default search action
Jean-Jacques Quisquater
Person information
- affiliation: Université catholique de Louvain, Belgium
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c166]Nicolas T. Courtois, Jean-Jacques Quisquater:
Can a Differential Attack Work for an Arbitrarily Large Number of Rounds? ICISC 2020: 157-181
2010 – 2019
- 2017
- [i21]Elli Androulaki, Matthias Jarke, Jean-Jacques Quisquater:
Introduction to the Special Theme Blockchain Engineering. ERCIM News 2017(110) (2017) - [i20]Jean-Jacques Quisquater:
Blockchains for Everybody: Individuals, Companies, States and Democracy. ERCIM News 2017(110) (2017) - 2016
- [c165]Christophe Petit, Jean-Jacques Quisquater:
Cryptographic Hash Functions and Expander Graphs: The End of the Story? The New Codebreakers 2016: 304-311 - [e13]Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater:
The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Lecture Notes in Computer Science 9100, Springer 2016, ISBN 978-3-662-49300-7 [contents] - 2015
- [j37]Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal, Jean-Jacques Quisquater, Guangyan Song:
Can GOST Be Made Secure Against Differential Cryptanalysis? Cryptologia 39(2): 145-156 (2015) - [e12]Giuseppe F. Italiano, Tiziana Margaria-Steffen, Jaroslav Pokorný, Jean-Jacques Quisquater, Roger Wattenhofer, Roman Spanek, Martin Rimnac:
Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015, the 41st International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2015) , Pec pod Snezkou, Czech Republic, January 24-29, 2015. CEUR Workshop Proceedings 1326, CEUR-WS.org 2015 [contents] - [e11]Giuseppe F. Italiano, Tiziana Margaria-Steffen, Jaroslav Pokorný, Jean-Jacques Quisquater, Roger Wattenhofer:
SOFSEM 2015: Theory and Practice of Computer Science - 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015. Proceedings. Lecture Notes in Computer Science 8939, Springer 2015, ISBN 978-3-662-46077-1 [contents] - 2013
- [c164]Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater:
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards. Financial Cryptography 2013: 230-238 - [i19]Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater:
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards. IACR Cryptol. ePrint Arch. 2013: 224 (2013) - 2012
- [c163]Christophe Petit, Jean-Jacques Quisquater:
On Polynomial Systems Arising from a Weil Descent. ASIACRYPT 2012: 451-466 - [p4]Chong Hee Kim, Jean-Jacques Quisquater:
Fault Attacks Against RSA-CRT Implementation. Fault Analysis in Cryptography 2012: 125-136 - [i18]Solange Ghernaouti-Helie, Jens Tölle, Jean-Jacques Quisquater:
Cybercrime and Privacy Issues - Introduction to the Special Theme. ERCIM News 2012(90) (2012) - [i17]Christophe Petit, Jean-Jacques Quisquater:
On Polynomial Systems Arising from a Weil Descent. IACR Cryptol. ePrint Arch. 2012: 146 (2012) - 2011
- [j36]Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica:
Compact elliptic curve representations. J. Math. Cryptol. 5(1): 89-100 (2011) - [j35]Christof Paar, Jean-Jacques Quisquater, Berk Sunar:
Guest Editorial. J. Cryptol. 24(2): 245-246 (2011) - [r12]Christophe Petit, Jean-Jacques Quisquater:
Cayley Hash Functions. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 183-184 - [r11]Jean-Jacques Quisquater, David Samyde:
Electromagnetic Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 382-385 - [r10]Benoît Libert, Jean-Jacques Quisquater:
Identity-Based Cryptosystems. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 588-594 - [r9]Jean-Jacques Quisquater, Gildas Avoine:
Passport Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 913-916 - [r8]François-Xavier Standaert, Jean-Jacques Quisquater:
Physical Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 928-929 - [r7]Jean-Jacques Quisquater, David Samyde:
Radio Frequency Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1015-1021 - [r6]François-Xavier Standaert, Jean-Jacques Quisquater:
Time-Memory Trade-offs. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1297-1299 - [i16]Christophe Petit, Jean-Jacques Quisquater:
Rubik's for cryptographers. IACR Cryptol. ePrint Arch. 2011: 638 (2011) - 2010
- [j34]Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater:
How to strongly link data and its medium: the paper case. IET Inf. Secur. 4(3): 125-136 (2010) - [j33]Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Key Evolution Systems in Untrusted Update Environments. ACM Trans. Inf. Syst. Secur. 13(4): 37:1-37:34 (2010) - [c162]Christophe Petit, Jean-Jacques Quisquater:
Preimages for the Tillich-Zémor Hash Function. Selected Areas in Cryptography 2010: 282-301 - [p3]Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater:
Signcryption Schemes Based on the Diffie-Hellman Problem. Practical Signcryption 2010: 57-69 - [p2]Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater:
Signcryption Schemes Based on Bilinear Maps. Practical Signcryption 2010: 71-97 - [p1]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. Towards Hardware-Intrinsic Security 2010: 99-134 - [e10]Douglas W. Jones, Jean-Jacques Quisquater, Eric Rescorla:
2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '10, Washington, D.C., USA, August 9-10, 2010. USENIX Association 2010 [contents]
2000 – 2009
- 2009
- [c161]Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated wireless roaming via tunnels: making mobile guests feel at home. AsiaCCS 2009: 92-103 - [c160]Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor:
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. CT-RSA 2009: 182-194 - [c159]Julien Cathalo, David Naccache, Jean-Jacques Quisquater:
Comparing with RSA. IMACC 2009: 326-335 - [c158]Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater:
Practical Algebraic Attacks on the Hitag2 Stream Cipher. ISC 2009: 167-176 - [c157]Nidal Aboudagga, Giacomo de Meulenaer, Mohamed Eltoweissy, Jean-Jacques Quisquater:
IMAPS: Imbricated authentication protocol suite for mobile users and groups. LCN 2009: 30-36 - [c156]Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater:
Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios. EVT/WOTE 2009 - [e9]Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater:
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings. Lecture Notes in Computer Science 5746, Springer 2009, ISBN 978-3-642-03943-0 [contents] - [i15]Julien Cathalo, David Naccache, Jean-Jacques Quisquater:
Comparing With RSA. IACR Cryptol. ePrint Arch. 2009: 21 (2009) - [i14]Giacomo de Meulenaer, Christophe Petit, Jean-Jacques Quisquater:
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? IACR Cryptol. ePrint Arch. 2009: 229 (2009) - [i13]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. IACR Cryptol. ePrint Arch. 2009: 341 (2009) - 2008
- [j32]Ayoub Massoudi, Frédéric Lefèbvre, Christophe De Vleeschouwer, Benoît Macq, Jean-Jacques Quisquater:
Overview on Selective Encryption of Image and Video: Challenges and Perspectives. EURASIP J. Inf. Secur. 2008 (2008) - [j31]Romain Robert, Mark Manulis, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, Jean-Jacques Quisquater:
WiFi Roaming: Legal Implications and Security Constraints. Int. J. Law Inf. Technol. 16(3): 205-241 (2008) - [j30]Francesc Sebé, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Yves Deswarte, Jean-Jacques Quisquater:
Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008) - [c155]Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy:
Implementation of the AES-128 on Virtex-5 FPGAs. AFRICACRYPT 2008: 16-26 - [c154]Chong Hee Kim, Jean-Jacques Quisquater:
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. CARDIS 2008: 48-60 - [c153]Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Key Evolution Systems in Untrusted Update Environments. Inscrypt 2008: 12-21 - [c152]Chong Hee Kim, Philippe Bulens, Christophe Petit, Jean-Jacques Quisquater:
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. EuroPKI 2008: 182-195 - [c151]Gildas Avoine, Kassem Kalach, Jean-Jacques Quisquater:
ePassport: Securing International Contacts with Contactless Chips. Financial Cryptography 2008: 141-155 - [c150]Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung:
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). Financial Cryptography 2008: 307-313 - [c149]Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. FSE 2008: 382-397 - [c148]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater:
On the Salsa20 Core Function. FSE 2008: 462-469 - [c147]Christophe Petit, Nicolas Veyrat-Charvillon, Jean-Jacques Quisquater:
Efficiency and pseudo-randomness of a variant of Zémor-Tillich hash function. ICECS 2008: 906-909 - [c146]Chong Hee Kim, Jean-Jacques Quisquater:
Method for Detecting Vulnerability to Doubling Attacks. ICICS 2008: 97-110 - [c145]Christophe Petit, Kristin E. Lauter, Jean-Jacques Quisquater:
Full Cryptanalysis of LPS and Morgenstern Hash Functions. SCN 2008: 263-277 - [i12]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater:
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations. CoRR abs/0811.4257 (2008) - [i11]François Macé, François-Xavier Standaert, Jean-Jacques Quisquater:
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. IACR Cryptol. ePrint Arch. 2008: 5 (2008) - [i10]Christophe Petit, Kristin E. Lauter, Jean-Jacques Quisquater:
Full Cryptanalysis of LPS and Morgenstern Hash Function. IACR Cryptol. ePrint Arch. 2008: 173 (2008) - [i9]Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home. IACR Cryptol. ePrint Arch. 2008: 382 (2008) - 2007
- [j29]Chong Hee Kim, Jean-Jacques Quisquater:
Faults, Injection Methods, and Fault Attacks. IEEE Des. Test Comput. 24(6): 544-545 (2007) - [j28]François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater:
FPGA implementations of the ICEBERG block cipher. Integr. 40(1): 20-27 (2007) - [j27]Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater:
Power and electromagnetic analysis: Improved model, consequences and comparisons. Integr. 40(1): 52-60 (2007) - [j26]Guerric Meurice de Dormale, Jean-Jacques Quisquater:
High-speed hardware implementations of Elliptic Curve Cryptography: A survey. J. Syst. Archit. 53(2-3): 72-84 (2007) - [c144]Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Forward-secure signatures in untrusted update environments: efficient and generic constructions. CCS 2007: 266-275 - [c143]Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater:
Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA. CHES 2007: 378-393 - [c142]François Macé, François-Xavier Standaert, Jean-Jacques Quisquater:
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. CHES 2007: 427-442 - [c141]Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. Inscrypt 2007: 51-65 - [c140]Nidal Aboudagga, Mohamed Eltoweissy, Jean-Jacques Quisquater:
Two-level signature delegation for mobile first responder authentication. CollaborateCom 2007: 16-23 - [c139]Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, Jean-Jacques Quisquater:
Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware. FCCM 2007: 197-206 - [c138]Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater:
On Solving RC5 Challenges with FPGAs. FCCM 2007: 281-282 - [c137]Chong Hee Kim, Jean-Jacques Quisquater:
How can we overcome both side channel analysis and fault attacks on RSA-CRT? FDTC 2007: 21-29 - [c136]Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater:
Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --. FPL 2007: 642-647 - [c135]Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Improving the Time Complexity of Matsui's Linear Cryptanalysis. ICISC 2007: 77-88 - [c134]Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee:
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. ICISC 2007: 273-281 - [c133]Benoît Libert, Jean-Jacques Quisquater:
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. Pairing 2007: 23-38 - [c132]Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Parallel Key-Insulated Public Key Encryption Without Random Oracles. Public Key Cryptography 2007: 298-314 - [c131]Jean-Jacques Quisquater:
The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? SSS 2007: 1 - [c130]Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater:
Simulation-Based Analysis of E2E Voting Systems. VOTE-ID 2007: 137-149 - [c129]Nidal Aboudagga, Jean-Jacques Quisquater, Mohamed Eltoweissy:
Group Authentication Protocol for Mobile Networks. WiMob 2007: 28 - [c128]Chong Hee Kim, Jean-Jacques Quisquater:
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. WISTP 2007: 215-228 - [e8]Damien Sauveron, Constantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater:
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings. Lecture Notes in Computer Science 4462, Springer 2007, ISBN 978-3-540-72353-0 [contents] - [i8]Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater:
Simulation-based analysis of E2E voting systems. Frontiers of Electronic Voting 2007 - [i7]François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater:
Towards Security Limits in Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2007: 222 (2007) - 2006
- [j25]Olivier Pereira, Jean-Jacques Quisquater:
On the impossibility of building secure Cliques-type authenticated group key agreement protocols. J. Comput. Secur. 14(2): 197-246 (2006) - [j24]François-Xavier Standaert, Eric Peeters, Gaël Rouvroy, Jean-Jacques Quisquater:
An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays. Proc. IEEE 94(2): 383-394 (2006) - [j23]Antonin Descampe, François-Olivier Devaux, Gaël Rouvroy, Jean-Didier Legat, Jean-Jacques Quisquater, Benoît Macq:
A Flexible Hardware JPEG 2000 Decoder for Digital Cinema. IEEE Trans. Circuits Syst. Video Technol. 16(11): 1397-1410 (2006) - [c127]François-Xavier Standaert, François Macé, Eric Peeters, Jean-Jacques Quisquater:
Updates on the Security of FPGAs Against Power Analysis Attacks. ARC 2006: 335-346 - [c126]Guerric Meurice de Dormale, Jean-Jacques Quisquater:
Iterative Modular Division over GF(2m): Novel Algorithm and Implementations on FPGA. ARC 2006: 370-382 - [c125]Guerric Meurice de Dormale, Renaud Ambroise, David Bol, Jean-Jacques Quisquater, Jean-Didier Legat:
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards. ASAP 2006: 347-353 - [c124]François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater:
SEA: A Scalable Encryption Algorithm for Small Embedded Applications. CARDIS 2006: 222-236 - [c123]Cédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater:
Template Attacks in Principal Subspaces. CHES 2006: 1-14 - [c122]François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater:
Towards Security Limits in Side-Channel Attacks. CHES 2006: 30-45 - [c121]Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Efficient Intrusion-Resilient Signatures Without Random Oracles. Inscrypt 2006: 27-41 - [c120]Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater:
Fair Identification. CT-RSA 2006: 52-63 - [c119]François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater:
FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks. FPL 2006: 1-4 - [c118]Benoît Libert, Jean-Jacques Quisquater:
On Constructing Certificateless Cryptosystems from Identity Based Encryption. Public Key Cryptography 2006: 474-490 - [c117]Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater:
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. SCN 2006: 63-77 - 2005
- [c116]Benoît Libert, Jean-Jacques Quisquater:
Identity Based Encryption Without Redundancy. ACNS 2005: 285-300 - [c115]Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater:
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. ASIACRYPT 2005: 515-532 - [c114]Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater:
Improved Higher-Order Side-Channel Attacks with FPGA Experiments. CHES 2005: 309-323 - [c113]Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater:
Efficient and Non-interactive Timed-Release Encryption. ICICS 2005: 291-303 - [c112]Vipul Goyal, Abhishek Jain, Jean-Jacques Quisquater:
Improvements to Mitchell's Remote User Authentication Protocol. ICISC 2005: 69-80 - [c111]François-Xavier Standaert, Frédéric Lefèbvre, Gaël Rouvroy, Benoît Macq, Jean-Jacques Quisquater, Jean-Didier Legat:
Practical Evaluation of a Radial Soft Hash Algorithm. ITCC (2) 2005: 89-94 - [c110]François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater:
FPGA Implementations of the ICEBERG Block Cipher. ITCC (1) 2005: 556-561 - [c109]François-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater:
On the Masking Countermeasure and Higher-Order Power Analysis Attacks. ITCC (1) 2005: 562-567 - [c108]Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater:
Authentication protocols for ad hoc networks: taxonomy and research issues. Q2SWinet 2005: 96-104 - [c107]François Macé, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat:
A Design Methodology for Secured ICs Using Dynamic Current Mode Logic. PATMOS 2005: 550-560 - [r5]Benoît Libert, Jean-Jacques Quisquater:
Identity-Based Cryptosystems. Encyclopedia of Cryptography and Security 2005 - [r4]Jean-Jacques Quisquater:
Eavesdropper. Encyclopedia of Cryptography and Security 2005 - [r3]Jean-Jacques Quisquater, David Samyde:
Electromagnetic Attack. Encyclopedia of Cryptography and Security 2005 - [r2]Jean-Jacques Quisquater, David Samyde:
Radio Frequency Attacks. Encyclopedia of Cryptography and Security 2005 - [r1]Jean-Jacques Quisquater, François-Xavier Standaert:
Time-memory tradeoffs. Encyclopedia of Cryptography and Security 2005 - 2004
- [c106]Gilles Piret, François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater:
On the Security of the DeKaRT Primitive. CARDIS 2004: 241-254 - [c105]Olivier Pereira, Jean-Jacques Quisquater:
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. CSFW 2004: 16-19 - [c104]Benoît Libert, Jean-Jacques Quisquater:
Identity Based Undeniable Signatures. CT-RSA 2004: 112-125 - [c103]Gaël Rouvroy, François-Xavier Standaert, Frédéric Lefèbvre, Jean-Jacques Quisquater, Benoît Macq, Jean-Didier Legat:
Reconfigurable hardware solutions for the digital rights management of digital cinema. Digital Rights Management Workshop 2004: 40-53 - [c102]Benoît Libert, Jean-Jacques Quisquater:
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. EuroPKI 2004: 57-70 - [c101]Gaël Rouvroy, Frédéric Lefèbvre, François-Xavier Standaert, Benoît Macq, Jean-Jacques Quisquater, Jean-Didier Legat:
Hardware implementation of a fingerprinting algorithm suited for digital cinema. EUSIPCO 2004: 1497-1500 - [c100]François-Xavier Standaert, Siddika Berna Örs, Jean-Jacques Quisquater, Bart Preneel:
Power Analysis Attacks Against FPGA Implementations of the DES. FPL 2004: 84-94 - [c99]Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater:
Efficient Modular Division Implementation: ECC over GF(p) Affine Coordinates Application. FPL 2004: 231-240 - [c98]Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater:
An improved Montgomery modular inversion targeted for efficient implementation on FPGA. FPT 2004: 441-444 - [c97]François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat:
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. FSE 2004: 279-299 - [c96]Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater:
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. ISC 2004: 52-60 - [c95]Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat:
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. ITCC (2) 2004: 583-587 - [c94]Benoît Libert, Jean-Jacques Quisquater:
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. Public Key Cryptography 2004: 187-200 - [c93]Gilles Piret, Jean-Jacques Quisquater:
Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. Selected Areas in Cryptography 2004: 100-113 - [c92]Benoît Libert, Jean-Jacques Quisquater:
Improved Signcryption from q-Diffie-Hellman Problems. SCN 2004: 220-234 - [e7]Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam:
Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France. IFIP 153, Kluwer/Springer 2004, ISBN 1-4020-8146-4 [contents] - [e6]Marc Joye, Jean-Jacques Quisquater:
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings. Lecture Notes in Computer Science 3156, Springer 2004, ISBN 3-540-22666-4 [contents] - [i6]Benoît Libert, Jean-Jacques Quisquater:
The Exact Security of an Identity Based Signature and its Applications. IACR Cryptol. ePrint Arch. 2004: 102 (2004) - [i5]Mathieu Ciet, Michael Neve, Eric Peeters, Jean-Jacques Quisquater:
Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version. IACR Cryptol. ePrint Arch. 2004: 187 (2004) - 2003
- [j22]Olivier Pereira, Jean-Jacques Quisquater:
Some Attacks Upon Authenticated Group Key Agreement Protocols. J. Comput. Secur. 11(4): 555-580 (2003) - [j21]Amaury Nève, Denis Flandre, Jean-Jacques Quisquater:
SOI Technology for Future High-Performance Smart Cards. IEEE Micro 23(3): 58-67 (2003) - [j20]Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat:
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. IEEE Trans. Computers 52(4): 473-482 (2003) - [c91]Gilles Piret, Jean-Jacques Quisquater:
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. CHES 2003: 77-88 - [c90]Julien Cathalo, François Koeune, Jean-Jacques Quisquater:
A New Type of Timing Attack: Application to GPS. CHES 2003: 291-303 - [c89]François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat:
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. CHES 2003: 334-350 - [c88]Anand Raghunathan, Srivaths Ravi, Sunil Hattangady, Jean-Jacques Quisquater:
Securing Mobile Appliances: New Challenges for the System Designer. DATE 2003: 10176-10183 - [c87]Mathieu Ciet, Tanja Lange, Francesco Sica, Jean-Jacques Quisquater:
Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms. EUROCRYPT 2003: 388-400 - [c86]François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat:
A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL. FPGA 2003: 216-224 - [c85]Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat:
Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES. FPGA 2003: 247 - [c84]Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat:
Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES. FPL 2003: 181-193 - [c83]François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, David Samyde, Jean-Jacques Quisquater:
Power Analysis of FPGAs: How Practical is the Attack? FPL 2003: 701-711 - [c82]Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat:
Efficient FPGA Implementation of Block Cipher MISTY1. IPDPS 2003: 185 - [c81]Benoît Libert, Jean-Jacques Quisquater:
A new identity based signcryption scheme from pairings. ITW 2003: 155-158 - [c80]Benoît Libert, Jean-Jacques Quisquater:
Efficient revocation and threshold pairing based cryptosystems. PODC 2003: 163-171 - [c79]Michael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater:
Memories: A Survey of Their Secure Uses in Smart Cards. IEEE Security in Storage Workshop 2003: 62-72 - [c78]Jean-Jacques Quisquater, David Samyde:
Signal processing for smart cards. Security and Watermarking of Multimedia Contents 2003: 229-239 - [c77]Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane:
Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers. IICIS 2003: 1-11 - [i4]Benoît Libert, Jean-Jacques Quisquater:
New identity based signcryption schemes from pairings. IACR Cryptol. ePrint Arch. 2003: 23 (2003) - [i3]Gilles Piret, Jean-Jacques Quisquater:
Integral Cryptanalysis on reduced-round Safer++. IACR Cryptol. ePrint Arch. 2003: 33 (2003) - [i2]Benoît Libert, Jean-Jacques Quisquater:
Identity Based Undeniable Signatures. IACR Cryptol. ePrint Arch. 2003: 206 (2003) - 2002
- [c76]Jean-Jacques Quisquater:
Awards. CARDIS 2002 - [c75]Jean-Jacques Quisquater, David Samyde:
Automatic Code Recognition for Smartcards Using a Kohonen Neural Network. CARDIS 2002 - [c74]Jean-Jacques Quisquater:
CHES: Past, Present, and Future. CHES 2002: 1 - [c73]Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica:
Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. CHES 2002: 540-550 - [c72]François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat:
A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results. CHES 2002: 593-609 - [c71]Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung:
Observability Analysis - Detecting When Improved Cryptosystems Fail. CT-RSA 2002: 17-29 - [c70]Gaël Hachez, Jean-Jacques Quisquater:
Which directions for asymmetric watermarking? EUSIPCO 2002: 1-4 - [c69]Jean-Jacques Quisquater, François-Xavier Standaert, Gaël Rouvroy, Jean-Pierre David, Jean-Didier Legat:
A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation. FPL 2002: 780-789 - [c68]François Koeune, Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Pierre David, Jean-Didier Legat:
An FPGA Implementation of the Linear Cryptanalysis. FPL 2002: 845-852 - [c67]Francesco Sica, Mathieu Ciet, Jean-Jacques Quisquater:
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. Selected Areas in Cryptography 2002: 21-36 - [c66]David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater:
On a New Way to Read Data from Memory. IEEE Security in Storage Workshop 2002: 65-69 - 2001
- [j19]Louis C. Guillou, Michel Ugon, Jean-Jacques Quisquater:
Cryptographic authentication protocols for smart cards. Comput. Networks 36(4): 437-451 (2001) - [j18]Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi:
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. Des. Codes Cryptogr. 23(3): 297-316 (2001) - [c65]Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater:
Provably authenticated group Diffie-Hellman key exchange. CCS 2001: 255-264 - [c64]Marc Joye, Jean-Jacques Quisquater:
Hessian Elliptic Curves and Side-Channel Attacks. CHES 2001: 402-410 - [c63]Olivier Pereira, Jean-Jacques Quisquater:
A Security Analysis of the Cliques Protocols Suites. CSFW 2001: 73-81 - [c62]Marc Joye, Jean-Jacques Quisquater, Moti Yung:
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. CT-RSA 2001: 208-222 - [c61]Jean-Jacques Quisquater, David Samyde:
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. E-smart 2001: 200-210 - [c60]Marc Joye, Jean-Jacques Quisquater:
On Rabin-Type Signatures. IMACC 2001: 99-113 - [c59]Werner Schindler, François Koeune, Jean-Jacques Quisquater:
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. IMACC 2001: 245-267 - [c58]Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica:
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. INDOCRYPT 2001: 108-116 - [c57]Olivier Pereira, Jean-Jacques Quisquater:
Security Analysis of the Cliques Protocols Suites: First Results. SEC 2001: 151-166 - 2000
- [c56]Gaël Hachez, François Koeune, Jean-Jacques Quisquater:
Biometrics, Access Control, Smart Cards: A not so Simple Combination. CARDIS 2000: 273-288 - [c55]Gaël Hachez, Jean-Jacques Quisquater:
Montgomery Exponentiation with no Final Subtractions: Improved Results. CHES 2000: 293-301 - [c54]Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot:
Towards a Practical Secure Framework for Mobile Code Commerce. ISW 2000: 164-178 - [e5]Jean-Jacques Quisquater, Bruce Schneier:
Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings. Lecture Notes in Computer Science 1820, Springer 2000, ISBN 3-540-67923-5 [contents]
1990 – 1999
- 1999
- [j17]Marc Joye, Arjen K. Lenstra, Jean-Jacques Quisquater:
Chinese Remaindering Based Cryptosystems in the Presence of Faults. J. Cryptol. 12(4): 241-245 (1999) - [c53]Xavier Verians, Jean-Didier Legat, Jean-Jacques Quisquater, Benoît Macq:
A New Parallelism Management Scheme for Multiprocessor Systems. ACPC 1999: 246-256 - [c52]Tanguy Gilmont, Jean-Didier Legat, Jean-Jacques Quisquater:
Enhancing Security in the Memory Management Unit. EUROMICRO 1999: 1449- - [c51]Xavier Verians, Jean-Didier Legat, Jean-Jacques Quisquater, Benoît Macq:
A Graph-Oriented Task Manager for Small Multiprocessor Systems. Euro-Par 1999: 735-744 - [c50]Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater:
Robust Object Watermarking: Application to Code. Information Hiding 1999: 368-378 - [c49]Yvo Desmedt, Tri Van Le, Jean-Jacques Quisquater:
Nonbinary Audio Cryptography. Information Hiding 1999: 478-489 - [c48]Amaury Nève, Denis Flandre, Jean-Jacques Quisquater:
Feasibility of the Smart Card in Silicon-On-Insulator (SOI) Technology. Smartcard 1999 - [c47]Tanguy Gilmont, Jean-Didier Legat, Jean-Jacques Quisquater:
Architecture of security management unit for safe hosting of multiple agents. Security and Watermarking of Multimedia Contents 1999: 472-483 - [c46]Jean-Marie Kabasele-Tenday, Jean-Jacques Quisquater, Marc Lobelle:
Deriving a Role-Based Access Control Model from the OBBAC Model. WETICE 1999: 147-151 - [c45]Henri Massias, X. Serret Avila, Jean-Jacques Quisquater:
Timestamps: Main Issues on Their Use and Implementation. WETICE 1999: 178-183 - 1998
- [j16]V. Darmstaedter, Jean-François Delaigle, Jean-Jacques Quisquater, Benoît Macq:
Low cost spatial watermarking. Comput. Graph. 22(4): 417-424 (1998) - [j15]Marc Joye, Jean-Jacques Quisquater:
Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams. Des. Codes Cryptogr. 14(1): 53-56 (1998) - [j14]Henri Gilbert, Dipankar Gupta, Andrew M. Odlyzko, Jean-Jacques Quisquater:
Attacks on Shamir's 'RSA for Paranoids'. Inf. Process. Lett. 68(4): 197-199 (1998) - [c44]Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater:
Audio and Optical Cryptography. ASIACRYPT 1998: 392-404 - [c43]Jean-François Dhem, François Koeune, Philippe-Alexandre Leroux, Patrick Mestré, Jean-Jacques Quisquater, Jean-Louis Willems:
A Practical Implementation of the Timing Attack. CARDIS 1998: 167-182 - [c42]Jean-François Dhem, Jean-Jacques Quisquater:
Recent Results on Modular Multiplications for Smart Cards. CARDIS 1998: 336-352 - [c41]Gérard Eizenberg, Jean-Jacques Quisquater:
Panel Session: Watermarking. ESORICS 1998: 275 - [c40]Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater:
Cerebral Cryptography. Information Hiding 1998: 62-72 - [e4]Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings. Lecture Notes in Computer Science 1485, Springer 1998, ISBN 3-540-65004-0 [contents] - 1997
- [j13]Jean-Jacques Quisquater:
The adolescence of smart cards. Future Gener. Comput. Syst. 13(1): 3-7 (1997) - [j12]Jean-François Dhem, Jean-Jacques Quisquater:
Lossless compression algorithms for smart cards: A progress report. Future Gener. Comput. Syst. 13(1): 27-38 (1997) - [j11]Jean-Jacques Quisquater, Marc Joye:
Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences. J. Comput. Secur. 5(3): 213-224 (1997) - [c39]Marc Joye, Jean-Jacques Quisquater:
On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack. CCS 1997: 135-141 - [c38]Jean-François Delaigle, Christophe De Vleeschouwer, Francois Goffin, Benoît Macq, Jean-Jacques Quisquater:
Low Cost Watermarking Based on a Human Vision Model. ECMAST 1997: 153-167 - [c37]Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater:
A new and optimal chosen-message attack on RSA-type cryptosystems. ICICS 1997: 302-313 - [c36]Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng:
RSA-type Signatures in the Presence of Transient Faults. IMACC 1997: 155-160 - [c35]Francois Goffin, Jean-François Delaigle, Christophe De Vleeschouwer, Benoît Macq, Jean-Jacques Quisquater:
Low-Cost Perceptive Digital Picture Watermarking Method. Storage and Retrieval for Image and Video Databases (SPIE) 1997: 264-277 - [c34]Jean-Jacques Quisquater, Benoît Macq, Marc Joye, N. Degand, A. Bernard:
Practical Solution to Authentication of Images with a Secure Camera. Storage and Retrieval for Image and Video Databases (SPIE) 1997: 290-297 - 1996
- [j10]Jean-François Dhem, Daniel Veithen, Jean-Jacques Quisquater:
SCALPS: Smart card for limited payment systems. IEEE Micro 16(3): 42-51 (1996) - [c33]Ronald Ferreira, Ralf Malzahn, Peter Marissen, Jean-Jacques Quisquater, Thomas Wille:
FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications. CARDIS 1996 - [c32]Pieter H. Hartel, Jean-Jacques Quisquater:
Introduction to CARDIS 1996. CARDIS 1996 - [c31]Renaud Lecat, Jean-Jacques Quisquater:
Efficient Compression Algorithms for Smart Cards. CARDIS 1996 - [c30]Marc Joye, Jean-Jacques Quisquater:
Cryptanalysis of RSA-type cryptosystems: A visit. Network Threats 1996: 21-31 - [c29]Gérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater:
Authors' Rights and Copyright Protection. ESORICS 1996: 324 - [c28]Marc Joye, Jean-Jacques Quisquater:
Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves. Security Protocols Workshop 1996: 93-100 - 1995
- [j9]Benoît Macq, Jean-Jacques Quisquater:
Cryptology for digital TV broadcasting. Proc. IEEE 83(6): 944-957 (1995) - [c27]Jean-Marc Boucqueau, Sylvie Lacroix, Benoît Macq, Jean-Jacques Quisquater:
Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties. COST 237 Workshop 1995: 229-243 - [c26]Philippe Béguin, Jean-Jacques Quisquater:
Fast Server-Aided RSA Signatures Secure Against Active Attacks. CRYPTO 1995: 57-69 - [e3]Louis C. Guillou, Jean-Jacques Quisquater:
Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding. Lecture Notes in Computer Science 921, Springer 1995, ISBN 3-540-59409-4 [contents] - 1994
- [c25]Philippe Béguin, Jean-Jacques Quisquater:
Secure Acceleration of DSS Signatures Using Insecure Server. ASIACRYPT 1994: 249-259 - [c24]Olivier Delos, Jean-Jacques Quisquater:
An Identity-Based Signature Scheme with Bounded Life-Span. CRYPTO 1994: 83-94 - 1993
- [c23]Olivier Delos, Jean-Jacques Quisquater:
Efficient multi-signature schemes for cooperating entities. Algebraic Coding 1993: 63-74 - 1992
- [j8]Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater:
Table of Large (Delta, D)-Graphs. Discret. Appl. Math. 37/38: 575-577 (1992) - [j7]Jean-Claude Bermond, Pavol Hell, Jean-Jacques Quisquater:
Construction of Large Packet Radio Networks. Parallel Process. Lett. 2: 3-12 (1992) - [e2]Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater:
Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings. Lecture Notes in Computer Science 648, Springer 1992, ISBN 3-540-56246-X [contents] - 1991
- [j6]Jean-Jacques Quisquater, Yvo Desmedt:
Chinese Lotto as an Exhaustive Code-Breaking Machine. Computer 24(11): 14-22 (1991) - [j5]Samy Bengio, Gilles Brassard, Yvo Desmedt, Claude Goutier, Jean-Jacques Quisquater:
Secure Implementations of Identification Systems. J. Cryptol. 4(3): 175-183 (1991) - [c22]Dominique de Waleffe, Jean-Jacques Quisquater:
Better Login Protocols for Computer Networks. Computer Security and Industrial Cryptography 1991: 50-70 - 1990
- [c21]Dominique de Waleffe, Jean-Jacques Quisquater:
CORSAIR: A SMART Card for Public Key Cryptosystems. CRYPTO 1990: 502-513 - [c20]Dominique de Waleffe, Jean-Jacques Quisquater:
Better Login Protocols for Computer Networks. ESORICS 1990: 163-172 - [c19]Louis C. Guillou, Jean-Jacques Quisquater, Michael Walker, Peter Landrock, Caroline Shafer:
Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". EUROCRYPT 1990: 465-473 - [e1]Jean-Jacques Quisquater, Joos Vandewalle:
Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings. Lecture Notes in Computer Science 434, Springer 1990, ISBN 3-540-53433-4 [contents]
1980 – 1989
- 1989
- [j4]Louis C. Guillou, Marc Davio, Jean-Jacques Quisquater:
Public-Key Techniques: Randomness and Redundancy. Cryptologia 13(2): 167-189 (1989) - [c18]Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder:
A Signature with Shared Verification Scheme. CRYPTO 1989: 253-262 - [c17]Jean-Jacques Quisquater, Jean-Paul Delescaille:
How Easy is Collision Search. New Results and Applications to DES. CRYPTO 1989: 408-413 - [c16]Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson:
How to Explain Zero-Knowledge Protocols to Your Children. CRYPTO 1989: 628-631 - [c15]Jean-Jacques Quisquater, Marc Girault:
2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms. EUROCRYPT 1989: 102-109 - [c14]Jean-Jacques Quisquater, Jean-Paul Delescaille:
How Easy is Collision Search? Application to DES (Extended Summary). EUROCRYPT 1989: 429-434 - [c13]Jean-Jacques Quisquater, André Bouckaert:
Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). EUROCRYPT 1989: 662-664 - 1988
- [c12]Louis C. Guillou, Jean-Jacques Quisquater:
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. CRYPTO 1988: 216-231 - [c11]Louis C. Guillou, Jean-Jacques Quisquater:
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. EUROCRYPT 1988: 123-128 - 1987
- [c10]Jean-Jacques Quisquater:
Secret Distribution of Keys for Public-Key Systems. CRYPTO 1987: 203-208 - [c9]Louis C. Guillou, Jean-Jacques Quisquater:
Efficient Digital Public-Key Signature with Shadow (Abstract). CRYPTO 1987: 223 - [c8]Jean-Jacques Quisquater, Jean-Paul Delescaille:
Other Cycling Tests for DES (Abstract). CRYPTO 1987: 255-256 - 1986
- [j3]Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater:
Strategies for Interconnection Networks: Some Methods from Graph Theory. J. Parallel Distributed Comput. 3(4): 433-449 (1986) - [c7]Yvo Desmedt, Jean-Jacques Quisquater:
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). CRYPTO 1986: 111-117 - [i1]Yvo Desmedt, Frank Hoornaert, Jean-Jacques Quisquater:
Several Exhaustive Key Search Machines and DES. EUROCRYPT 1986: 17-19 - 1985
- [c6]Jean-Jacques Quisquater, Yvo Desmedt, Marc Davio:
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys). CRYPTO 1985: 537-542 - 1984
- [c5]Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater:
Efficient Hardware and Software Implementations for the DES. CRYPTO 1984: 144-146 - [c4]Yvo Desmedt, Jean-Jacques Quisquater, Marc Davio:
Dependence of Output on Input in DES: Small Avalanche Characteristics. CRYPTO 1984: 359-376 - [c3]Marc Davio, Yvo Desmedt, Jean-Jacques Quisquater:
Propagation Characteristics of the DES. EUROCRYPT 1984: 62-73 - 1983
- [c2]Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters:
Analytical Characteristics of the DES. CRYPTO 1983: 171-202 - 1982
- [j2]Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater:
Tables of Large Graphs with Given Degree and Diameter. Inf. Process. Lett. 15(1): 10-13 (1982) - [c1]Marc Davio, Jean-Marie Goethals, Jean-Jacques Quisquater:
Authentication Procedures. EUROCRYPT 1982: 283-288
1970 – 1979
- 1973
- [j1]Philippe Delsarte, Jean-Jacques Quisquater:
Permutation Cascades with Normalized Cells. Inf. Control. 23(4): 344-356 (1973)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint