Search the dblp DataBase
Jean-Jacques Quisquater :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dominique de Waleffe , Jean-Jacques Quisquater Better Login Protocols for Computer Networks. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:50-70 [Conf ] Benoît Libert , Jean-Jacques Quisquater Identity Based Encryption Without Redundancy. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:285-300 [Conf ] Xavier Verians , Jean-Didier Legat , Jean-Jacques Quisquater , Benoit M. Macq A New Parallelism Management Scheme for Multiprocessor Systems. [Citation Graph (0, 0)][DBLP ] ACPC, 1999, pp:246-256 [Conf ] Guerric Meurice de Dormale , Renaud Ambroise , David Bol , Jean-Jacques Quisquater , Jean-Didier Legat Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards. [Citation Graph (0, 0)][DBLP ] ASAP, 2006, pp:347-353 [Conf ] Paulo S. L. M. Barreto , Benoît Libert , Noel McCullagh , Jean-Jacques Quisquater Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:515-532 [Conf ] Philippe Béguin , Jean-Jacques Quisquater Secure Acceleration of DSS Signatures Using Insecure Server. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:249-259 [Conf ] Yvo Desmedt , Shuang Hou , Jean-Jacques Quisquater Audio and Optical Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:392-404 [Conf ] Renaud Lecat , Jean-Jacques Quisquater Efficient Compression Algorithms for Smart Cards. [Citation Graph (0, 0)][DBLP ] CARDIS, 1996, pp:- [Conf ] Gilles Piret , François-Xavier Standaert , Gaël Rouvroy , Jean-Jacques Quisquater On the Security of the DeKaRT Primitive. [Citation Graph (0, 0)][DBLP ] CARDIS, 2004, pp:241-254 [Conf ] Jean-François Dhem , François Koeune , Philippe-Alexandre Leroux , Patrick Mestré , Jean-Jacques Quisquater , Jean-Louis Willems A Practical Implementation of the Timing Attack. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:167-182 [Conf ] Jean-François Dhem , Jean-Jacques Quisquater Recent Results on Modular Multiplications for Smart Cards. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:336-352 [Conf ] Jean-Jacques Quisquater Awards. [Citation Graph (0, 0)][DBLP ] CARDIS, 2002, pp:- [Conf ] Jean-Jacques Quisquater , David Samyde Automatic Code Recognition for Smartcards Using a Kohonen Neural Network. [Citation Graph (0, 0)][DBLP ] CARDIS, 2002, pp:- [Conf ] Gaël Hachez , François Koeune , Jean-Jacques Quisquater Biometrics, Access Control, Smart Cards: A not so Simple Combination. [Citation Graph (0, 0)][DBLP ] CARDIS, 2000, pp:273-288 [Conf ] Ronald Ferreira , Ralf Malzahn , Peter Marissen , Jean-Jacques Quisquater , Thomas Wille FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications. [Citation Graph (0, 0)][DBLP ] CARDIS, 1996, pp:- [Conf ] François-Xavier Standaert , Gilles Piret , Neil Gershenfeld , Jean-Jacques Quisquater SEA: A Scalable Encryption Algorithm for Small Embedded Applications. [Citation Graph (0, 0)][DBLP ] CARDIS, 2006, pp:222-236 [Conf ] Pieter H. Hartel , Jean-Jacques Quisquater Introduction to CARDIS 1996. [Citation Graph (0, 0)][DBLP ] CARDIS, 1996, pp:- [Conf ] Emmanuel Bresson , Olivier Chevassut , David Pointcheval , Jean-Jacques Quisquater Provably authenticated group Diffie-Hellman key exchange. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:255-264 [Conf ] Marc Joye , Jean-Jacques Quisquater On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:135-141 [Conf ] Gaël Hachez , Jean-Jacques Quisquater Montgomery Exponentiation with no Final Subtractions: Improved Results. [Citation Graph (0, 0)][DBLP ] CHES, 2000, pp:293-301 [Conf ] Julien Cathalo , François Koeune , Jean-Jacques Quisquater A New Type of Timing Attack: Application to GPS. [Citation Graph (0, 0)][DBLP ] CHES, 2003, pp:291-303 [Conf ] Mathieu Ciet , Jean-Jacques Quisquater , Francesco Sica Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. [Citation Graph (0, 0)][DBLP ] CHES, 2002, pp:540-550 [Conf ] Marc Joye , Jean-Jacques Quisquater Hessian Elliptic Curves and Side-Channel Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:402-410 [Conf ] Eric Peeters , François-Xavier Standaert , Nicolas Donckers , Jean-Jacques Quisquater Improved Higher-Order Side-Channel Attacks with FPGA Experiments. [Citation Graph (0, 0)][DBLP ] CHES, 2005, pp:309-323 [Conf ] Gilles Piret , Jean-Jacques Quisquater A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. [Citation Graph (0, 0)][DBLP ] CHES, 2003, pp:77-88 [Conf ] Jean-Jacques Quisquater CHES: Past, Present, and Future. [Citation Graph (0, 0)][DBLP ] CHES, 2002, pp:1- [Conf ] François-Xavier Standaert , Gaël Rouvroy , Jean-Jacques Quisquater , Jean-Didier Legat A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results. [Citation Graph (0, 0)][DBLP ] CHES, 2002, pp:593-609 [Conf ] François-Xavier Standaert , Gaël Rouvroy , Jean-Jacques Quisquater , Jean-Didier Legat Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. [Citation Graph (0, 0)][DBLP ] CHES, 2003, pp:334-350 [Conf ] François-Xavier Standaert , Eric Peeters , Cédric Archambeau , Jean-Jacques Quisquater Towards Security Limits in Side-Channel Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2006, pp:30-45 [Conf ] Cédric Archambeau , Eric Peeters , François-Xavier Standaert , Jean-Jacques Quisquater Template Attacks in Principal Subspaces. [Citation Graph (0, 0)][DBLP ] CHES, 2006, pp:1-14 [Conf ] Benoît Libert , Jean-Jacques Quisquater , Moti Yung Efficient Intrusion-Resilient Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:27-41 [Conf ] Jean-Marc Boucqueau , Sylvie Lacroix , Benoit M. Macq , Jean-Jacques Quisquater Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties. [Citation Graph (0, 0)][DBLP ] COST 237 Workshop, 1995, pp:229-243 [Conf ] Philippe Béguin , Jean-Jacques Quisquater Fast Server-Aided RSA Signatures Secure Against Active Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:57-69 [Conf ] Marc Davio , Yvo Desmedt , Jo Goubert , Frank Hoornaert , Jean-Jacques Quisquater Efficient Hardware and Software Implementations for the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:144-146 [Conf ] Olivier Delos , Jean-Jacques Quisquater An Identity-Based Signature Scheme with Bounded Life-Span. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:83-94 [Conf ] Yvo Desmedt , Jean-Jacques Quisquater Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:111-117 [Conf ] Yvo Desmedt , Jean-Jacques Quisquater , Marc Davio Dependence of Output on Input in DES: Small Avalanche Characteristics. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:359-376 [Conf ] Louis C. Guillou , Jean-Jacques Quisquater Efficient Digital Public-Key Signature with Shadow (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:223- [Conf ] Louis C. Guillou , Jean-Jacques Quisquater A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:216-231 [Conf ] Jean-Jacques Quisquater Secret Distribution of Keys for Public-Key Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:203-208 [Conf ] Jean-Jacques Quisquater , Jean-Paul Delescaille Other Cycling Tests for DES (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:255-256 [Conf ] Jean-Jacques Quisquater , Jean-Paul Delescaille How Easy is Collision Search. New Results and Applications to DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:408-413 [Conf ] Jean-Jacques Quisquater , Yvo Desmedt , Marc Davio The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:537-542 [Conf ] Jean-Jacques Quisquater , Myriam Quisquater , Muriel Quisquater , Michaël Quisquater , Louis C. Guillou , Marie Annick Guillou , Gaïd Guillou , Anna Guillou , Gwenolé Guillou , Soazig Guillou , Thomas A. Berson How to Explain Zero-Knowledge Protocols to Your Children. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:628-631 [Conf ] Marijke De Soete , Jean-Jacques Quisquater , Klaus Vedder A Signature with Shared Verification Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:253-262 [Conf ] Dominique de Waleffe , Jean-Jacques Quisquater CORSAIR: A SMART Card for Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:502-513 [Conf ] Marc Davio , Yvo Desmedt , Marc Fosseprez , René Govaerts , Jan Hulsbosch , Patrik Neutjens , Philippe Piret , Jean-Jacques Quisquater , Joos Vandewalle , Pascal Wouters Analytical Characteristics of the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1983, pp:171-202 [Conf ] Olivier Pereira , Jean-Jacques Quisquater A Security Analysis of the Cliques Protocols Suites. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:73-81 [Conf ] Olivier Pereira , Jean-Jacques Quisquater Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:16-19 [Conf ] Marc Joye , Jean-Jacques Quisquater , Moti Yung On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:208-222 [Conf ] Marc Joye , Jean-Jacques Quisquater , Sung-Ming Yen , Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:17-29 [Conf ] Benoît Libert , Jean-Jacques Quisquater Identity Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:112-125 [Conf ] Omkant Pandey , Julien Cathalo , Jean-Jacques Quisquater Fair Identification. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:52-63 [Conf ] Anand Raghunathan , Srivaths Ravi , Sunil Hattangady , Jean-Jacques Quisquater Securing Mobile Appliances: New Challenges for the System Designer. [Citation Graph (0, 0)][DBLP ] DATE, 2003, pp:10176-10183 [Conf ] Gaël Rouvroy , François-Xavier Standaert , Frédéric Lefèbvre , Jean-Jacques Quisquater , Benoit M. Macq , Jean-Didier Legat Reconfigurable hardware solutions for the digital rights management of digital cinema. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2004, pp:40-53 [Conf ] Jean-François Delaigle , Christophe De Vleeschouwer , Francois Goffin , Benoit M. Macq , Jean-Jacques Quisquater Low Cost Watermarking Based on a Human Vision Model. [Citation Graph (0, 0)][DBLP ] ECMAST, 1997, pp:153-167 [Conf ] Jean-Jacques Quisquater , David Samyde ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. [Citation Graph (0, 0)][DBLP ] E-smart, 2001, pp:200-210 [Conf ] Gérard Eizenberg , Dominique Gonthier , Alistair Kelman , Jean-Jacques Quisquater Authors' Rights and Copyright Protection. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:324- [Conf ] Gérard Eizenberg , Jean-Jacques Quisquater Panel Session: Watermarking. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:275- [Conf ] Mathieu Ciet , Tanja Lange , Francesco Sica , Jean-Jacques Quisquater Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:388-400 [Conf ] Marc Davio , Yvo Desmedt , Jean-Jacques Quisquater Propagation Characteristics of the DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:62-73 [Conf ] Yvo Desmedt , Frank Hoornaert , Jean-Jacques Quisquater Several Exhaustive Key Search Machines and DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:17-19 [Conf ] Louis C. Guillou , Jean-Jacques Quisquater A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:123-128 [Conf ] Louis C. Guillou , Jean-Jacques Quisquater , Michael Walker , Peter Landrock , Caroline Shafer Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:465-473 [Conf ] Jean-Jacques Quisquater , André Bouckaert Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:662-664 [Conf ] Jean-Jacques Quisquater , Jean-Paul Delescaille How Easy is Collision Search? Application to DES (Extended Summary). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:429-434 [Conf ] Jean-Jacques Quisquater , Marc Girault 2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:102-109 [Conf ] Tanguy Gilmont , Jean-Didier Legat , Jean-Jacques Quisquater Enhancing Security in the Memory Management Unit. [Citation Graph (0, 0)][DBLP ] EUROMICRO, 1999, pp:1449-0 [Conf ] Xavier Verians , Jean-Didier Legat , Jean-Jacques Quisquater , Benoit M. Macq A Graph-Oriented Task Manager for Small Multiprocessor Systems. [Citation Graph (0, 0)][DBLP ] Euro-Par, 1999, pp:735-744 [Conf ] Benoît Libert , Jean-Jacques Quisquater What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:57-70 [Conf ] Olivier Delos , Jean-Jacques Quisquater Efficient multi-signature schemes for cooperating entities. [Citation Graph (0, 0)][DBLP ] Algebraic Coding, 1993, pp:63-74 [Conf ] Gaël Rouvroy , François-Xavier Standaert , Jean-Jacques Quisquater , Jean-Didier Legat Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES. [Citation Graph (0, 0)][DBLP ] FPGA, 2003, pp:247- [Conf ] François-Xavier Standaert , Gaël Rouvroy , Jean-Jacques Quisquater , Jean-Didier Legat A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL. [Citation Graph (0, 0)][DBLP ] FPGA, 2003, pp:216-224 [Conf ] Guerric Meurice de Dormale , Philippe Bulens , Jean-Jacques Quisquater Efficient Modular Division Implementation: ECC over GF(p) Affine Coordinates Application. [Citation Graph (0, 0)][DBLP ] FPL, 2004, pp:231-240 [Conf ] François Koeune , Gaël Rouvroy , François-Xavier Standaert , Jean-Jacques Quisquater , Jean-Pierre David , Jean-Didier Legat An FPGA Implementation of the Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] FPL, 2002, pp:845-852 [Conf ] Jean-Jacques Quisquater , François-Xavier Standaert , Gaël Rouvroy , Jean-Pierre David , Jean-Didier Legat A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation. [Citation Graph (0, 0)][DBLP ] FPL, 2002, pp:780-789 [Conf ] Gaël Rouvroy , François-Xavier Standaert , Jean-Jacques Quisquater , Jean-Didier Legat Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES. [Citation Graph (0, 0)][DBLP ] FPL, 2003, pp:181-193 [Conf ] François-Xavier Standaert , Siddika Berna Örs , Jean-Jacques Quisquater , Bart Preneel Power Analysis Attacks Against FPGA Implementations of the DES. [Citation Graph (0, 0)][DBLP ] FPL, 2004, pp:84-94 [Conf ] François-Xavier Standaert , Loïc van Oldeneel tot Oldenzeel , David Samyde , Jean-Jacques Quisquater Power Analysis of FPGAs: How Practical is the Attack? [Citation Graph (0, 0)][DBLP ] FPL, 2003, pp:701-711 [Conf ] François-Xavier Standaert , Gilles Piret , Gaël Rouvroy , Jean-Jacques Quisquater , Jean-Didier Legat ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP ] FSE, 2004, pp:279-299 [Conf ] Daniel Bleichenbacher , Marc Joye , Jean-Jacques Quisquater A new and optimal chosen-message attack on RSA-type cryptosystems. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:302-313 [Conf ] Julien Cathalo , Benoît Libert , Jean-Jacques Quisquater Efficient and Non-interactive Timed-Release Encryption. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:291-303 [Conf ] Vipul Goyal , Abhishek Jain 0002 , Jean-Jacques Quisquater Improvements to Mitchell's Remote User Authentication Protocol. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:69-80 [Conf ] Yvo Desmedt , Shuang Hou , Jean-Jacques Quisquater Cerebral Cryptography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:62-72 [Conf ] Yvo Desmedt , Tri Van Le , Jean-Jacques Quisquater Nonbinary Audio Cryptography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:478-489 [Conf ] Julien P. Stern , Gaël Hachez , François Koeune , Jean-Jacques Quisquater Robust Object Watermarking: Application to Code. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:368-378 [Conf ] Marc Joye , Jean-Jacques Quisquater On Rabin-Type Signatures. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:99-113 [Conf ] Marc Joye , Jean-Jacques Quisquater , Feng Bao , Robert H. Deng RSA-type Signatures in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1997, pp:155-160 [Conf ] Werner Schindler , François Koeune , Jean-Jacques Quisquater Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:245-267 [Conf ] Mathieu Ciet , Jean-Jacques Quisquater , Francesco Sica A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:108-116 [Conf ] Gaël Rouvroy , François-Xavier Standaert , Jean-Jacques Quisquater , Jean-Didier Legat Efficient FPGA Implementation of Block Cipher MISTY1. [Citation Graph (0, 0)][DBLP ] IPDPS, 2003, pp:185- [Conf ] Gaël Hachez , Laurent Den Hollander , Mehrdad Jalali , Jean-Jacques Quisquater , Christophe Vasserot Towards a Practical Secure Framework for Mobile Code Commerce. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:164-178 [Conf ] Julien Cathalo , Benoît Libert , Jean-Jacques Quisquater Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:52-60 [Conf ] Gaël Rouvroy , François-Xavier Standaert , Jean-Jacques Quisquater , Jean-Didier Legat Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:583-587 [Conf ] François-Xavier Standaert , Frédéric Lefèbvre , Gaël Rouvroy , Benoit M. Macq , Jean-Jacques Quisquater , Jean-Didier Legat Practical Evaluation of a Radial Soft Hash Algorithm. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:89-94 [Conf ] François-Xavier Standaert , Eric Peeters , Jean-Jacques Quisquater On the Masking Countermeasure and Higher-Order Power Analysis Attacks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:562-567 [Conf ] François-Xavier Standaert , Gilles Piret , Gaël Rouvroy , Jean-Jacques Quisquater FPGA Implementations of the ICEBERG Block Cipher. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:556-561 [Conf ] François Macé , François-Xavier Standaert , Jean-Jacques Quisquater , Jean-Didier Legat A Design Methodology for Secured ICs Using Dynamic Current Mode Logic. [Citation Graph (0, 0)][DBLP ] PATMOS, 2005, pp:550-560 [Conf ] Benoît Libert , Jean-Jacques Quisquater Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:187-200 [Conf ] Benoît Libert , Jean-Jacques Quisquater On Constructing Certificateless Cryptosystems from Identity Based Encryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:474-490 [Conf ] Benoît Libert , Jean-Jacques Quisquater Efficient revocation and threshold pairing based cryptosystems. [Citation Graph (0, 0)][DBLP ] PODC, 2003, pp:163-171 [Conf ] Gilles Piret , Jean-Jacques Quisquater Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:100-113 [Conf ] Francesco Sica , Mathieu Ciet , Jean-Jacques Quisquater Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:21-36 [Conf ] Benoît Libert , Jean-Jacques Quisquater Improved Signcryption from q-Diffie-Hellman Problems. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:220-234 [Conf ] Fabien Laguillaumie , Benoît Libert , Jean-Jacques Quisquater Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. [Citation Graph (0, 0)][DBLP ] SCN, 2006, pp:63-77 [Conf ] Olivier Pereira , Jean-Jacques Quisquater Security Analysis of the Cliques Protocols Suites: First Results. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:151-166 [Conf ] Michael Neve , Eric Peeters , David Samyde , Jean-Jacques Quisquater Memories: A Survey of Their Secure Uses in Smart Cards. [Citation Graph (0, 0)][DBLP ] IEEE Security in Storage Workshop, 2003, pp:62-72 [Conf ] David Samyde , Sergei P. Skorobogatov , Ross J. Anderson , Jean-Jacques Quisquater On a New Way to Read Data from Memory. [Citation Graph (0, 0)][DBLP ] IEEE Security in Storage Workshop, 2002, pp:65-69 [Conf ] Francois Goffin , Jean-François Delaigle , Christophe De Vleeschouwer , Benoit M. Macq , Jean-Jacques Quisquater Low-Cost Perceptive Digital Picture Watermarking Method. [Citation Graph (0, 0)][DBLP ] Storage and Retrieval for Image and Video Databases (SPIE), 1997, pp:264-277 [Conf ] Jean-Jacques Quisquater , Benoit M. Macq , Marc Joye , N. Degand , A. Bernard Practical Solution to Authentication of Images with a Secure Camera. [Citation Graph (0, 0)][DBLP ] Storage and Retrieval for Image and Video Databases (SPIE), 1997, pp:290-297 [Conf ] Marc Joye , Jean-Jacques Quisquater Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1996, pp:93-100 [Conf ] Jean-Marie Kabasele-Tenday , Jean-Jacques Quisquater , Marc Lobelle Deriving a Role-Based Access Control Model from the OBBAC Model. [Citation Graph (0, 0)][DBLP ] WETICE, 1999, pp:147-151 [Conf ] H. Massias , X. Serret Avila , Jean-Jacques Quisquater Timestamps: Main Issues on Their Use and Implementation. [Citation Graph (0, 0)][DBLP ] WETICE, 1999, pp:178-183 [Conf ] V. Darmstaedter , Jean-François Delaigle , Jean-Jacques Quisquater , Benoit M. Macq Low cost spatial watermarking. [Citation Graph (0, 0)][DBLP ] Computers & Graphics, 1998, v:22, n:4, pp:417-424 [Journal ] Louis C. Guillou , Michel Ugon , Jean-Jacques Quisquater Cryptographic authentication protocols for smart cards. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:36, n:4, pp:437-451 [Journal ] Jean-Jacques Quisquater , Yvo Desmedt Chinese Lotto as an Exhaustive Code-Breaking Machine. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1991, v:24, n:11, pp:14-22 [Journal ] Jean-Claude Bermond , Charles Delorme , Jean-Jacques Quisquater Table of Large (Delta, D )-Graphs. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 1992, v:37, n:, pp:575-577 [Journal ] Marc Joye , Jean-Jacques Quisquater Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1998, v:14, n:1, pp:53-56 [Journal ] Marc Joye , Jean-Jacques Quisquater , Tsuyoshi Takagi How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2001, v:23, n:3, pp:297-316 [Journal ] Philippe Delsarte , Jean-Jacques Quisquater Permutation Cascades with Normalized Cells [Citation Graph (0, 0)][DBLP ] Information and Control, 1973, v:23, n:4, pp:344-356 [Journal ] Eric Peeters , François-Xavier Standaert , Jean-Jacques Quisquater Power and electromagnetic analysis: Improved model, consequences and comparisons. [Citation Graph (0, 0)][DBLP ] Integration, 2007, v:40, n:1, pp:52-60 [Journal ] François-Xavier Standaert , Gilles Piret , Gaël Rouvroy , Jean-Jacques Quisquater FPGA implementations of the ICEBERG block cipher. [Citation Graph (0, 0)][DBLP ] Integration, 2007, v:40, n:1, pp:20-27 [Journal ] Jean-Claude Bermond , Charles Delorme , Jean-Jacques Quisquater Tables of Large Graphs with Given Degree and Diameter. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1982, v:15, n:1, pp:10-13 [Journal ] Henri Gilbert , Dipankar Gupta , Andrew M. Odlyzko , Jean-Jacques Quisquater Attacks on Shamir's `RSA for Paranoids'. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1998, v:68, n:4, pp:197-199 [Journal ] Olivier Pereira , Jean-Jacques Quisquater Some Attacks Upon Authenticated Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:4, pp:555-580 [Journal ] Jean-Jacques Quisquater , Marc Joye Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:3, pp:213-224 [Journal ] Olivier Pereira , Jean-Jacques Quisquater On the impossibility of building secure Cliques-type authenticated group key agreement protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2006, v:14, n:2, pp:197-246 [Journal ] Samy Bengio , Gilles Brassard , Yvo Desmedt , Claude Goutier , Jean-Jacques Quisquater Secure Implementations of Identification Systems. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1991, v:4, n:3, pp:175-183 [Journal ] Marc Joye , Arjen K. Lenstra , Jean-Jacques Quisquater Chinese Remaindering Based Cryptosystems in the Presence of Faults. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:4, pp:241-245 [Journal ] Jean-Claude Bermond , Charles Delorme , Jean-Jacques Quisquater Strategies for Interconnection Networks: Some Methods from Graph Theory. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1986, v:3, n:4, pp:433-449 [Journal ] Guerric Meurice de Dormale , Jean-Jacques Quisquater High-speed hardware implementations of Elliptic Curve Cryptography: A survey. [Citation Graph (0, 0)][DBLP ] Journal of Systems Architecture, 2007, v:53, n:2-3, pp:72-84 [Journal ] Amaury Nève , Denis Flandre , Jean-Jacques Quisquater SOI Technology for Future High-Performance Smart Cards. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2003, v:23, n:3, pp:58-67 [Journal ] Jean-Claude Bermond , Pavol Hell , Jean-Jacques Quisquater Construction of Large Packet Radio Networks. [Citation Graph (0, 0)][DBLP ] Parallel Processing Letters, 1992, v:2, n:, pp:3-12 [Journal ] Gaël Rouvroy , François-Xavier Standaert , Jean-Jacques Quisquater , Jean-Didier Legat Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:473-482 [Journal ] François Macé , François-Xavier Standaert , Jean-Jacques Quisquater Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. [Citation Graph (0, 0)][DBLP ] CHES, 2007, pp:427-442 [Conf ] Guerric Meurice de Dormale , Philippe Bulens , Jean-Jacques Quisquater Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA. [Citation Graph (0, 0)][DBLP ] CHES, 2007, pp:378-393 [Conf ] François-Xavier Standaert , Gaël Rouvroy , Jean-Jacques Quisquater FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks. [Citation Graph (0, 0)][DBLP ] FPL, 2006, pp:1-4 [Conf ] Baudoin Collard , François-Xavier Standaert , Jean-Jacques Quisquater Improving the Time Complexity of Matsui's Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:77-88 [Conf ] Chong Hee Kim , Jong Hoon Shin , Jean-Jacques Quisquater , Pil Joong Lee Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:273-281 [Conf ] Benoît Libert , Jean-Jacques Quisquater , Moti Yung Parallel Key-Insulated Public Key Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:298-314 [Conf ] Jean-Jacques Quisquater The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? [Citation Graph (0, 0)][DBLP ] SSS, 2007, pp:1- [Conf ] François-Xavier Standaert , François Macé , Eric Peeters , Jean-Jacques Quisquater Updates on the Security of FPGAs Against Power Analysis Attacks. [Citation Graph (0, 0)][DBLP ] ARC, 2006, pp:335-346 [Conf ] Guerric Meurice de Dormale , Jean-Jacques Quisquater Iterative Modular Division over GF(2m ): Novel Algorithm and Implementations on FPGA. [Citation Graph (0, 0)][DBLP ] ARC, 2006, pp:370-382 [Conf ] Chong Hee Kim , Jean-Jacques Quisquater Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. [Citation Graph (0, 0)][DBLP ] WISTP, 2007, pp:215-228 [Conf ] Benoît Libert , Jean-Jacques Quisquater Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] Pairing, 2007, pp:23-38 [Conf ] Antonin Descampe , F.-O. Devaux , Gaël Rouvroy , Jean-Didier Legat , Jean-Jacques Quisquater , Benoit M. Macq A Flexible Hardware JPEG 2000 Decoder for Digital Cinema. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:11, pp:1397-1410 [Journal ] New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. [Citation Graph (, )][DBLP ] Forward-secure signatures in untrusted update environments: efficient and generic constructions. [Citation Graph (, )][DBLP ] Authenticated wireless roaming via tunnels: making mobile guests feel at home. [Citation Graph (, )][DBLP ] Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (, )][DBLP ] Key Evolution Systems in Untrusted Update Environments. [Citation Graph (, )][DBLP ] Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. [Citation Graph (, )][DBLP ] Simulation-based analysis of E2E voting systems. [Citation Graph (, )][DBLP ] Better Login Protocols for Computer Networks. [Citation Graph (, )][DBLP ] Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. [Citation Graph (, )][DBLP ] Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). [Citation Graph (, )][DBLP ] ePassport: Securing International Contacts with Contactless Chips. [Citation Graph (, )][DBLP ] On Solving RC5 Challenges with FPGAs. [Citation Graph (, )][DBLP ] Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware. [Citation Graph (, )][DBLP ] How can we overcome both side channel analysis and fault attacks on RSA-CRT? [Citation Graph (, )][DBLP ] Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --. [Citation Graph (, )][DBLP ] Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (, )][DBLP ] On the Salsa20 Core Function. [Citation Graph (, )][DBLP ] Method for Detecting Vulnerability to Doubling Attacks. [Citation Graph (, )][DBLP ] Comparing with RSA. [Citation Graph (, )][DBLP ] Practical Algebraic Attacks on the Hitag2 Stream Cipher. [Citation Graph (, )][DBLP ] IMAPS: Imbricated authentication protocol suite for mobile users and groups. [Citation Graph (, )][DBLP ] Authentication protocols for ad hoc networks: taxonomy and research issues. [Citation Graph (, )][DBLP ] Full Cryptanalysis of LPS and Morgenstern Hash Functions. [Citation Graph (, )][DBLP ] Two-level signature delegation for mobile first responder authentication. [Citation Graph (, )][DBLP ] Simulation-Based Analysis of E2E Voting Systems. [Citation Graph (, )][DBLP ] Implementation of the AES-128 on Virtex-5 FPGAs. [Citation Graph (, )][DBLP ] Group Authentication Protocol for Mobile Networks. [Citation Graph (, )][DBLP ] Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations [Citation Graph (, )][DBLP ] Faults, Injection Methods, and Fault Attacks. [Citation Graph (, )][DBLP ] Search in 0.033secs, Finished in 0.044secs