Cryptographers' World
 

Yvo Desmedt


Author's Web Page Link

64 papers in database with 3790 citations StarStarStar

Editor of 2 conference proceedings books

H-number: 26

Conference Proceedings

 
1. Yvo Desmedt, editor, Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings. Springer, 2002. ISBN 3-540-00324-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings. Springer, 1994. ISBN 3-540-58333-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Jean-Sébastien Coron,  David Naccache,  Yvo Desmedt,  Andrew M. Odlyzko,  Julien P. Stern,  Index Calculation Attacks on RSA Signature and Encryption, Designs, Codes and Cryptography, Volume 38(1), pp. 41 - 53, Springer, 2006.

[Electronic Edition][Cited 2 times ]

2. Yongge Wang,  Yvo Desmedt,  Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question, Journal of Cryptology, Volume 14(2), pp. 121 - 135, Springer, 2001.

[Cited 15 times ]

3. Mike Burmester,  Yvo Desmedt,  Toshiya Itoh,  Kouichi Sakurai,  Hiroki Shizuya,  Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages, Journal of Cryptology, Volume 12(3), pp. 197 - 223, Springer, 1999.

[Cited 5 times ]

4. Mike Burmester,  Yvo Desmedt,  Fred Piper,  Michael Walker,  A General Zero-Knowledge Scheme, Designs, Codes and Cryptography, Volume 12(1), pp. 13 - 37, Springer, 1997.

[Electronic Edition][Cited 16 times ]

5. Samy Bengio,  Gilles Brassard,  Yvo Desmedt,  Claude Goutier,  Jean-Jacques Quisquater,  Secure Implementations of Identification Systems, Journal of Cryptology, Volume 4(3), pp. 175 - 183, Springer, 1991.

[Cited 41 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yvo Desmedt,  Goce Jakimoski,  Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels, pp. 324 - 338, CT-RSA 2007.

[Electronic Edition][Cited 3 times ]

2. Yvo Desmedt,  Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure, pp. 53 - 56, FC 2007.

[Electronic Edition][Cited 3 times ]

3. Yvo Desmedt,  Tanja Lange,  Mike Burmester,  Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups, pp. 104 - 118, FC 2007.

[Electronic Edition][Cited 9 times ]

4. Ivan Damgard,  Yvo Desmedt,  Matthias Fitzi,  Jesper Buus Nielsen,  Secure Protocols with Asymmetric Trust, pp. 357 - 375, ASIACRYPT 2007.

[Electronic Edition][Cited 5 times ]

5. Yvo Desmedt,  Josef Pieprzyk,  Ron Steinfeld,  Huaxiong Wang,  On Secure Multi-party Computation in Black-Box Groups, pp. 591 - 612, CRYPTO 2007.

[Electronic Edition][Cited 4 times ]

6. Yvo Desmedt,  Tanja Lange,  Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng, pp. 154 - 159, FC 2006.

[Electronic Edition][Cited 2 times ]

7. Kaoru Kurosawa,  Yvo Desmedt,  A New Paradigm of Hybrid Encryption Scheme, pp. 426 - 442, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 167 times Red StarRed Star]

8. Goce Jakimoski,  Yvo Desmedt,  Related-Key Differential Cryptanalysis of 192-bit Key AES Variants, pp. 208 - 221, SAC 2003.

[Electronic Edition][Cited 63 times Red Star]

9. Yvo Desmedt,  Yongge Wang,  Perfectly Secure Message Transmission Revisited, pp. 502 - 517, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 79 times Red Star]

10. Yvo Desmedt,  Reihaneh Safavi-Naini,  Huaxiong Wang,  Redistribution of Mechanical Secret Shares, pp. 238 - 252, FC 2002.

[Electronic Edition][Cited 2 times ]

11. Yvo Desmedt,  Mike Burmester,  Jennifer Seberry,  Equitability in Retroactive Data Confiscation versus Proactive Key Escrow, pp. 277 - 286, PKC 2001.

[Electronic Edition][Cited 2 times ]

12. Yvo Desmedt,  Kaoru Kurosawa,  How to Break a Practical MIX and Design a New One, pp. 557 - 572, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 101 times Red StarRed Star]

13. Mike Burmester,  Yvo Desmedt,  Hiroshi Doi,  Masahiro Mambo,  Eiji Okamoto,  Mitsuru Tada,  Yuko Yoshifuji,  A Structured ElGamal-Type Multisignature Scheme, pp. 466 - 483, PKC 2000.

[Electronic Edition][Cited 54 times Red Star]

14. Mike Burmester,  Yvo Desmedt,  Secure Communication in an Unknown Network Using Certificates, pp. 274 - 287, ASIACRYPT 1999.

[Electronic Edition][Cited 26 times ]

15. Yvo Desmedt,  Yongge Wang,  Approximation Hardness and Secure Communication in Broadcast Channels, pp. 247 - 257, ASIACRYPT 1999.

[Electronic Edition][Cited 1 times ]

16. Yongge Wang,  Yvo Desmedt,  Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question, pp. 446 - 458, EUROCRYPT 1999.

[Electronic Edition][Cited 3 times ]

17. Yvo Desmedt,  Shuang Hou,  Jean-Jacques Quisquater,  Audio and Optical Cryptography, pp. 392 - 404, ASIACRYPT 1998.

[Electronic Edition][Cited 14 times ]

18. Kaoru Kurosawa,  Takuya Yoshida,  Yvo Desmedt,  Mike Burmester,  Some Bounds and a Construction for Secure Broadcast Encryption, pp. 420 - 433, ASIACRYPT 1998.

[Electronic Edition][Cited 21 times ]

19. Mike Burmester,  Yvo Desmedt,  Jennifer Seberry,  Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically), pp. 380 - 391, ASIACRYPT 1998.

[Electronic Edition][Cited 28 times ]

20. Kaoru Kurosawa,  Yvo Desmedt,  Optimum Traitor Tracing and Asymmetric Schemes, pp. 145 - 157, EUROCRYPT 1998.

[Electronic Edition][Cited 161 times Red StarRed Star]

21. Simon R. Blackburn,  Mike Burmester,  Yvo Desmedt,  Peter R. Wild,  Efficient Multiplicative Sharing Schemes, pp. 107 - 118, EUROCRYPT 1996.

[Electronic Edition][Cited 37 times ]

22. Yvo Desmedt,  Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract), pp. 147 - 157, EUROCRYPT 1995.

[Electronic Edition][Cited 29 times ]

23. Yvo Desmedt,  Giovanni Di Crescenzo,  Mike Burmester,  Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography, pp. 21 - 32, ASIACRYPT 1994.

[Electronic Edition][Cited 43 times ]

24. Mike Burmester,  Yvo Desmedt,  A Secure and Efficient Conference Key Distribution System (Extended Abstract), pp. 275 - 286, EUROCRYPT 1994.

[Electronic Edition][Cited 620 times Red StarRed StarRed StarRed Star]

25. Yvo Desmedt,  Treshold Cryptosystems (invited talk), pp. 3 - 14, ASIACRYPT 1992.

[Electronic Edition][Cited 8 times ]

26. Yvo Desmedt,  Jennifer Seberry,  Practical Proven Secure Authentication with Arbitration, pp. 27 - 32, ASIACRYPT 1992.

[Electronic Edition][Cited 2 times ]

27. Yvo Desmedt,  Peter Landrock,  Arjen K. Lenstra,  Kevin S. McCurley,  Andrew M. Odlyzko,  Rainer A. Rueppel,  Miles E. Smid,  The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel), pp. 194 - 199, EUROCRYPT 1992.

[Electronic Edition][No citation]

28. Yair Frankel,  Yvo Desmedt,  Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract), pp. 25 - 34, EUROCRYPT 1992.

[Electronic Edition][Cited 18 times ]

29. Yair Frankel,  Yvo Desmedt,  Mike Burmester,  Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract), pp. 549 - 557, CRYPTO 1992.

[Electronic Edition][Cited 10 times ]

30. Yvo Desmedt,  Mike Burmester,  An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers, pp. 360 - 367, ASIACRYPT 1991.

[Electronic Edition][Cited 5 times ]

31. Yvo Desmedt,  Yair Frankel,  Shared Generation of Authenticators and Signatures (Extended Abstract), pp. 457 - 469, CRYPTO 1991.

[Electronic Edition][Cited 437 times Red StarRed StarRed Star]

32. Yvo Desmedt,  Moti Yung,  Weakness of Undeniable Signature Schemes (Extended Abstract), pp. 205 - 220, EUROCRYPT 1991.

[Electronic Edition][Cited 59 times Red Star]

33. Mike Burmester,  Yvo Desmedt,  Broadcast Interactive Proofs (Extended Abstract), pp. 81 - 95, EUROCRYPT 1991.

[Electronic Edition][Cited 7 times ]

34. Mike Burmester,  Yvo Desmedt,  All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions, pp. 1 - 10, EUROCRYPT 1990.

[Electronic Edition][Cited 19 times ]

35. George I. Davida,  Yvo Desmedt,  René Peralta,  On the Importance of Memory Resources in the Security of Key Exchange Protocols, pp. 11 - 15, EUROCRYPT 1990.

[Electronic Edition][Cited 1 times ]

36. Yvo Desmedt,  Moti Yung,  Arbitrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract), pp. 177 - 188, CRYPTO 1990.

[Electronic Edition][Cited 27 times ]

37. Thomas Beth,  Yvo Desmedt,  Identification Tokens - or: Solving the Chess Grandmaster Problem, pp. 169 - 177, CRYPTO 1990.

[Electronic Edition][Cited 57 times Red Star]

38. Yvo Desmedt,  Yair Frankel,  Threshold Cryptosystems, pp. 307 - 315, CRYPTO 1989.

[Electronic Edition][Cited 824 times Red StarRed StarRed StarRed Star]

39. Yvo Desmedt,  Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context, pp. 6 - 16, CRYPTO 1989.

[Electronic Edition][Cited 3 times ]

40. George I. Davida,  Yvo Desmedt,  René Peralta,  A Key Distribution System Based On Any One-Way Function (Extended Abstract), pp. 75 - 79, EUROCRYPT 1989.

[Electronic Edition][Cited 5 times ]

41. Mike Burmester,  Yvo Desmedt,  Fred Piper,  Michael Walker,  A General Zero-Knowledge Scheme (Extended Abstract), pp. 122 - 133, EUROCRYPT 1989.

[Electronic Edition][Cited 18 times ]

42. Yvo Desmedt,  Abuses in Cryptography and How to Fight Them, pp. 375 - 389, CRYPTO 1988.

[Electronic Edition][Cited 43 times ]

43. George I. Davida,  Yvo Desmedt,  Passports and Visas Versus IDS (Extended Abstract), pp. 183 - 188, EUROCRYPT 1988.

[Electronic Edition][Cited 6 times ]

44. Yvo Desmedt,  Subliminal-Free Authentication and Signature (Extended Abstract), pp. 23 - 33, EUROCRYPT 1988.

[Electronic Edition][Cited 45 times ]

45. Yvo Desmedt,  Claude Goutier,  Samy Bengio,  Special Uses and Abuses of the Fiat-Shamir Passport Protocol, pp. 21 - 39, CRYPTO 1987.

[Electronic Edition][Cited 5 times ]

46. Yvo Desmedt,  Society and Group Oriented Cryptography: A New Concept, pp. 120 - 127, CRYPTO 1987.

[Electronic Edition][Cited 342 times Red StarRed StarRed Star]

47. Yvo Desmedt,  Jean-Jacques Quisquater,  Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?), pp. 111 - 117, CRYPTO 1986.

[Electronic Edition][Cited 62 times Red Star]

48. Yvo Desmedt,  Is There an ultimate Use of Cryptography?, pp. 459 - 463, CRYPTO 1986.

[Electronic Edition][Cited 6 times ]

49. Yvo Desmedt,  Frank Hoornaert,  Jean-Jacques Quisquater,  Several Exhaustive Key Search Machines and DES, pp. 17 - 19, EUROCRYPT 1986.

[Electronic Edition][Cited 4 times ]

50. Henri Cloetens,  Yvo Desmedt,  Luc Bierens,  Joos Vandewalle,  René Govaerts,  Additional Properties in the S-Boxes of the DES, pp. 20 - 20, EUROCRYPT 1986.

[Electronic Edition][Cited 2 times ]

51. Yvo Desmedt,  Andrew M. Odlyzko,  A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes, pp. 516 - 522, CRYPTO 1985.

[Electronic Edition][Cited 51 times Red Star]

52. Yvo Desmedt,  Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences, pp. 42 - 55, CRYPTO 1985.

[Electronic Edition][Cited 13 times ]

53. Jean-Jacques Quisquater,  Yvo Desmedt,  Marc Davio,  The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys), pp. 537 - 542, CRYPTO 1985.

[Electronic Edition][Cited 9 times ]

54. Yvo Desmedt,  Jean-Jacques Quisquater,  Marc Davio,  Dependence of Output on Input in DES: Small Avalanche Characteristics, pp. 359 - 376, CRYPTO 1984.

[Electronic Edition][Cited 26 times ]

55. Marc Davio,  Yvo Desmedt,  Jo Goubert,  Frank Hoornaert,  Jean-Jacques Quisquater,  Efficient Hardware and Software Implementations for the DES, pp. 144 - 146, CRYPTO 1984.

[Electronic Edition][Cited 31 times ]

56. Frank Hoornaert,  Jo Goubert,  Yvo Desmedt,  Efficient Hardware Implementation of the DES, pp. 147 - 173, CRYPTO 1984.

[Electronic Edition][Cited 26 times ]

57. Marc Davio,  Yvo Desmedt,  Jean-Jacques Quisquater,  Propagation Characteristics of the DES, pp. 62 - 73, EUROCRYPT 1984.

[Electronic Edition][Cited 7 times ]

58. Philippe Delsarte,  Yvo Desmedt,  Andrew M. Odlyzko,  Philippe Piret,  Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme, pp. 142 - 149, EUROCRYPT 1984.

[Electronic Edition][Cited 12 times ]

59. Marc Davio,  Yvo Desmedt,  Marc Fosseprez,  René Govaerts,  Jan Hulsbosch,  Patrik Neutjens,  Philippe Piret,  Jean-Jacques Quisquater,  Joos Vandewalle,  Pascal Wouters,  Analytical Characteristics of the DES, pp. 171 - 202, CRYPTO 1983.

[Electronic Edition][Cited 44 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...