D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 42 Citations 11,701 278 World Ranking 5151 National Ranking 2538

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer network
  • The Internet

Yvo Desmedt mostly deals with Computer security, Cryptography, Authentication, Public-key cryptography and Computer network. His work deals with themes such as Identity and World Wide Web, which intersect with Computer security. Yvo Desmedt focuses mostly in the field of World Wide Web, narrowing it down to topics relating to Focus and, in certain cases, Secure communication.

Within one scientific family, he focuses on topics pertaining to Encryption under Cryptography, and may sometimes address concerns connected to Hash function. Yvo Desmedt interconnects Signature, Sign, Secret sharing and Digital signature in the investigation of issues within Authentication. His work focuses on many connections between Public-key cryptography and other disciplines, such as Cryptosystem, that overlap with his field of interest in Shared secret.

His most cited work include:

  • Threshold cryptosystems (981 citations)
  • A secure and efficient conference key distribution system (780 citations)
  • Advances in Cryptology — CRYPTO ’94 (547 citations)

What are the main themes of his work throughout his whole career to date?

Yvo Desmedt mainly investigates Computer security, Cryptography, Theoretical computer science, Secret sharing and World Wide Web. Many of his studies involve connections with topics such as Identification and Computer security. His Cryptography study combines topics from a wide range of disciplines, such as Computer network, Encryption and Key distribution.

Theoretical computer science is closely attributed to Computation in his study. His Secret sharing study combines topics in areas such as Discrete mathematics, Verifiable secret sharing and Combinatorics. His research in Public-key cryptography intersects with topics in Cryptosystem and Algorithm.

He most often published in these fields:

  • Computer security (51.05%)
  • Cryptography (39.64%)
  • Theoretical computer science (21.92%)

What were the highlights of his more recent work (between 2013-2021)?

  • Secret sharing (18.32%)
  • Cryptography (39.64%)
  • Computer security (51.05%)

In recent papers he was focusing on the following fields of study:

Yvo Desmedt mainly focuses on Secret sharing, Cryptography, Computer security, Theoretical computer science and Homomorphic encryption. His Secret sharing research includes elements of Ideal, Matrix, Verifiable secret sharing and Strategic dominance. Many of his studies on Cryptography involve topics that are commonly interrelated, such as Functional encryption.

Code is closely connected to The Internet in his research, which is encompassed under the umbrella topic of Computer security. His Theoretical computer science research incorporates elements of Multiplicative function, Secure multi-party computation, Block cipher and Finite field. His Cryptographic protocol research is multidisciplinary, incorporating elements of Carry, Database transaction and Authentication.

Between 2013 and 2021, his most popular works were:

  • Efficient secret sharing schemes achieving optimal information rate (13 citations)
  • Walsh transforms and cryptographic applications in bias computing (8 citations)
  • Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor (5 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Computer network
  • The Internet

Yvo Desmedt focuses on Computer security, Functional encryption, Cryptography, Homomorphic encryption and Data access. His Computer security study frequently draws connections to other fields, such as The Internet. His study in Cryptography is interdisciplinary in nature, drawing from both Theoretical computer science and Verifiable secret sharing.

His Homomorphic encryption research integrates issues from Group, Homomorphism, Pseudorandom function family, Binary number and Lattice. His Homomorphic secret sharing study incorporates themes from Range, Probabilistic encryption, Attribute-based encryption and Multiple encryption. His work in the fields of Access structure overlaps with other areas such as Public access.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Threshold cryptosystems

Yvo G. Desmedt;Yair Frankel.
international cryptology conference (1989)

1582 Citations

A secure and efficient conference key distribution system

Mike Burmester;Yvo Desmedt.
theory and application of cryptographic techniques (1994)

1324 Citations

Advances in Cryptology — CRYPTO ’94

Yvo G. Desmedt.
(1994)

833 Citations

Public Key Cryptography - PKC 2003

Yvo G. Desmedt.
(2003)

659 Citations

Shared generation of authenticators and signatures

Yvo Desmedt;Yair Frankel.
international cryptology conference (1991)

551 Citations

Society and Group Oriented Cryptography: A New Concept

Yvo Desmedt.
international cryptology conference (1987)

463 Citations

A new paradigm of hybrid encryption scheme

Kaoru Kurosawa;Yvo Desmedt;Yvo Desmedt.
international cryptology conference (2004)

407 Citations

How to share a function securely

Alfredo De Santis;Yvo Desmedt;Yair Frankel;Moti Yung.
symposium on the theory of computing (1994)

389 Citations

Special Uses and Sbuses of the Fiat-Shamir Passport Protocol

Yvo Desmedt;Claude Goutier;Samy Bengio.
international cryptology conference (1987)

302 Citations

Optimum traitor tracing and asymmetric schemes

Kaoru Kurosawa;Yvo Desmedt;Yvo Desmedt.
theory and application of cryptographic techniques (1998)

267 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Yvo Desmedt

Moti Yung

Moti Yung

Columbia University

Publications: 83

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 53

Hideki Imai

Hideki Imai

Chuo University

Publications: 50

Reihaneh Safavi-Naini

Reihaneh Safavi-Naini

University of Calgary

Publications: 48

Huaxiong Wang

Huaxiong Wang

Nanyang Technological University

Publications: 42

Kaoru Kurosawa

Kaoru Kurosawa

Ibaraki University

Publications: 41

Eike Kiltz

Eike Kiltz

Ruhr University Bochum

Publications: 41

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 39

Gilbert Neiger

Gilbert Neiger

Intel (United States)

Publications: 38

Dan Boneh

Dan Boneh

Stanford University

Publications: 37

Rosario Gennaro

Rosario Gennaro

City College of New York

Publications: 37

Yi Mu

Yi Mu

Fujian Normal University

Publications: 35

C.Pandu Rangan

C.Pandu Rangan

Indian Institute of Technology Madras

Publications: 34

Josef Pieprzyk

Josef Pieprzyk

Commonwealth Scientific and Industrial Research Organisation

Publications: 33

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 32

Aggelos Kiayias

Aggelos Kiayias

University of Edinburgh

Publications: 32

Trending Scientists

Ugo Piomelli

Ugo Piomelli

Queen's University

Maria Azua Himmel

Maria Azua Himmel

Fidelity Investments (United States)

Boon Siang Yeo

Boon Siang Yeo

National University of Singapore

Yann Garcia

Yann Garcia

Université Catholique de Louvain

Joachim Messing

Joachim Messing

Rutgers, The State University of New Jersey

Andrew J. Read

Andrew J. Read

Duke University

Michael J. O. Wakelam

Michael J. O. Wakelam

Babraham Institute

Udo Bartsch

Udo Bartsch

Universität Hamburg

Hervé Bellon

Hervé Bellon

University of Western Brittany

Goen Ho

Goen Ho

Murdoch University

Samuel Albani

Samuel Albani

University of Milano-Bicocca

Yuanhang Zhang

Yuanhang Zhang

Peking University

Dardo Tomasi

Dardo Tomasi

National Institutes of Health

Staffan Skerfving

Staffan Skerfving

Lund University

Lorenza Mondada

Lorenza Mondada

University of Basel

Raymond G. Beausoleil

Raymond G. Beausoleil

Hewlett-Packard (United States)

Something went wrong. Please try again later.