Yvo Desmedt

Distinguished Professor in Computer Science
Professor - Computer Science
ygd120030@utdallas.edu
972-883-4536
ECS4411
Tags: Security Computer Science

Professional Preparation

Ph.D. - Applied Science
Kathlieke Universiteit Leuven - 1984
M.S. - Electrical Engineering
Kathlieke Universiteit Leuven - 1979

Research Areas

Current Research
  • Access Control
  • Anonymity and Internet Voting
  • Bridging theory and practice
  • Cryptanalysis, breaking and hacking of systems
  • Distributed and Network security (including:
    • Reliable and Perfectly Secure Message Transmission
    • Secret Sharing
    • Secure Multiparty Computation
  • Economic models for information security

Publications

Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto '87 (Lecture Notes in Computer Science 293), pp. 21{39. Springer-Verlag, 1988. (Cited: ISI: 31, Google Scholar: 107) 1988 - Publication
Y. Desmedt. Subliminal-free authentication and signature. In C. G. Gunther, editor, Advances in Cryptology, Proc. of Eurocrypt '88 (Lecture Notes in Computer Science 330), pp. 23{33. Springer-Verlag, May 1988. Davos, Switzerland. (Cited: ISI: 11, Google Scholar: 36) 1988 - Publication
Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto '87 (Lecture Notes in Computer Science 293), pp. 21{39. Springer-Verlag, 1988. (Cited: ISI: 31, Google Scholar: 107) 1988 - Publication
Y. Desmedt and J.-J. Quisquater. Public key systems based on the diculty of tampering (Is there a dierence between DES and RSA?). In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto '86 (Lecture Notes in Computer Science 263), pp. 111{117. Springer-Verlag, 1987. (Cited: ISI: 9, Google Scholar:57) 1987 - Publication
Y. Desmedt and A. Odlyzko. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes. In Hugh C. Williams, editor, Advances in Cryptology: Crypto '85, Proceedings (Lecture Notes in Computer Science 218), pp. 516{522. Springer-Verlag, 1986. (Cited: ISI: 4, Google Scholar: 48) 1986 - Publication
Y. Desmedt and A. Odlyzko. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes. In Hugh C. Williams, editor, Advances in Cryptology: Crypto '85, Proceedings (Lecture Notes in Computer Science 218), pp. 516{522. Springer-Verlag, 1986. (Cited: ISI: 4, Google Scholar: 48) 1986 - Publication
Y. Desmedt. What happened with knapsack cryptographic schemes. In J. K. Skwirzynski, editor, Performance Limits in Communication, Theory and Practice, NATO ASI Series E: Applied Sciences | Vol. 142, pp. 113{134. Kluwer Academic Publishers, 1988. Proceedings of the NATO Advanced Study Institute Il Ciocco, Castelvecchio Pascoli, Tuscany, Italy, July 7{19, 1986. (Cited: Google Scholar: 26) 1986 - Publication
P. Delsarte, Y. Desmedt, A. Odlyzko, and P. Piret. Fast cryptanalysis of the Matsumoto-Imai public key scheme. In T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology. Proc. of Eurocrypt 84 (Lecture Notes in Computer Science 209), pp. 142{149. Springer-Verlag, Berlin, 1985. (Google Scholar:10) 1985 - Publication
Y. Desmedt, J.-J. Quisquater, and M. Davio. Dependence of output on input in DES : Small avalanche characteristics. In G. R. Blakley and D. Chaum, editors, Advances in Cryptology. Proc. of Crypto 84 (Lecture Notes in Computer Science 196), pp. 359{376. Springer-Verlag, 1985. (Google Scholar:24) 1985 - Publication
M. Davio, Y. Desmedt, J. Goubert, F. Hoornaert, and J.-J. Quisquater. Ecient hardware and software implementations for the DES. In G. R. Blakley and D. Chaum, editors, Advances in Cryptology. Proc. of Crypto 84 (Lecture Notes in Computer Science 196), pp. 144{146. Springer-Verlag, 1985. Santa Barbara, California, U.S.A., August 19{22. (Cited: Google Scholar: 25) 1985 - Publication

Appointments

BT-Chair of Information Security
University College London, U.K. [2004–2009]
Professor
Florida State University [1999–2004]
Professor
University of Wisconsin, Milwaukee [1995–1999]
Associate Professor
University of Wisconsin [1991–1995]
Assistant Professor
Universit de Montral, Canada [1987–1991]
Assistant Professor
Universit de Montral, Canada [1987–2018]
Visiting Profesor
Universit de Montral, Canada [1986–1987]
Post-doctoral NFWO (National Science Foundation Belgium) researcher
Katholieke Universiteit Leuven [1985–1986]
Visiting Assistant Professor
University of New Mexico [1985–1985]
Research Assistant
Katholieke Universiteit Leuven [1983–1984]

Additional Information

Current Professional Activities
  • editor in Chief IET Information Security Journal
  • editor of:
    • the Journal of Computer Security,
    • Information Processing Letters,
    • Advances in Mathematics of Communications
  • Chair of the Steering Committee of:
    • International Conference on Cryptology and Network Security
    • International Conference on Information Theoretic Security
  • Member of the Steering Committee of the International Workshop on Practice and Theory in Public Key Cryptography (PKC)
Prizes Awards, and other Honors
  • 1983 100 Year Bell Telephone Belgium Prize
  • 1985 IBM Belgium Prize for best PhD in Computer Science NFWO, Belgium
  • 1985 S.W.I.F.T. (Society for Worldwide Interbank Financial Telecommunication) Prize
  • 1992 Graduate School/University of Wisconsin | Milwaukee Foundation Research Award Graduate School
  • 2000 Center of Excellence in Information Security Education at Florida State University NSA
  • 2010 International Association of Cryptologic Research Fellow IACR Fellows
  • Committee