default search action
Yvo Desmedt
Person information
- affiliation: University College London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [i27]Yvo Desmedt, Aydin Abadi:
Delegated-Query Oblivious Transfer and its Practical Applications. CoRR abs/2406.15063 (2024) - [i26]Aydin Abadi, Yvo Desmedt:
Supersonic OT: Fast Unconditionally Secure Oblivious Transfer. CoRR abs/2406.15529 (2024) - [i25]Yvo Desmedt, Aydin Abadi:
Delegated-Query Oblivious Transfer and its Practical Applications. IACR Cryptol. ePrint Arch. 2024: 1006 (2024) - [i24]Aydin Abadi, Yvo Desmedt:
Supersonic OT: Fast Unconditionally Secure Oblivious Transfer. IACR Cryptol. ePrint Arch. 2024: 1012 (2024) - 2023
- [c149]Yvo Desmedt:
Cryptologists Should Not Ignore the History of Al-Andalusia. C2SI 2023: 3-9 - [c148]Nicolas Chiapputo, Yvo Desmedt, Kirill Morozov:
Using Untrusted and Unreliable Cloud Providers to Obtain Private Email. SECRYPT 2023: 171-182 - 2022
- [c147]Yvo Desmedt:
Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper). SECRYPT 2022: 436-442 - 2021
- [j32]Vipin Singh Sehrawat, Foo Yee Yeo, Yvo Desmedt:
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification. Theor. Comput. Sci. 886: 106-138 (2021) - [j31]Yvo Desmedt, Songbao Mo, Arkadii M. Slinko:
Framing in Secret Sharing. IEEE Trans. Inf. Forensics Secur. 16: 2836-2842 (2021) - 2020
- [c146]Vipin Singh Sehrawat, Yvo Desmedt:
Access Structure Hiding Secret Sharing from Novel Set Systems and Vector Families. COCOON 2020: 246-261 - [i23]Vipin Singh Sehrawat, Yvo Desmedt:
Access Structure Hiding Secret Sharing from Novel Set Systems and Vector Families. CoRR abs/2008.07969 (2020) - [i22]Vipin Singh Sehrawat, Foo Yee Yeo, Yvo Desmedt:
Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious Majority and Free Verification. CoRR abs/2011.14804 (2020)
2010 – 2019
- 2019
- [j30]Yvo Desmedt, Fred Piper:
Perfect Anonymity. IEEE Trans. Inf. Theory 65(6): 3990-3997 (2019) - [c145]Vipin Singh Sehrawat, Yvo Desmedt:
Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption. CANS 2019: 3-23 - [c144]Yvo Desmedt, Sabyasachi Dutta, Kirill Morozov:
Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing. CANS 2019: 291-307 - [c143]Yvo Desmedt, Arkadii Slinko:
Realistic versus Rational Secret Sharing. GameSec 2019: 152-163 - [c142]Yvo Desmedt, Kirill Morozov:
VSS Made Simpler. IWSEC 2019: 329-342 - [i21]Yvo Desmedt, Arkadii Slinko:
Realistic versus Rational Secret Sharing. CoRR abs/1908.07581 (2019) - [i20]Vipin Singh Sehrawat, Yvo Desmedt:
Bi-Homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption. CoRR abs/1908.09032 (2019) - 2018
- [c141]Yvo Desmedt, Arash Shaghaghi:
Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations. From Database to Cyber Security 2018: 143-165 - 2017
- [c140]Mayur Punekar, Qutaibah M. Malluhi, Yongge Wang, Yvo Desmedt:
Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures. BDCAT 2017: 33-42 - [c139]Mayur Punekar, Qutaibah M. Malluhi, Yvo Desmedt, Yongge Wang:
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin. CANS 2017: 470-481 - [c138]Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti:
Controlled Homomorphic Encryption: Definition and Construction. Financial Cryptography Workshops 2017: 107-129 - [c137]Reihaneh Safavi-Naini, Viliam Lisý, Yvo Desmedt:
Economically Optimal Variable Tag Length Message Authentication. Financial Cryptography 2017: 204-223 - [c136]Yvo Desmedt:
"Need to know" to defend one's home, or should one buy a wifi enabled thermostat? ICC 2017: 201:1-201:4 - 2016
- [j29]Yi Lu, Yvo Desmedt:
Walsh transforms and cryptographic applications in bias computing. Cryptogr. Commun. 8(3): 435-453 (2016) - [c135]Yvo Desmedt:
What is the Future of Cryptography? The New Codebreakers 2016: 109-122 - [c134]Yvo Desmedt, Arash Shaghaghi:
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. MIST@CCS 2016: 89-92 - [c133]Paolo D'Arco, Roberto De Prisco, Yvo Desmedt:
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography. ICITS 2016: 95-113 - [i19]Yvo Desmedt, Arash Shaghaghi:
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. CoRR abs/1609.04514 (2016) - [i18]Yi Lu, Yvo Desmedt:
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing. IACR Cryptol. ePrint Arch. 2016: 419 (2016) - 2015
- [c132]Yvo Desmedt, Kirill Morozov:
Parity Check based redistribution of secret shares. ISIT 2015: 959-963 - [c131]Yvo Desmedt, Stelios Erotokritou:
Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols. VoteID 2015: 110-126 - [e5]Yvo Desmedt:
Information Security, 16th International Conference, ISC 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings. Lecture Notes in Computer Science 7807, Springer 2015, ISBN 978-3-319-27658-8 [contents] - [i17]Yvo Desmedt, Stelios Erotokritou:
Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols. CoRR abs/1506.04429 (2015) - 2014
- [j28]Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A subexponential construction of graph coloring for multiparty computation. J. Math. Cryptol. 8(4): 363-403 (2014) - [c130]Yongge Wang, Yvo Desmedt:
Efficient secret sharing schemes achieving optimal information rate. ITW 2014: 516-520 - [c129]Yvo Desmedt:
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions. Security Protocols Workshop 2014: 276-285 - [c128]Yvo Desmedt:
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion). Security Protocols Workshop 2014: 286-299 - [i16]Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A Subexponential Construction of Graph Coloring for Multiparty Computation. IACR Cryptol. ePrint Arch. 2014: 66 (2014) - [i15]Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti:
Controlled Homomorphic Encryption: Definition and Construction. IACR Cryptol. ePrint Arch. 2014: 989 (2014) - 2013
- [j27]Shah Mahmood, Yvo Desmedt:
Two new economic models for privacy. SIGMETRICS Perform. Evaluation Rev. 40(4): 84-89 (2013) - [c127]Manal T. Adham, Amir Azodi, Yvo Desmedt, Ioannis Karaolis:
How to Attack Two-Factor Authentication Internet Banking. Financial Cryptography 2013: 322-328 - [c126]Yi Lu, Yvo Desmedt:
Improved Davies-Murphy's Attack on DES Revisited. FPS 2013: 264-271 - 2012
- [j26]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Xiaoming Sun, Christophe Tartary, Huaxiong Wang, Andrew Chi-Chih Yao:
Graph Coloring Applied to Secure Computation in Non-Abelian Groups. J. Cryptol. 25(4): 557-600 (2012) - [c125]Yvo Desmedt:
A Brief Survey of Research Jointly with Jean-Jacques Quisquater. Cryptography and Security 2012: 8-12 - [c124]Yvo Desmedt, Pyrros Chaidos:
Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System. ESORICS 2012: 433-450 - [c123]Shah Mahmood, Yvo Desmedt:
Your Facebook deactivated friend or a cloaked spy. PerCom Workshops 2012: 367-373 - [c122]Shah Mahmood, Yvo Desmedt:
Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract). RAID 2012: 374-375 - [c121]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
Active Security in Multiparty Computation over Black-Box Groups. SCN 2012: 503-521 - [c120]Stelios Erotokritou, Yvo Desmedt:
Human Perfectly Secure Message Transmission Protocols and Their Applications. SCN 2012: 540-558 - [c119]Shah Mahmood, Yvo Desmedt:
Usable Privacy by Visual and Interactive Control of Information Flow. Security Protocols Workshop 2012: 181-188 - [i14]Shah Mahmood, Yvo Desmedt:
Your Facebook Deactivated Friend or a Cloaked Spy (Extended Abstract). CoRR abs/1203.4043 (2012) - [i13]Yongge Wang, Yvo Desmedt:
Edge-Colored Graphs with Applications To Homogeneous Faults. CoRR abs/1207.5439 (2012) - 2011
- [j25]Yongge Wang, Yvo Desmedt:
Edge-colored graphs with applications to homogeneous faults. Inf. Process. Lett. 111(13): 634-641 (2011) - [c118]Qiushi Yang, Yvo Desmedt:
Secure Communication in Multicast Graphs. ASIACRYPT 2011: 538-555 - [c117]Shah Mahmood, Yvo Desmedt:
Poster: preliminary analysis of Google+'s privacy. CCS 2011: 809-812 - [c116]Yongge Wang, Yvo Desmedt:
Homogeneous Faults, Colored Edge Graphs, and Cover Free Families. ICITS 2011: 58-72 - [r25]Yvo Desmedt:
Access Structure. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 20 - [r24]Yvo Desmedt, Goce Jakimoski:
Broadcast Authentication from an Information Theoretic Perspective. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 170-171 - [r23]Yvo Desmedt:
Covert Channels. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 265-266 - [r22]Yvo Desmedt:
Deniable Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 322-323 - [r21]Yvo Desmedt:
ElGamal Public Key Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 396 - [r20]Yvo Desmedt:
Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 457-458 - [r19]Yvo Desmedt:
Knapsack Cryptographic Schemes. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 695-704 - [r18]Yvo Desmedt:
Man-in-the-Middle Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 759 - [r17]Yvo Desmedt, Qiushi Yang:
Perfectly Secure Message Transmission. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 922-924 - [r16]Yvo Desmedt:
Relay Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1042 - [r15]Yvo Desmedt:
Station-to-Station Protocol. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1256 - [r14]Yvo Desmedt, Goce Jakimoski:
Stream and Multicast Authentication. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1260-1263 - [r13]Yvo Desmedt:
Threshold Cryptography. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1288-1293 - [r12]Yvo Desmedt:
Trojan Horses, Computer Viruses, and Worms. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1319-1320 - [i12]Shah Mahmood, Yvo Desmedt:
Preliminary Analysis of Google+'s Privacy. CoRR abs/1111.3530 (2011) - [i11]Qiushi Yang, Yvo Desmedt:
Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol. IACR Cryptol. ePrint Arch. 2011: 265 (2011) - 2010
- [j24]Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup:
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack. J. Cryptol. 23(1): 91-120 (2010) - [c115]Yvo Desmedt, Stelios Erotokritou, Reihaneh Safavi-Naini:
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes. AFRICACRYPT 2010: 166-183 - [c114]Qiushi Yang, Yvo Desmedt:
General Perfectly Secure Message Transmission Using Linear Codes. ASIACRYPT 2010: 448-465 - [c113]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. Inscrypt 2010: 187-198 - [c112]Yvo Desmedt, Atsuko Miyaji:
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments. Inscrypt 2010: 236-254 - [c111]Yi Lu, Yvo Desmedt:
Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher. ICISC 2010: 16-28 - [c110]Yi Lu, Yvo Desmedt:
Improved Distinguishing Attack on Rabbit. ISC 2010: 17-23 - [c109]Yvo Desmedt, Edith Elkind:
Equilibria of plurality voting with abstentions. EC 2010: 347-356 - [c108]Saghar Estehghari, Yvo Desmedt:
Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example. EVT/WOTE 2010 - [i10]Yvo Desmedt, Edith Elkind:
Equilibria of Plurality Voting with Abstentions. CoRR abs/1001.4939 (2010)
2000 – 2009
- 2009
- [j23]Yvo Desmedt, Niels Duif, Henk van Tilborg, Huaxiong Wang:
Bounds and constructions for key distribution schemes. Adv. Math. Commun. 3(3): 273-293 (2009) - [c107]Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt:
Unconditionally Secure Approximate Message Authentication. IWCC 2009: 233-247 - [c106]Qiushi Yang, Yvo Desmedt:
Cryptanalysis of Secure Message Transmission Protocols with Feedback. ICITS 2009: 159-176 - [e4]Yvo Desmedt:
Information Theoretic Security - Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4883, Springer 2009, ISBN 978-3-642-10229-5 [contents] - [i9]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. IACR Cryptol. ePrint Arch. 2009: 224 (2009) - [i8]Qiushi Yang, Yvo Desmedt:
Cryptanalysis of Secure Message Transmission Protocols with Feedback. IACR Cryptol. ePrint Arch. 2009: 632 (2009) - 2008
- [j22]Yongge Wang, Yvo Desmedt:
Perfectly Secure Message Transmission Revisited. IEEE Trans. Inf. Theory 54(6): 2582-2595 (2008) - [c105]Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan:
Hybrid Damgård Is CCA1-Secure under the DDH Assumption. CANS 2008: 18-30 - [c104]Yvo Desmedt, Tanja Lange:
Revisiting Pairing Based Group Key Exchange. Financial Cryptography 2008: 53-68 - [c103]Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung:
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). Financial Cryptography 2008: 307-313 - [c102]Yvo Desmedt, Brian King, Berry Schoenmakers:
Revisiting the Karnin, Greene and Hellman Bounds. ICITS 2008: 183-198 - [c101]Yvo Desmedt, Duong Hieu Phan:
A CCA Secure Hybrid Damgård's ElGamal Encryption. ProvSec 2008: 68-82 - 2007
- [c100]Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen:
Secure Protocols with Asymmetric Trust. ASIACRYPT 2007: 357-375 - [c99]Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt:
Unconditionally secure ring authentication. AsiaCCS 2007: 173-181 - [c98]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang:
On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612 - [c97]Yvo Desmedt, Goce Jakimoski:
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. CT-RSA 2007: 324-338 - [c96]Yvo Desmedt:
Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure. Financial Cryptography 2007: 53-56 - [c95]Yvo Desmedt, Tanja Lange, Mike Burmester:
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. Financial Cryptography 2007: 104-118 - [c94]Yvo Desmedt, Kaoru Kurosawa:
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. ISC 2007: 351-361 - 2006
- [j21]Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern:
Index Calculation Attacks on RSA Signature and Encryption. Des. Codes Cryptogr. 38(1): 41-53 (2006) - [c93]Yvo Desmedt, Yongge Wang, Mike Burmester:
Revisiting Colored Networks and Privacy Preserving Censorship. CRITIS 2006: 140-150 - [c92]Yvo Desmedt, Tanja Lange:
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng. Financial Cryptography 2006: 154-159 - [c91]Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson:
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309 - [c90]Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475 - [i7]Goce Jakimoski, Yvo Desmedt:
A Tree-based Model of Unicast Stream Authentication. IACR Cryptol. ePrint Arch. 2006: 89 (2006) - [i6]Yvo Desmedt, Tanja Lange, Mike Burmester:
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. IACR Cryptol. ePrint Arch. 2006: 443 (2006) - 2005
- [j20]Mike Burmester, Yvo Desmedt:
A secure and scalable Group Key Exchange system. Inf. Process. Lett. 94(3): 137-143 (2005) - [c89]Yvo Desmedt:
Potential Impacts of a Growing Gap Between Theory and Practice in Information Security. ACISP 2005: 532-536 - [c88]Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang:
Radio Networks with Reliable Communication. COCOON 2005: 156-166 - [c87]Brian King, Yvo Desmedt:
Securing Abstention in an Electronic Legislature. HICSS 2005 - [c86]Yvo Desmedt:
Unconditionally private and reliable communication in an untrusted network. ICITS 2005: 38-41 - [c85]Yvo Desmedt, Yongge Wang, Mike Burmester:
A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. ISAAC 2005: 277-287 - [c84]Yvo Desmedt, Kaoru Kurosawa:
Electronic Voting: Starting Over? ISC 2005: 329-343 - [c83]Yvo Desmedt:
Understanding Why Some Network Protocols Are User-Unfriendly. Security Protocols Workshop 2005: 215-219 - [c82]Yvo Desmedt:
Understanding Why Some Network Protocols Are User-Unfriendly. Security Protocols Workshop 2005: 220-227 - [e3]Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li:
Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings. Lecture Notes in Computer Science 3810, Springer 2005, ISBN 3-540-30849-0 [contents] - [r11]Yvo Desmedt:
Access structure. Encyclopedia of Cryptography and Security 2005 - [r10]Yvo Desmedt:
Covert Channels. Encyclopedia of Cryptography and Security 2005 - [r9]