dblp.uni-trier.dewww.uni-trier.de

Jean-Jacques Quisquater

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
185EEMark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater: Authenticated wireless roaming via tunnels: making mobile guests feel at home. ASIACCS 2009: 92-103
184EEChristophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor: Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. CT-RSA 2009: 182-194
2008
183EEPhilippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy: Implementation of the AES-128 on Virtex-5 FPGAs. AFRICACRYPT 2008: 16-26
182EEChong Hee Kim, Jean-Jacques Quisquater: New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. CARDIS 2008: 48-60
181EEChong Hee Kim, Philippe Bulens, Christophe Petit, Jean-Jacques Quisquater: Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. EuroPKI 2008: 182-195
180EEBaudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater: Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. FSE 2008: 382-397
179EEJulio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater: On the Salsa20 Core Function. FSE 2008: 462-469
178EEGildas Avoine, Kassem Kalach, Jean-Jacques Quisquater: ePassport: Securing International Contacts with Contactless Chips. Financial Cryptography 2008: 141-155
177EEJon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung: Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). Financial Cryptography 2008: 307-313
176EEChong Hee Kim, Jean-Jacques Quisquater: Method for Detecting Vulnerability to Doubling Attacks. ICICS 2008: 97-110
175EEBenoît Libert, Jean-Jacques Quisquater, Moti Yung: Key Evolution Systems in Untrusted Update Environments. Inscrypt 2008: 12-21
174EEChristophe Petit, Kristin Lauter, Jean-Jacques Quisquater: Full Cryptanalysis of LPS and Morgenstern Hash Functions. SCN 2008: 263-277
173EEJulio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater: Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations CoRR abs/0811.4257: (2008)
172EEFrancesc Sebé, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Yves Deswarte, Jean-Jacques Quisquater: Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008)
2007
171 Damien Sauveron, Constantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings Springer 2007
170EEBenoît Libert, Jean-Jacques Quisquater, Moti Yung: Forward-secure signatures in untrusted update environments: efficient and generic constructions. ACM Conference on Computer and Communications Security 2007: 266-275
169EEGuerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater: Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA. CHES 2007: 378-393
168EEFrançois Macé, François-Xavier Standaert, Jean-Jacques Quisquater: Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. CHES 2007: 427-442
167EENidal Aboudagga, Mohamed Eltoweissy, Jean-Jacques Quisquater: Two-level signature delegation for mobile first responder authentication. CollaborateCom 2007: 16-23
166EEGiacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, Jean-Jacques Quisquater: Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware. FCCM 2007: 197-206
165EEGuerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater: On Solving RC5 Challenges with FPGAs. FCCM 2007: 281-282
164EEChong Hee Kim, Jean-Jacques Quisquater: How can we overcome both side channel analysis and fault attacks on RSA-CRT? FDTC 2007: 21-29
163EEGuerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater: Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --. FPL 2007: 642-647
162EEOlivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater: Simulation-based analysis of E2E voting systems. Frontiers of Electronic Voting 2007
161EEChong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee: Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. ICISC 2007: 273-281
160EEBaudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater: Improving the Time Complexity of Matsui's Linear Cryptanalysis. ICISC 2007: 77-88
159EEBaudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater: Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. Inscrypt 2007: 51-65
158EEBenoît Libert, Jean-Jacques Quisquater: Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. Pairing 2007: 23-38
157EEBenoît Libert, Jean-Jacques Quisquater, Moti Yung: Parallel Key-Insulated Public Key Encryption Without Random Oracles. Public Key Cryptography 2007: 298-314
156EEJean-Jacques Quisquater: The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? SSS 2007: 1
155EEOlivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater: Simulation-Based Analysis of E2E Voting Systems. VOTE-ID 2007: 137-149
154EEChong Hee Kim, Jean-Jacques Quisquater: Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. WISTP 2007: 215-228
153EEChong Hee Kim, Jean-Jacques Quisquater: Faults, Injection Methods, and Fault Attacks. IEEE Design & Test of Computers 24(6): 544-545 (2007)
152EEFrançois-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater: FPGA implementations of the ICEBERG block cipher. Integration 40(1): 20-27 (2007)
151EEEric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater: Power and electromagnetic analysis: Improved model, consequences and comparisons. Integration 40(1): 52-60 (2007)
150EEGuerric Meurice de Dormale, Jean-Jacques Quisquater: High-speed hardware implementations of Elliptic Curve Cryptography: A survey. Journal of Systems Architecture 53(2-3): 72-84 (2007)
2006
149EEFrançois-Xavier Standaert, François Macé, Eric Peeters, Jean-Jacques Quisquater: Updates on the Security of FPGAs Against Power Analysis Attacks. ARC 2006: 335-346
148EEGuerric Meurice de Dormale, Jean-Jacques Quisquater: Iterative Modular Division over GF(2m): Novel Algorithm and Implementations on FPGA. ARC 2006: 370-382
147EEGuerric Meurice de Dormale, Renaud Ambroise, David Bol, Jean-Jacques Quisquater, Jean-Didier Legat: Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards. ASAP 2006: 347-353
146EEFrançois-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater: SEA: A Scalable Encryption Algorithm for Small Embedded Applications. CARDIS 2006: 222-236
145EECédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater: Template Attacks in Principal Subspaces. CHES 2006: 1-14
144EEFrançois-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater: Towards Security Limits in Side-Channel Attacks. CHES 2006: 30-45
143EEOmkant Pandey, Julien Cathalo, Jean-Jacques Quisquater: Fair Identification. CT-RSA 2006: 52-63
142EEFrançois-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater: FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks. FPL 2006: 1-4
141EEBenoît Libert, Jean-Jacques Quisquater, Moti Yung: Efficient Intrusion-Resilient Signatures Without Random Oracles. Inscrypt 2006: 27-41
140EEBenoît Libert, Jean-Jacques Quisquater: On Constructing Certificateless Cryptosystems from Identity Based Encryption. Public Key Cryptography 2006: 474-490
139EEFabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater: Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. SCN 2006: 63-77
138EEAntonin Descampe, F.-O. Devaux, Gaël Rouvroy, Jean-Didier Legat, Jean-Jacques Quisquater, Benoit M. Macq: A Flexible Hardware JPEG 2000 Decoder for Digital Cinema. IEEE Trans. Circuits Syst. Video Techn. 16(11): 1397-1410 (2006)
137EEOlivier Pereira, Jean-Jacques Quisquater: On the impossibility of building secure Cliques-type authenticated group key agreement protocols. Journal of Computer Security 14(2): 197-246 (2006)
2005
136EEBenoît Libert, Jean-Jacques Quisquater: Identity Based Encryption Without Redundancy. ACNS 2005: 285-300
135EEPaulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater: Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. ASIACRYPT 2005: 515-532
134EEEric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater: Improved Higher-Order Side-Channel Attacks with FPGA Experiments. CHES 2005: 309-323
133EEJulien Cathalo, Benoît Libert, Jean-Jacques Quisquater: Efficient and Non-interactive Timed-Release Encryption. ICICS 2005: 291-303
132EEVipul Goyal, Abhishek Jain, Jean-Jacques Quisquater: Improvements to Mitchell's Remote User Authentication Protocol. ICISC 2005: 69-80
131EEFrançois-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater: FPGA Implementations of the ICEBERG Block Cipher. ITCC (1) 2005: 556-561
130EEFrançois-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater: On the Masking Countermeasure and Higher-Order Power Analysis Attacks. ITCC (1) 2005: 562-567
129EEFrançois-Xavier Standaert, Frédéric Lefèbvre, Gaël Rouvroy, Benoit M. Macq, Jean-Jacques Quisquater, Jean-Didier Legat: Practical Evaluation of a Radial Soft Hash Algorithm. ITCC (2) 2005: 89-94
128EEFrançois Macé, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: A Design Methodology for Secured ICs Using Dynamic Current Mode Logic. PATMOS 2005: 550-560
127EENidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater: Authentication protocols for ad hoc networks: taxonomy and research issues. Q2SWinet 2005: 96-104
126EEJean-Jacques Quisquater: Eavesdropper. Encyclopedia of Cryptography and Security 2005
125EEJean-Jacques Quisquater, David Samyde: Electromagnetic Attack. Encyclopedia of Cryptography and Security 2005
124EEBenoît Libert, Jean-Jacques Quisquater: Identity-Based Cryptosystems. Encyclopedia of Cryptography and Security 2005
123EEJean-Jacques Quisquater, David Samyde: Radio Frequency Attacks. Encyclopedia of Cryptography and Security 2005
122EEJean-Jacques Quisquater, François-Xavier Standaert: Time-memory tradeoffs. Encyclopedia of Cryptography and Security 2005
2004
121 Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam: Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France Kluwer 2004
120 Marc Joye, Jean-Jacques Quisquater: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings Springer 2004
119 Gilles Piret, François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater: On the Security of the DeKaRT Primitive. CARDIS 2004: 241-254
118EEOlivier Pereira, Jean-Jacques Quisquater: Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. CSFW 2004: 16-19
117EEBenoît Libert, Jean-Jacques Quisquater: Identity Based Undeniable Signatures. CT-RSA 2004: 112-125
116EEGaël Rouvroy, François-Xavier Standaert, Frédéric Lefèbvre, Jean-Jacques Quisquater, Benoit M. Macq, Jean-Didier Legat: Reconfigurable hardware solutions for the digital rights management of digital cinema. Digital Rights Management Workshop 2004: 40-53
115EEBenoît Libert, Jean-Jacques Quisquater: What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. EuroPKI 2004: 57-70
114EEGuerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater: Efficient Modular Division Implementation: ECC over GF(p) Affine Coordinates Application. FPL 2004: 231-240
113EEFrançois-Xavier Standaert, Siddika Berna Örs, Jean-Jacques Quisquater, Bart Preneel: Power Analysis Attacks Against FPGA Implementations of the DES. FPL 2004: 84-94
112EEFrançois-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat: ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. FSE 2004: 279-299
111EEJulien Cathalo, Benoît Libert, Jean-Jacques Quisquater: Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. ISC 2004: 52-60
110EEGaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. ITCC (2) 2004: 583-587
109EEBenoît Libert, Jean-Jacques Quisquater: Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. Public Key Cryptography 2004: 187-200
108EEBenoît Libert, Jean-Jacques Quisquater: Improved Signcryption from q-Diffie-Hellman Problems. SCN 2004: 220-234
107EEGilles Piret, Jean-Jacques Quisquater: Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. Selected Areas in Cryptography 2004: 100-113
2003
106EEJulien Cathalo, François Koeune, Jean-Jacques Quisquater: A New Type of Timing Attack: Application to GPS. CHES 2003: 291-303
105EEFrançois-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat: Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. CHES 2003: 334-350
104EEGilles Piret, Jean-Jacques Quisquater: A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. CHES 2003: 77-88
103EEAnand Raghunathan, Srivaths Ravi, Sunil Hattangady, Jean-Jacques Quisquater: Securing Mobile Appliances: New Challenges for the System Designer. DATE 2003: 10176-10183
102EEMathieu Ciet, Tanja Lange, Francesco Sica, Jean-Jacques Quisquater: Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms. EUROCRYPT 2003: 388-400
101EEFrançois-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat: A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL. FPGA 2003: 216-224
100EEGaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES. FPGA 2003: 247
99EEGaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES. FPL 2003: 181-193
98EEFrançois-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, David Samyde, Jean-Jacques Quisquater: Power Analysis of FPGAs: How Practical is the Attack? FPL 2003: 701-711
97EEMichael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater: Memories: A Survey of Their Secure Uses in Smart Cards. IEEE Security in Storage Workshop 2003: 62-72
96EEGaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: Efficient FPGA Implementation of Block Cipher MISTY1. IPDPS 2003: 185
95EEBenoît Libert, Jean-Jacques Quisquater: Efficient revocation and threshold pairing based cryptosystems. PODC 2003: 163-171
94EEAmaury Nève, Denis Flandre, Jean-Jacques Quisquater: SOI Technology for Future High-Performance Smart Cards. IEEE Micro 23(3): 58-67 (2003)
93EEGaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat: Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. IEEE Trans. Computers 52(4): 473-482 (2003)
92 Olivier Pereira, Jean-Jacques Quisquater: Some Attacks Upon Authenticated Group Key Agreement Protocols. Journal of Computer Security 11(4): 555-580 (2003)
2002
91EEJean-Jacques Quisquater, David Samyde: Automatic Code Recognition for Smartcards Using a Kohonen Neural Network. CARDIS 2002
90 Jean-Jacques Quisquater: Awards. CARDIS 2002
89EEJean-Jacques Quisquater: CHES: Past, Present, and Future. CHES 2002: 1
88EEMathieu Ciet, Jean-Jacques Quisquater, Francesco Sica: Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. CHES 2002: 540-550
87EEFrançois-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat: A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results. CHES 2002: 593-609
86EEMarc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung: Observability Analysis - Detecting When Improved Cryptosystems Fail. CT-RSA 2002: 17-29
85EEJean-Jacques Quisquater, François-Xavier Standaert, Gaël Rouvroy, Jean-Pierre David, Jean-Didier Legat: A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation. FPL 2002: 780-789
84EEFrançois Koeune, Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Pierre David, Jean-Didier Legat: An FPGA Implementation of the Linear Cryptanalysis. FPL 2002: 845-852
83EEDavid Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater: On a New Way to Read Data from Memory. IEEE Security in Storage Workshop 2002: 65-69
82EEFrancesco Sica, Mathieu Ciet, Jean-Jacques Quisquater: Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. Selected Areas in Cryptography 2002: 21-36
2001
81EEEmmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater: Provably authenticated group Diffie-Hellman key exchange. ACM Conference on Computer and Communications Security 2001: 255-264
80EEMarc Joye, Jean-Jacques Quisquater: Hessian Elliptic Curves and Side-Channel Attacks. CHES 2001: 402-410
79EEOlivier Pereira, Jean-Jacques Quisquater: A Security Analysis of the Cliques Protocols Suites. CSFW 2001: 73-81
78EEMarc Joye, Jean-Jacques Quisquater, Moti Yung: On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. CT-RSA 2001: 208-222
77EEJean-Jacques Quisquater, David Samyde: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. E-smart 2001: 200-210
76EEWerner Schindler, François Koeune, Jean-Jacques Quisquater: Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. IMA Int. Conf. 2001: 245-267
75EEMarc Joye, Jean-Jacques Quisquater: On Rabin-Type Signatures. IMA Int. Conf. 2001: 99-113
74EEMathieu Ciet, Jean-Jacques Quisquater, Francesco Sica: A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. INDOCRYPT 2001: 108-116
73 Olivier Pereira, Jean-Jacques Quisquater: Security Analysis of the Cliques Protocols Suites: First Results. SEC 2001: 151-166
72EELouis C. Guillou, Michel Ugon, Jean-Jacques Quisquater: Cryptographic authentication protocols for smart cards. Computer Networks 36(4): 437-451 (2001)
71 Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi: How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. Des. Codes Cryptography 23(3): 297-316 (2001)
2000
70 Jean-Jacques Quisquater, Bruce Schneier: Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings Springer 2000
69 Gaël Hachez, François Koeune, Jean-Jacques Quisquater: Biometrics, Access Control, Smart Cards: A not so Simple Combination. CARDIS 2000: 273-288
68EEGaël Hachez, Jean-Jacques Quisquater: Montgomery Exponentiation with no Final Subtractions: Improved Results. CHES 2000: 293-301
67EEGaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot: Towards a Practical Secure Framework for Mobile Code Commerce. ISW 2000: 164-178
1999
66EEXavier Verians, Jean-Didier Legat, Jean-Jacques Quisquater, Benoit M. Macq: A New Parallelism Management Scheme for Multiprocessor Systems. ACPC 1999: 246-256
65EETanguy Gilmont, Jean-Didier Legat, Jean-Jacques Quisquater: Enhancing Security in the Memory Management Unit. EUROMICRO 1999: 1449-
64EEXavier Verians, Jean-Didier Legat, Jean-Jacques Quisquater, Benoit M. Macq: A Graph-Oriented Task Manager for Small Multiprocessor Systems. Euro-Par 1999: 735-744
63 Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater: Robust Object Watermarking: Application to Code. Information Hiding 1999: 368-378
62 Yvo Desmedt, Tri Van Le, Jean-Jacques Quisquater: Nonbinary Audio Cryptography. Information Hiding 1999: 478-489
61EEJean-Marie Kabasele-Tenday, Jean-Jacques Quisquater, Marc Lobelle: Deriving a Role-Based Access Control Model from the OBBAC Model. WETICE 1999: 147-151
60EEHenri Massias, X. Serret Avila, Jean-Jacques Quisquater: Timestamps: Main Issues on Their Use and Implementation. WETICE 1999: 178-183
59EEMarc Joye, Arjen K. Lenstra, Jean-Jacques Quisquater: Chinese Remaindering Based Cryptosystems in the Presence of Faults. J. Cryptology 12(4): 241-245 (1999)
1998
58 Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Springer 1998
57EEYvo Desmedt, Shuang Hou, Jean-Jacques Quisquater: Audio and Optical Cryptography. ASIACRYPT 1998: 392-404
56 Jean-François Dhem, François Koeune, Philippe-Alexandre Leroux, Patrick Mestré, Jean-Jacques Quisquater, Jean-Louis Willems: A Practical Implementation of the Timing Attack. CARDIS 1998: 167-182
55 Jean-François Dhem, Jean-Jacques Quisquater: Recent Results on Modular Multiplications for Smart Cards. CARDIS 1998: 336-352
54EEGérard Eizenberg, Jean-Jacques Quisquater: Panel Session: Watermarking. ESORICS 1998: 275
53EEYvo Desmedt, Shuang Hou, Jean-Jacques Quisquater: Cerebral Cryptography. Information Hiding 1998: 62-72
52EEV. Darmstaedter, Jean-François Delaigle, Jean-Jacques Quisquater, Benoit M. Macq: Low cost spatial watermarking. Computers & Graphics 22(4): 417-424 (1998)
51 Marc Joye, Jean-Jacques Quisquater: Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams. Des. Codes Cryptography 14(1): 53-56 (1998)
50EEHenri Gilbert, Dipankar Gupta, Andrew M. Odlyzko, Jean-Jacques Quisquater: Attacks on Shamir's `RSA for Paranoids'. Inf. Process. Lett. 68(4): 197-199 (1998)
1997
49EEMarc Joye, Jean-Jacques Quisquater: On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack. ACM Conference on Computer and Communications Security 1997: 135-141
48 Jean-François Delaigle, Christophe De Vleeschouwer, Francois Goffin, Benoit M. Macq, Jean-Jacques Quisquater: Low Cost Watermarking Based on a Human Vision Model. ECMAST 1997: 153-167
47 Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater: A new and optimal chosen-message attack on RSA-type cryptosystems. ICICS 1997: 302-313
46 Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng: RSA-type Signatures in the Presence of Transient Faults. IMA Int. Conf. 1997: 155-160
45 Francois Goffin, Jean-François Delaigle, Christophe De Vleeschouwer, Benoit M. Macq, Jean-Jacques Quisquater: Low-Cost Perceptive Digital Picture Watermarking Method. Storage and Retrieval for Image and Video Databases (SPIE) 1997: 264-277
44 Jean-Jacques Quisquater, Benoit M. Macq, Marc Joye, N. Degand, A. Bernard: Practical Solution to Authentication of Images with a Secure Camera. Storage and Retrieval for Image and Video Databases (SPIE) 1997: 290-297
43 Jean-Jacques Quisquater, Marc Joye: Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences. Journal of Computer Security 5(3): 213-224 (1997)
1996
42 Renaud Lecat, Jean-Jacques Quisquater: Efficient Compression Algorithms for Smart Cards. CARDIS 1996
41 Ronald Ferreira, Ralf Malzahn, Peter Marissen, Jean-Jacques Quisquater, Thomas Wille: FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications. CARDIS 1996
40 Pieter H. Hartel, Jean-Jacques Quisquater: Introduction to CARDIS 1996. CARDIS 1996
39EEGérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater: Authors' Rights and Copyright Protection. ESORICS 1996: 324
38 Marc Joye, Jean-Jacques Quisquater: Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves. Security Protocols Workshop 1996: 93-100
1995
37 Louis C. Guillou, Jean-Jacques Quisquater: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding Springer 1995
36 Jean-Marc Boucqueau, Sylvie Lacroix, Benoit M. Macq, Jean-Jacques Quisquater: Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties. COST 237 Workshop 1995: 229-243
35EEPhilippe Béguin, Jean-Jacques Quisquater: Fast Server-Aided RSA Signatures Secure Against Active Attacks. CRYPTO 1995: 57-69
1994
34 Philippe Béguin, Jean-Jacques Quisquater: Secure Acceleration of DSS Signatures Using Insecure Server. ASIACRYPT 1994: 249-259
33EEOlivier Delos, Jean-Jacques Quisquater: An Identity-Based Signature Scheme with Bounded Life-Span. CRYPTO 1994: 83-94
1993
32 Olivier Delos, Jean-Jacques Quisquater: Efficient multi-signature schemes for cooperating entities. Algebraic Coding 1993: 63-74
1992
31 Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings Springer 1992
30EEJean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater: Table of Large (Delta, D)-Graphs. Discrete Applied Mathematics 37/38: 575-577 (1992)
29 Jean-Claude Bermond, Pavol Hell, Jean-Jacques Quisquater: Construction of Large Packet Radio Networks. Parallel Processing Letters 2: 3-12 (1992)
1991
28 Dominique de Waleffe, Jean-Jacques Quisquater: Better Login Protocols for Computer Networks. Computer Security and Industrial Cryptography 1991: 50-70
27 Jean-Jacques Quisquater, Yvo Desmedt: Chinese Lotto as an Exhaustive Code-Breaking Machine. IEEE Computer 24(11): 14-22 (1991)
26 Samy Bengio, Gilles Brassard, Yvo Desmedt, Claude Goutier, Jean-Jacques Quisquater: Secure Implementations of Identification Systems. J. Cryptology 4(3): 175-183 (1991)
1990
25 Jean-Jacques Quisquater, Joos Vandewalle: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings Springer 1990
24EEDominique de Waleffe, Jean-Jacques Quisquater: CORSAIR: A SMART Card for Public Key Cryptosystems. CRYPTO 1990: 502-513
23 Dominique de Waleffe, Jean-Jacques Quisquater: Better Login Protocols for Computer Networks. ESORICS 1990: 163-172
22EELouis C. Guillou, Jean-Jacques Quisquater, Michael Walker, Peter Landrock, Caroline Shafer: Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". EUROCRYPT 1990: 465-473
1989
21EEMarijke De Soete, Jean-Jacques Quisquater, Klaus Vedder: A Signature with Shared Verification Scheme. CRYPTO 1989: 253-262
20EEJean-Jacques Quisquater, Jean-Paul Delescaille: How Easy is Collision Search. New Results and Applications to DES. CRYPTO 1989: 408-413
19EEJean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michaël Quisquater, Louis C. Guillou, Marie Annick Guillou, Gaïd Guillou, Anna Guillou, Gwenolé Guillou, Soazig Guillou, Thomas A. Berson: How to Explain Zero-Knowledge Protocols to Your Children. CRYPTO 1989: 628-631
18EEJean-Jacques Quisquater, Marc Girault: 2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms. EUROCRYPT 1989: 102-109
17EEJean-Jacques Quisquater, Jean-Paul Delescaille: How Easy is Collision Search? Application to DES (Extended Summary). EUROCRYPT 1989: 429-434
16EEJean-Jacques Quisquater, André Bouckaert: Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). EUROCRYPT 1989: 662-664
1988
15EELouis C. Guillou, Jean-Jacques Quisquater: A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. CRYPTO 1988: 216-231
14EELouis C. Guillou, Jean-Jacques Quisquater: A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. EUROCRYPT 1988: 123-128
1987
13EEJean-Jacques Quisquater: Secret Distribution of Keys for Public-Key Systems. CRYPTO 1987: 203-208
12EELouis C. Guillou, Jean-Jacques Quisquater: Efficient Digital Public-Key Signature with Shadow (Abstract). CRYPTO 1987: 223
11EEJean-Jacques Quisquater, Jean-Paul Delescaille: Other Cycling Tests for DES (Abstract). CRYPTO 1987: 255-256
1986
10EEYvo Desmedt, Jean-Jacques Quisquater: Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). CRYPTO 1986: 111-117
9 Yvo Desmedt, Frank Hoornaert, Jean-Jacques Quisquater: Several Exhaustive Key Search Machines and DES. EUROCRYPT 1986: 17-19
8 Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater: Strategies for Interconnection Networks: Some Methods from Graph Theory. J. Parallel Distrib. Comput. 3(4): 433-449 (1986)
1985
7EEJean-Jacques Quisquater, Yvo Desmedt, Marc Davio: The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys). CRYPTO 1985: 537-542
1984
6EEMarc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, Jean-Jacques Quisquater: Efficient Hardware and Software Implementations for the DES. CRYPTO 1984: 144-146
5EEYvo Desmedt, Jean-Jacques Quisquater, Marc Davio: Dependence of Output on Input in DES: Small Avalanche Characteristics. CRYPTO 1984: 359-376
4EEMarc Davio, Yvo Desmedt, Jean-Jacques Quisquater: Propagation Characteristics of the DES. EUROCRYPT 1984: 62-73
1983
3 Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters: Analytical Characteristics of the DES. CRYPTO 1983: 171-202
1982
2 Jean-Claude Bermond, Charles Delorme, Jean-Jacques Quisquater: Tables of Large Graphs with Given Degree and Diameter. Inf. Process. Lett. 15(1): 10-13 (1982)
1973
1 Philippe Delsarte, Jean-Jacques Quisquater: Permutation Cascades with Normalized Cells Information and Control 23(4): 344-356 (1973)

Coauthor Index

1Nidal Aboudagga [127] [167]
2Renaud Ambroise [147]
3Ross J. Anderson [83]
4Cédric Archambeau [144] [145]
5X. Serret Avila [60]
6Gildas Avoine [178]
7Feng Bao [46]
8Paulo S. L. M. Barreto [135]
9John Bass [163] [165]
10Philippe Béguin [34] [35]
11Samy Bengio [26]
12Jean-Claude Bermond [2] [8] [29] [30]
13A. Bernard [44]
14Thomas A. Berson [19]
15Angelos Bilas [171]
16Daniel Bleichenbacher [47]
17David Bol [147]
18Olivier Bonaventure [185]
19André Bouckaert [16]
20Jean-Marc Boucqueau [36]
21Gilles Brassard [26]
22Emmanuel Bresson [81]
23Philippe Bulens [114] [169] [181] [183]
24Jon Callas [177]
25Julio César Hernández Castro [173] [179]
26Julien Cathalo [106] [111] [133] [143]
27Olivier Chevassut [81]
28Mathieu Ciet [74] [82] [88] [102]
29Baudoin Collard [159] [160] [180]
30Luiz A. DaSilva [127]
31V. Darmstaedter [52]
32Jean-Pierre David [84] [85]
33Marc Davio [3] [4] [5] [6] [7]
34N. Degand [44]
35Jean-François Delaigle [45] [48] [52]
36Jean-Paul Delescaille [11] [17] [20]
37Charles Delorme [2] [8] [30]
38Olivier Delos [32] [33]
39Philippe Delsarte [1]
40Robert H. Deng (Robert Huijie Deng) [46]
41Antonin Descampe [138]
42Yvo Desmedt [3] [4] [5] [6] [7] [9] [10] [26] [27] [53] [57] [62] [177]
43Yves Deswarte [31] [58] [121] [172]
44F.-O. Devaux [138]
45Jean-François Dhem [55] [56]
46Josep Domingo-Ferrer [172]
47Nicolas Donckers [134]
48Guerric Meurice de Dormale [114] [147] [148] [150] [163] [165] [166] [169]
49Gérard Eizenberg [31] [39] [54]
50Mohamed Eltoweissy [127] [167]
51Juan M. Estévez-Tapiador [173] [179]
52Ronald Ferreira [41]
53Denis Flandre [94]
54Marc Fosseprez [3]
55Neil Gershenfeld [146]
56Henri Gilbert [50]
57Tanguy Gilmont [65]
58Marc Girault [18]
59Francois Goffin [45] [48]
60Dieter Gollmann [58]
61Dominique Gonthier [39]
62François Gosset [166]
63Jo Goubert [6]
64Claude Goutier [26]
65René Govaerts [3]
66Vipul Goyal [132]
67Anna Guillou [19]
68Gaïd Guillou [19]
69Gwenolé Guillou [19]
70Louis C. Guillou [12] [14] [15] [19] [22] [37] [72]
71Marie Annick Guillou [19]
72Soazig Guillou [19]
73Dipankar Gupta [50]
74Gaël Hachez [63] [67] [68] [69]
75Pieter H. Hartel [40]
76Sunil Hattangady [103]
77Pavol Hell [29]
78Laurent Den Hollander [67]
79Frank Hoornaert [6] [9]
80Shuang Hou [53] [57]
81Jan Hulsbosch [3]
82Abhishek Jain [132]
83Mehrdad Jalali [67]
84Marc Joye [38] [43] [44] [46] [47] [49] [51] [59] [71] [75] [78] [80] [86] [120]
85Jean-Marie Kabasele-Tenday [61]
86Kassem Kalach [178]
87Anas Abou El Kalam [121]
88Alistair Kelman [39]
89Chong Hee Kim [153] [154] [161] [164] [176] [181] [182]
90François Koeune [56] [63] [69] [76] [84] [106] [185]
91Sylvie Lacroix [36]
92Fabien Laguillaumie [139]
93Peter Landrock [22]
94Tanja Lange [102]
95Kristin Lauter [174]
96Tri Van Le [62]
97Renaud Lecat [42]
98Pil Joong Lee [161]
99Frédéric Lefèbvre [116] [129]
100Jean-Didier Legat [64] [65] [66] [84] [85] [87] [93] [96] [99] [100] [101] [105] [110] [112] [116] [128] [129] [138] [147]
101Arjen K. Lenstra [59]
102Philippe-Alexandre Leroux [56]
103Damien Leroy [185]
104Benoît Libert [95] [108] [109] [111] [115] [117] [124] [133] [135] [136] [139] [140] [141] [157] [158] [170] [175]
105Marc Lobelle [61]
106François Macé [128] [149] [168]
107Benoit M. Macq (Benoît Macq) [36] [44] [45] [48] [52] [64] [66] [116] [129] [138]
108Ralf Malzahn [41]
109Mark Manulis [185]
110Peter Marissen [41]
111Constantinos Markantonakis [171]
112Olivier de Marneffe [155] [162]
113Antoni Martínez-Ballesté [172]
114Henri Massias [60]
115Noel McCullagh [135]
116Catherine Meadows [58]
117Patrick Mestré [56]
118Giacomo de Meulenaer [166]
119Daniel Nagy [177]
120Patrik Neutjens [3]
121Amaury Nève [94]
122Michael Neve [97]
123Andrew M. Odlyzko [50]
124Loïc van Oldeneel tot Oldenzeel [98]
125Siddika Berna Örs [113]
126Akira Otsuka [177]
127Omkant Pandey [143]
128Pierre Paradinas [121]
129Eric Peeters [97] [130] [134] [144] [145] [149] [151]
130Pascal Pellegrin [183]
131Olivier Pereira [73] [79] [92] [118] [137] [155] [162]
132Pedro Peris-Lopez [173]
133Christophe Petit [174] [181] [184]
134Gilles Piret [104] [107] [112] [119] [131] [146] [152]
135Philippe Piret [3]
136David Pointcheval [81]
137Bart Preneel [113]
138Michaël Quisquater [19]
139Muriel Quisquater [19]
140Myriam Quisquater [19]
141Anand Raghunathan [103]
142Srivaths Ravi [103]
143M. Tamer Refaei [127]
144Gaël Rouvroy [84] [85] [87] [93] [96] [99] [100] [101] [105] [110] [112] [116] [119] [129] [131] [138] [142] [152] [183]
145David Samyde [77] [83] [91] [97] [98] [123] [125]
146Damien Sauveron [171]
147Werner Schindler [76]
148Bruce Schneier [70]
149Francesc Sebé [172]
150Caroline Shafer [22]
151Jong Hoon Shin [161]
152Francesco Sica [74] [82] [88] [102]
153Sergei P. Skorobogatov [83]
154Marijke De Soete [21]
155François-Xavier Standaert [84] [85] [87] [93] [96] [98] [99] [100] [101] [105] [110] [112] [113] [116] [119] [122] [128] [129] [130] [131] [134] [142] [144] [145] [146] [149] [151] [152] [159] [160] [168] [180] [183]
156Julien P. Stern [63]
157Tsuyoshi Takagi [71]
158Jean-Pierre Tillich [184]
159Michel Ugon [72]
160Joos Vandewalle [3] [25]
161Christophe Vasserot [67]
162Klaus Vedder [21]
163Xavier Verians [64] [66]
164Christophe De Vleeschouwer [45] [48]
165Dominique de Waleffe [23] [24] [28]
166Michael Walker [22]
167Thomas Wille [41]
168Jean-Louis Willems [56]
169Pascal Wouters [3]
170Sung-Ming Yen [86]
171Moti Yung (Mordechai M. Yung) [78] [86] [141] [157] [170] [175] [177]
172Gilles Zémor [184]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)