Back to Results
First PageMeta Content
Cryptography / Eurocrypt / Lecture Notes in Computer Science / Computational hardness assumptions


Curriculum Vitae Yvo Desmedt 1 Personal Details
Add to Reading List

Document Date: 2010-11-22 15:14:26


Open Document

File Size: 218,78 KB

Share Result on Facebook

City

Kenmare / Santa Barbara / Xiamen / Ottawa / Montr´eal / Brighton / Sebastol / Ishikawa / Sanya / Castelvecchio Pascoli / Milwaukee / Florence / Fairfax / IWONL / Zaragoza / New York / Canberra / Leuven / Berlin / Davos / Cambridge / Aarhus / Beijing / Japan Royal Holloway / /

Company

Large Scale Networks / British Telecommunications / Plenum Press / Simmons / the AES / IBM / Google / SIAM Journal / Advances / /

Country

Switzerland / Japan / Canada / United Kingdom / China / Denmark / Italy / Belgium / United States / Singapore / Spain / Greece / Ireland / /

Currency

GBP / USD / /

Facility

Macquarie University / Laboratory of Security / Belgium Ibaraki University / Belgium University of New Mexico / Japan University of Wisconsin / Canada University of Wisconsin / University of Wisconsin-Milwaukee / University of London / University of Wisconsin / Information Security University of Wisconsin / Italy University of Wisconsin / Australia Ibaraki University / U.S.A. University of Wisconsin / George Mason University / U.S.A. University College / U.S.A. Florida State University / Australia Tokyo Institute of Technology / Florida State University / Institution University of Karlsruhe / University College London / U.S.A. University of Wollongong / Israel University of Waterloo / WestGermany University of New South Wales / Japan Florida State University / College of Engineering / U.K. Florida U.S.A. State University / Australia Queensland University of Technology / /

IndustryTerm

Internet Voting / software implementations / identification systems / anti-jamming systems / unknown network / knapsack public key algorithms / passport protocol / secure software / public key cryptographic knapsack algorithms / non-malleable group key exchange protocol / Public key systems / /

MusicGroup

J. K. / /

Organization

U.K. Florida U.S.A. State University / Queensland University of Technology / Macquarie University / Department of Computer Science Visiting / Milwaukee Foundation Research Award Center of Excellence / Research Center for Information Security / North Atlantic Treaty Organization / Laboratory of Security and Assurance / Ministry of Science and Technology of China / Florida State University / George Mason University / National Foundation for Scientific Research / Center for Cryptography / Computer and Network Security / National Science Foundation Belgium / Society for Worldwide Interbank Financial Telecommunication / College of Engineering and Applied Science Professorial Fellow / Science and Engineering Research Council / Department of Electrical Engineering / University of London / Univ. of Wisconsin / National Security Agency / University College London / Institute for Scientific Research for the Industry and Agriculture / University of Wollongong / Department of Computer Science Visiting Associate / Department of Mathematics / University of New South Wales / Japan Program / University of Waterloo / Department of Electrical Engineering and Computer Science / NSA Center of Excellence / Australia Ibaraki University / Japan Society for the Promotion of Science / Graduate School / Florida State University International Association / Department of Computer Science / Research Program Agency / University of New Mexico / Institution University of Karlsruhe / Belgium Ibaraki University / Katholieke Universiteit Leuven / Tokyo Institute of Technology / University of Wisconsin / Technion / /

Person

E. Kushilevitz / A. Odlyzko / Fred Piper / R. Steinfeld / A. Beimel / G. I. Davida / Y. Yoshifuji / M. Yung / J. Vandewalle / C. Xing / G. Davida / Van Nostrand Reinhold / S. Bengio / August / G. Jakimoski / B. J. Matt / M. Burmester / P. Delsarte / K. Kurosawa / A. De Santis / R. Punyayutthakarn / E. Okamoto / Y. Mu / R. B. Harrison / C. Goutier / Y. G. Desmedt / G. Di Crescenzo / Y. Desmedt / Y. Frankel / J. Seberry / Alec Yasinsac / H. Shizuya / K. Sechtig / T. Yoshida / T. Itoh / T. Beth / Jim Lowe / Fakult / Q. Yang / A. Yao / X. Wang / V. D. Burmester / H. Wang / S. Mahmood / M. Mambo / R. Wright / Y. Li / Rogue / A. Yasinsac / R. Govaerts / J. Pieprzyk / Y. Lu / Mike Burmester / P. Piret / J. R. Seberry / M. Tada / Y. Wang / S. Jajodia / J. Cheney / J. Quisquater / A. Tillirides / K. Sakurai / Kaoru Kurosawa / /

Position

advisor / Adjunct Professor / Department / Post-doctoral advisor / Assistant Professor / D´ept / PhD advisor / arbiter / Professor in Information Security / Professor / Post-doctoral advisor of Y. Lu PhD / Professor of Information Security / MSc advisor / Research Assistant / Electrical Engineering Dept / Associate Professor / Independent study advisor / editor / Professor / D´ept / Principal Investigator / Quandt Independent study advisor / Hou Posdoctoral advisor of Dr. Y. Wang / Co-investigator / advisor of R. Punyayutthakarn PhD / researcher / Master project advisor / MSc advisor of J. Cheney / Founding Director / Postdoctoral advisor / Chair of Information Communication Technology Computer Science / Invited Senior Research Scientist / Patel Master project advisor / Director / Assistant Professor / Professor / Computer Science Department / Visiting Assistant / Professor in Computing / B. Quandt Independent study advisor / /

Product

Skullcandy G.I. Headphone/Headset / Franklin / /

ProvinceOrState

Virginia / New York / Tuscany / New Mexico / California / Ontario / Wisconsin / Hainan / New South Wales / /

PublishedMedium

The Computer Journal / IEEE Transactions on Information Theory / Communications of the ACM / Journal of Cryptology / Theory of Computing / Lecture Notes in Computer Science / /

Region

South Wales / /

SportsLeague

International Association / /

Technology

public key cryptographic knapsack algorithms / key exchange protocol / Information Technology / secure broadcast encryption / encryption / Cryptography / knapsack public key algorithms / Fiat-Shamir passport protocol / Technology of China / public key / Simulation / /

SocialTag