| 2008 |
| 137 | EE | Yvo Desmedt,
Helger Lipmaa,
Duong Hieu Phan:
Hybrid Damgård Is CCA1-Secure under the DDH Assumption.
CANS 2008: 18-30 |
| 136 | EE | Jon Callas,
Yvo Desmedt,
Daniel Nagy,
Akira Otsuka,
Jean-Jacques Quisquater,
Moti Yung:
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Financial Cryptography 2008: 307-313 |
| 135 | EE | Yvo Desmedt,
Tanja Lange:
Revisiting Pairing Based Group Key Exchange.
Financial Cryptography 2008: 53-68 |
| 134 | EE | Yvo Desmedt,
Brian King,
Berry Schoenmakers:
Revisiting the Karnin, Greene and Hellman Bounds.
ICITS 2008: 183-198 |
| 133 | EE | Yvo Desmedt,
Duong Hieu Phan:
A CCA Secure Hybrid Damgård's ElGamal Encryption.
ProvSec 2008: 68-82 |
| 132 | EE | Yongge Wang,
Yvo Desmedt:
Perfectly Secure Message Transmission Revisited.
IEEE Transactions on Information Theory 54(6): 2582-2595 (2008) |
| 2007 |
| 131 | EE | Reihaneh Safavi-Naini,
Shuhong Wang,
Yvo Desmedt:
Unconditionally secure ring authentication.
ASIACCS 2007: 173-181 |
| 130 | EE | Ivan Damgård,
Yvo Desmedt,
Matthias Fitzi,
Jesper Buus Nielsen:
Secure Protocols with Asymmetric Trust.
ASIACRYPT 2007: 357-375 |
| 129 | EE | Yvo Desmedt,
Josef Pieprzyk,
Ron Steinfeld,
Huaxiong Wang:
On Secure Multi-party Computation in Black-Box Groups.
CRYPTO 2007: 591-612 |
| 128 | EE | Yvo Desmedt,
Goce Jakimoski:
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels.
CT-RSA 2007: 324-338 |
| 127 | EE | Yvo Desmedt,
Tanja Lange,
Mike Burmester:
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.
Financial Cryptography 2007: 104-118 |
| 126 | EE | Yvo Desmedt:
Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.
Financial Cryptography 2007: 53-56 |
| 125 | EE | Yvo Desmedt,
Kaoru Kurosawa:
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring.
ISC 2007: 351-361 |
| 2006 |
| 124 | EE | Yvo Desmedt,
Yongge Wang,
Mike Burmester:
Revisiting Colored Networks and Privacy Preserving Censorship.
CRITIS 2006: 140-150 |
| 123 | EE | Yvo Desmedt,
Tanja Lange:
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng.
Financial Cryptography 2006: 154-159 |
| 122 | EE | Kun Peng,
Juan Manuel González Nieto,
Yvo Desmedt,
Ed Dawson:
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network.
ICISC 2006: 296-309 |
| 121 | EE | Yvo Desmedt,
Josef Pieprzyk,
Ron Steinfeld,
Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.
ISC 2006: 459-475 |
| 120 | EE | Jean-Sébastien Coron,
David Naccache,
Yvo Desmedt,
Andrew M. Odlyzko,
Julien P. Stern:
Index Calculation Attacks on RSA Signature and Encryption.
Des. Codes Cryptography 38(1): 41-53 (2006) |
| 2005 |
| 119 | | Yvo Desmedt,
Huaxiong Wang,
Yi Mu,
Yongqing Li:
Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
Springer 2005 |
| 118 | EE | Yvo Desmedt:
Potential Impacts of a Growing Gap Between Theory and Practice in Information Security.
ACISP 2005: 532-536 |
| 117 | EE | Yvo Desmedt,
Yongge Wang,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Radio Networks with Reliable Communication.
COCOON 2005: 156-166 |
| 116 | EE | Brian King,
Yvo Desmedt:
Securing Abstention in an Electronic Legislature.
HICSS 2005 |
| 115 | EE | Yvo Desmedt,
Yongge Wang,
Mike Burmester:
A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback.
ISAAC 2005: 277-287 |
| 114 | EE | Yvo Desmedt,
Kaoru Kurosawa:
Electronic Voting: Starting Over?
ISC 2005: 329-343 |
| 113 | EE | Yvo Desmedt:
Understanding Why Some Network Protocols Are User-Unfriendly.
Security Protocols Workshop 2005: 215-219 |
| 112 | EE | Yvo Desmedt:
Understanding Why Some Network Protocols Are User-Unfriendly.
Security Protocols Workshop 2005: 220-227 |
| 111 | EE | Yvo Desmedt:
Access structure.
Encyclopedia of Cryptography and Security 2005 |
| 110 | EE | Yvo Desmedt:
Covert Channels.
Encyclopedia of Cryptography and Security 2005 |
| 109 | EE | Yvo Desmedt:
Deniable encryption.
Encyclopedia of Cryptography and Security 2005 |
| 108 | EE | Yvo Desmedt:
ElGamal Public Key Encryption.
Encyclopedia of Cryptography and Security 2005 |
| 107 | EE | Yvo Desmedt:
Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature Scheme.
Encyclopedia of Cryptography and Security 2005 |
| 106 | EE | Yvo Desmedt:
Knapsack cryptographic schemes.
Encyclopedia of Cryptography and Security 2005 |
| 105 | EE | Yvo Desmedt:
Man-in-the-Middle Attack.
Encyclopedia of Cryptography and Security 2005 |
| 104 | EE | Yvo Desmedt:
Relay Attack.
Encyclopedia of Cryptography and Security 2005 |
| 103 | EE | Yvo Desmedt:
Station-to-Station Protocol.
Encyclopedia of Cryptography and Security 2005 |
| 102 | EE | Yvo Desmedt:
Threshold Cryptography.
Encyclopedia of Cryptography and Security 2005 |
| 101 | EE | Yvo Desmedt:
Trojan Horses, Computer Viruses and Worms.
Encyclopedia of Cryptography and Security 2005 |
| 100 | EE | Mike Burmester,
Yvo Desmedt:
A secure and scalable Group Key Exchange system.
Inf. Process. Lett. 94(3): 137-143 (2005) |
| 2004 |
| 99 | EE | Tri Van Le,
Rüdiger Sparr,
Ralph Wernsdorf,
Yvo Desmedt:
Complementation-Like and Cyclic Properties of AES Round Functions.
AES Conference 2004: 128-141 |
| 98 | EE | Kaoru Kurosawa,
Yvo Desmedt:
A New Paradigm of Hybrid Encryption Scheme.
CRYPTO 2004: 426-442 |
| 97 | | Yvo Desmedt,
Mike Burmester:
Identity-based Key Infrastructures (IKI).
SEC 2004: 167-176 |
| 96 | EE | Mike Burmester,
Yvo Desmedt,
Rebecca N. Wright,
Alec Yasinsac:
Accountable Privacy.
Security Protocols Workshop 2004: 83-95 |
| 95 | EE | Mike Burmester,
Yvo Desmedt:
Is hierarchical public-key certification the next target for hackers?
Commun. ACM 47(8): 68-74 (2004) |
| 94 | EE | Yvo Desmedt,
Yongge Wang:
Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs.
Int. J. Found. Comput. Sci. 15(1): 107-125 (2004) |
| 2003 |
| 93 | EE | Yvo Desmedt,
Kaoru Kurosawa,
Tri Van Le:
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes.
ISC 2003: 396-407 |
| 92 | EE | Goce Jakimoski,
Yvo Desmedt:
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants.
Selected Areas in Cryptography 2003: 208-221 |
| 2002 |
| 91 | | Yvo Desmedt:
Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings
Springer 2002 |
| 90 | EE | Yvo Desmedt,
Yongge Wang:
Maximum Flows and Critical Vertices in AND/OR Graphs.
COCOON 2002: 238-248 |
| 89 | EE | Yvo Desmedt,
Brian King:
Verifiable Democracy a Protocol to Secure an Electronic Legislature.
EGOV 2002: 460-463 |
| 88 | EE | Yvo Desmedt,
Yongge Wang:
Perfectly Secure Message Transmission Revisited.
EUROCRYPT 2002: 502-517 |
| 87 | EE | Yvo Desmedt,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Redistribution of Mechanical Secret Shares.
Financial Cryptography 2002: 238-252 |
| 86 | EE | Tri Van Le,
Yvo Desmedt:
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection.
Information Hiding 2002: 213-225 |
| 85 | EE | Yvo Desmedt,
Yongge Wang:
Efficient Zero-Knowledge Proofs for Some Practical Graph Problems.
SCN 2002: 290-302 |
| 84 | EE | Yvo Desmedt,
Yongge Wang:
Perfectly Secure Message Transmission Revisited
CoRR cs.CR/0208041: (2002) |
| 2001 |
| 83 | EE | Yvo Desmedt,
Mike Burmester,
Jennifer Seberry:
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow.
Public Key Cryptography 2001: 277-286 |
| 82 | EE | Yvo Desmedt,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Lynn Margaret Batten,
Chris Charnes,
Josef Pieprzyk:
Broadcast anti-jamming systems.
Computer Networks 35(2-3): 223-236 (2001) |
| 81 | EE | Yongge Wang,
Yvo Desmedt:
Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question.
J. Cryptology 14(2): 121-135 (2001) |
| 2000 |
| 80 | EE | Yvo Desmedt,
Tri Van Le:
Moiré cryptography.
ACM Conference on Computer and Communications Security 2000: 116-124 |
| 79 | EE | Carlisle M. Adams,
Mike Burmester,
Yvo Desmedt,
Michael K. Reiter,
Philip Zimmermann:
Which PKI (public key infrastructure) is the right one? (panel session).
ACM Conference on Computer and Communications Security 2000: 98-101 |
| 78 | EE | Xunhua Wang,
Yih Huang,
Yvo Desmedt,
David Rine:
Enabling Secure On-Line DNS Dynamic Update.
ACSAC 2000: 52- |
| 77 | EE | Yvo Desmedt,
Kaoru Kurosawa:
How to Break a Practical MIX and Design a New One.
EUROCRYPT 2000: 557-572 |
| 76 | | Mike Burmester,
Yvo Desmedt,
Hiroshi Doi,
Masahiro Mambo,
Eiji Okamoto,
Mitsuru Tada,
Yuko Yoshifuji:
A Structured ElGamal-Type Multisignature Scheme.
Public Key Cryptography 2000: 466-483 |
| 75 | | Yongge Wang,
Yvo Desmedt,
Mike Burmester:
Models For Dependable Computation with Multiple Inputs and Some Hardness Results.
Fundam. Inform. 42(1): 61-73 (2000) |
| 74 | EE | Nikos Alexandris,
Mike Burmester,
Vassilios Chrissikopoulos,
Yvo Desmedt:
Secure linking of customers, merchants and banks in electronic commerce.
Future Generation Comp. Syst. 16(4): 393-401 (2000) |
| 73 | EE | Amos Beimel,
Mike Burmester,
Yvo Desmedt,
Eyal Kushilevitz:
Computing Functions of a Shared Secret.
SIAM J. Discrete Math. 13(3): 324-345 (2000) |
| 1999 |
| 72 | | Yvo Desmedt,
Yongge Wang:
Approximation Hardness and Secure Communication in Broadcast Channels.
ASIACRYPT 1999: 247-257 |
| 71 | | Mike Burmester,
Yvo Desmedt:
Secure Communication in an Unknown Network Using Certificates.
ASIACRYPT 1999: 274-287 |
| 70 | | Yvo Desmedt,
Brian King:
Verifiable Democracy.
Communications and Multimedia Security 1999: 53-70 |
| 69 | EE | Yongge Wang,
Yvo Desmedt:
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question.
EUROCRYPT 1999: 446-458 |
| 68 | | Yvo Desmedt,
Tri Van Le,
Jean-Jacques Quisquater:
Nonbinary Audio Cryptography.
Information Hiding 1999: 478-489 |
| 67 | EE | Mike Burmester,
Yvo Desmedt,
Toshiya Itoh,
Kouichi Sakurai,
Hiroki Shizuya:
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages.
J. Cryptology 12(3): 197-223 (1999) |
| 1998 |
| 66 | EE | Yvo Desmedt,
Brian King,
Wataru Kishimoto,
Kaoru Kurosawa:
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group.
ACISP 1998: 391-402 |
| 65 | EE | Mike Burmester,
Yvo Desmedt,
Jennifer Seberry:
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically).
ASIACRYPT 1998: 380-391 |
| 64 | EE | Yvo Desmedt,
Shuang Hou,
Jean-Jacques Quisquater:
Audio and Optical Cryptography.
ASIACRYPT 1998: 392-404 |
| 63 | EE | Kaoru Kurosawa,
Takuya Yoshida,
Yvo Desmedt,
Mike Burmester:
Some Bounds and a Construction for Secure Broadcast Encryption.
ASIACRYPT 1998: 420-433 |
| 62 | EE | Kaoru Kurosawa,
Yvo Desmedt:
Optimum Traitor Tracing and Asymmetric Schemes.
EUROCRYPT 1998: 145-157 |
| 61 | EE | Yvo Desmedt,
Shuang Hou,
Jean-Jacques Quisquater:
Cerebral Cryptography.
Information Hiding 1998: 62-72 |
| 60 | EE | Mike Burmester,
Yvo Desmedt,
Yongge Wang:
Using Approximation Hardness to Achieve Dependable Computation.
RANDOM 1998: 172-186 |
| 1997 |
| 59 | | Yvo Desmedt:
Some Recent Research Aspects of Threshold Cryptography.
ISW 1997: 158-173 |
| 58 | | Mike Burmester,
Yvo Desmedt,
Fred Piper,
Michael Walker:
A General Zero-Knowledge Scheme.
Des. Codes Cryptography 12(1): 13-37 (1997) |
| 1996 |
| 57 | EE | Yvo Desmedt:
Simmons' protocol is not free of subliminal channels.
CSFW 1996: 170-175 |
| 56 | EE | Simon R. Blackburn,
Mike Burmester,
Yvo Desmedt,
Peter R. Wild:
Efficient Multiplicative Sharing Schemes.
EUROCRYPT 1996: 107-118 |
| 55 | | Mike Burmester,
Yvo Desmedt,
Toshiya Itoh,
Kouichi Sakurai,
Hiroki Shizuya,
Moti Yung:
A Progress Report on Subliminal-Free Channels.
Information Hiding 1996: 157-168 |
| 54 | | Yvo Desmedt:
Establishing Big Broth Using Covert Channals and Other Covert Techniques.
Information Hiding 1996: 65-71 |
| 53 | | Mike Burmester,
Yvo Desmedt:
Efficient and Secure Conference-Key Distribution.
Security Protocols Workshop 1996: 119-129 |
| 1995 |
| 52 | EE | Yvo Desmedt:
Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract).
EUROCRYPT 1995: 147-157 |
| 1994 |
| 51 | | Yvo Desmedt:
Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings
Springer 1994 |
| 50 | | Yvo Desmedt,
Giovanni Di Crescenzo,
Mike Burmester:
Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography.
ASIACRYPT 1994: 21-32 |
| 49 | EE | Mike Burmester,
Yvo Desmedt:
A Secure and Efficient Conference Key Distribution System (Extended Abstract).
EUROCRYPT 1994: 275-286 |
| 48 | EE | Alfredo De Santis,
Yvo Desmedt,
Yair Frankel,
Moti Yung:
How to share a function securely.
STOC 1994: 522-533 |
| 47 | EE | Yvo Desmedt,
Yair Frankel:
Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group.
SIAM J. Discrete Math. 7(4): 667-679 (1994) |
| 1993 |
| 46 | EE | Yvo Desmedt,
Mike Burmester:
Towards Practical ``Proven Secure'' Authenticated Key Distribution.
ACM Conference on Computer and Communications Security 1993: 228-231 |
| 1992 |
| 45 | | Yvo Desmedt,
Jennifer Seberry:
Practical Proven Secure Authentication with Arbitration.
AUSCRYPT 1992: 27-32 |
| 44 | | Yvo Desmedt:
Treshold Cryptosystems (invited talk).
AUSCRYPT 1992: 3-14 |
| 43 | EE | Yair Frankel,
Yvo Desmedt,
Mike Burmester:
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract).
CRYPTO 1992: 549-557 |
| 42 | EE | Yvo Desmedt:
Breaking the Traditional Computer Security Barriers.
ESORICS 1992: 125-138 |
| 41 | EE | Yvo Desmedt,
Peter Landrock,
Arjen K. Lenstra,
Kevin S. McCurley,
Andrew M. Odlyzko,
Rainer A. Rueppel,
Miles E. Smid:
The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel).
EUROCRYPT 1992: 194-199 |
| 40 | EE | Yair Frankel,
Yvo Desmedt:
Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract).
EUROCRYPT 1992: 25-34 |
| 39 | | Mike Burmester,
Yvo Desmedt:
Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token.
IFIP Congress (2) 1992: 479-485 |
| 38 | | Yvo Desmedt,
Yair Frankel,
Moti Yung:
Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback.
INFOCOM 1992: 2045-2054 |
| 37 | | Mike Burmester,
Yvo Desmedt,
Thomas Beth:
Efficient Zero-Knowledge Identification Schemes for Smart Cards.
Comput. J. 35(1): 21-29 (1992) |
| 36 | EE | George I. Davida,
Yvo Desmedt:
Passports and visas versus IDs.
Computers & Security 11(3): 253-258 (1992) |
| 1991 |
| 35 | | Yvo Desmedt,
Mike Burmester:
An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers.
ASIACRYPT 1991: 360-367 |
| 34 | EE | Yvo Desmedt,
Yair Frankel:
Shared Generation of Authenticators and Signatures (Extended Abstract).
CRYPTO 1991: 457-469 |
| 33 | EE | Yvo Desmedt,
Moti Yung:
Weakness of Undeniable Signature Schemes (Extended Abstract).
EUROCRYPT 1991: 205-220 |
| 32 | EE | Mike Burmester,
Yvo Desmedt:
Broadcast Interactive Proofs (Extended Abstract).
EUROCRYPT 1991: 81-95 |
| 31 | | Jean-Jacques Quisquater,
Yvo Desmedt:
Chinese Lotto as an Exhaustive Code-Breaking Machine.
IEEE Computer 24(11): 14-22 (1991) |
| 30 | | Samy Bengio,
Gilles Brassard,
Yvo Desmedt,
Claude Goutier,
Jean-Jacques Quisquater:
Secure Implementations of Identification Systems.
J. Cryptology 4(3): 175-183 (1991) |
| 1990 |
| 29 | EE | Thomas Beth,
Yvo Desmedt:
Identification Tokens - or: Solving the Chess Grandmaster Problem.
CRYPTO 1990: 169-177 |
| 28 | EE | Yvo Desmedt,
Moti Yung:
Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract).
CRYPTO 1990: 177-188 |
| 27 | EE | George I. Davida,
Yvo Desmedt,
René Peralta:
On the Importance of Memory Resources in the Security of Key Exchange Protocols.
EUROCRYPT 1990: 11-15 |
| 26 | | George I. Davida,
Yvo Desmedt:
Cryptography Based Data Security.
Advances in Computers 30: 171-222 (1990) |
| 1989 |
| 25 | EE | Yvo Desmedt,
Yair Frankel:
Threshold Cryptosystems.
CRYPTO 1989: 307-315 |
| 24 | EE | Yvo Desmedt:
Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context.
CRYPTO 1989: 6-16 |
| 23 | EE | Mike Burmester,
Yvo Desmedt,
Fred Piper,
Michael Walker:
A General Zero-Knowledge Scheme (Extended Abstract).
EUROCRYPT 1989: 122-133 |
| 22 | EE | George I. Davida,
Yvo Desmedt,
René Peralta:
A Key Distribution System Based On Any One-Way Function (Extended Abstract).
EUROCRYPT 1989: 75-79 |
| 21 | | George I. Davida,
Yvo Desmedt,
Brian J. Matt:
Defending Systems against Viruses through Cryptographic Authentication.
IEEE Symposium on Security and Privacy 1989: 312-318 |
| 1988 |
| 20 | EE | Yvo Desmedt:
Abuses in Cryptography and How to Fight Them.
CRYPTO 1988: 375-389 |
| 19 | EE | George I. Davida,
Yvo Desmedt:
Passports and Visas Versus IDS (Extended Abstract).
EUROCRYPT 1988: 183-188 |
| 18 | EE | Yvo Desmedt:
Subliminal-Free Authentication and Signature (Extended Abstract).
EUROCRYPT 1988: 23-33 |
| 1987 |
| 17 | EE | Yvo Desmedt:
Society and Group Oriented Cryptography: A New Concept.
CRYPTO 1987: 120-127 |
| 16 | EE | Yvo Desmedt,
Claude Goutier,
Samy Bengio:
Special Uses and Abuses of the Fiat-Shamir Passport Protocol.
CRYPTO 1987: 21-39 |
| 1986 |
| 15 | EE | Yvo Desmedt,
Jean-Jacques Quisquater:
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?).
CRYPTO 1986: 111-117 |
| 14 | EE | Yvo Desmedt:
Is There an ultimate Use of Cryptography?
CRYPTO 1986: 459-463 |
| 13 | | Yvo Desmedt,
Frank Hoornaert,
Jean-Jacques Quisquater:
Several Exhaustive Key Search Machines and DES.
EUROCRYPT 1986: 17-19 |
| 12 | | Henri Cloetens,
Yvo Desmedt,
Luc Bierens,
Joos Vandewalle,
René Govaerts:
Additional Properties in the S-Boxes of the DES.
EUROCRYPT 1986: 20 |
| 1985 |
| 11 | EE | Yvo Desmedt:
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences.
CRYPTO 1985: 42-55 |
| 10 | EE | Yvo Desmedt,
Andrew M. Odlyzko:
A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes.
CRYPTO 1985: 516-522 |
| 9 | EE | Jean-Jacques Quisquater,
Yvo Desmedt,
Marc Davio:
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys).
CRYPTO 1985: 537-542 |
| 1984 |
| 8 | EE | Marc Davio,
Yvo Desmedt,
Jo Goubert,
Frank Hoornaert,
Jean-Jacques Quisquater:
Efficient Hardware and Software Implementations for the DES.
CRYPTO 1984: 144-146 |
| 7 | EE | Frank Hoornaert,
Jo Goubert,
Yvo Desmedt:
Efficient Hardware Implementation of the DES.
CRYPTO 1984: 147-173 |
| 6 | EE | Yvo Desmedt,
Jean-Jacques Quisquater,
Marc Davio:
Dependence of Output on Input in DES: Small Avalanche Characteristics.
CRYPTO 1984: 359-376 |
| 5 | EE | Philippe Delsarte,
Yvo Desmedt,
Andrew M. Odlyzko,
Philippe Piret:
Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme.
EUROCRYPT 1984: 142-149 |
| 4 | EE | Marc Davio,
Yvo Desmedt,
Jean-Jacques Quisquater:
Propagation Characteristics of the DES.
EUROCRYPT 1984: 62-73 |
| 3 | | René Govaerts,
Yvo Desmedt,
Joos Vandewalle:
Cryptography: How to Attack, What to Protect?
ICC (1) 1984: 175-178 |
| 2 | | Yvo Desmedt,
Joos Vandewalle,
René Govaerts:
A critical analysis of the security of knapsack public-key algorithms.
IEEE Transactions on Information Theory 30(4): 601-610 (1984) |
| 1983 |
| 1 | | Marc Davio,
Yvo Desmedt,
Marc Fosseprez,
René Govaerts,
Jan Hulsbosch,
Patrik Neutjens,
Philippe Piret,
Jean-Jacques Quisquater,
Joos Vandewalle,
Pascal Wouters:
Analytical Characteristics of the DES.
CRYPTO 1983: 171-202 |