dblp.uni-trier.dewww.uni-trier.de

Yvo Desmedt

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
137EEYvo Desmedt, Helger Lipmaa, Duong Hieu Phan: Hybrid Damgård Is CCA1-Secure under the DDH Assumption. CANS 2008: 18-30
136EEJon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung: Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). Financial Cryptography 2008: 307-313
135EEYvo Desmedt, Tanja Lange: Revisiting Pairing Based Group Key Exchange. Financial Cryptography 2008: 53-68
134EEYvo Desmedt, Brian King, Berry Schoenmakers: Revisiting the Karnin, Greene and Hellman Bounds. ICITS 2008: 183-198
133EEYvo Desmedt, Duong Hieu Phan: A CCA Secure Hybrid Damgård's ElGamal Encryption. ProvSec 2008: 68-82
132EEYongge Wang, Yvo Desmedt: Perfectly Secure Message Transmission Revisited. IEEE Transactions on Information Theory 54(6): 2582-2595 (2008)
2007
131EEReihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt: Unconditionally secure ring authentication. ASIACCS 2007: 173-181
130EEIvan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen: Secure Protocols with Asymmetric Trust. ASIACRYPT 2007: 357-375
129EEYvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612
128EEYvo Desmedt, Goce Jakimoski: Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. CT-RSA 2007: 324-338
127EEYvo Desmedt, Tanja Lange, Mike Burmester: Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. Financial Cryptography 2007: 104-118
126EEYvo Desmedt: Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure. Financial Cryptography 2007: 53-56
125EEYvo Desmedt, Kaoru Kurosawa: A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. ISC 2007: 351-361
2006
124EEYvo Desmedt, Yongge Wang, Mike Burmester: Revisiting Colored Networks and Privacy Preserving Censorship. CRITIS 2006: 140-150
123EEYvo Desmedt, Tanja Lange: Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng. Financial Cryptography 2006: 154-159
122EEKun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson: Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309
121EEYvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang: A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475
120EEJean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern: Index Calculation Attacks on RSA Signature and Encryption. Des. Codes Cryptography 38(1): 41-53 (2006)
2005
119 Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings Springer 2005
118EEYvo Desmedt: Potential Impacts of a Growing Gap Between Theory and Practice in Information Security. ACISP 2005: 532-536
117EEYvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang: Radio Networks with Reliable Communication. COCOON 2005: 156-166
116EEBrian King, Yvo Desmedt: Securing Abstention in an Electronic Legislature. HICSS 2005
115EEYvo Desmedt, Yongge Wang, Mike Burmester: A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. ISAAC 2005: 277-287
114EEYvo Desmedt, Kaoru Kurosawa: Electronic Voting: Starting Over? ISC 2005: 329-343
113EEYvo Desmedt: Understanding Why Some Network Protocols Are User-Unfriendly. Security Protocols Workshop 2005: 215-219
112EEYvo Desmedt: Understanding Why Some Network Protocols Are User-Unfriendly. Security Protocols Workshop 2005: 220-227
111EEYvo Desmedt: Access structure. Encyclopedia of Cryptography and Security 2005
110EEYvo Desmedt: Covert Channels. Encyclopedia of Cryptography and Security 2005
109EEYvo Desmedt: Deniable encryption. Encyclopedia of Cryptography and Security 2005
108EEYvo Desmedt: ElGamal Public Key Encryption. Encyclopedia of Cryptography and Security 2005
107EEYvo Desmedt: Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature Scheme. Encyclopedia of Cryptography and Security 2005
106EEYvo Desmedt: Knapsack cryptographic schemes. Encyclopedia of Cryptography and Security 2005
105EEYvo Desmedt: Man-in-the-Middle Attack. Encyclopedia of Cryptography and Security 2005
104EEYvo Desmedt: Relay Attack. Encyclopedia of Cryptography and Security 2005
103EEYvo Desmedt: Station-to-Station Protocol. Encyclopedia of Cryptography and Security 2005
102EEYvo Desmedt: Threshold Cryptography. Encyclopedia of Cryptography and Security 2005
101EEYvo Desmedt: Trojan Horses, Computer Viruses and Worms. Encyclopedia of Cryptography and Security 2005
100EEMike Burmester, Yvo Desmedt: A secure and scalable Group Key Exchange system. Inf. Process. Lett. 94(3): 137-143 (2005)
2004
99EETri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Yvo Desmedt: Complementation-Like and Cyclic Properties of AES Round Functions. AES Conference 2004: 128-141
98EEKaoru Kurosawa, Yvo Desmedt: A New Paradigm of Hybrid Encryption Scheme. CRYPTO 2004: 426-442
97 Yvo Desmedt, Mike Burmester: Identity-based Key Infrastructures (IKI). SEC 2004: 167-176
96EEMike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac: Accountable Privacy. Security Protocols Workshop 2004: 83-95
95EEMike Burmester, Yvo Desmedt: Is hierarchical public-key certification the next target for hackers? Commun. ACM 47(8): 68-74 (2004)
94EEYvo Desmedt, Yongge Wang: Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs. Int. J. Found. Comput. Sci. 15(1): 107-125 (2004)
2003
93EEYvo Desmedt, Kaoru Kurosawa, Tri Van Le: Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. ISC 2003: 396-407
92EEGoce Jakimoski, Yvo Desmedt: Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. Selected Areas in Cryptography 2003: 208-221
2002
91 Yvo Desmedt: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings Springer 2002
90EEYvo Desmedt, Yongge Wang: Maximum Flows and Critical Vertices in AND/OR Graphs. COCOON 2002: 238-248
89EEYvo Desmedt, Brian King: Verifiable Democracy a Protocol to Secure an Electronic Legislature. EGOV 2002: 460-463
88EEYvo Desmedt, Yongge Wang: Perfectly Secure Message Transmission Revisited. EUROCRYPT 2002: 502-517
87EEYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang: Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252
86EETri Van Le, Yvo Desmedt: Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. Information Hiding 2002: 213-225
85EEYvo Desmedt, Yongge Wang: Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. SCN 2002: 290-302
84EEYvo Desmedt, Yongge Wang: Perfectly Secure Message Transmission Revisited CoRR cs.CR/0208041: (2002)
2001
83EEYvo Desmedt, Mike Burmester, Jennifer Seberry: Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Public Key Cryptography 2001: 277-286
82EEYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001)
81EEYongge Wang, Yvo Desmedt: Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question. J. Cryptology 14(2): 121-135 (2001)
2000
80EEYvo Desmedt, Tri Van Le: Moiré cryptography. ACM Conference on Computer and Communications Security 2000: 116-124
79EECarlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann: Which PKI (public key infrastructure) is the right one? (panel session). ACM Conference on Computer and Communications Security 2000: 98-101
78EEXunhua Wang, Yih Huang, Yvo Desmedt, David Rine: Enabling Secure On-Line DNS Dynamic Update. ACSAC 2000: 52-
77EEYvo Desmedt, Kaoru Kurosawa: How to Break a Practical MIX and Design a New One. EUROCRYPT 2000: 557-572
76 Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji: A Structured ElGamal-Type Multisignature Scheme. Public Key Cryptography 2000: 466-483
75 Yongge Wang, Yvo Desmedt, Mike Burmester: Models For Dependable Computation with Multiple Inputs and Some Hardness Results. Fundam. Inform. 42(1): 61-73 (2000)
74EENikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, Yvo Desmedt: Secure linking of customers, merchants and banks in electronic commerce. Future Generation Comp. Syst. 16(4): 393-401 (2000)
73EEAmos Beimel, Mike Burmester, Yvo Desmedt, Eyal Kushilevitz: Computing Functions of a Shared Secret. SIAM J. Discrete Math. 13(3): 324-345 (2000)
1999
72 Yvo Desmedt, Yongge Wang: Approximation Hardness and Secure Communication in Broadcast Channels. ASIACRYPT 1999: 247-257
71 Mike Burmester, Yvo Desmedt: Secure Communication in an Unknown Network Using Certificates. ASIACRYPT 1999: 274-287
70 Yvo Desmedt, Brian King: Verifiable Democracy. Communications and Multimedia Security 1999: 53-70
69EEYongge Wang, Yvo Desmedt: Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question. EUROCRYPT 1999: 446-458
68 Yvo Desmedt, Tri Van Le, Jean-Jacques Quisquater: Nonbinary Audio Cryptography. Information Hiding 1999: 478-489
67EEMike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya: Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. J. Cryptology 12(3): 197-223 (1999)
1998
66EEYvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa: A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. ACISP 1998: 391-402
65EEMike Burmester, Yvo Desmedt, Jennifer Seberry: Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). ASIACRYPT 1998: 380-391
64EEYvo Desmedt, Shuang Hou, Jean-Jacques Quisquater: Audio and Optical Cryptography. ASIACRYPT 1998: 392-404
63EEKaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester: Some Bounds and a Construction for Secure Broadcast Encryption. ASIACRYPT 1998: 420-433
62EEKaoru Kurosawa, Yvo Desmedt: Optimum Traitor Tracing and Asymmetric Schemes. EUROCRYPT 1998: 145-157
61EEYvo Desmedt, Shuang Hou, Jean-Jacques Quisquater: Cerebral Cryptography. Information Hiding 1998: 62-72
60EEMike Burmester, Yvo Desmedt, Yongge Wang: Using Approximation Hardness to Achieve Dependable Computation. RANDOM 1998: 172-186
1997
59 Yvo Desmedt: Some Recent Research Aspects of Threshold Cryptography. ISW 1997: 158-173
58 Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker: A General Zero-Knowledge Scheme. Des. Codes Cryptography 12(1): 13-37 (1997)
1996
57EEYvo Desmedt: Simmons' protocol is not free of subliminal channels. CSFW 1996: 170-175
56EESimon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild: Efficient Multiplicative Sharing Schemes. EUROCRYPT 1996: 107-118
55 Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung: A Progress Report on Subliminal-Free Channels. Information Hiding 1996: 157-168
54 Yvo Desmedt: Establishing Big Broth Using Covert Channals and Other Covert Techniques. Information Hiding 1996: 65-71
53 Mike Burmester, Yvo Desmedt: Efficient and Secure Conference-Key Distribution. Security Protocols Workshop 1996: 119-129
1995
52EEYvo Desmedt: Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). EUROCRYPT 1995: 147-157
1994
51 Yvo Desmedt: Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings Springer 1994
50 Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester: Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. ASIACRYPT 1994: 21-32
49EEMike Burmester, Yvo Desmedt: A Secure and Efficient Conference Key Distribution System (Extended Abstract). EUROCRYPT 1994: 275-286
48EEAlfredo De Santis, Yvo Desmedt, Yair Frankel, Moti Yung: How to share a function securely. STOC 1994: 522-533
47EEYvo Desmedt, Yair Frankel: Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group. SIAM J. Discrete Math. 7(4): 667-679 (1994)
1993
46EEYvo Desmedt, Mike Burmester: Towards Practical ``Proven Secure'' Authenticated Key Distribution. ACM Conference on Computer and Communications Security 1993: 228-231
1992
45 Yvo Desmedt, Jennifer Seberry: Practical Proven Secure Authentication with Arbitration. AUSCRYPT 1992: 27-32
44 Yvo Desmedt: Treshold Cryptosystems (invited talk). AUSCRYPT 1992: 3-14
43EEYair Frankel, Yvo Desmedt, Mike Burmester: Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract). CRYPTO 1992: 549-557
42EEYvo Desmedt: Breaking the Traditional Computer Security Barriers. ESORICS 1992: 125-138
41EEYvo Desmedt, Peter Landrock, Arjen K. Lenstra, Kevin S. McCurley, Andrew M. Odlyzko, Rainer A. Rueppel, Miles E. Smid: The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel). EUROCRYPT 1992: 194-199
40EEYair Frankel, Yvo Desmedt: Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract). EUROCRYPT 1992: 25-34
39 Mike Burmester, Yvo Desmedt: Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token. IFIP Congress (2) 1992: 479-485
38 Yvo Desmedt, Yair Frankel, Moti Yung: Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback. INFOCOM 1992: 2045-2054
37 Mike Burmester, Yvo Desmedt, Thomas Beth: Efficient Zero-Knowledge Identification Schemes for Smart Cards. Comput. J. 35(1): 21-29 (1992)
36EEGeorge I. Davida, Yvo Desmedt: Passports and visas versus IDs. Computers & Security 11(3): 253-258 (1992)
1991
35 Yvo Desmedt, Mike Burmester: An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. ASIACRYPT 1991: 360-367
34EEYvo Desmedt, Yair Frankel: Shared Generation of Authenticators and Signatures (Extended Abstract). CRYPTO 1991: 457-469
33EEYvo Desmedt, Moti Yung: Weakness of Undeniable Signature Schemes (Extended Abstract). EUROCRYPT 1991: 205-220
32EEMike Burmester, Yvo Desmedt: Broadcast Interactive Proofs (Extended Abstract). EUROCRYPT 1991: 81-95
31 Jean-Jacques Quisquater, Yvo Desmedt: Chinese Lotto as an Exhaustive Code-Breaking Machine. IEEE Computer 24(11): 14-22 (1991)
30 Samy Bengio, Gilles Brassard, Yvo Desmedt, Claude Goutier, Jean-Jacques Quisquater: Secure Implementations of Identification Systems. J. Cryptology 4(3): 175-183 (1991)
1990
29EEThomas Beth, Yvo Desmedt: Identification Tokens - or: Solving the Chess Grandmaster Problem. CRYPTO 1990: 169-177
28EEYvo Desmedt, Moti Yung: Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract). CRYPTO 1990: 177-188
27EEGeorge I. Davida, Yvo Desmedt, René Peralta: On the Importance of Memory Resources in the Security of Key Exchange Protocols. EUROCRYPT 1990: 11-15
26 George I. Davida, Yvo Desmedt: Cryptography Based Data Security. Advances in Computers 30: 171-222 (1990)
1989
25EEYvo Desmedt, Yair Frankel: Threshold Cryptosystems. CRYPTO 1989: 307-315
24EEYvo Desmedt: Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. CRYPTO 1989: 6-16
23EEMike Burmester, Yvo Desmedt, Fred Piper, Michael Walker: A General Zero-Knowledge Scheme (Extended Abstract). EUROCRYPT 1989: 122-133
22EEGeorge I. Davida, Yvo Desmedt, René Peralta: A Key Distribution System Based On Any One-Way Function (Extended Abstract). EUROCRYPT 1989: 75-79
21 George I. Davida, Yvo Desmedt, Brian J. Matt: Defending Systems against Viruses through Cryptographic Authentication. IEEE Symposium on Security and Privacy 1989: 312-318
1988
20EEYvo Desmedt: Abuses in Cryptography and How to Fight Them. CRYPTO 1988: 375-389
19EEGeorge I. Davida, Yvo Desmedt: Passports and Visas Versus IDS (Extended Abstract). EUROCRYPT 1988: 183-188
18EEYvo Desmedt: Subliminal-Free Authentication and Signature (Extended Abstract). EUROCRYPT 1988: 23-33
1987
17EEYvo Desmedt: Society and Group Oriented Cryptography: A New Concept. CRYPTO 1987: 120-127
16EEYvo Desmedt, Claude Goutier, Samy Bengio: Special Uses and Abuses of the Fiat-Shamir Passport Protocol. CRYPTO 1987: 21-39
1986
15EEYvo Desmedt, Jean-Jacques Quisquater: Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). CRYPTO 1986: 111-117
14EEYvo Desmedt: Is There an ultimate Use of Cryptography? CRYPTO 1986: 459-463
13 Yvo Desmedt, Frank Hoornaert, Jean-Jacques Quisquater: Several Exhaustive Key Search Machines and DES. EUROCRYPT 1986: 17-19
12 Henri Cloetens, Yvo Desmedt, Luc Bierens, Joos Vandewalle, René Govaerts: Additional Properties in the S-Boxes of the DES. EUROCRYPT 1986: 20
1985
11EEYvo Desmedt: Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences. CRYPTO 1985: 42-55
10EEYvo Desmedt, Andrew M. Odlyzko: A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. CRYPTO 1985: 516-522
9EEJean-Jacques Quisquater, Yvo Desmedt, Marc Davio: The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys). CRYPTO 1985: 537-542
1984
8EEMarc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater: Efficient Hardware and Software Implementations for the DES. CRYPTO 1984: 144-146
7EEFrank Hoornaert, Jo Goubert, Yvo Desmedt: Efficient Hardware Implementation of the DES. CRYPTO 1984: 147-173
6EEYvo Desmedt, Jean-Jacques Quisquater, Marc Davio: Dependence of Output on Input in DES: Small Avalanche Characteristics. CRYPTO 1984: 359-376
5EEPhilippe Delsarte, Yvo Desmedt, Andrew M. Odlyzko, Philippe Piret: Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme. EUROCRYPT 1984: 142-149
4EEMarc Davio, Yvo Desmedt, Jean-Jacques Quisquater: Propagation Characteristics of the DES. EUROCRYPT 1984: 62-73
3 René Govaerts, Yvo Desmedt, Joos Vandewalle: Cryptography: How to Attack, What to Protect? ICC (1) 1984: 175-178
2 Yvo Desmedt, Joos Vandewalle, René Govaerts: A critical analysis of the security of knapsack public-key algorithms. IEEE Transactions on Information Theory 30(4): 601-610 (1984)
1983
1 Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters: Analytical Characteristics of the DES. CRYPTO 1983: 171-202

Coauthor Index

1Carlisle M. Adams (Carlisle Adams) [79]
2Nikos Alexandris (Nikolaos Alexandris) [74]
3Lynn Margaret Batten [82]
4Amos Beimel [73]
5Samy Bengio [16] [30]
6Thomas Beth [29] [37]
7Luc Bierens [12]
8Simon R. Blackburn [56]
9Gilles Brassard [30]
10Mike Burmester [23] [32] [35] [37] [39] [43] [46] [49] [50] [53] [55] [56] [58] [60] [63] [65] [67] [71] [73] [74] [75] [76] [79] [83] [95] [96] [97] [100] [115] [124] [127]
11Jon Callas [136]
12Chris Charnes [82]
13Vassilios Chrissikopoulos [74]
14Henri Cloetens [12]
15Jean-Sébastien Coron [120]
16Giovanni Di Crescenzo [50]
17Ivan Damgård [130]
18George I. Davida [19] [21] [22] [26] [27] [36]
19Marc Davio [1] [4] [6] [8] [9]
20Ed Dawson [122]
21Philippe Delsarte [5]
22Hiroshi Doi [76]
23Matthias Fitzi [130]
24Marc Fosseprez [1]
25Yair Frankel [25] [34] [38] [40] [43] [47] [48]
26Jo Goubert [7] [8]
27Claude Goutier [16] [30]
28René Govaerts [1] [2] [3] [12]
29Frank Hoornaert [7] [8] [13]
30Shuang Hou [61] [64]
31Yih Huang [78]
32Jan Hulsbosch [1]
33Toshiya Itoh [55] [67]
34Goce Jakimoski [92] [128]
35Brian King [66] [70] [89] [116] [134]
36Wataru Kishimoto [66]
37Kaoru Kurosawa [62] [63] [66] [77] [93] [98] [114] [125]
38Eyal Kushilevitz [73]
39Peter Landrock [41]
40Tanja Lange [123] [127] [135]
41Tri Van Le [68] [80] [86] [93] [99]
42Arjen K. Lenstra [41]
43Yongqing Li [119]
44Helger Lipmaa [137]
45Masahiro Mambo [76]
46Brian J. Matt [21]
47Kevin S. McCurley [41]
48Yi Mu [119]
49David Naccache [120]
50Daniel Nagy [136]
51Patrik Neutjens [1]
52Jesper Buus Nielsen [130]
53Juan Manuel González Nieto (Juanma González Nieto) [122]
54Andrew M. Odlyzko [5] [10] [41] [120]
55Eiji Okamoto [76]
56Akira Otsuka [136]
57Kun Peng [122]
58René Peralta [22] [27]
59Duong Hieu Phan [133] [137]
60Josef Pieprzyk [82] [121] [129]
61Fred Piper [23] [58]
62Philippe Piret [1] [5]
63Jean-Jacques Quisquater [1] [4] [6] [8] [9] [13] [15] [30] [31] [61] [64] [68] [136]
64Michael K. Reiter [79]
65David Rine [78]
66Rainer A. Rueppel [41]
67Reihaneh Safavi-Naini [82] [87] [117] [131]
68Kouichi Sakurai [55] [67]
69Alfredo De Santis [48]
70Berry Schoenmakers [134]
71Jennifer Seberry (Jennifer Seberry Wallis) [45] [65] [83]
72Hiroki Shizuya [55] [67]
73Miles E. Smid [41]
74Rüdiger Sparr [99]
75Ron Steinfeld [121] [129]
76Julien P. Stern [120]
77Mitsuru Tada [76]
78Joos Vandewalle [1] [2] [3] [12]
79Michael Walker [23] [58]
80Huaxiong Wang [82] [87] [117] [119] [121] [129]
81Shuhong Wang [131]
82Xunhua Wang [78]
83Yongge Wang [60] [69] [72] [75] [81] [84] [85] [88] [90] [94] [115] [117] [124] [132]
84Ralph Wernsdorf [99]
85Peter R. Wild [56]
86Pascal Wouters [1]
87Rebecca N. Wright [96]
88Alec Yasinsac [96]
89Takuya Yoshida [63]
90Yuko Yoshifuji [76]
91Moti Yung (Mordechai M. Yung) [28] [33] [38] [48] [55] [136]
92Philip Zimmermann [79]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)