Yvo Desmedt mostly deals with Computer security, Cryptography, Authentication, Public-key cryptography and Computer network. His work deals with themes such as Identity and World Wide Web, which intersect with Computer security. Yvo Desmedt focuses mostly in the field of World Wide Web, narrowing it down to topics relating to Focus and, in certain cases, Secure communication.
Within one scientific family, he focuses on topics pertaining to Encryption under Cryptography, and may sometimes address concerns connected to Hash function. Yvo Desmedt interconnects Signature, Sign, Secret sharing and Digital signature in the investigation of issues within Authentication. His work focuses on many connections between Public-key cryptography and other disciplines, such as Cryptosystem, that overlap with his field of interest in Shared secret.
Yvo Desmedt mainly investigates Computer security, Cryptography, Theoretical computer science, Secret sharing and World Wide Web. Many of his studies involve connections with topics such as Identification and Computer security. His Cryptography study combines topics from a wide range of disciplines, such as Computer network, Encryption and Key distribution.
Theoretical computer science is closely attributed to Computation in his study. His Secret sharing study combines topics in areas such as Discrete mathematics, Verifiable secret sharing and Combinatorics. His research in Public-key cryptography intersects with topics in Cryptosystem and Algorithm.
Yvo Desmedt mainly focuses on Secret sharing, Cryptography, Computer security, Theoretical computer science and Homomorphic encryption. His Secret sharing research includes elements of Ideal, Matrix, Verifiable secret sharing and Strategic dominance. Many of his studies on Cryptography involve topics that are commonly interrelated, such as Functional encryption.
Code is closely connected to The Internet in his research, which is encompassed under the umbrella topic of Computer security. His Theoretical computer science research incorporates elements of Multiplicative function, Secure multi-party computation, Block cipher and Finite field. His Cryptographic protocol research is multidisciplinary, incorporating elements of Carry, Database transaction and Authentication.
Yvo Desmedt focuses on Computer security, Functional encryption, Cryptography, Homomorphic encryption and Data access. His Computer security study frequently draws connections to other fields, such as The Internet. His study in Cryptography is interdisciplinary in nature, drawing from both Theoretical computer science and Verifiable secret sharing.
His Homomorphic encryption research integrates issues from Group, Homomorphism, Pseudorandom function family, Binary number and Lattice. His Homomorphic secret sharing study incorporates themes from Range, Probabilistic encryption, Attribute-based encryption and Multiple encryption. His work in the fields of Access structure overlaps with other areas such as Public access.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Threshold cryptosystems
Yvo G. Desmedt;Yair Frankel.
international cryptology conference (1989)
A secure and efficient conference key distribution system
Mike Burmester;Yvo Desmedt.
theory and application of cryptographic techniques (1994)
Advances in Cryptology — CRYPTO ’94
Yvo G. Desmedt.
(1994)
Public Key Cryptography - PKC 2003
Yvo G. Desmedt.
(2003)
Shared generation of authenticators and signatures
Yvo Desmedt;Yair Frankel.
international cryptology conference (1991)
Society and Group Oriented Cryptography: A New Concept
Yvo Desmedt.
international cryptology conference (1987)
A new paradigm of hybrid encryption scheme
Kaoru Kurosawa;Yvo Desmedt;Yvo Desmedt.
international cryptology conference (2004)
How to share a function securely
Alfredo De Santis;Yvo Desmedt;Yair Frankel;Moti Yung.
symposium on the theory of computing (1994)
Special Uses and Sbuses of the Fiat-Shamir Passport Protocol
Yvo Desmedt;Claude Goutier;Samy Bengio.
international cryptology conference (1987)
Optimum traitor tracing and asymmetric schemes
Kaoru Kurosawa;Yvo Desmedt;Yvo Desmedt.
theory and application of cryptographic techniques (1998)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Florida State University
Université Catholique de Louvain
KU Leuven
Nanyang Technological University
Ibaraki University
Commonwealth Scientific and Industrial Research Organisation
Columbia University
Eindhoven University of Technology
University of Wollongong
University of Minnesota
Queen's University
Fidelity Investments (United States)
National University of Singapore
Université Catholique de Louvain
Rutgers, The State University of New Jersey
Duke University
Babraham Institute
Universität Hamburg
University of Western Brittany
Murdoch University
University of Milano-Bicocca
Peking University
National Institutes of Health
Lund University
University of Basel
Hewlett-Packard (United States)