-0155-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Desmedt16, author = {Yvo Desmedt}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {What is the Future of Cryptography?}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {109--122}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_7}, doi = {10.1007/978-3-662-49301-4\_7}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Desmedt16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DesmedtS16, author = {Yvo Desmedt and Arash Shaghaghi}, editor = {Ilsun You and Elisa Bertino}, title = {Function-Based Access Control {(FBAC):} From Access Control Matrix to Access Control Tensor}, booktitle = {Proceedings of the 8th {ACM} {CCS} International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {89--92}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2995974}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DesmedtS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DArcoPD16, author = {Paolo D'Arco and Roberto De Prisco and Yvo Desmedt}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {95--113}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_5}, doi = {10.1007/978-3-319-49175-2\_5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DArcoPD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DesmedtS16, author = {Yvo Desmedt and Arash Shaghaghi}, title = {Function-Based Access Control {(FBAC):} From Access Control Matrix to Access Control Tensor}, journal = {CoRR}, volume = {abs/1609.04514}, year = {2016}, url = {http://arxiv.org/abs/1609.04514}, eprinttype = {arXiv}, eprint = {1609.04514}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DesmedtS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuD16, author = {Yi Lu and Yvo Desmedt}, title = {Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2016}, url = {http://eprint.iacr.org/2016/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/DesmedtM15, author = {Yvo Desmedt and Kirill Morozov}, title = {Parity Check based redistribution of secret shares}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2015, Hong Kong, China, June 14-19, 2015}, pages = {959--963}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIT.2015.7282597}, doi = {10.1109/ISIT.2015.7282597}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/DesmedtM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/DesmedtE15, author = {Yvo Desmedt and Stelios Erotokritou}, editor = {Rolf Haenni and Reto E. Koenig and Douglas Wikstr{\"{o}}m}, title = {Making Code Voting Secure Against Insider Threats Using Unconditionally Secure {MIX} Schemes and Human {PSMT} Protocols}, booktitle = {E-Voting and Identity - 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9269}, pages = {110--126}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22270-7\_7}, doi = {10.1007/978-3-319-22270-7\_7}, timestamp = {Thu, 27 Feb 2020 12:57:39 +0100}, biburl = {https://dblp.org/rec/conf/voteid/DesmedtE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2013, editor = {Yvo Desmedt}, title = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27659-5}, doi = {10.1007/978-3-319-27659-5}, isbn = {978-3-319-27658-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DesmedtE15, author = {Yvo Desmedt and Stelios Erotokritou}, title = {Making Code Voting Secure against Insider Threats using Unconditionally Secure {MIX} Schemes and Human {PSMT} Protocols}, journal = {CoRR}, volume = {abs/1506.04429}, year = {2015}, url = {http://arxiv.org/abs/1506.04429}, eprinttype = {arXiv}, eprint = {1506.04429}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DesmedtE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AsgharDPS14, author = {Hassan Jameel Asghar and Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld}, title = {A subexponential construction of graph coloring for multiparty computation}, journal = {J. Math. Cryptol.}, volume = {8}, number = {4}, pages = {363--403}, year = {2014}, url = {http://www.degruyter.com/view/j/jmc.2014.8.issue-4/jmc-2013-0035/jmc-2013-0035.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/AsgharDPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/WangD14, author = {Yongge Wang and Yvo Desmedt}, title = {Efficient secret sharing schemes achieving optimal information rate}, booktitle = {2014 {IEEE} Information Theory Workshop, {ITW} 2014, Hobart, Tasmania, Australia, November 2-5, 2014}, pages = {516--520}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ITW.2014.6970885}, doi = {10.1109/ITW.2014.6970885}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itw/WangD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Desmedt14, author = {Yvo Desmedt}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {276--285}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_27}, doi = {10.1007/978-3-319-12400-1\_27}, timestamp = {Mon, 05 Feb 2024 20:35:15 +0100}, biburl = {https://dblp.org/rec/conf/spw/Desmedt14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Desmedt14a, author = {Yvo Desmedt}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {286--299}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_28}, doi = {10.1007/978-3-319-12400-1\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Desmedt14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharDPS14, author = {Hassan Jameel Asghar and Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld}, title = {A Subexponential Construction of Graph Coloring for Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2014}, url = {http://eprint.iacr.org/2014/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsgharDPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DesmedtIPV14, author = {Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti}, title = {Controlled Homomorphic Encryption: Definition and Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2014}, url = {http://eprint.iacr.org/2014/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DesmedtIPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/MahmoodD13, author = {Shah Mahmood and Yvo Desmedt}, title = {Two new economic models for privacy}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {40}, number = {4}, pages = {84--89}, year = {2013}, url = {https://doi.org/10.1145/2479942.2479953}, doi = {10.1145/2479942.2479953}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/MahmoodD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AdhamADK13, author = {Manal T. Adham and Amir Azodi and Yvo Desmedt and Ioannis Karaolis}, editor = {Ahmad{-}Reza Sadeghi}, title = {How to Attack Two-Factor Authentication Internet Banking}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {322--328}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_27}, doi = {10.1007/978-3-642-39884-1\_27}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AdhamADK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/0002D13, author = {Yi Lu and Yvo Desmedt}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Improved Davies-Murphy's Attack on {DES} Revisited}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {264--271}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_16}, doi = {10.1007/978-3-319-05302-8\_16}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/0002D13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DesmedtPSSTWY12, author = {Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld and Xiaoming Sun and Christophe Tartary and Huaxiong Wang and Andrew Chi{-}Chih Yao}, title = {Graph Coloring Applied to Secure Computation in Non-Abelian Groups}, journal = {J. Cryptol.}, volume = {25}, number = {4}, pages = {557--600}, year = {2012}, url = {https://doi.org/10.1007/s00145-011-9104-3}, doi = {10.1007/S00145-011-9104-3}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DesmedtPSSTWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Desmedt12, author = {Yvo Desmedt}, editor = {David Naccache}, title = {A Brief Survey of Research Jointly with Jean-Jacques Quisquater}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {8--12}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_3}, doi = {10.1007/978-3-642-28368-0\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Desmedt12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DesmedtC12, author = {Yvo Desmedt and Pyrros Chaidos}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {433--450}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_25}, doi = {10.1007/978-3-642-33167-1\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DesmedtC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/MahmoodD12, author = {Shah Mahmood and Yvo Desmedt}, title = {Your Facebook deactivated friend or a cloaked spy}, booktitle = {Tenth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland, Workshop Proceedings}, pages = {367--373}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PerComW.2012.6197512}, doi = {10.1109/PERCOMW.2012.6197512}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/percom/MahmoodD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MahmoodD12, author = {Shah Mahmood and Yvo Desmedt}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {374--375}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_19}, doi = {10.1007/978-3-642-33338-5\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MahmoodD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DesmedtPS12, author = {Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Active Security in Multiparty Computation over Black-Box Groups}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {503--521}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_28}, doi = {10.1007/978-3-642-32928-9\_28}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/DesmedtPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ErotokritouD12, author = {Stelios Erotokritou and Yvo Desmedt}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Human Perfectly Secure Message Transmission Protocols and Their Applications}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {540--558}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_30}, doi = {10.1007/978-3-642-32928-9\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ErotokritouD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MahmoodD12, author = {Shah Mahmood and Yvo Desmedt}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Usable Privacy by Visual and Interactive Control of Information Flow}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {181--188}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_20}, doi = {10.1007/978-3-642-35694-0\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MahmoodD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-4043, author = {Shah Mahmood and Yvo Desmedt}, title = {Your Facebook Deactivated Friend or a Cloaked Spy (Extended Abstract)}, journal = {CoRR}, volume = {abs/1203.4043}, year = {2012}, url = {http://arxiv.org/abs/1203.4043}, eprinttype = {arXiv}, eprint = {1203.4043}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-4043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-5439, author = {Yongge Wang and Yvo Desmedt}, title = {Edge-Colored Graphs with Applications To Homogeneous Faults}, journal = {CoRR}, volume = {abs/1207.5439}, year = {2012}, url = {http://arxiv.org/abs/1207.5439}, eprinttype = {arXiv}, eprint = {1207.5439}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-5439.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/WangD11, author = {Yongge Wang and Yvo Desmedt}, title = {Edge-colored graphs with applications to homogeneous faults}, journal = {Inf. Process. Lett.}, volume = {111}, number = {13}, pages = {634--641}, year = {2011}, url = {https://doi.org/10.1016/j.ipl.2011.03.017}, doi = {10.1016/J.IPL.2011.03.017}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/WangD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YangD11, author = {Qiushi Yang and Yvo Desmedt}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Secure Communication in Multicast Graphs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {538--555}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_29}, doi = {10.1007/978-3-642-25385-0\_29}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/YangD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MahmoodD11, author = {Shah Mahmood and Yvo Desmedt}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: preliminary analysis of Google+'s privacy}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {809--812}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093499}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MahmoodD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/WangD11, author = {Yongge Wang and Yvo Desmedt}, editor = {Serge Fehr}, title = {Homogeneous Faults, Colored Edge Graphs, and Cover Free Families}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {58--72}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_6}, doi = {10.1007/978-3-642-20728-0\_6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/WangD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Access Structure}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_313}, doi = {10.1007/978-1-4419-5906-5\_313}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/DesmedtJ11, author = {Yvo Desmedt and Goce Jakimoski}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Broadcast Authentication from an Information Theoretic Perspective}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {170--171}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_885}, doi = {10.1007/978-1-4419-5906-5\_885}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/DesmedtJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11a, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Covert Channels}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {265--266}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_315}, doi = {10.1007/978-1-4419-5906-5\_315}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11b, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Deniable Encryption}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {322--323}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_316}, doi = {10.1007/978-1-4419-5906-5\_316}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11c, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {ElGamal Public Key Encryption}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {396}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_318}, doi = {10.1007/978-1-4419-5906-5\_318}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11d, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {457--458}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_319}, doi = {10.1007/978-1-4419-5906-5\_319}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11e, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Knapsack Cryptographic Schemes}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {695--704}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_323}, doi = {10.1007/978-1-4419-5906-5\_323}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11f, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Man-in-the-Middle Attack}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {759}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_324}, doi = {10.1007/978-1-4419-5906-5\_324}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/DesmedtY11, author = {Yvo Desmedt and Qiushi Yang}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Perfectly Secure Message Transmission}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {922--924}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_326}, doi = {10.1007/978-1-4419-5906-5\_326}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/DesmedtY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11g, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Relay Attack}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1042}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_327}, doi = {10.1007/978-1-4419-5906-5\_327}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11h, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Station-to-Station Protocol}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1256}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_328}, doi = {10.1007/978-1-4419-5906-5\_328}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/DesmedtJ11a, author = {Yvo Desmedt and Goce Jakimoski}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Stream and Multicast Authentication}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1260--1263}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_329}, doi = {10.1007/978-1-4419-5906-5\_329}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/DesmedtJ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11i, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Threshold Cryptography}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1288--1293}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_330}, doi = {10.1007/978-1-4419-5906-5\_330}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt11j, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Trojan Horses, Computer Viruses, and Worms}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1319--1320}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_331}, doi = {10.1007/978-1-4419-5906-5\_331}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt11j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-3530, author = {Shah Mahmood and Yvo Desmedt}, title = {Preliminary Analysis of Google+'s Privacy}, journal = {CoRR}, volume = {abs/1111.3530}, year = {2011}, url = {http://arxiv.org/abs/1111.3530}, eprinttype = {arXiv}, eprint = {1111.3530}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-3530.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangD11, author = {Qiushi Yang and Yvo Desmedt}, title = {Efficient 2-Round General Perfectly Secure Message Transmission: {A} Minor Correction to Yang and Desmedt's Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2011}, url = {http://eprint.iacr.org/2011/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DesmedtGKS10, author = {Yvo Desmedt and Rosario Gennaro and Kaoru Kurosawa and Victor Shoup}, title = {A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack}, journal = {J. Cryptol.}, volume = {23}, number = {1}, pages = {91--120}, year = {2010}, url = {https://doi.org/10.1007/s00145-009-9051-4}, doi = {10.1007/S00145-009-9051-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DesmedtGKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/DesmedtES10, author = {Yvo Desmedt and Stelios Erotokritou and Reihaneh Safavi{-}Naini}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {166--183}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_11}, doi = {10.1007/978-3-642-12678-9\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/DesmedtES10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YangD10, author = {Qiushi Yang and Yvo Desmedt}, editor = {Masayuki Abe}, title = {General Perfectly Secure Message Transmission Using Linear Codes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {448--465}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_26}, doi = {10.1007/978-3-642-17373-8\_26}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/YangD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/JiaDHW10, author = {Keting Jia and Yvo Desmedt and Lidong Han and Xiaoyun Wang}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Pseudo-Cryptanalysis of Luffa}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {187--198}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_14}, doi = {10.1007/978-3-642-21518-6\_14}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/JiaDHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DesmedtM10, author = {Yvo Desmedt and Atsuko Miyaji}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {236--254}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_17}, doi = {10.1007/978-3-642-21518-6\_17}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/DesmedtM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LuD10, author = {Yi Lu and Yvo Desmedt}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {Bias Analysis of a Certain Problem with Applications to {E0} and Shannon Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {16--28}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_2}, doi = {10.1007/978-3-642-24209-0\_2}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LuD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LuD10, author = {Yi Lu and Yvo Desmedt}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Improved Distinguishing Attack on Rabbit}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {17--23}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_2}, doi = {10.1007/978-3-642-18178-8\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/LuD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/DesmedtE10, author = {Yvo Desmedt and Edith Elkind}, editor = {David C. Parkes and Chrysanthos Dellarocas and Moshe Tennenholtz}, title = {Equilibria of plurality voting with abstentions}, booktitle = {Proceedings 11th {ACM} Conference on Electronic Commerce (EC-2010), Cambridge, Massachusetts, USA, June 7-11, 2010}, pages = {347--356}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1807342.1807398}, doi = {10.1145/1807342.1807398}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/DesmedtE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EstehghariD10, author = {Saghar Estehghari and Yvo Desmedt}, editor = {Douglas W. Jones and Jean{-}Jacques Quisquater and Eric Rescorla}, title = {Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example}, booktitle = {2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '10, Washington, D.C., USA, August 9-10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/evtwote-10/exploiting-client-vulnerabilities-internet-e-voting-systems-hacking-helios-20}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/EstehghariD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-4939, author = {Yvo Desmedt and Edith Elkind}, title = {Equilibria of Plurality Voting with Abstentions}, journal = {CoRR}, volume = {abs/1001.4939}, year = {2010}, url = {http://arxiv.org/abs/1001.4939}, eprinttype = {arXiv}, eprint = {1001.4939}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-4939.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/DesmedtDTW09, author = {Yvo Desmedt and Niels Duif and Henk van Tilborg and Huaxiong Wang}, title = {Bounds and constructions for key distribution schemes}, journal = {Adv. Math. Commun.}, volume = {3}, number = {3}, pages = {273--293}, year = {2009}, url = {https://doi.org/10.3934/amc.2009.3.273}, doi = {10.3934/AMC.2009.3.273}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/DesmedtDTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codcry/TonienSND09, author = {Dongvu Tonien and Reihaneh Safavi{-}Naini and Peter Nickolas and Yvo Desmedt}, editor = {Yeow Meng Chee and Chao Li and San Ling and Huaxiong Wang and Chaoping Xing}, title = {Unconditionally Secure Approximate Message Authentication}, booktitle = {Coding and Cryptology, Second International Workshop, {IWCC} 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5557}, pages = {233--247}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01877-0\_19}, doi = {10.1007/978-3-642-01877-0\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codcry/TonienSND09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/YangD09, author = {Qiushi Yang and Yvo Desmedt}, editor = {Kaoru Kurosawa}, title = {Cryptanalysis of Secure Message Transmission Protocols with Feedback}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {159--176}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_14}, doi = {10.1007/978-3-642-14496-7\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/YangD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2007, editor = {Yvo Desmedt}, title = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10230-1}, doi = {10.1007/978-3-642-10230-1}, isbn = {978-3-642-10229-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiaDHW09, author = {Keting Jia and Yvo Desmedt and Lidong Han and Xiaoyun Wang}, title = {Pseudo-Cryptanalysis of Luffa}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2009}, url = {http://eprint.iacr.org/2009/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiaDHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangD09, author = {Qiushi Yang and Yvo Desmedt}, title = {Cryptanalysis of Secure Message Transmission Protocols with Feedback}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2009}, url = {http://eprint.iacr.org/2009/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WangD08, author = {Yongge Wang and Yvo Desmedt}, title = {Perfectly Secure Message Transmission Revisited}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2582--2595}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921676}, doi = {10.1109/TIT.2008.921676}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/WangD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DesmedtLP08, author = {Yvo Desmedt and Helger Lipmaa and Duong Hieu Phan}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Hybrid Damg{\aa}rd Is CCA1-Secure under the {DDH} Assumption}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {18--30}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_2}, doi = {10.1007/978-3-540-89641-8\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DesmedtLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DesmedtL08, author = {Yvo Desmedt and Tanja Lange}, editor = {Gene Tsudik}, title = {Revisiting Pairing Based Group Key Exchange}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {53--68}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_5}, doi = {10.1007/978-3-540-85230-8\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DesmedtL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CallasDNOQY08, author = {Jon Callas and Yvo Desmedt and Daniel Nagy and Akira Otsuka and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Gene Tsudik}, title = {Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report)}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {307--313}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_28}, doi = {10.1007/978-3-540-85230-8\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CallasDNOQY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DesmedtKS08, author = {Yvo Desmedt and Brian King and Berry Schoenmakers}, editor = {Reihaneh Safavi{-}Naini}, title = {Revisiting the Karnin, Greene and Hellman Bounds}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {183--198}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_18}, doi = {10.1007/978-3-540-85093-9\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/DesmedtKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DesmedtP08, author = {Yvo Desmedt and Duong Hieu Phan}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {A {CCA} Secure Hybrid Damg{\aa}rd's ElGamal Encryption}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {68--82}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_5}, doi = {10.1007/978-3-540-88733-1\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/DesmedtP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DamgardDFN07, author = {Ivan Damg{\aa}rd and Yvo Desmedt and Matthias Fitzi and Jesper Buus Nielsen}, editor = {Kaoru Kurosawa}, title = {Secure Protocols with Asymmetric Trust}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {357--375}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_22}, doi = {10.1007/978-3-540-76900-2\_22}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DamgardDFN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Safavi-NainiWD07, author = {Reihaneh Safavi{-}Naini and Shuhong Wang and Yvo Desmedt}, editor = {Feng Bao and Steven Miller}, title = {Unconditionally secure ring authentication}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {173--181}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229310}, doi = {10.1145/1229285.1229310}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Safavi-NainiWD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtPSW07, author = {Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld and Huaxiong Wang}, editor = {Alfred Menezes}, title = {On Secure Multi-party Computation in Black-Box Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {591--612}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_33}, doi = {10.1007/978-3-540-74143-5\_33}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtPSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DesmedtJ07, author = {Yvo Desmedt and Goce Jakimoski}, editor = {Masayuki Abe}, title = {Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {324--338}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_21}, doi = {10.1007/11967668\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DesmedtJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Desmedt07, author = {Yvo Desmedt}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Position Statement in {RFID} S{\&}P Panel: From Relative Security to Perceived Secure}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {53--56}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_8}, doi = {10.1007/978-3-540-77366-5\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Desmedt07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DesmedtLB07, author = {Yvo Desmedt and Tanja Lange and Mike Burmester}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {104--118}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_12}, doi = {10.1007/978-3-540-77366-5\_12}, timestamp = {Mon, 25 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/DesmedtLB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DesmedtK07, author = {Yvo Desmedt and Kaoru Kurosawa}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {351--361}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_23}, doi = {10.1007/978-3-540-75496-1\_23}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/DesmedtK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CoronNDOS06, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Yvo Desmedt and Andrew M. Odlyzko and Julien P. Stern}, title = {Index Calculation Attacks on {RSA} Signature and Encryption}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {41--53}, year = {2006}, url = {https://doi.org/10.1007/s10623-004-5660-y}, doi = {10.1007/S10623-004-5660-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CoronNDOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/DesmedtWB06, author = {Yvo Desmedt and Yongge Wang and Mike Burmester}, editor = {Javier L{\'{o}}pez}, title = {Revisiting Colored Networks and Privacy Preserving Censorship}, booktitle = {Critical Information Infrastructures Security, First International Workshop, {CRITIS} 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {4347}, pages = {140--150}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11962977\_12}, doi = {10.1007/11962977\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/DesmedtWB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DesmedtL06, author = {Yvo Desmedt and Tanja Lange}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {154--159}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_12}, doi = {10.1007/11889663\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DesmedtL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengNDD06, author = {Kun Peng and Juan Manuel Gonz{\'{a}}lez Nieto and Yvo Desmedt and Ed Dawson}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Klein Bottle Routing: An Alternative to Onion Routing and Mix Network}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {296--309}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_25}, doi = {10.1007/11927587\_25}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengNDD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DesmedtPSW06, author = {Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld and Huaxiong Wang}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {459--475}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_33}, doi = {10.1007/11836810\_33}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/DesmedtPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakimoskiD06, author = {Goce Jakimoski and Yvo Desmedt}, title = {A Tree-based Model of Unicast Stream Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2006}, url = {http://eprint.iacr.org/2006/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakimoskiD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DesmedtLB06, author = {Yvo Desmedt and Tanja Lange and Mike Burmester}, title = {Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2006}, url = {http://eprint.iacr.org/2006/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DesmedtLB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BurmesterD05, author = {Mike Burmester and Yvo Desmedt}, title = {A secure and scalable Group Key Exchange system}, journal = {Inf. Process. Lett.}, volume = {94}, number = {3}, pages = {137--143}, year = {2005}, url = {https://doi.org/10.1016/j.ipl.2005.01.003}, doi = {10.1016/J.IPL.2005.01.003}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BurmesterD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Desmedt05, author = {Yvo Desmedt}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Potential Impacts of a Growing Gap Between Theory and Practice in Information Security}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {532--536}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_44}, doi = {10.1007/11506157\_44}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Desmedt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/DesmedtWSW05, author = {Yvo Desmedt and Yongge Wang and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Lusheng Wang}, title = {Radio Networks with Reliable Communication}, booktitle = {Computing and Combinatorics, 11th Annual International Conference, {COCOON} 2005, Kunming, China, August 16-29, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3595}, pages = {156--166}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11533719\_18}, doi = {10.1007/11533719\_18}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cocoon/DesmedtWSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/KingD05, author = {Brian King and Yvo Desmedt}, title = {Securing Abstention in an Electronic Legislature}, booktitle = {38th Hawaii International Conference on System Sciences {(HICSS-38} 2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/HICSS.2005.532}, doi = {10.1109/HICSS.2005.532}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/KingD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Desmedt05, author = {Yvo Desmedt}, title = {Unconditionally private and reliable communication in an untrusted network}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {38--41}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543954}, doi = {10.1109/ITWTPI.2005.1543954}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icits/Desmedt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/DesmedtWB05, author = {Yvo Desmedt and Yongge Wang and Mike Burmester}, editor = {Xiaotie Deng and Ding{-}Zhu Du}, title = {A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback}, booktitle = {Algorithms and Computation, 16th International Symposium, {ISAAC} 2005, Sanya, Hainan, China, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3827}, pages = {277--287}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602613\_29}, doi = {10.1007/11602613\_29}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isaac/DesmedtWB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DesmedtK05, author = {Yvo Desmedt and Kaoru Kurosawa}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Electronic Voting: Starting Over?}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {329--343}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_24}, doi = {10.1007/11556992\_24}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/DesmedtK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Desmedt05, author = {Yvo Desmedt}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Understanding Why Some Network Protocols Are User-Unfriendly}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {215--219}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_26}, doi = {10.1007/978-3-540-77156-2\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Desmedt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Desmedt05a, author = {Yvo Desmedt}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Understanding Why Some Network Protocols Are User-Unfriendly}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {220--227}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_27}, doi = {10.1007/978-3-540-77156-2\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Desmedt05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2005, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371}, doi = {10.1007/11599371}, isbn = {3-540-30849-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {Access structure}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_4}, doi = {10.1007/0-387-23483-7\_4}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05a, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {Covert Channels}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_82}, doi = {10.1007/0-387-23483-7\_82}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05b, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {Deniable encryption}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_101}, doi = {10.1007/0-387-23483-7\_101}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05c, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {ElGamal Public Key Encryption}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_129}, doi = {10.1007/0-387-23483-7\_129}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05d, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature Scheme}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_162}, doi = {10.1007/0-387-23483-7\_162}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05e, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {Knapsack cryptographic schemes}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_223}, doi = {10.1007/0-387-23483-7\_223}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05f, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {Man-in-the-Middle Attack}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_241}, doi = {10.1007/0-387-23483-7\_241}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05g, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {Relay Attack}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_352}, doi = {10.1007/0-387-23483-7\_352}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05h, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {Station-to-Station Protocol}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_411}, doi = {10.1007/0-387-23483-7\_411}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05i, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {Threshold Cryptography}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_428}, doi = {10.1007/0-387-23483-7\_428}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Desmedt05j, author = {Yvo Desmedt}, editor = {Henk C. A. van Tilborg}, title = {Trojan Horses, Computer Viruses and Worms}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_438}, doi = {10.1007/0-387-23483-7\_438}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Desmedt05j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakimoskiD05, author = {Goce Jakimoski and Yvo Desmedt}, title = {On Resistance of {DES} to Related-Key Differential Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2005}, url = {http://eprint.iacr.org/2005/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakimoskiD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BurmesterD04, author = {Mike Burmester and Yvo Desmedt}, title = {Is hierarchical public-key certification the next target for hackers?}, journal = {Commun. {ACM}}, volume = {47}, number = {8}, pages = {68--74}, year = {2004}, url = {https://doi.org/10.1145/1012037.1012038}, doi = {10.1145/1012037.1012038}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BurmesterD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/DesmedtW04, author = {Yvo Desmedt and Yongge Wang}, title = {Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs}, journal = {Int. J. Found. Comput. Sci.}, volume = {15}, number = {1}, pages = {107--125}, year = {2004}, url = {https://doi.org/10.1142/S0129054104002339}, doi = {10.1142/S0129054104002339}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijfcs/DesmedtW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/LeSWD04, author = {Tri Van Le and R{\"{u}}diger Sparr and Ralph Wernsdorf and Yvo Desmedt}, editor = {Hans Dobbertin and Vincent Rijmen and Aleksandra Sowa}, title = {Complementation-Like and Cyclic Properties of {AES} Round Functions}, booktitle = {Advanced Encryption Standard - AES, 4th International Conference, {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3373}, pages = {128--141}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11506447\_11}, doi = {10.1007/11506447\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/aes/LeSWD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KurosawaD04, author = {Kaoru Kurosawa and Yvo Desmedt}, editor = {Matthew K. Franklin}, title = {A New Paradigm of Hybrid Encryption Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {426--442}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_26}, doi = {10.1007/978-3-540-28628-8\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KurosawaD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DesmedtB04, author = {Yvo Desmedt and Mike Burmester}, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Identity-based Key Infrastructures {(IKI)}}, booktitle = {Security and Protection in Information Processing Systems, {IFIP} 18th WorldComputer Congress, {TC11} 19th International Information Security Conference, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {147}, pages = {167--176}, publisher = {Kluwer / Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8143-X\_11}, doi = {10.1007/1-4020-8143-X\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DesmedtB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BurmesterDWY04, author = {Mike Burmester and Yvo Desmedt and Rebecca N. Wright and Alec Yasinsac}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Accountable Privacy}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {83--95}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_10}, doi = {10.1007/11861386\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BurmesterDWY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DesmedtKL03, author = {Yvo Desmedt and Kaoru Kurosawa and Tri Van Le}, editor = {Colin Boyd and Wenbo Mao}, title = {Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {396--407}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_30}, doi = {10.1007/10958513\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/DesmedtKL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JakimoskiD03, author = {Goce Jakimoski and Yvo Desmedt}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {Related-Key Differential Cryptanalysis of 192-bit Key {AES} Variants}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {208--221}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_15}, doi = {10.1007/978-3-540-24654-1\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/JakimoskiD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Desmedt02, author = {Yvo Desmedt}, title = {Is there a Need for Survivable Computation in Critical Infrastructures?}, journal = {Inf. Secur. Tech. Rep.}, volume = {7}, number = {2}, pages = {11--21}, year = {2002}, url = {https://doi.org/10.1016/S1363-4127(02)02003-4}, doi = {10.1016/S1363-4127(02)02003-4}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Desmedt02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/DesmedtW02, author = {Yvo Desmedt and Yongge Wang}, editor = {Oscar H. Ibarra and Louxin Zhang}, title = {Maximum Flows and Critical Vertices in {AND/OR} Graphs}, booktitle = {Computing and Combinatorics, 8th Annual International Conference, {COCOON} 2002, Singapore, August 15-17, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2387}, pages = {238--248}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45655-4\_27}, doi = {10.1007/3-540-45655-4\_27}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cocoon/DesmedtW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egov/DesmedtK02, author = {Yvo Desmedt and Brian King}, editor = {Klaus Lenk and Roland Traunm{\"{u}}ller}, title = {Verifiable Democracy a Protocol to Secure an Electronic Legislature}, booktitle = {Electronic Government, First International Conference, {EGOV} 2002, Aix-en-Provence, France, September 2-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2456}, pages = {460--463}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46138-8\_74}, doi = {10.1007/3-540-46138-8\_74}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/egov/DesmedtK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DesmedtW02, author = {Yvo Desmedt and Yongge Wang}, editor = {Lars R. Knudsen}, title = {Perfectly Secure Message Transmission Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {502--517}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_33}, doi = {10.1007/3-540-46035-7\_33}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DesmedtW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DesmedtSW02, author = {Yvo Desmedt and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Matt Blaze}, title = {Redistribution of Mechanical Secret Shares}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {238--252}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_17}, doi = {10.1007/3-540-36504-4\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DesmedtSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LeD02, author = {Tri Van Le and Yvo Desmedt}, editor = {Fabien A. P. Petitcolas}, title = {Cryptanalysis of {UCLA} Watermarking Schemes for Intellectual Property Protection}, booktitle = {Information Hiding, 5th International Workshop, {IH} 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2578}, pages = {213--225}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36415-3\_14}, doi = {10.1007/3-540-36415-3\_14}, timestamp = {Sun, 02 Oct 2022 16:07:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/LeD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DesmedtW02, author = {Yvo Desmedt and Yongge Wang}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Efficient Zero-Knowledge Proofs for Some Practical Graph Problems}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {290--302}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_21}, doi = {10.1007/3-540-36413-7\_21}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/DesmedtW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2003, editor = {Yvo Desmedt}, title = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36288-6}, doi = {10.1007/3-540-36288-6}, isbn = {3-540-00324-X}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0208041, author = {Yvo Desmedt and Yongge Wang}, title = {Perfectly Secure Message Transmission Revisited}, journal = {CoRR}, volume = {cs.CR/0208041}, year = {2002}, url = {https://arxiv.org/abs/cs/0208041}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0208041.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DesmedtW02, author = {Yvo Desmedt and Yongge Wang}, title = {Perfectly Secure Message Transmission Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2002}, url = {http://eprint.iacr.org/2002/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DesmedtW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DesmedtSWBCP01, author = {Yvo Desmedt and Reihaneh Safavi{-}Naini and Huaxiong Wang and Lynn Margaret Batten and Chris Charnes and Josef Pieprzyk}, title = {Broadcast anti-jamming systems}, journal = {Comput. Networks}, volume = {35}, number = {2-3}, pages = {223--236}, year = {2001}, url = {https://doi.org/10.1016/S1389-1286(00)00169-9}, doi = {10.1016/S1389-1286(00)00169-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DesmedtSWBCP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/WangD01, author = {Yongge Wang and Yvo Desmedt}, title = {Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question}, journal = {J. Cryptol.}, volume = {14}, number = {2}, pages = {121--135}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0002-y}, doi = {10.1007/S00145-001-0002-Y}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/WangD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DesmedtBS01, author = {Yvo Desmedt and Mike Burmester and Jennifer Seberry}, editor = {Kwangjo Kim}, title = {Equitability in Retroactive Data Confiscation versus Proactive Key Escrow}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {277--286}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_20}, doi = {10.1007/3-540-44586-2\_20}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DesmedtBS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AlexandrisBCD00, author = {Nikos Alexandris and Mike Burmester and Vassilios Chrissikopoulos and Yvo Desmedt}, title = {Secure linking of customers, merchants and banks in electronic commerce}, journal = {Future Gener. Comput. Syst.}, volume = {16}, number = {4}, pages = {393--401}, year = {2000}, url = {https://doi.org/10.1016/S0167-739X(99)00063-1}, doi = {10.1016/S0167-739X(99)00063-1}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AlexandrisBCD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/WangDB00, author = {Yongge Wang and Yvo Desmedt and Mike Burmester}, title = {Models For Dependable Computation with Multiple Inputs and Some Hardness Results}, journal = {Fundam. Informaticae}, volume = {42}, number = {1}, pages = {61--73}, year = {2000}, url = {https://doi.org/10.3233/FI-2000-42103}, doi = {10.3233/FI-2000-42103}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fuin/WangDB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/BeimelBDK00, author = {Amos Beimel and Mike Burmester and Yvo Desmedt and Eyal Kushilevitz}, title = {Computing Functions of a Shared Secret}, journal = {{SIAM} J. Discret. Math.}, volume = {13}, number = {3}, pages = {324--345}, year = {2000}, url = {https://doi.org/10.1137/S0895480195288819}, doi = {10.1137/S0895480195288819}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/BeimelBDK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuangRWD00, author = {Xunhua Wang and Yih Huang and Yvo Desmedt and David Rine}, title = {Enabling Secure On-Line {DNS} Dynamic Update}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {52}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898857}, doi = {10.1109/ACSAC.2000.898857}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HuangRWD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AdamsBDRZ00, author = {Carlisle M. Adams and Mike Burmester and Yvo Desmedt and Michael K. Reiter and Philip Zimmermann}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Which {PKI} (public key infrastructure) is the right one? (panel session)}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {98--101}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352615}, doi = {10.1145/352600.352615}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AdamsBDRZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DesmedtL00, author = {Yvo Desmedt and Tri Van Le}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Moir{\'{e}} cryptography}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {116--124}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352618}, doi = {10.1145/352600.352618}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DesmedtL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DesmedtK00, author = {Yvo Desmedt and Kaoru Kurosawa}, editor = {Bart Preneel}, title = {How to Break a Practical {MIX} and Design a New One}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {557--572}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_39}, doi = {10.1007/3-540-45539-6\_39}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DesmedtK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BurmesterDDMOTY00, author = {Mike Burmester and Yvo Desmedt and Hiroshi Doi and Masahiro Mambo and Eiji Okamoto and Mitsuru Tada and Yuko Yoshifuji}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Structured ElGamal-Type Multisignature Scheme}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {466--483}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_31}, doi = {10.1007/978-3-540-46588-1\_31}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BurmesterDDMOTY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BurmesterDISS99, author = {Mike Burmester and Yvo Desmedt and Toshiya Itoh and Kouichi Sakurai and Hiroki Shizuya}, title = {Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {197--223}, year = {1999}, url = {https://doi.org/10.1007/s001459900053}, doi = {10.1007/S001459900053}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BurmesterDISS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DesmedtW99, author = {Yvo Desmedt and Yongge Wang}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Approximation Hardness and Secure Communication in Broadcast Channels}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {247--257}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_20}, doi = {10.1007/978-3-540-48000-6\_20}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DesmedtW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BurmesterD99, author = {Mike Burmester and Yvo Desmedt}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Secure Communication in an Unknown Network Using Certificates}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {274--287}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_22}, doi = {10.1007/978-3-540-48000-6\_22}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BurmesterD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/DesmedtK99, author = {Yvo Desmedt and Brian King}, editor = {Bart Preneel}, title = {Verifiable Democracy}, booktitle = {Secure Information Networks: Communications and Multimedia Security, {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {152}, pages = {53--70}, publisher = {Kluwer}, year = {1999}, timestamp = {Mon, 14 Oct 2002 12:00:15 +0200}, biburl = {https://dblp.org/rec/conf/cms/DesmedtK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangD99, author = {Yongge Wang and Yvo Desmedt}, editor = {Jacques Stern}, title = {Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {446--458}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_31}, doi = {10.1007/3-540-48910-X\_31}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/DesmedtSWCP99, author = {Yvo Desmedt and Reihaneh Safavi{-}Naini and Huaxiong Wang and Chris Charnes and Josef Pieprzyk}, title = {Broadcast anti-jamming systems}, booktitle = {Proceedings of the {IEEE} International Conference on Networks 1999, {ICON} 1999, Brisbane, Queensland, Australia, September 28 - October 1, 1999}, pages = {349--355}, publisher = {{IEEE}}, year = {1999}, url = {https://doi.org/10.1109/ICON.1999.796197}, doi = {10.1109/ICON.1999.796197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/DesmedtSWCP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DesmedtLQ99, author = {Yvo Desmedt and Tri Van Le and Jean{-}Jacques Quisquater}, editor = {Andreas Pfitzmann}, title = {Nonbinary Audio Cryptography}, booktitle = {Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1768}, pages = {478--489}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719724\_33}, doi = {10.1007/10719724\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DesmedtLQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/99/Desmedt99, author = {Yvo Desmedt}, editor = {Mikhail J. Atallah}, title = {Cryptographic Foundations}, booktitle = {Algorithms and Theory of Computation Handbook}, series = {Chapman {\&} Hall/CRC Applied Algorithms and Data Structures series}, publisher = {{CRC} Press}, year = {1999}, url = {https://doi.org/10.1201/9781420049503-c39}, doi = {10.1201/9781420049503-C39}, timestamp = {Fri, 17 Jul 2020 16:12:44 +0200}, biburl = {https://dblp.org/rec/books/crc/99/Desmedt99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/99/Desmedt99a, author = {Yvo Desmedt}, editor = {Mikhail J. Atallah}, title = {Encryption Schemes}, booktitle = {Algorithms and Theory of Computation Handbook}, series = {Chapman {\&} Hall/CRC Applied Algorithms and Data Structures series}, publisher = {{CRC} Press}, year = {1999}, url = {https://doi.org/10.1201/9781420049503-c40}, doi = {10.1201/9781420049503-C40}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/crc/99/Desmedt99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DesmedtKKK98, author = {Yvo Desmedt and Brian King and Wataru Kishimoto and Kaoru Kurosawa}, editor = {Colin Boyd and Ed Dawson}, title = {A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {391--402}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053750}, doi = {10.1007/BFB0053750}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DesmedtKKK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BurmesterDS98, author = {Mike Burmester and Yvo Desmedt and Jennifer Seberry}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {380--391}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_30}, doi = {10.1007/3-540-49649-1\_30}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BurmesterDS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DesmedtHQ98, author = {Yvo Desmedt and Shuang Hou and Jean{-}Jacques Quisquater}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Audio and Optical Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {392--404}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_31}, doi = {10.1007/3-540-49649-1\_31}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DesmedtHQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaYDB98, author = {Kaoru Kurosawa and Takuya Yoshida and Yvo Desmedt and Mike Burmester}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Some Bounds and a Construction for Secure Broadcast Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {420--433}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_33}, doi = {10.1007/3-540-49649-1\_33}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaYDB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaD98, author = {Kaoru Kurosawa and Yvo Desmedt}, editor = {Kaisa Nyberg}, title = {Optimum Traitor Tracing and Asymmetric Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {145--157}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054123}, doi = {10.1007/BFB0054123}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DesmedtHQ98, author = {Yvo Desmedt and Shuang Hou and Jean{-}Jacques Quisquater}, editor = {David Aucsmith}, title = {Cerebral Cryptography}, booktitle = {Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1525}, pages = {62--72}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49380-8\_5}, doi = {10.1007/3-540-49380-8\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DesmedtHQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/random/BurmesterDW98, author = {Mike Burmester and Yvo Desmedt and Yongge Wang}, editor = {Michael Luby and Jos{\'{e}} D. P. Rolim and Maria J. Serna}, title = {Using Approximation Hardness to Achieve Dependable Computation}, booktitle = {Randomization and Approximation Techniques in Computer Science, Second International Workshop, RANDOM'98, Barcelona, Spain, October 8-10, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1518}, pages = {172--186}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49543-6\_15}, doi = {10.1007/3-540-49543-6\_15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/random/BurmesterDW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BurmesterDPW97, author = {Mike Burmester and Yvo Desmedt and Fred Piper and Michael Walker}, title = {A General Zero-Knowledge Scheme}, journal = {Des. Codes Cryptogr.}, volume = {12}, number = {1}, pages = {13--37}, year = {1997}, url = {https://doi.org/10.1023/A:1008237708202}, doi = {10.1023/A:1008237708202}, timestamp = {Tue, 12 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BurmesterDPW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Desmedt97, author = {Yvo Desmedt}, editor = {Eiji Okamoto and George I. Davida and Masahiro Mambo}, title = {Some Recent Research Aspects of Threshold Cryptography}, booktitle = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1396}, pages = {158--173}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030418}, doi = {10.1007/BFB0030418}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/Desmedt97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Desmedt96, author = {Yvo Desmedt}, title = {Simmons' protocol is not free of subliminal channels}, booktitle = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland}, pages = {170--175}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CSFW.1996.503702}, doi = {10.1109/CSFW.1996.503702}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Desmedt96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/BurmesterDK96, author = {Mike Burmester and Yvo Desmedt and Gregory Kabatianskii}, editor = {Rebecca N. Wright and Peter G. Neumann}, title = {Trust and security: {A} new look at the Byzantine generals problem}, booktitle = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4, 1996}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {38}, pages = {75--83}, publisher = {{DIMACS/AMS}}, year = {1996}, url = {https://doi.org/10.1090/dimacs/038/08}, doi = {10.1090/DIMACS/038/08}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/BurmesterDK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlackburnBDW96, author = {Simon R. Blackburn and Mike Burmester and Yvo Desmedt and Peter R. Wild}, editor = {Ueli M. Maurer}, title = {Efficient Multiplicative Sharing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {107--118}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_10}, doi = {10.1007/3-540-68339-9\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlackburnBDW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Desmedt96, author = {Yvo Desmedt}, editor = {Ross J. Anderson}, title = {Establishing Big Broth Using Covert Channals and Other Covert Techniques}, booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1174}, pages = {65--71}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61996-8\_32}, doi = {10.1007/3-540-61996-8\_32}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/Desmedt96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BurmesterDISSY96, author = {Mike Burmester and Yvo Desmedt and Toshiya Itoh and Kouichi Sakurai and Hiroki Shizuya and Moti Yung}, editor = {Ross J. Anderson}, title = {A Progress Report on Subliminal-Free Channels}, booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1174}, pages = {157--168}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61996-8\_39}, doi = {10.1007/3-540-61996-8\_39}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BurmesterDISSY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BurmesterD96, author = {Mike Burmester and Yvo Desmedt}, editor = {T. Mark A. Lomas}, title = {Efficient and Secure Conference-Key Distribution}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {119--129}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_12}, doi = {10.1007/3-540-62494-5\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BurmesterD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Desmedt95, author = {Yvo Desmedt}, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, pages = {147--157}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X\_12}, doi = {10.1007/3-540-49264-X\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Desmedt95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/Desmedt94, author = {Yvo Desmedt}, title = {Threshold cryptography}, journal = {Eur. Trans. Telecommun.}, volume = {5}, number = {4}, pages = {449--458}, year = {1994}, url = {https://doi.org/10.1002/ett.4460050407}, doi = {10.1002/ETT.4460050407}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/Desmedt94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/DesmedtF94, author = {Yvo Desmedt and Yair Frankel}, title = {Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group}, journal = {{SIAM} J. Discret. Math.}, volume = {7}, number = {4}, pages = {667--679}, year = {1994}, url = {https://doi.org/10.1137/S0895480192224713}, doi = {10.1137/S0895480192224713}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/DesmedtF94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DesmedtCB94, author = {Yvo Desmedt and Giovanni Di Crescenzo and Mike Burmester}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {21--32}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000421}, doi = {10.1007/BFB0000421}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DesmedtCB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BurmesterD94, author = {Mike Burmester and Yvo Desmedt}, editor = {Alfredo De Santis}, title = {A Secure and Efficient Conference Key Distribution System (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {275--286}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053443}, doi = {10.1007/BFB0053443}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BurmesterD94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/SantisDFY94, author = {Alfredo De Santis and Yvo Desmedt and Yair Frankel and Moti Yung}, editor = {Frank Thomson Leighton and Michael T. Goodrich}, title = {How to share a function securely}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {522--533}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/195058.195405}, doi = {10.1145/195058.195405}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/SantisDFY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/1994, editor = {Yvo Desmedt}, title = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5}, doi = {10.1007/3-540-48658-5}, isbn = {3-540-58333-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/1994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DesmedtB93, author = {Yvo Desmedt and Mike Burmester}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {Towards Practical "Proven Secure" Authenticated Key Distribution}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, pages = {228--231}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168588.168616}, doi = {10.1145/168588.168616}, timestamp = {Tue, 10 Nov 2020 20:00:40 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DesmedtB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Desmedt93, author = {Yvo Desmedt}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Computer security by redefining what a computer is}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {160--166}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283834}, doi = {10.1145/283751.283834}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Desmedt93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BurmesterDB92, author = {Mike Burmester and Yvo Desmedt and Thomas Beth}, title = {Efficient Zero-Knowledge Identification Schemes for Smart Cards}, journal = {Comput. J.}, volume = {35}, number = {1}, pages = {21--29}, year = {1992}, url = {https://doi.org/10.1093/comjnl/35.1.21}, doi = {10.1093/COMJNL/35.1.21}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BurmesterDB92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DavidaD92, author = {George I. Davida and Yvo Desmedt}, title = {Passports and visas versus IDs}, journal = {Comput. Secur.}, volume = {11}, number = {3}, pages = {253--258}, year = {1992}, url = {https://doi.org/10.1016/0167-4048(92)90205-6}, doi = {10.1016/0167-4048(92)90205-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DavidaD92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Desmedt92, author = {Yvo Desmedt}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {Treshold Cryptosystems (invited talk)}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {3--14}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_47}, doi = {10.1007/3-540-57220-1\_47}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Desmedt92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DesmedtS92, author = {Yvo Desmedt and Jennifer Seberry}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {Practical Proven Secure Authentication with Arbitration}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {27--32}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_49}, doi = {10.1007/3-540-57220-1\_49}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DesmedtS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FrankelDB92, author = {Yair Frankel and Yvo Desmedt and Mike Burmester}, editor = {Ernest F. Brickell}, title = {Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {549--557}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_39}, doi = {10.1007/3-540-48071-4\_39}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FrankelDB92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Desmedt92, author = {Yvo Desmedt}, editor = {Yves Deswarte and G{\'{e}}rard Eizenberg and Jean{-}Jacques Quisquater}, title = {Breaking the Traditional Computer Security Barriers}, booktitle = {Computer Security - {ESORICS} 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {648}, pages = {125--138}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0013895}, doi = {10.1007/BFB0013895}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Desmedt92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FrankelD92, author = {Yair Frankel and Yvo Desmedt}, editor = {Rainer A. Rueppel}, title = {Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {25--34}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_2}, doi = {10.1007/3-540-47555-9\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FrankelD92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DesmedtLLMORS92, author = {Yvo Desmedt and Peter Landrock and Arjen K. Lenstra and Kevin S. McCurley and Andrew M. Odlyzko and Rainer A. Rueppel and Miles E. Smid}, editor = {Rainer A. Rueppel}, title = {The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {194--199}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_17}, doi = {10.1007/3-540-47555-9\_17}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DesmedtLLMORS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/BurmesterD92, author = {Mike Burmester and Yvo Desmedt}, editor = {Robert M. Aiken}, title = {Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token}, booktitle = {Education and Society - Information Processing '92, Volume 2, Proceedings of the {IFIP} 12th World Computer Congress, Madrid, Spain, 7-11 September 1992}, series = {{IFIP} Transactions}, volume = {{A-13}}, pages = {479--485}, publisher = {North-Holland}, year = {1992}, timestamp = {Fri, 20 Sep 2002 13:29:42 +0200}, biburl = {https://dblp.org/rec/conf/ifip/BurmesterD92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/DesmedtFY92, author = {Yvo Desmedt and Yair Frankel and Moti Yung}, title = {Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback}, booktitle = {Proceedings {IEEE} {INFOCOM} '92, The Conference on Computer Communications, Eleventh Annual Joint Conference of the {IEEE} Computer and Communications Societies, One World through Communications, Florence, Italy, May 4-8, 1992}, pages = {2045--2054}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/INFCOM.1992.263476}, doi = {10.1109/INFCOM.1992.263476}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/DesmedtFY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/QuisquaterD91, author = {Jean{-}Jacques Quisquater and Yvo Desmedt}, title = {Chinese Lotto as an Exhaustive Code-Breaking Machine}, journal = {Computer}, volume = {24}, number = {11}, pages = {14--22}, year = {1991}, url = {https://doi.org/10.1109/2.116847}, doi = {10.1109/2.116847}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/QuisquaterD91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Desmedt91, author = {Yvo Desmedt}, title = {The "a" Cipher Does not necessarily Strengthen Security}, journal = {Cryptologia}, volume = {15}, number = {3}, pages = {203--206}, year = {1991}, url = {https://doi.org/10.1080/0161-119191865867}, doi = {10.1080/0161-119191865867}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Desmedt91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BengioBDGQ91, author = {Samy Bengio and Gilles Brassard and Yvo Desmedt and Claude Goutier and Jean{-}Jacques Quisquater}, title = {Secure Implementations of Identification Systems}, journal = {J. Cryptol.}, volume = {4}, number = {3}, pages = {175--183}, year = {1991}, url = {https://doi.org/10.1007/BF00196726}, doi = {10.1007/BF00196726}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BengioBDGQ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DesmedtB91, author = {Yvo Desmedt and Mike Burmester}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {360--367}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_31}, doi = {10.1007/3-540-57332-1\_31}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DesmedtB91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtF91, author = {Yvo Desmedt and Yair Frankel}, editor = {Joan Feigenbaum}, title = {Shared Generation of Authenticators and Signatures (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {457--469}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_37}, doi = {10.1007/3-540-46766-1\_37}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtF91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BurmesterD91, author = {Mike Burmester and Yvo Desmedt}, editor = {Donald W. Davies}, title = {Broadcast Interactive Proofs (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {81--95}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_7}, doi = {10.1007/3-540-46416-6\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BurmesterD91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DesmedtY91, author = {Yvo Desmedt and Moti Yung}, editor = {Donald W. Davies}, title = {Weakness of Undeniable Signature Schemes (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {205--220}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_19}, doi = {10.1007/3-540-46416-6\_19}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DesmedtY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/DavidaD90, author = {George I. Davida and Yvo Desmedt}, title = {Cryptography Based Data Security}, journal = {Adv. Comput.}, volume = {30}, pages = {171--222}, year = {1990}, url = {https://doi.org/10.1016/S0065-2458(08)60300-9}, doi = {10.1016/S0065-2458(08)60300-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/DavidaD90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BethD90, author = {Thomas Beth and Yvo Desmedt}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Identification Tokens - or: Solving the Chess Grandmaster Problem}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {169--177}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_12}, doi = {10.1007/3-540-38424-3\_12}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BethD90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtY90, author = {Yvo Desmedt and Moti Yung}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {177--188}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_13}, doi = {10.1007/3-540-38424-3\_13}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DavidaDP90, author = {George I. Davida and Yvo Desmedt and Ren{\'{e}} Peralta}, editor = {Ivan Damg{\aa}rd}, title = {On the Importance of Memory Resources in the Security of Key Exchange Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {11--15}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_2}, doi = {10.1007/3-540-46877-3\_2}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DavidaDP90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Desmedt89, author = {Yvo Desmedt}, editor = {Gilles Brassard}, title = {Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {6--16}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_2}, doi = {10.1007/0-387-34805-0\_2}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Desmedt89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtF89, author = {Yvo Desmedt and Yair Frankel}, editor = {Gilles Brassard}, title = {Threshold Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {307--315}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_28}, doi = {10.1007/0-387-34805-0\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtF89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DavidaDP89, author = {George I. Davida and Yvo Desmedt and Ren{\'{e}} Peralta}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {A Key Distribution System Based On Any One-Way Function (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {75--79}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_10}, doi = {10.1007/3-540-46885-4\_10}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DavidaDP89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BurmesterDPW89, author = {Mike Burmester and Yvo Desmedt and Fred Piper and Michael Walker}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {A General Zero-Knowledge Scheme (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {122--133}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_15}, doi = {10.1007/3-540-46885-4\_15}, timestamp = {Tue, 12 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BurmesterDPW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DavidaDM89, author = {George I. Davida and Yvo Desmedt and Brian J. Matt}, title = {Defending Systems against Viruses through Cryptographic Authentication}, booktitle = {Proceedings of the 1989 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 1-3, 1989}, pages = {312--318}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SECPRI.1989.36305}, doi = {10.1109/SECPRI.1989.36305}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/DavidaDM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Desmedt88, author = {Yvo Desmedt}, editor = {Shafi Goldwasser}, title = {Abuses in Cryptography and How to Fight Them}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {375--389}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_29}, doi = {10.1007/0-387-34799-2\_29}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Desmedt88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Desmedt88, author = {Yvo Desmedt}, editor = {Christoph G. G{\"{u}}nther}, title = {Subliminal-Free Authentication and Signature (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {23--33}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_3}, doi = {10.1007/3-540-45961-8\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Desmedt88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DavidaD88, author = {George I. Davida and Yvo Desmedt}, editor = {Christoph G. G{\"{u}}nther}, title = {Passports and Visas Versus {IDS} (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {183--188}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_16}, doi = {10.1007/3-540-45961-8\_16}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DavidaD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtGB87, author = {Yvo Desmedt and Claude Goutier and Samy Bengio}, editor = {Carl Pomerance}, title = {Special Uses and Abuses of the Fiat-Shamir Passport Protocol}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {21--39}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_3}, doi = {10.1007/3-540-48184-2\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtGB87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Desmedt87, author = {Yvo Desmedt}, editor = {Carl Pomerance}, title = {Society and Group Oriented Cryptography: {A} New Concept}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {120--127}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_8}, doi = {10.1007/3-540-48184-2\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Desmedt87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtQ86, author = {Yvo Desmedt and Jean{-}Jacques Quisquater}, editor = {Andrew M. Odlyzko}, title = {Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between {DES} and RSA?)}, booktitle = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California, USA, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {263}, pages = {111--117}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-47721-7\_9}, doi = {10.1007/3-540-47721-7\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtQ86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Desmedt86, author = {Yvo Desmedt}, editor = {Andrew M. Odlyzko}, title = {Is There an ultimate Use of Cryptography?}, booktitle = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California, USA, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {263}, pages = {459--463}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-47721-7\_34}, doi = {10.1007/3-540-47721-7\_34}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Desmedt86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DesmedtHQ86, author = {Yvo Desmedt and Frank Hoornaert and Jean{-}Jacques Quisquater}, title = {Several Exhaustive Key Search Machines and {DES}}, booktitle = {{EUROCRYPT}}, pages = {17--19}, year = {1986}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DesmedtHQ86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CloetensDBVG86, author = {Henri Cloetens and Yvo Desmedt and Luc Bierens and Joos Vandewalle and Ren{\'{e}} Govaerts}, title = {Additional Properties in the S-Boxes of the {DES}}, booktitle = {{EUROCRYPT}}, pages = {20}, year = {1986}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CloetensDBVG86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Desmedt85, author = {Yvo Desmedt}, editor = {Hugh C. Williams}, title = {Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {42--55}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_6}, doi = {10.1007/3-540-39799-X\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Desmedt85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtO85, author = {Yvo Desmedt and Andrew M. Odlyzko}, editor = {Hugh C. Williams}, title = {A Chosen Text Attack on the {RSA} Cryptosystem and Some Discrete Logarithm Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {516--522}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_40}, doi = {10.1007/3-540-39799-X\_40}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtO85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuisquaterDD85, author = {Jean{-}Jacques Quisquater and Yvo Desmedt and Marc Davio}, editor = {Hugh C. Williams}, title = {The Importance of "Good" Key Scheduling Schemes (How to Make a Secure {DES} Scheme with {\textless}= 48 Bit Keys)}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {537--542}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_43}, doi = {10.1007/3-540-39799-X\_43}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/QuisquaterDD85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DesmedtVG84, author = {Yvo Desmedt and Joos Vandewalle and Ren{\'{e}} Govaerts}, title = {A critical analysis of the security of knapsack public-key algorithms}, journal = {{IEEE} Trans. Inf. Theory}, volume = {30}, number = {4}, pages = {601--610}, year = {1984}, url = {https://doi.org/10.1109/TIT.1984.1056932}, doi = {10.1109/TIT.1984.1056932}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/DesmedtVG84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DavioDGHQ84, author = {Marc Davio and Yvo Desmedt and Jo Goubert and Frank Hoornaert and Jean{-}Jacques Quisquater}, editor = {G. R. Blakley and David Chaum}, title = {Efficient Hardware and Software Implementations for the {DES}}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {144--146}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_14}, doi = {10.1007/3-540-39568-7\_14}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DavioDGHQ84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoornaertGD84, author = {Frank Hoornaert and Jo Goubert and Yvo Desmedt}, editor = {G. R. Blakley and David Chaum}, title = {Efficient Hardware Implementation of the {DES}}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {147--173}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_15}, doi = {10.1007/3-540-39568-7\_15}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoornaertGD84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtQD84, author = {Yvo Desmedt and Jean{-}Jacques Quisquater and Marc Davio}, editor = {G. R. Blakley and David Chaum}, title = {Dependence of Output on Input in {DES:} Small Avalanche Characteristics}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {359--376}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_28}, doi = {10.1007/3-540-39568-7\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtQD84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DavioDQ84, author = {Marc Davio and Yvo Desmedt and Jean{-}Jacques Quisquater}, editor = {Thomas Beth and Norbert Cot and Ingemar Ingemarsson}, title = {Propagation Characteristics of the {DES}}, booktitle = {Advances in Cryptology: Proceedings of {EUROCRYPT} 84, {A} Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {209}, pages = {62--73}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39757-4\_7}, doi = {10.1007/3-540-39757-4\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DavioDQ84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DelsarteDOP84, author = {Philippe Delsarte and Yvo Desmedt and Andrew M. Odlyzko and Philippe Piret}, editor = {Thomas Beth and Norbert Cot and Ingemar Ingemarsson}, title = {Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme}, booktitle = {Advances in Cryptology: Proceedings of {EUROCRYPT} 84, {A} Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {209}, pages = {142--149}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39757-4\_14}, doi = {10.1007/3-540-39757-4\_14}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DelsarteDOP84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GovaertsDV84, author = {Ren{\'{e}} Govaerts and Yvo Desmedt and Joos Vandewalle}, title = {Cryptography: How to Attack, What to Protect?}, booktitle = {{IEEE} International Conference on Communications: Links for the Future - Science, Systems {\&} Services for Communications, {ICC} 1984, Amsterdam, The Netherlands, May 14-17, 1984, Proceedings}, pages = {175--178}, publisher = {Elsevier}, year = {1984}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/GovaertsDV84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WoutersVQPNHGFDD83, author = {Marc Davio and Yvo Desmedt and Marc Fosseprez and Ren{\'{e}} Govaerts and Jan Hulsbosch and Patrik Neutjens and Philippe Piret and Jean{-}Jacques Quisquater and Joos Vandewalle and Pascal Wouters}, editor = {David Chaum}, title = {Analytical Characteristics of the {DES}}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '83, Santa Barbara, California, USA, August 21-24, 1983}, pages = {171--202}, publisher = {Plenum Press, New York}, year = {1983}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/WoutersVQPNHGFDD83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.