Yvo Desmedt

Distinguished Professor in Computer Science
Professor - Computer Science
Tags: Security Computer Science

Professional Preparation

Ph.D. - Applied Science
Kathlieke Universiteit Leuven - 1984
M.S. - Electrical Engineering
Kathlieke Universiteit Leuven - 1979

Research Areas

Current Research
  • Access Control
  • Anonymity and Internet Voting
  • Bridging theory and practice
  • Cryptanalysis, breaking and hacking of systems
  • Distributed and Network security (including:
    • Reliable and Perfectly Secure Message Transmission
    • Secret Sharing
    • Secure Multiparty Computation
  • Economic models for information security


S. Mahmood and Y. Desmedt. Your facebook deactivated friend or a cloaked spy. In 4th IEEE International Workshop on Security and Social Networking (SESOC) 2012. Accepted for publication. 2012 - Publication
S. Mahmood and Y. Desmedt. Usable Privacy by visual and interactive control of information flow. In Security Protocols (to appear in: Lecture Notes in Computer Science). Springer-Verlag, 2012. Cambridge, United Kingdom April 12-13, 2012. 2012 - Publication
Y. Desmedt. Secret sharing and reliable cloud computing. In Cryptography for Emerginng Technologies and Applications Workshop, National Institute of Standards and Technology (NIST), Gaitherburg, Maryland, Novemeber 708, 2011 2011 - Publication
Q. Yang and Y. Desmedt. Secure communication in multicast graphs. In S.H. Lee and X. Wang, editors, Asiacrypt 2011, volume 7073 of Lecture Notes in Computer Science, pp. 538-555. Springer, 2011. 2011 - Publication
Y. Lu and Y. Desmedt. Improved distinguishing attack on rabbit. In M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, editors, Information Security Conference (ISC 2010), volume 6531 of Lecture Notes in Computer Science, pp. 17{23. Springer, 2011. 2011 - Publication
Y. Wang and Y. Desmedt. Homogeneous faults, colored edge graphs, and cover free families. In S. Fehr, editor, Information Theoretic Security, 5th International Conference, ICITS, volume 6673 of Lecture Notes in Computer Science, pp. 58{72. Springer, May 2011. 2011 - Publication
Y. Lu and Y. Desmedt. Bias analysis of a certain problem with applications to E0 and Shannon cipher. In Information Security and Cryptology - ICISC 2010, December 2010. To appear in the proceedings, LNCS. 2010 - Publication
Y. Desmedt and A. Miyaji. Redesigning group key exchange protocol based on bilinear pairing suitable for various environments. In Inscrypt 2010, 2010. To appear in the proceedings, LNCS. 2010 - Publication
Q. Yang and Y. Desmedt. General perfectly secure message transmission using linear codes. In M. Abe, editor, Asiacrypt 2010, volume 6477 of Lecture Notes in Computer Science, pp. 448{465. Springer, 2010. 2010 - Publication
Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In J. Feigenbaum, editor, Advances in Cryptology | Crypto '91, Proceedings (Lecture Notes in Computer Science 576), pp. 457{469. Springer-Verlag, 1992. (Cited: ISI: 65, Google Scholar: 385) 1992 - Publication


BT-Chair of Information Security
University College London, U.K. [2004–2009]
Florida State University [1999–2004]
University of Wisconsin, Milwaukee [1995–1999]
Associate Professor
University of Wisconsin [1991–1995]
Assistant Professor
Universit de Montral, Canada [1987–1991]
Assistant Professor
Universit de Montral, Canada [1987–2018]
Visiting Profesor
Universit de Montral, Canada [1986–1987]
Post-doctoral NFWO (National Science Foundation Belgium) researcher
Katholieke Universiteit Leuven [1985–1986]
Visiting Assistant Professor
University of New Mexico [1985–1985]
Research Assistant
Katholieke Universiteit Leuven [1983–1984]

Additional Information

Current Professional Activities
  • editor in Chief IET Information Security Journal
  • editor of:
    • the Journal of Computer Security,
    • Information Processing Letters,
    • Advances in Mathematics of Communications
  • Chair of the Steering Committee of:
    • International Conference on Cryptology and Network Security
    • International Conference on Information Theoretic Security
  • Member of the Steering Committee of the International Workshop on Practice and Theory in Public Key Cryptography (PKC)
Prizes Awards, and other Honors
  • 1983 100 Year Bell Telephone Belgium Prize
  • 1985 IBM Belgium Prize for best PhD in Computer Science NFWO, Belgium
  • 1985 S.W.I.F.T. (Society for Worldwide Interbank Financial Telecommunication) Prize
  • 1992 Graduate School/University of Wisconsin | Milwaukee Foundation Research Award Graduate School
  • 2000 Center of Excellence in Information Security Education at Florida State University NSA
  • 2010 International Association of Cryptologic Research Fellow IACR Fellows
  • Committee