Yvo Desmedt
Person information
- affiliation: University College London, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c141]Yvo Desmedt, Arash Shaghaghi:
Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations. From Database to Cyber Security 2018: 143-165 - 2017
- [c140]Mayur Punekar, Qutaibah M. Malluhi, Yongge Wang, Yvo Desmedt:
Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures. BDCAT 2017: 33-42 - [c139]Mayur Punekar, Qutaibah M. Malluhi, Yvo Desmedt, Yongge Wang:
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin. CANS 2017: 470-481 - [c138]Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti:
Controlled Homomorphic Encryption: Definition and Construction. Financial Cryptography Workshops 2017: 107-129 - [c137]Reihaneh Safavi-Naini, Viliam Lisý, Yvo Desmedt:
Economically Optimal Variable Tag Length Message Authentication. Financial Cryptography 2017: 204-223 - [c136]Yvo Desmedt:
"Need to know" to defend one's home, or should one buy a wifi enabled thermostat? ICC 2017: 201:1-201:4 - 2016
- [j29]Yi Lu, Yvo Desmedt:
Walsh transforms and cryptographic applications in bias computing. Cryptography and Communications 8(3): 435-453 (2016) - [c135]
- [c134]Yvo Desmedt, Arash Shaghaghi:
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. MIST@CCS 2016: 89-92 - [c133]Paolo D'Arco, Roberto De Prisco, Yvo Desmedt:
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography. ICITS 2016: 95-113 - [i19]Yvo Desmedt, Arash Shaghaghi:
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. CoRR abs/1609.04514 (2016) - [i18]Yi Lu, Yvo Desmedt:
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing. IACR Cryptology ePrint Archive 2016: 419 (2016) - 2015
- [c132]
- [c131]Yvo Desmedt, Stelios Erotokritou:
Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols. VOTE-ID 2015: 110-126 - [e5]Yvo Desmedt:
Information Security, 16th International Conference, ISC 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings. Lecture Notes in Computer Science 7807, Springer 2015, ISBN 978-3-319-27658-8 [contents] - [i17]Yvo Desmedt, Stelios Erotokritou:
Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols. CoRR abs/1506.04429 (2015) - 2014
- [j28]Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A subexponential construction of graph coloring for multiparty computation. J. Mathematical Cryptology 8(4): 363-403 (2014) - [c130]Yongge Wang, Yvo Desmedt:
Efficient secret sharing schemes achieving optimal information rate. ITW 2014: 516-520 - [c129]Yvo Desmedt:
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions. Security Protocols Workshop 2014: 276-285 - [c128]Yvo Desmedt:
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion). Security Protocols Workshop 2014: 286-299 - [i16]Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A Subexponential Construction of Graph Coloring for Multiparty Computation. IACR Cryptology ePrint Archive 2014: 66 (2014) - [i15]Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti:
Controlled Homomorphic Encryption: Definition and Construction. IACR Cryptology ePrint Archive 2014: 989 (2014) - 2013
- [j27]Shah Mahmood, Yvo Desmedt:
Two new economic models for privacy. SIGMETRICS Performance Evaluation Review 40(4): 84-89 (2013) - [c127]Manal Adham, Amir Azodi, Yvo Desmedt, Ioannis Karaolis:
How to Attack Two-Factor Authentication Internet Banking. Financial Cryptography 2013: 322-328 - [c126]
- 2012
- [j26]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Xiaoming Sun, Christophe Tartary, Huaxiong Wang, Andrew Chi-Chih Yao:
Graph Coloring Applied to Secure Computation in Non-Abelian Groups. J. Cryptology 25(4): 557-600 (2012) - [c125]Yvo Desmedt:
A Brief Survey of Research Jointly with Jean-Jacques Quisquater. Cryptography and Security 2012: 8-12 - [c124]Yvo Desmedt, Pyrros Chaidos:
Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System. ESORICS 2012: 433-450 - [c123]Shah Mahmood, Yvo Desmedt:
Your Facebook deactivated friend or a cloaked spy. PerCom Workshops 2012: 367-373 - [c122]Shah Mahmood, Yvo Desmedt:
Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract). RAID 2012: 374-375 - [c121]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
Active Security in Multiparty Computation over Black-Box Groups. SCN 2012: 503-521 - [c120]Stelios Erotokritou, Yvo Desmedt:
Human Perfectly Secure Message Transmission Protocols and Their Applications. SCN 2012: 540-558 - [c119]Shah Mahmood, Yvo Desmedt:
Usable Privacy by Visual and Interactive Control of Information Flow. Security Protocols Workshop 2012: 181-188 - [i14]Shah Mahmood, Yvo Desmedt:
Your Facebook Deactivated Friend or a Cloaked Spy (Extended Abstract). CoRR abs/1203.4043 (2012) - [i13]Yongge Wang, Yvo Desmedt:
Edge-Colored Graphs with Applications To Homogeneous Faults. CoRR abs/1207.5439 (2012) - 2011
- [j25]Yongge Wang, Yvo Desmedt:
Edge-colored graphs with applications to homogeneous faults. Inf. Process. Lett. 111(13): 634-641 (2011) - [c118]
- [c117]Shah Mahmood, Yvo Desmedt:
Poster: preliminary analysis of Google+'s privacy. ACM Conference on Computer and Communications Security 2011: 809-812 - [c116]Yongge Wang, Yvo Desmedt:
Homogeneous Faults, Colored Edge Graphs, and Cover Free Families. ICITS 2011: 58-72 - [r25]
- [r24]Yvo Desmedt, Goce Jakimoski:
Broadcast Authentication from an Information Theoretic Perspective. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 170-171 - [r23]
- [r22]
- [r21]Yvo Desmedt:
ElGamal Public Key Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 396 - [r20]Yvo Desmedt:
Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 457-458 - [r19]Yvo Desmedt:
Knapsack Cryptographic Schemes. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 695-704 - [r18]Yvo Desmedt:
Man-in-the-Middle Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 759 - [r17]Yvo Desmedt, Qiushi Yang:
Perfectly Secure Message Transmission. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 922-924 - [r16]
- [r15]Yvo Desmedt:
Station-to-Station Protocol. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1256 - [r14]Yvo Desmedt, Goce Jakimoski:
Stream and Multicast Authentication. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1260-1263 - [r13]Yvo Desmedt:
Threshold Cryptography. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1288-1293 - [r12]Yvo Desmedt:
Trojan Horses, Computer Viruses, and Worms. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1319-1320 - [i12]
- [i11]Qiushi Yang, Yvo Desmedt:
Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol. IACR Cryptology ePrint Archive 2011: 265 (2011) - 2010
- [j24]Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup:
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack. J. Cryptology 23(1): 91-120 (2010) - [c115]Yvo Desmedt, Stelios Erotokritou, Reihaneh Safavi-Naini:
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes. AFRICACRYPT 2010: 166-183 - [c114]Qiushi Yang, Yvo Desmedt:
General Perfectly Secure Message Transmission Using Linear Codes. ASIACRYPT 2010: 448-465 - [c113]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. Inscrypt 2010: 187-198 - [c112]Yvo Desmedt, Atsuko Miyaji:
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments. Inscrypt 2010: 236-254 - [c111]Yi Lu, Yvo Desmedt:
Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher. ICISC 2010: 16-28 - [c110]
- [c109]
- [c108]Saghar Estehghari, Yvo Desmedt:
Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example. EVT/WOTE 2010 - [i10]Yvo Desmedt, Edith Elkind:
Equilibria of Plurality Voting with Abstentions. CoRR abs/1001.4939 (2010)
2000 – 2009
- 2009
- [j23]Yvo Desmedt, Niels Duif, Henk van Tilborg, Huaxiong Wang:
Bounds and constructions for key distribution schemes. Adv. in Math. of Comm. 3(3): 273-293 (2009) - [c107]Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt:
Unconditionally Secure Approximate Message Authentication. IWCC 2009: 233-247 - [c106]Qiushi Yang, Yvo Desmedt:
Cryptanalysis of Secure Message Transmission Protocols with Feedback. ICITS 2009: 159-176 - [e4]Yvo Desmedt:
Information Theoretic Security - Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4883, Springer 2009, ISBN 978-3-642-10229-5 [contents] - [i9]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. IACR Cryptology ePrint Archive 2009: 224 (2009) - [i8]Qiushi Yang, Yvo Desmedt:
Cryptanalysis of Secure Message Transmission Protocols with Feedback. IACR Cryptology ePrint Archive 2009: 632 (2009) - 2008
- [j22]Yongge Wang, Yvo Desmedt:
Perfectly Secure Message Transmission Revisited. IEEE Trans. Information Theory 54(6): 2582-2595 (2008) - [c105]Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan:
Hybrid Damgård Is CCA1-Secure under the DDH Assumption. CANS 2008: 18-30 - [c104]Yvo Desmedt, Tanja Lange:
Revisiting Pairing Based Group Key Exchange. Financial Cryptography 2008: 53-68 - [c103]Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung:
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). Financial Cryptography 2008: 307-313 - [c102]Yvo Desmedt, Brian King, Berry Schoenmakers:
Revisiting the Karnin, Greene and Hellman Bounds. ICITS 2008: 183-198 - [c101]
- 2007
- [c100]Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen:
Secure Protocols with Asymmetric Trust. ASIACRYPT 2007: 357-375 - [c99]Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt:
Unconditionally secure ring authentication. AsiaCCS 2007: 173-181 - [c98]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang:
On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612 - [c97]Yvo Desmedt, Goce Jakimoski:
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. CT-RSA 2007: 324-338 - [c96]Yvo Desmedt:
Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure. Financial Cryptography 2007: 53-56 - [c95]Yvo Desmedt, Tanja Lange, Mike Burmester:
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. Financial Cryptography 2007: 104-118 - [c94]Yvo Desmedt, Kaoru Kurosawa:
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. ISC 2007: 351-361 - 2006
- [j21]Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern:
Index Calculation Attacks on RSA Signature and Encryption. Des. Codes Cryptography 38(1): 41-53 (2006) - [c93]Yvo Desmedt, Yongge Wang, Mike Burmester:
Revisiting Colored Networks and Privacy Preserving Censorship. CRITIS 2006: 140-150 - [c92]Yvo Desmedt, Tanja Lange:
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng. Financial Cryptography 2006: 154-159 - [c91]Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson:
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309 - [c90]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475 - [i7]Goce Jakimoski, Yvo Desmedt:
A Tree-based Model of Unicast Stream Authentication. IACR Cryptology ePrint Archive 2006: 89 (2006) - [i6]Yvo Desmedt, Tanja Lange, Mike Burmester:
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. IACR Cryptology ePrint Archive 2006: 443 (2006) - 2005
- [j20]Mike Burmester, Yvo Desmedt:
A secure and scalable Group Key Exchange system. Inf. Process. Lett. 94(3): 137-143 (2005) - [c89]Yvo Desmedt:
Potential Impacts of a Growing Gap Between Theory and Practice in Information Security. ACISP 2005: 532-536 - [c88]Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang:
Radio Networks with Reliable Communication. COCOON 2005: 156-166 - [c87]
- [c86]Yvo Desmedt:
Unconditionally private and reliable communication in an untrusted network. ICITS 2005: 38-41 - [c85]Yvo Desmedt, Yongge Wang, Mike Burmester:
A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. ISAAC 2005: 277-287 - [c84]
- [c83]Yvo Desmedt:
Understanding Why Some Network Protocols Are User-Unfriendly. Security Protocols Workshop 2005: 215-219 - [c82]Yvo Desmedt:
Understanding Why Some Network Protocols Are User-Unfriendly. Security Protocols Workshop 2005: 220-227 - [e3]Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li:
Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings. Lecture Notes in Computer Science 3810, Springer 2005, ISBN 3-540-30849-0 [contents] - [r11]
- [r10]
- [r9]
- [r8]
- [r7]Yvo Desmedt:
Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature Scheme. Encyclopedia of Cryptography and Security 2005 - [r6]
- [r5]
- [r4]
- [r3]
- [r2]
- [r1]Yvo Desmedt:
Trojan Horses, Computer Viruses and Worms. Encyclopedia of Cryptography and Security 2005 - [i5]Goce Jakimoski, Yvo Desmedt:
On Resistance of DES to Related-Key Differential Cryptanalysis. IACR Cryptology ePrint Archive 2005: 84 (2005) - 2004
- [j19]Mike Burmester, Yvo Desmedt:
Is hierarchical public-key certification the next target for hackers? Commun. ACM 47(8): 68-74 (2004) - [j18]Yvo Desmedt, Yongge Wang:
Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs. Int. J. Found. Comput. Sci. 15(1): 107-125 (2004) - [c81]Tri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Yvo Desmedt:
Complementation-Like and Cyclic Properties of AES Round Functions. AES Conference 2004: 128-141 - [c80]
- [c79]
- [c78]Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac:
Accountable Privacy. Security Protocols Workshop 2004: 83-95 - 2003
- [c77]Yvo Desmedt, Kaoru Kurosawa, Tri Van Le:
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. ISC 2003: 396-407 - [c76]Goce Jakimoski, Yvo Desmedt:
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. Selected Areas in Cryptography 2003: 208-221 - 2002
- [j17]Yvo Desmedt:
Is there a Need for Survivable Computation in Critical Infrastructures? Inf. Sec. Techn. Report 7(2): 11-21 (2002) - [c75]Yvo Desmedt, Yongge Wang:
Maximum Flows and Critical Vertices in AND/OR Graphs. COCOON 2002: 238-248 - [c74]Yvo Desmedt, Brian King:
Verifiable Democracy a Protocol to Secure an Electronic Legislature. EGOV 2002: 460-463 - [c73]
- [c72]Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang:
Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252 - [c71]Tri Van Le, Yvo Desmedt:
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. Information Hiding 2002: 213-225 - [c70]Yvo Desmedt, Yongge Wang:
Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. SCN 2002: 290-302 - [e2]Yvo Desmedt:
Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings. Lecture Notes in Computer Science 2567, Springer 2002, ISBN 3-540-00324-X [contents] - [i4]Yvo Desmedt, Yongge Wang:
Perfectly Secure Message Transmission Revisited. CoRR cs.CR/0208041 (2002) - [i3]Yvo Desmedt, Yongge Wang:
Perfectly Secure Message Transmission Revisited. IACR Cryptology ePrint Archive 2002: 128 (2002) - 2001
- [j16]Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk:
Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001) - [j15]