Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Author="Desmedt, Yvo"
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Edge-colored graphs with applications to homogeneous faults
Yongge Wang
,
Yvo Desmedt
Information Processing Letters
111
(13), 2011, pp. 634-641
A secure and scalable Group Key Exchange system
Mike Burmester
,
Yvo Desmedt
Information Processing Letters
94
(3), 2005, pp. 137-143
A complete characterization of tolerable adversary structures for secure point-to-point transmissions without feedback
Yvo Desmedt
,
Yongge Wang
,
Mike Burmester
Lecture Notes in Computer Science
3827
, 2005, pp. 277-287
Radio networks with reliable communication
Yvo Desmedt
,
Yongge Wang
,
Rei Safavi-Naini
,
Huaxiong Wang
Lecture Notes in Computer Science
3595
, 2005, pp. 156-166
Analyzing vulnerabilities of critical infrastructures using flows and critical vertices in and/or graphs
Yvo Desmedt
,
Yongge Wang
International Journal of Foundations of Computer Science
15
(1), 2004, pp. 107-125
Maximum flows and critical vertices in AND/OR graphs
Yvo Desmedt
,
Yongge Wang
Lecture Notes in Computer Science
2387
, 2002, pp. 238-248
Computing functions of a shared secret
Amos Beimel
,
Mike Burmester
,
Yvo Desmedt
,
Eyal Kushilevitz
SIAM Journal on Discrete Mathematics
13
(3), 2000, pp. 324-345
Cryptographic foundations
Yvo Desmedt
Algorithms and Theory of Computation Handbook, 1999, pp. 38-1 - 38-14
Encryption schemes
Yvo Desmedt
Algorithms and Theory of Computation Handbook, 1999, pp. 39-1 - 39-28
Using approximation hardness to achieve dependable computation
Mike Burmester
,
Yvo Desmedt
,
Yongge Wang
Lecture Notes in Computer Science
1518
, 1998, pp. 172-186
Incremental cryptography: The case of hashing and signing
Mihir Bellare
,
Oded Goldreich
,
Shafi Goldwasser
Lecture Notes in Computer Science
839
, 1994, pp. 216-233
The security of cipher block chaining
Mihir Bellare
,
Joe Kilian
,
Phillip Rogaway
Lecture Notes in Computer Science
839
, 1994, pp. 341-358
Cryptanalysis of cryptosystems based on remote chaos replication
Th. Beth
,
D.E. Lazic
,
A. Mathias
Lecture Notes in Computer Science
839
, 1994, pp. 318-331
Cryptographic protocols based on discrete logarithms in real-quadratic orders
Ingrid Biehl
,
Johannes Buchmann
,
Christoph Thiel
Lecture Notes in Computer Science
839
, 1994, pp. 56-60
Bounds for resilient functions and orthogonal arrays
Jürgen Bierbrauer
,
K. Gopalakrishnan
,
D.R. Stinson
Lecture Notes in Computer Science
839
, 1994, pp. 247-256
Directed acyclic graphs, one-way functions and digital signatures
Daniel Bleichenbacher
,
Ueli M. Maurer
Lecture Notes in Computer Science
839
, 1994, pp. 75-82
Multi-secret sharing schemes
Carlo Blundo
,
Alfredo De Santis
,
Giovanni Di Crescenzo
,
Antonio Giorgio Gaggia
,
Ugo Vaccaro
Lecture Notes in Computer Science
839
, 1994, pp. 150-163
On the risk of opening distributed keys
Mike Burmester
Lecture Notes in Computer Science
839
, 1994, pp. 308-317
Maintaining security in the presence of transient faults
Ran Canetti
,
Amir Herzberg
Lecture Notes in Computer Science
839
, 1994, pp. 425-438
Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks
Jinhui Chao
,
Kazuo Tanada
,
Shigeo Tsujii
Lecture Notes in Computer Science
839
, 1994, pp. 50-55
Tracing traitors
Benny Chor
,
Amos Fiat
,
Moni Naor
Lecture Notes in Computer Science
839
, 1994, pp. 257-270
Attack on the cryptographic scheme NIKS-TAS
Don Coppersmith
Lecture Notes in Computer Science
839
, 1994, pp. 294-307
Proofs of partial knowledge and simplified design of witness hiding protocols
Ronald Cramer
,
Ivan Damgård
,
Berry Schoenmakers
Lecture Notes in Computer Science
839
, 1994, pp. 174-187
Cryptographic randomness from air turbulence in disk drives
Don Davis
,
Ross Ihaka
,
Philip Fenstermacher
Lecture Notes in Computer Science
839
, 1994, pp. 114-120
An identity-based signature scheme with bounded life-span
Olivier Delos
,
Jean-Jacques Quisquater
Lecture Notes in Computer Science
839
, 1994, pp. 83-94
Seiten 1
2
>