Search the dblp DataBase
Yvo Desmedt :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yvo Desmedt Potential Impacts of a Growing Gap Between Theory and Practice in Information Security. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:532-536 [Conf ] Yvo Desmedt , Brian King , Wataru Kishimoto , Kaoru Kurosawa A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:391-402 [Conf ] Xunhua Wang , Yih Huang , Yvo Desmedt , David Rine Enabling Secure On-Line DNS Dynamic Update. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:52-0 [Conf ] Tri Van Le , Rüdiger Sparr , Ralph Wernsdorf , Yvo Desmedt Complementation-Like and Cyclic Properties of AES Round Functions. [Citation Graph (0, 0)][DBLP ] AES Conference, 2004, pp:128-141 [Conf ] Mike Burmester , Yvo Desmedt Secure Communication in an Unknown Network Using Certificates. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:274-287 [Conf ] Mike Burmester , Yvo Desmedt , Jennifer Seberry Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:380-391 [Conf ] Yvo Desmedt Treshold Cryptosystems (invited talk). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:3-14 [Conf ] Yvo Desmedt , Mike Burmester An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:360-367 [Conf ] Yvo Desmedt , Giovanni Di Crescenzo , Mike Burmester Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:21-32 [Conf ] Yvo Desmedt , Shuang Hou , Jean-Jacques Quisquater Audio and Optical Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:392-404 [Conf ] Yvo Desmedt , Jennifer Seberry Practical Proven Secure Authentication with Arbitration. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:27-32 [Conf ] Yvo Desmedt , Yongge Wang Approximation Hardness and Secure Communication in Broadcast Channels. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:247-257 [Conf ] Kaoru Kurosawa , Takuya Yoshida , Yvo Desmedt , Mike Burmester Some Bounds and a Construction for Secure Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:420-433 [Conf ] Yvo Desmedt , Mike Burmester Towards Practical ``Proven Secure'' Authenticated Key Distribution. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:228-231 [Conf ] Yvo Desmedt , Tri Van Le Moiré cryptography. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:116-124 [Conf ] Carlisle M. Adams , Mike Burmester , Yvo Desmedt , Michael K. Reiter , Philip Zimmermann Which PKI (public key infrastructure) is the right one? (panel session). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:98-101 [Conf ] Reihaneh Safavi-Naini , Shuhong Wang , Yvo Desmedt Unconditionally secure ring authentication. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:173-181 [Conf ] Yvo Desmedt , Brian King Verifiable Democracy. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1999, pp:53-70 [Conf ] Yvo Desmedt , Yongge Wang Maximum Flows and Critical Vertices in AND/OR Graphs. [Citation Graph (0, 0)][DBLP ] COCOON, 2002, pp:238-248 [Conf ] Yvo Desmedt , Yongge Wang , Reihaneh Safavi-Naini , Huaxiong Wang Radio Networks with Reliable Communication. [Citation Graph (0, 0)][DBLP ] COCOON, 2005, pp:156-166 [Conf ] Thomas Beth , Yvo Desmedt Identification Tokens - or: Solving the Chess Grandmaster Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:169-177 [Conf ] Marc Davio , Yvo Desmedt , Jo Goubert , Frank Hoornaert , Jean-Jacques Quisquater Efficient Hardware and Software Implementations for the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:144-146 [Conf ] Yvo Desmedt Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:42-55 [Conf ] Yvo Desmedt Is There an ultimate Use of Cryptography? [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:459-463 [Conf ] Yvo Desmedt Society and Group Oriented Cryptography: A New Concept. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:120-127 [Conf ] Yvo Desmedt Abuses in Cryptography and How to Fight Them. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:375-389 [Conf ] Yvo Desmedt Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:6-16 [Conf ] Yvo Desmedt , Yair Frankel Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:307-315 [Conf ] Yvo Desmedt , Yair Frankel Shared Generation of Authenticators and Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:457-469 [Conf ] Yvo Desmedt , Claude Goutier , Samy Bengio Special Uses and Abuses of the Fiat-Shamir Passport Protocol. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:21-39 [Conf ] Yvo Desmedt , Andrew M. Odlyzko A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:516-522 [Conf ] Yvo Desmedt , Jean-Jacques Quisquater Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:111-117 [Conf ] Yvo Desmedt , Jean-Jacques Quisquater , Marc Davio Dependence of Output on Input in DES: Small Avalanche Characteristics. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:359-376 [Conf ] Yvo Desmedt , Moti Yung Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:177-188 [Conf ] Yair Frankel , Yvo Desmedt , Mike Burmester Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:549-557 [Conf ] Frank Hoornaert , Jo Goubert , Yvo Desmedt Efficient Hardware Implementation of the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:147-173 [Conf ] Kaoru Kurosawa , Yvo Desmedt A New Paradigm of Hybrid Encryption Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:426-442 [Conf ] Jean-Jacques Quisquater , Yvo Desmedt , Marc Davio The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:537-542 [Conf ] Marc Davio , Yvo Desmedt , Marc Fosseprez , René Govaerts , Jan Hulsbosch , Patrik Neutjens , Philippe Piret , Jean-Jacques Quisquater , Joos Vandewalle , Pascal Wouters Analytical Characteristics of the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1983, pp:171-202 [Conf ] Yvo Desmedt Simmons' protocol is not free of subliminal channels. [Citation Graph (0, 0)][DBLP ] CSFW, 1996, pp:170-175 [Conf ] Yvo Desmedt , Goce Jakimoski Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:324-338 [Conf ] Yvo Desmedt , Brian King Verifiable Democracy a Protocol to Secure an Electronic Legislature. [Citation Graph (0, 0)][DBLP ] EGOV, 2002, pp:460-463 [Conf ] Yvo Desmedt Breaking the Traditional Computer Security Barriers. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:125-138 [Conf ] Simon R. Blackburn , Mike Burmester , Yvo Desmedt , Peter R. Wild Efficient Multiplicative Sharing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:107-118 [Conf ] Henri Cloetens , Yvo Desmedt , Luc Bierens , Joos Vandewalle , René Govaerts Additional Properties in the S-Boxes of the DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:20- [Conf ] Mike Burmester , Yvo Desmedt Broadcast Interactive Proofs (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:81-95 [Conf ] Mike Burmester , Yvo Desmedt A Secure and Efficient Conference Key Distribution System (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:275-286 [Conf ] Mike Burmester , Yvo Desmedt , Fred Piper , Michael Walker A General Zero-Knowledge Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:122-133 [Conf ] Yvo Desmedt , Peter Landrock , Arjen K. Lenstra , Kevin S. McCurley , Andrew M. Odlyzko , Rainer A. Rueppel , Miles E. Smid The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:194-199 [Conf ] George I. Davida , Yvo Desmedt Passports and Visas Versus IDS (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:183-188 [Conf ] George I. Davida , Yvo Desmedt , René Peralta A Key Distribution System Based On Any One-Way Function (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:75-79 [Conf ] George I. Davida , Yvo Desmedt , René Peralta On the Importance of Memory Resources in the Security of Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:11-15 [Conf ] Marc Davio , Yvo Desmedt , Jean-Jacques Quisquater Propagation Characteristics of the DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:62-73 [Conf ] Philippe Delsarte , Yvo Desmedt , Andrew M. Odlyzko , Philippe Piret Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:142-149 [Conf ] Yvo Desmedt Subliminal-Free Authentication and Signature (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:23-33 [Conf ] Yvo Desmedt Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:147-157 [Conf ] Yvo Desmedt , Frank Hoornaert , Jean-Jacques Quisquater Several Exhaustive Key Search Machines and DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:17-19 [Conf ] Yvo Desmedt , Kaoru Kurosawa How to Break a Practical MIX and Design a New One. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:557-572 [Conf ] Yvo Desmedt , Yongge Wang Perfectly Secure Message Transmission Revisited. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:502-517 [Conf ] Yvo Desmedt , Moti Yung Weakness of Undeniable Signature Schemes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:205-220 [Conf ] Yair Frankel , Yvo Desmedt Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:25-34 [Conf ] Kaoru Kurosawa , Yvo Desmedt Optimum Traitor Tracing and Asymmetric Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:145-157 [Conf ] Yongge Wang , Yvo Desmedt Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:446-458 [Conf ] Yvo Desmedt , Reihaneh Safavi-Naini , Huaxiong Wang Redistribution of Mechanical Secret Shares. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:238-252 [Conf ] Yvo Desmedt , Tanja Lange Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:154-159 [Conf ] Brian King , Yvo Desmedt Securing Abstention in an Electronic Legislature. [Citation Graph (0, 0)][DBLP ] HICSS, 2005, pp:- [Conf ] René Govaerts , Yvo Desmedt , Joos Vandewalle Cryptography: How to Attack, What to Protect? [Citation Graph (0, 0)][DBLP ] ICC (1), 1984, pp:175-178 [Conf ] Kun Peng , Juan Manuel González Nieto , Yvo Desmedt , Ed Dawson Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:296-309 [Conf ] Mike Burmester , Yvo Desmedt Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token. [Citation Graph (0, 0)][DBLP ] IFIP Congress (2), 1992, pp:479-485 [Conf ] Mike Burmester , Yvo Desmedt , Toshiya Itoh , Kouichi Sakurai , Hiroki Shizuya , Moti Yung A Progress Report on Subliminal-Free Channels. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:157-168 [Conf ] Tri Van Le , Yvo Desmedt Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:213-225 [Conf ] Yvo Desmedt Establishing Big Broth Using Covert Channals and Other Covert Techniques. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:65-71 [Conf ] Yvo Desmedt , Shuang Hou , Jean-Jacques Quisquater Cerebral Cryptography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:62-72 [Conf ] Yvo Desmedt , Tri Van Le , Jean-Jacques Quisquater Nonbinary Audio Cryptography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:478-489 [Conf ] Yvo Desmedt , Yair Frankel , Moti Yung Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1992, pp:2045-2054 [Conf ] Yvo Desmedt , Yongge Wang , Mike Burmester A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. [Citation Graph (0, 0)][DBLP ] ISAAC, 2005, pp:277-287 [Conf ] Yvo Desmedt , Kaoru Kurosawa , Tri Van Le Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:396-407 [Conf ] Yvo Desmedt , Josef Pieprzyk , Ron Steinfeld , Huaxiong Wang A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:459-475 [Conf ] Yvo Desmedt , Kaoru Kurosawa Electronic Voting: Starting Over? [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:329-343 [Conf ] Yvo Desmedt Some Recent Research Aspects of Threshold Cryptography. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:158-173 [Conf ] Yvo Desmedt , Mike Burmester , Jennifer Seberry Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:277-286 [Conf ] Mike Burmester , Yvo Desmedt , Hiroshi Doi , Masahiro Mambo , Eiji Okamoto , Mitsuru Tada , Yuko Yoshifuji A Structured ElGamal-Type Multisignature Scheme. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:466-483 [Conf ] Mike Burmester , Yvo Desmedt , Yongge Wang Using Approximation Hardness to Achieve Dependable Computation. [Citation Graph (0, 0)][DBLP ] RANDOM, 1998, pp:172-186 [Conf ] Goce Jakimoski , Yvo Desmedt Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2003, pp:208-221 [Conf ] Yvo Desmedt , Yongge Wang Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. [Citation Graph (0, 0)][DBLP ] SCN, 2002, pp:290-302 [Conf ] Yvo Desmedt , Mike Burmester Identity-based Key Infrastructures (IKI). [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:167-176 [Conf ] George I. Davida , Yvo Desmedt , Brian J. Matt Defending Systems against Viruses through Cryptographic Authentication. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:312-318 [Conf ] Mike Burmester , Yvo Desmedt Efficient and Secure Conference-Key Distribution. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1996, pp:119-129 [Conf ] Mike Burmester , Yvo Desmedt , Rebecca N. Wright , Alec Yasinsac Accountable Privacy. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:83-95 [Conf ] Alfredo De Santis , Yvo Desmedt , Yair Frankel , Moti Yung How to share a function securely. [Citation Graph (0, 0)][DBLP ] STOC, 1994, pp:522-533 [Conf ] Yvo Desmedt , Yongge Wang , Mike Burmester Revisiting Colored Networks and Privacy Preserving Censorship. [Citation Graph (0, 0)][DBLP ] CRITIS, 2006, pp:140-150 [Conf ] George I. Davida , Yvo Desmedt Cryptography Based Data Security. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 1990, v:30, n:, pp:171-222 [Journal ] Mike Burmester , Yvo Desmedt Is hierarchical public-key certification the next target for hackers? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:8, pp:68-74 [Journal ] Mike Burmester , Yvo Desmedt , Thomas Beth Efficient Zero-Knowledge Identification Schemes for Smart Cards. [Citation Graph (0, 0)][DBLP ] Comput. J., 1992, v:35, n:1, pp:21-29 [Journal ] Yvo Desmedt , Reihaneh Safavi-Naini , Huaxiong Wang , Lynn Margaret Batten , Chris Charnes , Josef Pieprzyk Broadcast anti-jamming systems. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:35, n:2-3, pp:223-236 [Journal ] George I. Davida , Yvo Desmedt Passports and visas versus IDs. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:253-258 [Journal ] Jean-Jacques Quisquater , Yvo Desmedt Chinese Lotto as an Exhaustive Code-Breaking Machine. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1991, v:24, n:11, pp:14-22 [Journal ] Yvo Desmedt , Yongge Wang Perfectly Secure Message Transmission Revisited [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Mike Burmester , Yvo Desmedt , Fred Piper , Michael Walker A General Zero-Knowledge Scheme. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1997, v:12, n:1, pp:13-37 [Journal ] Jean-Sébastien Coron , David Naccache , Yvo Desmedt , Andrew M. Odlyzko , Julien P. Stern Index Calculation Attacks on RSA Signature and Encryption. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2006, v:38, n:1, pp:41-53 [Journal ] Yongge Wang , Yvo Desmedt , Mike Burmester Models For Dependable Computation with Multiple Inputs and Some Hardness Results. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2000, v:42, n:1, pp:61-73 [Journal ] Yvo Desmedt , Yongge Wang Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 2004, v:15, n:1, pp:107-125 [Journal ] Mike Burmester , Yvo Desmedt A secure and scalable Group Key Exchange system. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2005, v:94, n:3, pp:137-143 [Journal ] Samy Bengio , Gilles Brassard , Yvo Desmedt , Claude Goutier , Jean-Jacques Quisquater Secure Implementations of Identification Systems. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1991, v:4, n:3, pp:175-183 [Journal ] Mike Burmester , Yvo Desmedt , Toshiya Itoh , Kouichi Sakurai , Hiroki Shizuya Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:3, pp:197-223 [Journal ] Yongge Wang , Yvo Desmedt Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2001, v:14, n:2, pp:121-135 [Journal ] Amos Beimel , Mike Burmester , Yvo Desmedt , Eyal Kushilevitz Computing Functions of a Shared Secret. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 2000, v:13, n:3, pp:324-345 [Journal ] Yvo Desmedt , Yair Frankel Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 1994, v:7, n:4, pp:667-679 [Journal ] Yvo Desmedt , Joos Vandewalle , René Govaerts A critical analysis of the security of knapsack public-key algorithms. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:601-610 [Journal ] Ivan Damgård , Yvo Desmedt , Matthias Fitzi , Jesper Buus Nielsen Secure Protocols with Asymmetric Trust. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:357-375 [Conf ] Yvo Desmedt , Josef Pieprzyk , Ron Steinfeld , Huaxiong Wang On Secure Multi-party Computation in Black-Box Groups. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:591-612 [Conf ] Yvo Desmedt , Kaoru Kurosawa A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. [Citation Graph (0, 0)][DBLP ] ISC, 2007, pp:351-361 [Conf ] Nikos Alexandris , Mike Burmester , Vassilios Chrissikopoulos , Yvo Desmedt Secure linking of customers, merchants and banks in electronic commerce. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2000, v:16, n:4, pp:393-401 [Journal ] Hybrid Damgård Is CCA1-Secure under the DDH Assumption. [Citation Graph (, )][DBLP ] Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure. [Citation Graph (, )][DBLP ] Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. [Citation Graph (, )][DBLP ] Revisiting Pairing Based Group Key Exchange. [Citation Graph (, )][DBLP ] Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). [Citation Graph (, )][DBLP ] Equilibria of plurality voting with abstentions. [Citation Graph (, )][DBLP ] Understanding Why Some Network Protocols Are User-Unfriendly. [Citation Graph (, )][DBLP ] Understanding Why Some Network Protocols Are User-Unfriendly. [Citation Graph (, )][DBLP ] A CCA Secure Hybrid Damgård's ElGamal Encryption. [Citation Graph (, )][DBLP ] Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes. [Citation Graph (, )][DBLP ] Revisiting the Karnin, Greene and Hellman Bounds. [Citation Graph (, )][DBLP ] Cryptanalysis of Secure Message Transmission Protocols with Feedback. [Citation Graph (, )][DBLP ] Unconditionally Secure Approximate Message Authentication. [Citation Graph (, )][DBLP ] Equilibria of Plurality Voting with Abstentions [Citation Graph (, )][DBLP ] Search in 0.025secs, Finished in 0.029secs