2009 | ||
---|---|---|
185 | EE | Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater: Authenticated wireless roaming via tunnels: making mobile guests feel at home. ASIACCS 2009: 92-103 |
184 | EE | Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor: Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. CT-RSA 2009: 182-194 |
2008 | ||
183 | EE | Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy: Implementation of the AES-128 on Virtex-5 FPGAs. AFRICACRYPT 2008: 16-26 |
182 | EE | Chong Hee Kim, Jean-Jacques Quisquater: New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. CARDIS 2008: 48-60 |
181 | EE | Chong Hee Kim, Philippe Bulens, Christophe Petit, Jean-Jacques Quisquater: Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. EuroPKI 2008: 182-195 |
180 | EE | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater: Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. FSE 2008: 382-397 |
179 | EE | Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater: On the Salsa20 Core Function. FSE 2008: 462-469 |
178 | EE | Gildas Avoine, Kassem Kalach, Jean-Jacques Quisquater: ePassport: Securing International Contacts with Contactless Chips. Financial Cryptography 2008: 141-155 |
177 | EE | Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung: Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). Financial Cryptography 2008: 307-313 |
176 | EE | Chong Hee Kim, Jean-Jacques Quisquater: Method for Detecting Vulnerability to Doubling Attacks. ICICS 2008: 97-110 |
175 | EE | Benoît Libert, Jean-Jacques Quisquater, Moti Yung: Key Evolution Systems in Untrusted Update Environments. Inscrypt 2008: 12-21 |
174 | EE | Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater: Full Cryptanalysis of LPS and Morgenstern Hash Functions. SCN 2008: 263-277 |
173 | EE | Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater: Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations CoRR abs/0811.4257: (2008) |
172 | EE | Francesc Sebé, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Yves Deswarte, Jean-Jacques Quisquater: Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008) |
2007 | ||
171 | Damien Sauveron, Constantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings Springer 2007 | |
170 | EE | Benoît Libert, Jean-Jacques Quisquater, Moti Yung: Forward-secure signatures in untrusted update environments: efficient and generic constructions. ACM Conference on Computer and Communications Security 2007: 266-275 |
169 | EE | Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater: Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA. CHES 2007: 378-393 |
168 | EE | François Macé, François-Xavier Standaert, Jean-Jacques Quisquater: Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. CHES 2007: 427-442 |
167 | EE | Nidal Aboudagga, Mohamed Eltoweissy, Jean-Jacques Quisquater: Two-level signature delegation for mobile first responder authentication. CollaborateCom 2007: 16-23 |
166 | EE | Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, Jean-Jacques Quisquater: Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware. FCCM 2007: 197-206 |
165 | EE | Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater: On Solving RC5 Challenges with FPGAs. FCCM 2007: 281-282 |
164 | EE | Chong Hee Kim, Jean-Jacques Quisquater: How can we overcome both side channel analysis and fault attacks on RSA-CRT? FDTC 2007: 21-29 |
163 | EE | Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater: Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --. FPL 2007: 642-647 |
162 | EE | Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater: Simulation-based analysis of E2E voting systems. Frontiers of Electronic Voting 2007 |
161 | EE | Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee: Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. ICISC 2007: 273-281 |
160 | EE | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater: Improving the Time Complexity of Matsui's Linear Cryptanalysis. ICISC 2007: 77-88 |
159 | EE | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater: Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. Inscrypt 2007: 51-65 |
158 | EE | Benoît Libert, Jean-Jacques Quisquater: Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. Pairing 2007: 23-38 |
157 | EE | Benoît Libert, Jean-Jacques Quisquater, Moti Yung: Parallel Key-Insulated Public Key Encryption Without Random Oracles. Public Key Cryptography 2007: 298-314 |
156 | EE | Jean-Jacques Quisquater: The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? SSS 2007: 1 |
155 | EE | Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater: Simulation-Based Analysis of E2E Voting Systems. VOTE-ID 2007: 137-149 |
154 | EE | Chong Hee Kim, Jean-Jacques Quisquater: Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. WISTP 2007: 215-228 |
153 | EE | Chong Hee Kim, Jean-Jacques Quisquater: Faults, Injection Methods, and Fault Attacks. IEEE Design & Test of Computers 24(6): 544-545 (2007) |
152 | EE | François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater: FPGA implementations of the ICEBERG block cipher. Integration 40(1): 20-27 (2007) |
151 | EE | Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater: Power and electromagnetic analysis: Improved model, consequences and comparisons. Integration 40(1): 52-60 (2007) |
150 | EE | Guerric Meurice de Dormale, Jean-Jacques Quisquater: High-speed hardware implementations of Elliptic Curve Cryptography: A survey. Journal of Systems Architecture 53(2-3): 72-84 (2007) |
2006 | ||
149 | EE | François-Xavier Standaert, François Macé, Eric Peeters, Jean-Jacques Quisquater: Updates on the Security of FPGAs Against Power Analysis Attacks. ARC 2006: 335-346 |
148 | EE | Guerric Meurice de Dormale, Jean-Jacques Quisquater: Iterative Modular Division over GF(2m): Novel Algorithm and Implementations on FPGA. ARC 2006: 370-382 |
147 | EE | Guerric Meurice de Dormale, Renaud Ambroise, David Bol, Jean-Jacques Quisquater, Jean-Didier Legat: Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards. ASAP 2006: 347-353 |
146 | EE | François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater: SEA: A Scalable Encryption Algorithm for Small Embedded Applications. CARDIS 2006: 222-236 |
145 | EE | Cédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater: Template Attacks in Principal Subspaces. CHES 2006: 1-14 |
144 | EE | François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater: Towards Security Limits in Side-Channel Attacks. CHES 2006: 30-45 |
143 | EE | Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater: Fair Identification. CT-RSA 2006: 52-63 |
142 | EE | François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater: FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks. FPL 2006: 1-4 |
141 | EE | Benoît Libert, Jean-Jacques Quisquater, Moti Yung: Efficient Intrusion-Resilient Signatures Without Random Oracles. Inscrypt 2006: 27-41 |
140 | EE | Benoît Libert, Jean-Jacques Quisquater: On Constructing Certificateless Cryptosystems from Identity Based Encryption. Public Key Cryptography 2006: 474-490 |
139 | EE | Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater: Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. SCN 2006: 63-77 |
138 | EE | Antonin Descampe, F.-O. Devaux, Gaël Rouvroy, Jean-Didier Legat, Jean-Jacques Quisquater, Benoit M. Macq: A Flexible Hardware JPEG 2000 Decoder for Digital Cinema. IEEE Trans. Circuits Syst. Video Techn. 16(11): 1397-1410 (2006) |
137 | EE | Olivier Pereira, Jean-Jacques Quisquater: On the impossibility of building secure Cliques-type authenticated group key agreement protocols. Journal of Computer Security 14(2): 197-246 (2006) |
2005 | ||
136 | EE | Benoît Libert, Jean-Jacques Quisquater: Identity Based Encryption Without Redundancy. ACNS 2005: 285-300 |
135 | EE | Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater: Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. ASIACRYPT 2005: 515-532 |
134 | EE | Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater: Improved Higher-Order Side-Channel Attacks with FPGA Experiments. CHES 2005: 309-323 |
133 | EE | Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater: Efficient and Non-interactive Timed-Release Encryption. ICICS 2005: 291-303 |
132 | EE | Vipul Goyal, Abhishek Jain, Jean-Jacques Quisquater: Improvements to Mitchell's Remote User Authentication Protocol. ICISC 2005: 69-80 |
131 | EE | François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater: FPGA Implementations of the ICEBERG Block Cipher. ITCC (1) 2005: 556-561 |
130 | EE | François-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater: On the Masking Countermeasure and Higher-Order Power Analysis Attacks. ITCC (1) 2005: 562-567 |
129 | EE | François-Xavier Standaert, Frédéric Lefèbvre, Gaël Rouvroy, Benoit M. Macq, Jean-Jacques Quisquater, Jean-Didier Legat: Practical Evaluation of a Radial Soft Hash Algorithm. ITCC (2) 2005: 89-94 |
128 | EE | François Macé, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: A Design Methodology for Secured ICs Using Dynamic Current Mode Logic. PATMOS 2005: 550-560 |
127 | EE | Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater: Authentication protocols for ad hoc networks: taxonomy and research issues. Q2SWinet 2005: 96-104 |
126 | EE | Jean-Jacques Quisquater: Eavesdropper. Encyclopedia of Cryptography and Security 2005 |
125 | EE | Jean-Jacques Quisquater, David Samyde: Electromagnetic Attack. Encyclopedia of Cryptography and Security 2005 |
124 | EE | Benoît Libert, Jean-Jacques Quisquater: Identity-Based Cryptosystems. Encyclopedia of Cryptography and Security 2005 |
123 | EE | Jean-Jacques Quisquater, David Samyde: Radio Frequency Attacks. Encyclopedia of Cryptography and Security 2005 |
122 | EE | Jean-Jacques Quisquater, François-Xavier Standaert: Time-memory tradeoffs. Encyclopedia of Cryptography and Security 2005 |
2004 | ||
121 | Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam: Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France Kluwer 2004 | |
120 | Marc Joye, Jean-Jacques Quisquater: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings Springer 2004 | |
119 | Gilles Piret, François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater: On the Security of the DeKaRT Primitive. CARDIS 2004: 241-254 | |
118 | EE | Olivier Pereira, Jean-Jacques Quisquater: Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. CSFW 2004: 16-19 |
117 | EE | Benoît Libert, Jean-Jacques Quisquater: Identity Based Undeniable Signatures. CT-RSA 2004: 112-125 |
116 | EE | Gaël Rouvroy, François-Xavier Standaert, Frédéric Lefèbvre, Jean-Jacques Quisquater, Benoit M. Macq, Jean-Didier Legat: Reconfigurable hardware solutions for the digital rights management of digital cinema. Digital Rights Management Workshop 2004: 40-53 |
115 | EE | Benoît Libert, Jean-Jacques Quisquater: What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. EuroPKI 2004: 57-70 |
114 | EE | Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater: Efficient Modular Division Implementation: ECC over GF(p) Affine Coordinates Application. FPL 2004: 231-240 |
113 | EE | François-Xavier Standaert, Siddika Berna Örs, Jean-Jacques Quisquater, Bart Preneel: Power Analysis Attacks Against FPGA Implementations of the DES. FPL 2004: 84-94 |
112 | EE | François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat: ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. FSE 2004: 279-299 |
111 | EE | Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater: Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. ISC 2004: 52-60 |
110 | EE | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. ITCC (2) 2004: 583-587 |
109 | EE | Benoît Libert, Jean-Jacques Quisquater: Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. Public Key Cryptography 2004: 187-200 |
108 | EE | Benoît Libert, Jean-Jacques Quisquater: Improved Signcryption from q-Diffie-Hellman Problems. SCN 2004: 220-234 |
107 | EE | Gilles Piret, Jean-Jacques Quisquater: Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. Selected Areas in Cryptography 2004: 100-113 |
2003 | ||
106 | EE | Julien Cathalo, François Koeune, Jean-Jacques Quisquater: A New Type of Timing Attack: Application to GPS. CHES 2003: 291-303 |
105 | EE | François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat: Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. CHES 2003: 334-350 |
104 | EE | Gilles Piret, Jean-Jacques Quisquater: A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. CHES 2003: 77-88 |
103 | EE | Anand Raghunathan, Srivaths Ravi, Sunil Hattangady, Jean-Jacques Quisquater: Securing Mobile Appliances: New Challenges for the System Designer. DATE 2003: 10176-10183 |
102 | EE | Mathieu Ciet, Tanja Lange, Francesco Sica, Jean-Jacques Quisquater: Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms. EUROCRYPT 2003: 388-400 |
101 | EE | François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat: A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL. FPGA 2003: 216-224 |
100 | EE | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES. FPGA 2003: 247 |
99 | EE | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES. FPL 2003: 181-193 |
98 | EE | François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, David Samyde, Jean-Jacques Quisquater: Power Analysis of FPGAs: How Practical is the Attack? FPL 2003: 701-711 |
97 | EE | Michael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater: Memories: A Survey of Their Secure Uses in Smart Cards. IEEE Security in Storage Workshop 2003: 62-72 |
96 | EE | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: Efficient FPGA Implementation of Block Cipher MISTY1. IPDPS 2003: 185 |
95 | EE | Benoît Libert, Jean-Jacques Quisquater: Efficient revocation and threshold pairing based cryptosystems. PODC 2003: 163-171 |
94 | EE | Amaury Nève, Denis Flandre, Jean-Jacques Quisquater: SOI Technology for Future High-Performance Smart Cards. IEEE Micro 23(3): 58-67 (2003) |
93 | EE | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. IEEE Trans. Computers 52(4): 473-482 (2003) |
92 | Olivier Pereira, Jean-Jacques Quisquater: Some Attacks Upon Authenticated Group Key Agreement Protocols. Journal of Computer Security 11(4): 555-580 (2003) | |
2002 | ||
91 | EE | Jean-Jacques Quisquater, David Samyde: Automatic Code Recognition for Smartcards Using a Kohonen Neural Network. CARDIS 2002 |
90 | Jean-Jacques Quisquater: Awards. CARDIS 2002 | |
89 | EE | Jean-Jacques Quisquater: CHES: Past, Present, and Future. CHES 2002: 1 |
88 | EE | Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica: Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. CHES 2002: 540-550 |
87 | EE | François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat: A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results. CHES 2002: 593-609 |
86 | EE | Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung: Observability Analysis - Detecting When Improved Cryptosystems Fail. CT-RSA 2002: 17-29 |
85 | EE | Jean-Jacques Quisquater, François-Xavier Standaert, Gaël Rouvroy, Jean-Pierre David, Jean-Didier Legat: A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation. FPL 2002: 780-789 |
84 | EE | François Koeune, Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Pierre David, Jean-Didier Legat: An FPGA Implementation of the Linear Cryptanalysis. FPL 2002: 845-852 |
83 | EE | David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater: On a New Way to Read Data from Memory. IEEE Security in Storage Workshop 2002: 65-69 |
82 | EE | Francesco Sica, Mathieu Ciet, Jean-Jacques Quisquater: Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. Selected Areas in Cryptography 2002: 21-36 |
2001 | ||
81 | EE | Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater: Provably authenticated group Diffie-Hellman key exchange. ACM Conference on Computer and Communications Security 2001: 255-264 |
80 | EE | Marc Joye, Jean-Jacques Quisquater: Hessian Elliptic Curves and Side-Channel Attacks. CHES 2001: 402-410 |
79 | EE | Olivier Pereira, Jean-Jacques Quisquater: A Security Analysis of the Cliques Protocols Suites. CSFW 2001: 73-81 |
78 | EE | Marc Joye, Jean-Jacques Quisquater, Moti Yung: On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. CT-RSA 2001: 208-222 |
77 | EE | Jean-Jacques Quisquater, David Samyde: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. E-smart 2001: 200-210 |
76 | EE | Werner Schindler, François Koeune, Jean-Jacques Quisquater: Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. IMA Int. Conf. 2001: 245-267 |
75 | EE | Marc Joye, Jean-Jacques Quisquater: On Rabin-Type Signatures. IMA Int. Conf. 2001: 99-113 |
74 | EE | Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica: A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. INDOCRYPT 2001: 108-116 |
73 | Olivier Pereira, Jean-Jacques Quisquater: Security Analysis of the Cliques Protocols Suites: First Results. SEC 2001: 151-166 | |
72 | EE | Louis C. Guillou, Michel Ugon, Jean-Jacques Quisquater: Cryptographic authentication protocols for smart cards. Computer Networks 36(4): 437-451 (2001) |
71 | Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi: How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. Des. Codes Cryptography 23(3): 297-316 (2001) | |
2000 | ||
70 | Jean-Jacques Quisquater, Bruce Schneier: Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings Springer 2000 | |
69 | Gaël Hachez, François Koeune, Jean-Jacques Quisquater: Biometrics, Access Control, Smart Cards: A not so Simple Combination. CARDIS 2000: 273-288 | |
68 | EE | Gaël Hachez, Jean-Jacques Quisquater: Montgomery Exponentiation with no Final Subtractions: Improved Results. CHES 2000: 293-301 |
67 | EE | Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot: Towards a Practical Secure Framework for Mobile Code Commerce. ISW 2000: 164-178 |
1999 | ||
66 | EE | Xavier Verians, Jean-Didier Legat, Jean-Jacques Quisquater, Benoit M. Macq: A New Parallelism Management Scheme for Multiprocessor Systems. ACPC 1999: 246-256 |
65 | EE | Tanguy Gilmont, Jean-Didier Legat, Jean-Jacques Quisquater: Enhancing Security in the Memory Management Unit. EUROMICRO 1999: 1449- |
64 | EE | Xavier Verians, Jean-Didier Legat, Jean-Jacques Quisquater, Benoit M. Macq: A Graph-Oriented Task Manager for Small Multiprocessor Systems. Euro-Par 1999: 735-744 |
63 | Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater: Robust Object Watermarking: Application to Code. Information Hiding 1999: 368-378 | |
62 | Yvo Desmedt, Tri Van Le, Jean-Jacques Quisquater: Nonbinary Audio Cryptography. Information Hiding 1999: 478-489 | |
61 | EE | Jean-Marie Kabasele-Tenday, Jean-Jacques Quisquater, Marc Lobelle: Deriving a Role-Based Access Control Model from the OBBAC Model. WETICE 1999: 147-151 |
60 | EE | Henri Massias, X. Serret Avila, Jean-Jacques Quisquater: Timestamps: Main Issues on Their Use and Implementation. WETICE 1999: 178-183 |
59 | EE | Marc Joye, Arjen K. Lenstra, Jean-Jacques Quisquater: Chinese Remaindering Based Cryptosystems in the Presence of Faults. J. Cryptology 12(4): 241-245 (1999) |
1998 | ||
58 | Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Springer 1998 | |
57 | EE | Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater: Audio and Optical Cryptography. ASIACRYPT 1998: 392-404 |
56 | Jean-François Dhem, François Koeune, Philippe-Alexandre Leroux, Patrick Mestré, Jean-Jacques Quisquater, Jean-Louis Willems: A Practical Implementation of the Timing Attack. CARDIS 1998: 167-182 | |
55 | Jean-François Dhem, Jean-Jacques Quisquater: Recent Results on Modular Multiplications for Smart Cards. CARDIS 1998: 336-352 | |
54 | EE | Gérard Eizenberg, Jean-Jacques Quisquater: Panel Session: Watermarking. ESORICS 1998: 275 |
53 | EE | Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater: Cerebral Cryptography. Information Hiding 1998: 62-72 |
52 | EE | V. Darmstaedter, Jean-François Delaigle, Jean-Jacques Quisquater, Benoit M. Macq: Low cost spatial watermarking. Computers & Graphics 22(4): 417-424 (1998) |
51 | Marc Joye, Jean-Jacques Quisquater: Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams. Des. Codes Cryptography 14(1): 53-56 (1998) | |
50 | EE | Henri Gilbert, Dipankar Gupta, Andrew M. Odlyzko, Jean-Jacques Quisquater: Attacks on Shamir's `RSA for Paranoids'. Inf. Process. Lett. 68(4): 197-199 (1998) |
1997 | ||
49 | EE | Marc Joye, Jean-Jacques Quisquater: On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack. ACM Conference on Computer and Communications Security 1997: 135-141 |
48 | Jean-François Delaigle, Christophe De Vleeschouwer, Francois Goffin, Benoit M. Macq, Jean-Jacques Quisquater: Low Cost Watermarking Based on a Human Vision Model. ECMAST 1997: 153-167 | |
47 | Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater: A new and optimal chosen-message attack on RSA-type cryptosystems. ICICS 1997: 302-313 | |
46 | Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng: RSA-type Signatures in the Presence of Transient Faults. IMA Int. Conf. 1997: 155-160 | |
45 | Francois Goffin, Jean-François Delaigle, Christophe De Vleeschouwer, Benoit M. Macq, Jean-Jacques Quisquater: Low-Cost Perceptive Digital Picture Watermarking Method. Storage and Retrieval for Image and Video Databases (SPIE) 1997: 264-277 | |
44 | Jean-Jacques Quisquater, Benoit M. Macq, Marc Joye, N. Degand, A. Bernard: Practical Solution to Authentication of Images with a Secure Camera. Storage and Retrieval for Image and Video Databases (SPIE) 1997: 290-297 | |
43 | Jean-Jacques Quisquater, Marc Joye: Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences. Journal of Computer Security 5(3): 213-224 (1997) | |
1996 | ||
42 | Renaud Lecat, Jean-Jacques Quisquater: Efficient Compression Algorithms for Smart Cards. CARDIS 1996 | |
41 | Ronald Ferreira, Ralf Malzahn, Peter Marissen, Jean-Jacques Quisquater, Thomas Wille: FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications. CARDIS 1996 | |
40 | Pieter H. Hartel, Jean-Jacques Quisquater: Introduction to CARDIS 1996. CARDIS 1996 | |
39 | EE | Gérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater: Authors' Rights and Copyright Protection. ESORICS 1996: 324 |
38 | Marc Joye, Jean-Jacques Quisquater: Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves. Security Protocols Workshop 1996: 93-100 | |
1995 | ||
37 | Louis C. Guillou, Jean-Jacques Quisquater: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding Springer 1995 | |
36 | Jean-Marc Boucqueau, Sylvie Lacroix, Benoit M. Macq, Jean-Jacques Quisquater: Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties. COST 237 Workshop 1995: 229-243 | |
35 | EE | Philippe Béguin, Jean-Jacques Quisquater: Fast Server-Aided RSA Signatures Secure Against Active Attacks. CRYPTO 1995: 57-69 |
1994 | ||
34 | Philippe Béguin, Jean-Jacques Quisquater: Secure Acceleration of DSS Signatures Using Insecure Server. ASIACRYPT 1994: 249-259 | |
33 | EE | Olivier Delos, Jean-Jacques Quisquater: An Identity-Based Signature Scheme with Bounded Life-Span. CRYPTO 1994: 83-94 |
1993 | ||
32 | Olivier Delos, Jean-Jacques Quisquater: Efficient multi-signature schemes for cooperating entities. Algebraic Coding 1993: 63-74 | |
1992 | ||
31 | Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings Springer 1992 | |
30 | EE | Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater: Table of Large (Delta, D)-Graphs. Discrete Applied Mathematics 37/38: 575-577 (1992) |
29 | Jean-Claude Bermond, Pavol Hell, Jean-Jacques Quisquater: Construction of Large Packet Radio Networks. Parallel Processing Letters 2: 3-12 (1992) | |
1991 | ||
28 | Dominique de Waleffe, Jean-Jacques Quisquater: Better Login Protocols for Computer Networks. Computer Security and Industrial Cryptography 1991: 50-70 | |
27 | Jean-Jacques Quisquater, Yvo Desmedt: Chinese Lotto as an Exhaustive Code-Breaking Machine. IEEE Computer 24(11): 14-22 (1991) | |
26 | Samy Bengio, Gilles Brassard, Yvo Desmedt, Claude Goutier, Jean-Jacques Quisquater: Secure Implementations of Identification Systems. J. Cryptology 4(3): 175-183 (1991) | |
1990 | ||
25 | Jean-Jacques Quisquater, Joos Vandewalle: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings Springer 1990 | |
24 | EE | Dominique de Waleffe, Jean-Jacques Quisquater: CORSAIR: A SMART Card for Public Key Cryptosystems. CRYPTO 1990: 502-513 |
23 | Dominique de Waleffe, Jean-Jacques Quisquater: Better Login Protocols for Computer Networks. ESORICS 1990: 163-172 | |
22 | EE | Louis C. Guillou, Jean-Jacques Quisquater, Michael Walker, Peter Landrock, Caroline Shafer: Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". EUROCRYPT 1990: 465-473 |
1989 | ||
21 | EE | Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder: A Signature with Shared Verification Scheme. CRYPTO 1989: 253-262 |
20 | EE | Jean-Jacques Quisquater, Jean-Paul Delescaille: How Easy is Collision Search. New Results and Applications to DES. CRYPTO 1989: 408-413 |
19 | EE | Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson: How to Explain Zero-Knowledge Protocols to Your Children. CRYPTO 1989: 628-631 |
18 | EE | Jean-Jacques Quisquater, Marc Girault: 2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms. EUROCRYPT 1989: 102-109 |
17 | EE | Jean-Jacques Quisquater, Jean-Paul Delescaille: How Easy is Collision Search? Application to DES (Extended Summary). EUROCRYPT 1989: 429-434 |
16 | EE | Jean-Jacques Quisquater, André Bouckaert: Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). EUROCRYPT 1989: 662-664 |
1988 | ||
15 | EE | Louis C. Guillou, Jean-Jacques Quisquater: A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. CRYPTO 1988: 216-231 |
14 | EE | Louis C. Guillou, Jean-Jacques Quisquater: A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. EUROCRYPT 1988: 123-128 |
1987 | ||
13 | EE | Jean-Jacques Quisquater: Secret Distribution of Keys for Public-Key Systems. CRYPTO 1987: 203-208 |
12 | EE | Louis C. Guillou, Jean-Jacques Quisquater: Efficient Digital Public-Key Signature with Shadow (Abstract). CRYPTO 1987: 223 |
11 | EE | Jean-Jacques Quisquater, Jean-Paul Delescaille: Other Cycling Tests for DES (Abstract). CRYPTO 1987: 255-256 |
1986 | ||
10 | EE | Yvo Desmedt, Jean-Jacques Quisquater: Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). CRYPTO 1986: 111-117 |
9 | Yvo Desmedt, Frank Hoornaert, Jean-Jacques Quisquater: Several Exhaustive Key Search Machines and DES. EUROCRYPT 1986: 17-19 | |
8 | Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater: Strategies for Interconnection Networks: Some Methods from Graph Theory. J. Parallel Distrib. Comput. 3(4): 433-449 (1986) | |
1985 | ||
7 | EE | Jean-Jacques Quisquater, Yvo Desmedt, Marc Davio: The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys). CRYPTO 1985: 537-542 |
1984 | ||
6 | EE | Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater: Efficient Hardware and Software Implementations for the DES. CRYPTO 1984: 144-146 |
5 | EE | Yvo Desmedt, Jean-Jacques Quisquater, Marc Davio: Dependence of Output on Input in DES: Small Avalanche Characteristics. CRYPTO 1984: 359-376 |
4 | EE | Marc Davio, Yvo Desmedt, Jean-Jacques Quisquater: Propagation Characteristics of the DES. EUROCRYPT 1984: 62-73 |
1983 | ||
3 | Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters: Analytical Characteristics of the DES. CRYPTO 1983: 171-202 | |
1982 | ||
2 | Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater: Tables of Large Graphs with Given Degree and Diameter. Inf. Process. Lett. 15(1): 10-13 (1982) | |
1973 | ||
1 | Philippe Delsarte, Jean-Jacques Quisquater: Permutation Cascades with Normalized Cells Information and Control 23(4): 344-356 (1973) |