The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jean-Jacques Quisquater: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dominique de Waleffe, Jean-Jacques Quisquater
    Better Login Protocols for Computer Networks. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:50-70 [Conf]
  2. Benoît Libert, Jean-Jacques Quisquater
    Identity Based Encryption Without Redundancy. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:285-300 [Conf]
  3. Xavier Verians, Jean-Didier Legat, Jean-Jacques Quisquater, Benoit M. Macq
    A New Parallelism Management Scheme for Multiprocessor Systems. [Citation Graph (0, 0)][DBLP]
    ACPC, 1999, pp:246-256 [Conf]
  4. Guerric Meurice de Dormale, Renaud Ambroise, David Bol, Jean-Jacques Quisquater, Jean-Didier Legat
    Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards. [Citation Graph (0, 0)][DBLP]
    ASAP, 2006, pp:347-353 [Conf]
  5. Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater
    Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:515-532 [Conf]
  6. Philippe Béguin, Jean-Jacques Quisquater
    Secure Acceleration of DSS Signatures Using Insecure Server. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:249-259 [Conf]
  7. Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater
    Audio and Optical Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:392-404 [Conf]
  8. Renaud Lecat, Jean-Jacques Quisquater
    Efficient Compression Algorithms for Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  9. Gilles Piret, François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater
    On the Security of the DeKaRT Primitive. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:241-254 [Conf]
  10. Jean-François Dhem, François Koeune, Philippe-Alexandre Leroux, Patrick Mestré, Jean-Jacques Quisquater, Jean-Louis Willems
    A Practical Implementation of the Timing Attack. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:167-182 [Conf]
  11. Jean-François Dhem, Jean-Jacques Quisquater
    Recent Results on Modular Multiplications for Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:336-352 [Conf]
  12. Jean-Jacques Quisquater
    Awards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2002, pp:- [Conf]
  13. Jean-Jacques Quisquater, David Samyde
    Automatic Code Recognition for Smartcards Using a Kohonen Neural Network. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2002, pp:- [Conf]
  14. Gaël Hachez, François Koeune, Jean-Jacques Quisquater
    Biometrics, Access Control, Smart Cards: A not so Simple Combination. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:273-288 [Conf]
  15. Ronald Ferreira, Ralf Malzahn, Peter Marissen, Jean-Jacques Quisquater, Thomas Wille
    FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  16. François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater
    SEA: A Scalable Encryption Algorithm for Small Embedded Applications. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:222-236 [Conf]
  17. Pieter H. Hartel, Jean-Jacques Quisquater
    Introduction to CARDIS 1996. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  18. Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater
    Provably authenticated group Diffie-Hellman key exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:255-264 [Conf]
  19. Marc Joye, Jean-Jacques Quisquater
    On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:135-141 [Conf]
  20. Gaël Hachez, Jean-Jacques Quisquater
    Montgomery Exponentiation with no Final Subtractions: Improved Results. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:293-301 [Conf]
  21. Julien Cathalo, François Koeune, Jean-Jacques Quisquater
    A New Type of Timing Attack: Application to GPS. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:291-303 [Conf]
  22. Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica
    Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:540-550 [Conf]
  23. Marc Joye, Jean-Jacques Quisquater
    Hessian Elliptic Curves and Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:402-410 [Conf]
  24. Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater
    Improved Higher-Order Side-Channel Attacks with FPGA Experiments. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:309-323 [Conf]
  25. Gilles Piret, Jean-Jacques Quisquater
    A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:77-88 [Conf]
  26. Jean-Jacques Quisquater
    CHES: Past, Present, and Future. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:1- [Conf]
  27. François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat
    A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:593-609 [Conf]
  28. François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat
    Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:334-350 [Conf]
  29. François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater
    Towards Security Limits in Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:30-45 [Conf]
  30. Cédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater
    Template Attacks in Principal Subspaces. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:1-14 [Conf]
  31. Benoît Libert, Jean-Jacques Quisquater, Moti Yung
    Efficient Intrusion-Resilient Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:27-41 [Conf]
  32. Jean-Marc Boucqueau, Sylvie Lacroix, Benoit M. Macq, Jean-Jacques Quisquater
    Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties. [Citation Graph (0, 0)][DBLP]
    COST 237 Workshop, 1995, pp:229-243 [Conf]
  33. Philippe Béguin, Jean-Jacques Quisquater
    Fast Server-Aided RSA Signatures Secure Against Active Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:57-69 [Conf]
  34. Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater
    Efficient Hardware and Software Implementations for the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:144-146 [Conf]
  35. Olivier Delos, Jean-Jacques Quisquater
    An Identity-Based Signature Scheme with Bounded Life-Span. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:83-94 [Conf]
  36. Yvo Desmedt, Jean-Jacques Quisquater
    Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:111-117 [Conf]
  37. Yvo Desmedt, Jean-Jacques Quisquater, Marc Davio
    Dependence of Output on Input in DES: Small Avalanche Characteristics. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:359-376 [Conf]
  38. Louis C. Guillou, Jean-Jacques Quisquater
    Efficient Digital Public-Key Signature with Shadow (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:223- [Conf]
  39. Louis C. Guillou, Jean-Jacques Quisquater
    A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:216-231 [Conf]
  40. Jean-Jacques Quisquater
    Secret Distribution of Keys for Public-Key Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:203-208 [Conf]
  41. Jean-Jacques Quisquater, Jean-Paul Delescaille
    Other Cycling Tests for DES (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:255-256 [Conf]
  42. Jean-Jacques Quisquater, Jean-Paul Delescaille
    How Easy is Collision Search. New Results and Applications to DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:408-413 [Conf]
  43. Jean-Jacques Quisquater, Yvo Desmedt, Marc Davio
    The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:537-542 [Conf]
  44. Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson
    How to Explain Zero-Knowledge Protocols to Your Children. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:628-631 [Conf]
  45. Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder
    A Signature with Shared Verification Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:253-262 [Conf]
  46. Dominique de Waleffe, Jean-Jacques Quisquater
    CORSAIR: A SMART Card for Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:502-513 [Conf]
  47. Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters
    Analytical Characteristics of the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:171-202 [Conf]
  48. Olivier Pereira, Jean-Jacques Quisquater
    A Security Analysis of the Cliques Protocols Suites. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:73-81 [Conf]
  49. Olivier Pereira, Jean-Jacques Quisquater
    Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:16-19 [Conf]
  50. Marc Joye, Jean-Jacques Quisquater, Moti Yung
    On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:208-222 [Conf]
  51. Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung
    Observability Analysis - Detecting When Improved Cryptosystems Fail. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:17-29 [Conf]
  52. Benoît Libert, Jean-Jacques Quisquater
    Identity Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:112-125 [Conf]
  53. Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater
    Fair Identification. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:52-63 [Conf]
  54. Anand Raghunathan, Srivaths Ravi, Sunil Hattangady, Jean-Jacques Quisquater
    Securing Mobile Appliances: New Challenges for the System Designer. [Citation Graph (0, 0)][DBLP]
    DATE, 2003, pp:10176-10183 [Conf]
  55. Gaël Rouvroy, François-Xavier Standaert, Frédéric Lefèbvre, Jean-Jacques Quisquater, Benoit M. Macq, Jean-Didier Legat
    Reconfigurable hardware solutions for the digital rights management of digital cinema. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2004, pp:40-53 [Conf]
  56. Jean-François Delaigle, Christophe De Vleeschouwer, Francois Goffin, Benoit M. Macq, Jean-Jacques Quisquater
    Low Cost Watermarking Based on a Human Vision Model. [Citation Graph (0, 0)][DBLP]
    ECMAST, 1997, pp:153-167 [Conf]
  57. Jean-Jacques Quisquater, David Samyde
    ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. [Citation Graph (0, 0)][DBLP]
    E-smart, 2001, pp:200-210 [Conf]
  58. Gérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater
    Authors' Rights and Copyright Protection. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:324- [Conf]
  59. Gérard Eizenberg, Jean-Jacques Quisquater
    Panel Session: Watermarking. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:275- [Conf]
  60. Mathieu Ciet, Tanja Lange, Francesco Sica, Jean-Jacques Quisquater
    Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:388-400 [Conf]
  61. Marc Davio, Yvo Desmedt, Jean-Jacques Quisquater
    Propagation Characteristics of the DES. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:62-73 [Conf]
  62. Yvo Desmedt, Frank Hoornaert, Jean-Jacques Quisquater
    Several Exhaustive Key Search Machines and DES. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:17-19 [Conf]
  63. Louis C. Guillou, Jean-Jacques Quisquater
    A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:123-128 [Conf]
  64. Louis C. Guillou, Jean-Jacques Quisquater, Michael Walker, Peter Landrock, Caroline Shafer
    Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:465-473 [Conf]
  65. Jean-Jacques Quisquater, André Bouckaert
    Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:662-664 [Conf]
  66. Jean-Jacques Quisquater, Jean-Paul Delescaille
    How Easy is Collision Search? Application to DES (Extended Summary). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:429-434 [Conf]
  67. Jean-Jacques Quisquater, Marc Girault
    2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:102-109 [Conf]
  68. Tanguy Gilmont, Jean-Didier Legat, Jean-Jacques Quisquater
    Enhancing Security in the Memory Management Unit. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 1999, pp:1449-0 [Conf]
  69. Xavier Verians, Jean-Didier Legat, Jean-Jacques Quisquater, Benoit M. Macq
    A Graph-Oriented Task Manager for Small Multiprocessor Systems. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 1999, pp:735-744 [Conf]
  70. Benoît Libert, Jean-Jacques Quisquater
    What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:57-70 [Conf]
  71. Olivier Delos, Jean-Jacques Quisquater
    Efficient multi-signature schemes for cooperating entities. [Citation Graph (0, 0)][DBLP]
    Algebraic Coding, 1993, pp:63-74 [Conf]
  72. Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
    Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES. [Citation Graph (0, 0)][DBLP]
    FPGA, 2003, pp:247- [Conf]
  73. François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat
    A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL. [Citation Graph (0, 0)][DBLP]
    FPGA, 2003, pp:216-224 [Conf]
  74. Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater
    Efficient Modular Division Implementation: ECC over GF(p) Affine Coordinates Application. [Citation Graph (0, 0)][DBLP]
    FPL, 2004, pp:231-240 [Conf]
  75. François Koeune, Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Pierre David, Jean-Didier Legat
    An FPGA Implementation of the Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    FPL, 2002, pp:845-852 [Conf]
  76. Jean-Jacques Quisquater, François-Xavier Standaert, Gaël Rouvroy, Jean-Pierre David, Jean-Didier Legat
    A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation. [Citation Graph (0, 0)][DBLP]
    FPL, 2002, pp:780-789 [Conf]
  77. Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
    Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES. [Citation Graph (0, 0)][DBLP]
    FPL, 2003, pp:181-193 [Conf]
  78. François-Xavier Standaert, Siddika Berna Örs, Jean-Jacques Quisquater, Bart Preneel
    Power Analysis Attacks Against FPGA Implementations of the DES. [Citation Graph (0, 0)][DBLP]
    FPL, 2004, pp:84-94 [Conf]
  79. François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, David Samyde, Jean-Jacques Quisquater
    Power Analysis of FPGAs: How Practical is the Attack? [Citation Graph (0, 0)][DBLP]
    FPL, 2003, pp:701-711 [Conf]
  80. François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat
    ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:279-299 [Conf]
  81. Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater
    A new and optimal chosen-message attack on RSA-type cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:302-313 [Conf]
  82. Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
    Efficient and Non-interactive Timed-Release Encryption. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:291-303 [Conf]
  83. Vipul Goyal, Abhishek Jain 0002, Jean-Jacques Quisquater
    Improvements to Mitchell's Remote User Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:69-80 [Conf]
  84. Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater
    Cerebral Cryptography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:62-72 [Conf]
  85. Yvo Desmedt, Tri Van Le, Jean-Jacques Quisquater
    Nonbinary Audio Cryptography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:478-489 [Conf]
  86. Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater
    Robust Object Watermarking: Application to Code. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:368-378 [Conf]
  87. Marc Joye, Jean-Jacques Quisquater
    On Rabin-Type Signatures. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:99-113 [Conf]
  88. Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng
    RSA-type Signatures in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1997, pp:155-160 [Conf]
  89. Werner Schindler, François Koeune, Jean-Jacques Quisquater
    Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:245-267 [Conf]
  90. Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica
    A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:108-116 [Conf]
  91. Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
    Efficient FPGA Implementation of Block Cipher MISTY1. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:185- [Conf]
  92. Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot
    Towards a Practical Secure Framework for Mobile Code Commerce. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:164-178 [Conf]
  93. Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
    Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:52-60 [Conf]
  94. Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
    Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:583-587 [Conf]
  95. François-Xavier Standaert, Frédéric Lefèbvre, Gaël Rouvroy, Benoit M. Macq, Jean-Jacques Quisquater, Jean-Didier Legat
    Practical Evaluation of a Radial Soft Hash Algorithm. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:89-94 [Conf]
  96. François-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater
    On the Masking Countermeasure and Higher-Order Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:562-567 [Conf]
  97. François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater
    FPGA Implementations of the ICEBERG Block Cipher. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:556-561 [Conf]
  98. François Macé, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
    A Design Methodology for Secured ICs Using Dynamic Current Mode Logic. [Citation Graph (0, 0)][DBLP]
    PATMOS, 2005, pp:550-560 [Conf]
  99. Benoît Libert, Jean-Jacques Quisquater
    Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:187-200 [Conf]
  100. Benoît Libert, Jean-Jacques Quisquater
    On Constructing Certificateless Cryptosystems from Identity Based Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:474-490 [Conf]
  101. Benoît Libert, Jean-Jacques Quisquater
    Efficient revocation and threshold pairing based cryptosystems. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:163-171 [Conf]
  102. Gilles Piret, Jean-Jacques Quisquater
    Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:100-113 [Conf]
  103. Francesco Sica, Mathieu Ciet, Jean-Jacques Quisquater
    Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:21-36 [Conf]
  104. Benoît Libert, Jean-Jacques Quisquater
    Improved Signcryption from q-Diffie-Hellman Problems. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:220-234 [Conf]
  105. Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater
    Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:63-77 [Conf]
  106. Olivier Pereira, Jean-Jacques Quisquater
    Security Analysis of the Cliques Protocols Suites: First Results. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:151-166 [Conf]
  107. Michael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater
    Memories: A Survey of Their Secure Uses in Smart Cards. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2003, pp:62-72 [Conf]
  108. David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater
    On a New Way to Read Data from Memory. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:65-69 [Conf]
  109. Francois Goffin, Jean-François Delaigle, Christophe De Vleeschouwer, Benoit M. Macq, Jean-Jacques Quisquater
    Low-Cost Perceptive Digital Picture Watermarking Method. [Citation Graph (0, 0)][DBLP]
    Storage and Retrieval for Image and Video Databases (SPIE), 1997, pp:264-277 [Conf]
  110. Jean-Jacques Quisquater, Benoit M. Macq, Marc Joye, N. Degand, A. Bernard
    Practical Solution to Authentication of Images with a Secure Camera. [Citation Graph (0, 0)][DBLP]
    Storage and Retrieval for Image and Video Databases (SPIE), 1997, pp:290-297 [Conf]
  111. Marc Joye, Jean-Jacques Quisquater
    Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:93-100 [Conf]
  112. Jean-Marie Kabasele-Tenday, Jean-Jacques Quisquater, Marc Lobelle
    Deriving a Role-Based Access Control Model from the OBBAC Model. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:147-151 [Conf]
  113. H. Massias, X. Serret Avila, Jean-Jacques Quisquater
    Timestamps: Main Issues on Their Use and Implementation. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:178-183 [Conf]
  114. V. Darmstaedter, Jean-François Delaigle, Jean-Jacques Quisquater, Benoit M. Macq
    Low cost spatial watermarking. [Citation Graph (0, 0)][DBLP]
    Computers & Graphics, 1998, v:22, n:4, pp:417-424 [Journal]
  115. Louis C. Guillou, Michel Ugon, Jean-Jacques Quisquater
    Cryptographic authentication protocols for smart cards. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:36, n:4, pp:437-451 [Journal]
  116. Jean-Jacques Quisquater, Yvo Desmedt
    Chinese Lotto as an Exhaustive Code-Breaking Machine. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1991, v:24, n:11, pp:14-22 [Journal]
  117. Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater
    Table of Large (Delta, D)-Graphs. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1992, v:37, n:, pp:575-577 [Journal]
  118. Marc Joye, Jean-Jacques Quisquater
    Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1998, v:14, n:1, pp:53-56 [Journal]
  119. Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi
    How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2001, v:23, n:3, pp:297-316 [Journal]
  120. Philippe Delsarte, Jean-Jacques Quisquater
    Permutation Cascades with Normalized Cells [Citation Graph (0, 0)][DBLP]
    Information and Control, 1973, v:23, n:4, pp:344-356 [Journal]
  121. Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater
    Power and electromagnetic analysis: Improved model, consequences and comparisons. [Citation Graph (0, 0)][DBLP]
    Integration, 2007, v:40, n:1, pp:52-60 [Journal]
  122. François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater
    FPGA implementations of the ICEBERG block cipher. [Citation Graph (0, 0)][DBLP]
    Integration, 2007, v:40, n:1, pp:20-27 [Journal]
  123. Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater
    Tables of Large Graphs with Given Degree and Diameter. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1982, v:15, n:1, pp:10-13 [Journal]
  124. Henri Gilbert, Dipankar Gupta, Andrew M. Odlyzko, Jean-Jacques Quisquater
    Attacks on Shamir's `RSA for Paranoids'. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:68, n:4, pp:197-199 [Journal]
  125. Olivier Pereira, Jean-Jacques Quisquater
    Some Attacks Upon Authenticated Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:4, pp:555-580 [Journal]
  126. Jean-Jacques Quisquater, Marc Joye
    Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:3, pp:213-224 [Journal]
  127. Olivier Pereira, Jean-Jacques Quisquater
    On the impossibility of building secure Cliques-type authenticated group key agreement protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:2, pp:197-246 [Journal]
  128. Samy Bengio, Gilles Brassard, Yvo Desmedt, Claude Goutier, Jean-Jacques Quisquater
    Secure Implementations of Identification Systems. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1991, v:4, n:3, pp:175-183 [Journal]
  129. Marc Joye, Arjen K. Lenstra, Jean-Jacques Quisquater
    Chinese Remaindering Based Cryptosystems in the Presence of Faults. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:4, pp:241-245 [Journal]
  130. Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater
    Strategies for Interconnection Networks: Some Methods from Graph Theory. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1986, v:3, n:4, pp:433-449 [Journal]
  131. Guerric Meurice de Dormale, Jean-Jacques Quisquater
    High-speed hardware implementations of Elliptic Curve Cryptography: A survey. [Citation Graph (0, 0)][DBLP]
    Journal of Systems Architecture, 2007, v:53, n:2-3, pp:72-84 [Journal]
  132. Amaury Nève, Denis Flandre, Jean-Jacques Quisquater
    SOI Technology for Future High-Performance Smart Cards. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2003, v:23, n:3, pp:58-67 [Journal]
  133. Jean-Claude Bermond, Pavol Hell, Jean-Jacques Quisquater
    Construction of Large Packet Radio Networks. [Citation Graph (0, 0)][DBLP]
    Parallel Processing Letters, 1992, v:2, n:, pp:3-12 [Journal]
  134. Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
    Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:4, pp:473-482 [Journal]
  135. François Macé, François-Xavier Standaert, Jean-Jacques Quisquater
    Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:427-442 [Conf]
  136. Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater
    Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:378-393 [Conf]
  137. François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater
    FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    FPL, 2006, pp:1-4 [Conf]
  138. Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater
    Improving the Time Complexity of Matsui's Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:77-88 [Conf]
  139. Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee
    Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:273-281 [Conf]
  140. Benoît Libert, Jean-Jacques Quisquater, Moti Yung
    Parallel Key-Insulated Public Key Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:298-314 [Conf]
  141. Jean-Jacques Quisquater
    The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? [Citation Graph (0, 0)][DBLP]
    SSS, 2007, pp:1- [Conf]
  142. François-Xavier Standaert, François Macé, Eric Peeters, Jean-Jacques Quisquater
    Updates on the Security of FPGAs Against Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ARC, 2006, pp:335-346 [Conf]
  143. Guerric Meurice de Dormale, Jean-Jacques Quisquater
    Iterative Modular Division over GF(2m): Novel Algorithm and Implementations on FPGA. [Citation Graph (0, 0)][DBLP]
    ARC, 2006, pp:370-382 [Conf]
  144. Chong Hee Kim, Jean-Jacques Quisquater
    Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:215-228 [Conf]
  145. Benoît Libert, Jean-Jacques Quisquater
    Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:23-38 [Conf]
  146. Antonin Descampe, F.-O. Devaux, Gaël Rouvroy, Jean-Didier Legat, Jean-Jacques Quisquater, Benoit M. Macq
    A Flexible Hardware JPEG 2000 Decoder for Digital Cinema. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:11, pp:1397-1410 [Journal]

  147. New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. [Citation Graph (, )][DBLP]


  148. Forward-secure signatures in untrusted update environments: efficient and generic constructions. [Citation Graph (, )][DBLP]


  149. Authenticated wireless roaming via tunnels: making mobile guests feel at home. [Citation Graph (, )][DBLP]


  150. Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (, )][DBLP]


  151. Key Evolution Systems in Untrusted Update Environments. [Citation Graph (, )][DBLP]


  152. Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. [Citation Graph (, )][DBLP]


  153. Simulation-based analysis of E2E voting systems. [Citation Graph (, )][DBLP]


  154. Better Login Protocols for Computer Networks. [Citation Graph (, )][DBLP]


  155. Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. [Citation Graph (, )][DBLP]


  156. Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). [Citation Graph (, )][DBLP]


  157. ePassport: Securing International Contacts with Contactless Chips. [Citation Graph (, )][DBLP]


  158. On Solving RC5 Challenges with FPGAs. [Citation Graph (, )][DBLP]


  159. Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware. [Citation Graph (, )][DBLP]


  160. How can we overcome both side channel analysis and fault attacks on RSA-CRT? [Citation Graph (, )][DBLP]


  161. Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --. [Citation Graph (, )][DBLP]


  162. Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (, )][DBLP]


  163. On the Salsa20 Core Function. [Citation Graph (, )][DBLP]


  164. Method for Detecting Vulnerability to Doubling Attacks. [Citation Graph (, )][DBLP]


  165. Comparing with RSA. [Citation Graph (, )][DBLP]


  166. Practical Algebraic Attacks on the Hitag2 Stream Cipher. [Citation Graph (, )][DBLP]


  167. IMAPS: Imbricated authentication protocol suite for mobile users and groups. [Citation Graph (, )][DBLP]


  168. Authentication protocols for ad hoc networks: taxonomy and research issues. [Citation Graph (, )][DBLP]


  169. Full Cryptanalysis of LPS and Morgenstern Hash Functions. [Citation Graph (, )][DBLP]


  170. Two-level signature delegation for mobile first responder authentication. [Citation Graph (, )][DBLP]


  171. Simulation-Based Analysis of E2E Voting Systems. [Citation Graph (, )][DBLP]


  172. Implementation of the AES-128 on Virtex-5 FPGAs. [Citation Graph (, )][DBLP]


  173. Group Authentication Protocol for Mobile Networks. [Citation Graph (, )][DBLP]


  174. Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations [Citation Graph (, )][DBLP]


  175. Faults, Injection Methods, and Fault Attacks. [Citation Graph (, )][DBLP]


Search in 0.011secs, Finished in 0.768secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002