2009 |
185 | EE | Mark Manulis,
Damien Leroy,
François Koeune,
Olivier Bonaventure,
Jean-Jacques Quisquater:
Authenticated wireless roaming via tunnels: making mobile guests feel at home.
ASIACCS 2009: 92-103 |
184 | EE | Christophe Petit,
Jean-Jacques Quisquater,
Jean-Pierre Tillich,
Gilles Zémor:
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security.
CT-RSA 2009: 182-194 |
2008 |
183 | EE | Philippe Bulens,
François-Xavier Standaert,
Jean-Jacques Quisquater,
Pascal Pellegrin,
Gaël Rouvroy:
Implementation of the AES-128 on Virtex-5 FPGAs.
AFRICACRYPT 2008: 16-26 |
182 | EE | Chong Hee Kim,
Jean-Jacques Quisquater:
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough.
CARDIS 2008: 48-60 |
181 | EE | Chong Hee Kim,
Philippe Bulens,
Christophe Petit,
Jean-Jacques Quisquater:
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes.
EuroPKI 2008: 182-195 |
180 | EE | Baudoin Collard,
François-Xavier Standaert,
Jean-Jacques Quisquater:
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent.
FSE 2008: 382-397 |
179 | EE | Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Jean-Jacques Quisquater:
On the Salsa20 Core Function.
FSE 2008: 462-469 |
178 | EE | Gildas Avoine,
Kassem Kalach,
Jean-Jacques Quisquater:
ePassport: Securing International Contacts with Contactless Chips.
Financial Cryptography 2008: 141-155 |
177 | EE | Jon Callas,
Yvo Desmedt,
Daniel Nagy,
Akira Otsuka,
Jean-Jacques Quisquater,
Moti Yung:
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Financial Cryptography 2008: 307-313 |
176 | EE | Chong Hee Kim,
Jean-Jacques Quisquater:
Method for Detecting Vulnerability to Doubling Attacks.
ICICS 2008: 97-110 |
175 | EE | Benoît Libert,
Jean-Jacques Quisquater,
Moti Yung:
Key Evolution Systems in Untrusted Update Environments.
Inscrypt 2008: 12-21 |
174 | EE | Christophe Petit,
Kristin Lauter,
Jean-Jacques Quisquater:
Full Cryptanalysis of LPS and Morgenstern Hash Functions.
SCN 2008: 263-277 |
173 | EE | Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Pedro Peris-Lopez,
Jean-Jacques Quisquater:
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
CoRR abs/0811.4257: (2008) |
172 | EE | Francesc Sebé,
Josep Domingo-Ferrer,
Antoni Martínez-Ballesté,
Yves Deswarte,
Jean-Jacques Quisquater:
Efficient Remote Data Possession Checking in Critical Information Infrastructures.
IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008) |
2007 |
171 | | Damien Sauveron,
Constantinos Markantonakis,
Angelos Bilas,
Jean-Jacques Quisquater:
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings
Springer 2007 |
170 | EE | Benoît Libert,
Jean-Jacques Quisquater,
Moti Yung:
Forward-secure signatures in untrusted update environments: efficient and generic constructions.
ACM Conference on Computer and Communications Security 2007: 266-275 |
169 | EE | Guerric Meurice de Dormale,
Philippe Bulens,
Jean-Jacques Quisquater:
Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA.
CHES 2007: 378-393 |
168 | EE | François Macé,
François-Xavier Standaert,
Jean-Jacques Quisquater:
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles.
CHES 2007: 427-442 |
167 | EE | Nidal Aboudagga,
Mohamed Eltoweissy,
Jean-Jacques Quisquater:
Two-level signature delegation for mobile first responder authentication.
CollaborateCom 2007: 16-23 |
166 | EE | Giacomo de Meulenaer,
François Gosset,
Guerric Meurice de Dormale,
Jean-Jacques Quisquater:
Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware.
FCCM 2007: 197-206 |
165 | EE | Guerric Meurice de Dormale,
John Bass,
Jean-Jacques Quisquater:
On Solving RC5 Challenges with FPGAs.
FCCM 2007: 281-282 |
164 | EE | Chong Hee Kim,
Jean-Jacques Quisquater:
How can we overcome both side channel analysis and fault attacks on RSA-CRT?
FDTC 2007: 21-29 |
163 | EE | Guerric Meurice de Dormale,
John Bass,
Jean-Jacques Quisquater:
Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --.
FPL 2007: 642-647 |
162 | EE | Olivier de Marneffe,
Olivier Pereira,
Jean-Jacques Quisquater:
Simulation-based analysis of E2E voting systems.
Frontiers of Electronic Voting 2007 |
161 | EE | Chong Hee Kim,
Jong Hoon Shin,
Jean-Jacques Quisquater,
Pil Joong Lee:
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.
ICISC 2007: 273-281 |
160 | EE | Baudoin Collard,
François-Xavier Standaert,
Jean-Jacques Quisquater:
Improving the Time Complexity of Matsui's Linear Cryptanalysis.
ICISC 2007: 77-88 |
159 | EE | Baudoin Collard,
François-Xavier Standaert,
Jean-Jacques Quisquater:
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent.
Inscrypt 2007: 51-65 |
158 | EE | Benoît Libert,
Jean-Jacques Quisquater:
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps.
Pairing 2007: 23-38 |
157 | EE | Benoît Libert,
Jean-Jacques Quisquater,
Moti Yung:
Parallel Key-Insulated Public Key Encryption Without Random Oracles.
Public Key Cryptography 2007: 298-314 |
156 | EE | Jean-Jacques Quisquater:
The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults?
SSS 2007: 1 |
155 | EE | Olivier de Marneffe,
Olivier Pereira,
Jean-Jacques Quisquater:
Simulation-Based Analysis of E2E Voting Systems.
VOTE-ID 2007: 137-149 |
154 | EE | Chong Hee Kim,
Jean-Jacques Quisquater:
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures.
WISTP 2007: 215-228 |
153 | EE | Chong Hee Kim,
Jean-Jacques Quisquater:
Faults, Injection Methods, and Fault Attacks.
IEEE Design & Test of Computers 24(6): 544-545 (2007) |
152 | EE | François-Xavier Standaert,
Gilles Piret,
Gaël Rouvroy,
Jean-Jacques Quisquater:
FPGA implementations of the ICEBERG block cipher.
Integration 40(1): 20-27 (2007) |
151 | EE | Eric Peeters,
François-Xavier Standaert,
Jean-Jacques Quisquater:
Power and electromagnetic analysis: Improved model, consequences and comparisons.
Integration 40(1): 52-60 (2007) |
150 | EE | Guerric Meurice de Dormale,
Jean-Jacques Quisquater:
High-speed hardware implementations of Elliptic Curve Cryptography: A survey.
Journal of Systems Architecture 53(2-3): 72-84 (2007) |
2006 |
149 | EE | François-Xavier Standaert,
François Macé,
Eric Peeters,
Jean-Jacques Quisquater:
Updates on the Security of FPGAs Against Power Analysis Attacks.
ARC 2006: 335-346 |
148 | EE | Guerric Meurice de Dormale,
Jean-Jacques Quisquater:
Iterative Modular Division over GF(2m): Novel Algorithm and Implementations on FPGA.
ARC 2006: 370-382 |
147 | EE | Guerric Meurice de Dormale,
Renaud Ambroise,
David Bol,
Jean-Jacques Quisquater,
Jean-Didier Legat:
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards.
ASAP 2006: 347-353 |
146 | EE | François-Xavier Standaert,
Gilles Piret,
Neil Gershenfeld,
Jean-Jacques Quisquater:
SEA: A Scalable Encryption Algorithm for Small Embedded Applications.
CARDIS 2006: 222-236 |
145 | EE | Cédric Archambeau,
Eric Peeters,
François-Xavier Standaert,
Jean-Jacques Quisquater:
Template Attacks in Principal Subspaces.
CHES 2006: 1-14 |
144 | EE | François-Xavier Standaert,
Eric Peeters,
Cédric Archambeau,
Jean-Jacques Quisquater:
Towards Security Limits in Side-Channel Attacks.
CHES 2006: 30-45 |
143 | EE | Omkant Pandey,
Julien Cathalo,
Jean-Jacques Quisquater:
Fair Identification.
CT-RSA 2006: 52-63 |
142 | EE | François-Xavier Standaert,
Gaël Rouvroy,
Jean-Jacques Quisquater:
FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks.
FPL 2006: 1-4 |
141 | EE | Benoît Libert,
Jean-Jacques Quisquater,
Moti Yung:
Efficient Intrusion-Resilient Signatures Without Random Oracles.
Inscrypt 2006: 27-41 |
140 | EE | Benoît Libert,
Jean-Jacques Quisquater:
On Constructing Certificateless Cryptosystems from Identity Based Encryption.
Public Key Cryptography 2006: 474-490 |
139 | EE | Fabien Laguillaumie,
Benoît Libert,
Jean-Jacques Quisquater:
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions.
SCN 2006: 63-77 |
138 | EE | Antonin Descampe,
F.-O. Devaux,
Gaël Rouvroy,
Jean-Didier Legat,
Jean-Jacques Quisquater,
Benoit M. Macq:
A Flexible Hardware JPEG 2000 Decoder for Digital Cinema.
IEEE Trans. Circuits Syst. Video Techn. 16(11): 1397-1410 (2006) |
137 | EE | Olivier Pereira,
Jean-Jacques Quisquater:
On the impossibility of building secure Cliques-type authenticated group key agreement protocols.
Journal of Computer Security 14(2): 197-246 (2006) |
2005 |
136 | EE | Benoît Libert,
Jean-Jacques Quisquater:
Identity Based Encryption Without Redundancy.
ACNS 2005: 285-300 |
135 | EE | Paulo S. L. M. Barreto,
Benoît Libert,
Noel McCullagh,
Jean-Jacques Quisquater:
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps.
ASIACRYPT 2005: 515-532 |
134 | EE | Eric Peeters,
François-Xavier Standaert,
Nicolas Donckers,
Jean-Jacques Quisquater:
Improved Higher-Order Side-Channel Attacks with FPGA Experiments.
CHES 2005: 309-323 |
133 | EE | Julien Cathalo,
Benoît Libert,
Jean-Jacques Quisquater:
Efficient and Non-interactive Timed-Release Encryption.
ICICS 2005: 291-303 |
132 | EE | Vipul Goyal,
Abhishek Jain,
Jean-Jacques Quisquater:
Improvements to Mitchell's Remote User Authentication Protocol.
ICISC 2005: 69-80 |
131 | EE | François-Xavier Standaert,
Gilles Piret,
Gaël Rouvroy,
Jean-Jacques Quisquater:
FPGA Implementations of the ICEBERG Block Cipher.
ITCC (1) 2005: 556-561 |
130 | EE | François-Xavier Standaert,
Eric Peeters,
Jean-Jacques Quisquater:
On the Masking Countermeasure and Higher-Order Power Analysis Attacks.
ITCC (1) 2005: 562-567 |
129 | EE | François-Xavier Standaert,
Frédéric Lefèbvre,
Gaël Rouvroy,
Benoit M. Macq,
Jean-Jacques Quisquater,
Jean-Didier Legat:
Practical Evaluation of a Radial Soft Hash Algorithm.
ITCC (2) 2005: 89-94 |
128 | EE | François Macé,
François-Xavier Standaert,
Jean-Jacques Quisquater,
Jean-Didier Legat:
A Design Methodology for Secured ICs Using Dynamic Current Mode Logic.
PATMOS 2005: 550-560 |
127 | EE | Nidal Aboudagga,
M. Tamer Refaei,
Mohamed Eltoweissy,
Luiz A. DaSilva,
Jean-Jacques Quisquater:
Authentication protocols for ad hoc networks: taxonomy and research issues.
Q2SWinet 2005: 96-104 |
126 | EE | Jean-Jacques Quisquater:
Eavesdropper.
Encyclopedia of Cryptography and Security 2005 |
125 | EE | Jean-Jacques Quisquater,
David Samyde:
Electromagnetic Attack.
Encyclopedia of Cryptography and Security 2005 |
124 | EE | Benoît Libert,
Jean-Jacques Quisquater:
Identity-Based Cryptosystems.
Encyclopedia of Cryptography and Security 2005 |
123 | EE | Jean-Jacques Quisquater,
David Samyde:
Radio Frequency Attacks.
Encyclopedia of Cryptography and Security 2005 |
122 | EE | Jean-Jacques Quisquater,
François-Xavier Standaert:
Time-memory tradeoffs.
Encyclopedia of Cryptography and Security 2005 |
2004 |
121 | | Jean-Jacques Quisquater,
Pierre Paradinas,
Yves Deswarte,
Anas Abou El Kalam:
Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France
Kluwer 2004 |
120 | | Marc Joye,
Jean-Jacques Quisquater:
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings
Springer 2004 |
119 | | Gilles Piret,
François-Xavier Standaert,
Gaël Rouvroy,
Jean-Jacques Quisquater:
On the Security of the DeKaRT Primitive.
CARDIS 2004: 241-254 |
118 | EE | Olivier Pereira,
Jean-Jacques Quisquater:
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols.
CSFW 2004: 16-19 |
117 | EE | Benoît Libert,
Jean-Jacques Quisquater:
Identity Based Undeniable Signatures.
CT-RSA 2004: 112-125 |
116 | EE | Gaël Rouvroy,
François-Xavier Standaert,
Frédéric Lefèbvre,
Jean-Jacques Quisquater,
Benoit M. Macq,
Jean-Didier Legat:
Reconfigurable hardware solutions for the digital rights management of digital cinema.
Digital Rights Management Workshop 2004: 40-53 |
115 | EE | Benoît Libert,
Jean-Jacques Quisquater:
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved.
EuroPKI 2004: 57-70 |
114 | EE | Guerric Meurice de Dormale,
Philippe Bulens,
Jean-Jacques Quisquater:
Efficient Modular Division Implementation: ECC over GF(p) Affine Coordinates Application.
FPL 2004: 231-240 |
113 | EE | François-Xavier Standaert,
Siddika Berna Örs,
Jean-Jacques Quisquater,
Bart Preneel:
Power Analysis Attacks Against FPGA Implementations of the DES.
FPL 2004: 84-94 |
112 | EE | François-Xavier Standaert,
Gilles Piret,
Gaël Rouvroy,
Jean-Jacques Quisquater,
Jean-Didier Legat:
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware.
FSE 2004: 279-299 |
111 | EE | Julien Cathalo,
Benoît Libert,
Jean-Jacques Quisquater:
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA.
ISC 2004: 52-60 |
110 | EE | Gaël Rouvroy,
François-Xavier Standaert,
Jean-Jacques Quisquater,
Jean-Didier Legat:
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications.
ITCC (2) 2004: 583-587 |
109 | EE | Benoît Libert,
Jean-Jacques Quisquater:
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups.
Public Key Cryptography 2004: 187-200 |
108 | EE | Benoît Libert,
Jean-Jacques Quisquater:
Improved Signcryption from q-Diffie-Hellman Problems.
SCN 2004: 220-234 |
107 | EE | Gilles Piret,
Jean-Jacques Quisquater:
Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results.
Selected Areas in Cryptography 2004: 100-113 |
2003 |
106 | EE | Julien Cathalo,
François Koeune,
Jean-Jacques Quisquater:
A New Type of Timing Attack: Application to GPS.
CHES 2003: 291-303 |
105 | EE | François-Xavier Standaert,
Gaël Rouvroy,
Jean-Jacques Quisquater,
Jean-Didier Legat:
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs.
CHES 2003: 334-350 |
104 | EE | Gilles Piret,
Jean-Jacques Quisquater:
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD.
CHES 2003: 77-88 |
103 | EE | Anand Raghunathan,
Srivaths Ravi,
Sunil Hattangady,
Jean-Jacques Quisquater:
Securing Mobile Appliances: New Challenges for the System Designer.
DATE 2003: 10176-10183 |
102 | EE | Mathieu Ciet,
Tanja Lange,
Francesco Sica,
Jean-Jacques Quisquater:
Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms.
EUROCRYPT 2003: 388-400 |
101 | EE | François-Xavier Standaert,
Gaël Rouvroy,
Jean-Jacques Quisquater,
Jean-Didier Legat:
A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL.
FPGA 2003: 216-224 |
100 | EE | Gaël Rouvroy,
François-Xavier Standaert,
Jean-Jacques Quisquater,
Jean-Didier Legat:
Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES.
FPGA 2003: 247 |
99 | EE | Gaël Rouvroy,
François-Xavier Standaert,
Jean-Jacques Quisquater,
Jean-Didier Legat:
Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES.
FPL 2003: 181-193 |
98 | EE | François-Xavier Standaert,
Loïc van Oldeneel tot Oldenzeel,
David Samyde,
Jean-Jacques Quisquater:
Power Analysis of FPGAs: How Practical is the Attack?
FPL 2003: 701-711 |
97 | EE | Michael Neve,
Eric Peeters,
David Samyde,
Jean-Jacques Quisquater:
Memories: A Survey of Their Secure Uses in Smart Cards.
IEEE Security in Storage Workshop 2003: 62-72 |
96 | EE | Gaël Rouvroy,
François-Xavier Standaert,
Jean-Jacques Quisquater,
Jean-Didier Legat:
Efficient FPGA Implementation of Block Cipher MISTY1.
IPDPS 2003: 185 |
95 | EE | Benoît Libert,
Jean-Jacques Quisquater:
Efficient revocation and threshold pairing based cryptosystems.
PODC 2003: 163-171 |
94 | EE | Amaury Nève,
Denis Flandre,
Jean-Jacques Quisquater:
SOI Technology for Future High-Performance Smart Cards.
IEEE Micro 23(3): 58-67 (2003) |
93 | EE | Gaël Rouvroy,
François-Xavier Standaert,
Jean-Jacques Quisquater,
Jean-Didier Legat:
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis.
IEEE Trans. Computers 52(4): 473-482 (2003) |
92 | | Olivier Pereira,
Jean-Jacques Quisquater:
Some Attacks Upon Authenticated Group Key Agreement Protocols.
Journal of Computer Security 11(4): 555-580 (2003) |
2002 |
91 | EE | Jean-Jacques Quisquater,
David Samyde:
Automatic Code Recognition for Smartcards Using a Kohonen Neural Network.
CARDIS 2002 |
90 | | Jean-Jacques Quisquater:
Awards.
CARDIS 2002 |
89 | EE | Jean-Jacques Quisquater:
CHES: Past, Present, and Future.
CHES 2002: 1 |
88 | EE | Mathieu Ciet,
Jean-Jacques Quisquater,
Francesco Sica:
Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication.
CHES 2002: 540-550 |
87 | EE | François-Xavier Standaert,
Gaël Rouvroy,
Jean-Jacques Quisquater,
Jean-Didier Legat:
A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results.
CHES 2002: 593-609 |
86 | EE | Marc Joye,
Jean-Jacques Quisquater,
Sung-Ming Yen,
Moti Yung:
Observability Analysis - Detecting When Improved Cryptosystems Fail.
CT-RSA 2002: 17-29 |
85 | EE | Jean-Jacques Quisquater,
François-Xavier Standaert,
Gaël Rouvroy,
Jean-Pierre David,
Jean-Didier Legat:
A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation.
FPL 2002: 780-789 |
84 | EE | François Koeune,
Gaël Rouvroy,
François-Xavier Standaert,
Jean-Jacques Quisquater,
Jean-Pierre David,
Jean-Didier Legat:
An FPGA Implementation of the Linear Cryptanalysis.
FPL 2002: 845-852 |
83 | EE | David Samyde,
Sergei P. Skorobogatov,
Ross J. Anderson,
Jean-Jacques Quisquater:
On a New Way to Read Data from Memory.
IEEE Security in Storage Workshop 2002: 65-69 |
82 | EE | Francesco Sica,
Mathieu Ciet,
Jean-Jacques Quisquater:
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves.
Selected Areas in Cryptography 2002: 21-36 |
2001 |
81 | EE | Emmanuel Bresson,
Olivier Chevassut,
David Pointcheval,
Jean-Jacques Quisquater:
Provably authenticated group Diffie-Hellman key exchange.
ACM Conference on Computer and Communications Security 2001: 255-264 |
80 | EE | Marc Joye,
Jean-Jacques Quisquater:
Hessian Elliptic Curves and Side-Channel Attacks.
CHES 2001: 402-410 |
79 | EE | Olivier Pereira,
Jean-Jacques Quisquater:
A Security Analysis of the Cliques Protocols Suites.
CSFW 2001: 73-81 |
78 | EE | Marc Joye,
Jean-Jacques Quisquater,
Moti Yung:
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC.
CT-RSA 2001: 208-222 |
77 | EE | Jean-Jacques Quisquater,
David Samyde:
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards.
E-smart 2001: 200-210 |
76 | EE | Werner Schindler,
François Koeune,
Jean-Jacques Quisquater:
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies.
IMA Int. Conf. 2001: 245-267 |
75 | EE | Marc Joye,
Jean-Jacques Quisquater:
On Rabin-Type Signatures.
IMA Int. Conf. 2001: 99-113 |
74 | EE | Mathieu Ciet,
Jean-Jacques Quisquater,
Francesco Sica:
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography.
INDOCRYPT 2001: 108-116 |
73 | | Olivier Pereira,
Jean-Jacques Quisquater:
Security Analysis of the Cliques Protocols Suites: First Results.
SEC 2001: 151-166 |
72 | EE | Louis C. Guillou,
Michel Ugon,
Jean-Jacques Quisquater:
Cryptographic authentication protocols for smart cards.
Computer Networks 36(4): 437-451 (2001) |
71 | | Marc Joye,
Jean-Jacques Quisquater,
Tsuyoshi Takagi:
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves.
Des. Codes Cryptography 23(3): 297-316 (2001) |
2000 |
70 | | Jean-Jacques Quisquater,
Bruce Schneier:
Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings
Springer 2000 |
69 | | Gaël Hachez,
François Koeune,
Jean-Jacques Quisquater:
Biometrics, Access Control, Smart Cards: A not so Simple Combination.
CARDIS 2000: 273-288 |
68 | EE | Gaël Hachez,
Jean-Jacques Quisquater:
Montgomery Exponentiation with no Final Subtractions: Improved Results.
CHES 2000: 293-301 |
67 | EE | Gaël Hachez,
Laurent Den Hollander,
Mehrdad Jalali,
Jean-Jacques Quisquater,
Christophe Vasserot:
Towards a Practical Secure Framework for Mobile Code Commerce.
ISW 2000: 164-178 |
1999 |
66 | EE | Xavier Verians,
Jean-Didier Legat,
Jean-Jacques Quisquater,
Benoit M. Macq:
A New Parallelism Management Scheme for Multiprocessor Systems.
ACPC 1999: 246-256 |
65 | EE | Tanguy Gilmont,
Jean-Didier Legat,
Jean-Jacques Quisquater:
Enhancing Security in the Memory Management Unit.
EUROMICRO 1999: 1449- |
64 | EE | Xavier Verians,
Jean-Didier Legat,
Jean-Jacques Quisquater,
Benoit M. Macq:
A Graph-Oriented Task Manager for Small Multiprocessor Systems.
Euro-Par 1999: 735-744 |
63 | | Julien P. Stern,
Gaël Hachez,
François Koeune,
Jean-Jacques Quisquater:
Robust Object Watermarking: Application to Code.
Information Hiding 1999: 368-378 |
62 | | Yvo Desmedt,
Tri Van Le,
Jean-Jacques Quisquater:
Nonbinary Audio Cryptography.
Information Hiding 1999: 478-489 |
61 | EE | Jean-Marie Kabasele-Tenday,
Jean-Jacques Quisquater,
Marc Lobelle:
Deriving a Role-Based Access Control Model from the OBBAC Model.
WETICE 1999: 147-151 |
60 | EE | Henri Massias,
X. Serret Avila,
Jean-Jacques Quisquater:
Timestamps: Main Issues on Their Use and Implementation.
WETICE 1999: 178-183 |
59 | EE | Marc Joye,
Arjen K. Lenstra,
Jean-Jacques Quisquater:
Chinese Remaindering Based Cryptosystems in the Presence of Faults.
J. Cryptology 12(4): 241-245 (1999) |
1998 |
58 | | Jean-Jacques Quisquater,
Yves Deswarte,
Catherine Meadows,
Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings
Springer 1998 |
57 | EE | Yvo Desmedt,
Shuang Hou,
Jean-Jacques Quisquater:
Audio and Optical Cryptography.
ASIACRYPT 1998: 392-404 |
56 | | Jean-François Dhem,
François Koeune,
Philippe-Alexandre Leroux,
Patrick Mestré,
Jean-Jacques Quisquater,
Jean-Louis Willems:
A Practical Implementation of the Timing Attack.
CARDIS 1998: 167-182 |
55 | | Jean-François Dhem,
Jean-Jacques Quisquater:
Recent Results on Modular Multiplications for Smart Cards.
CARDIS 1998: 336-352 |
54 | EE | Gérard Eizenberg,
Jean-Jacques Quisquater:
Panel Session: Watermarking.
ESORICS 1998: 275 |
53 | EE | Yvo Desmedt,
Shuang Hou,
Jean-Jacques Quisquater:
Cerebral Cryptography.
Information Hiding 1998: 62-72 |
52 | EE | V. Darmstaedter,
Jean-François Delaigle,
Jean-Jacques Quisquater,
Benoit M. Macq:
Low cost spatial watermarking.
Computers & Graphics 22(4): 417-424 (1998) |
51 | | Marc Joye,
Jean-Jacques Quisquater:
Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams.
Des. Codes Cryptography 14(1): 53-56 (1998) |
50 | EE | Henri Gilbert,
Dipankar Gupta,
Andrew M. Odlyzko,
Jean-Jacques Quisquater:
Attacks on Shamir's `RSA for Paranoids'.
Inf. Process. Lett. 68(4): 197-199 (1998) |
1997 |
49 | EE | Marc Joye,
Jean-Jacques Quisquater:
On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack.
ACM Conference on Computer and Communications Security 1997: 135-141 |
48 | | Jean-François Delaigle,
Christophe De Vleeschouwer,
Francois Goffin,
Benoit M. Macq,
Jean-Jacques Quisquater:
Low Cost Watermarking Based on a Human Vision Model.
ECMAST 1997: 153-167 |
47 | | Daniel Bleichenbacher,
Marc Joye,
Jean-Jacques Quisquater:
A new and optimal chosen-message attack on RSA-type cryptosystems.
ICICS 1997: 302-313 |
46 | | Marc Joye,
Jean-Jacques Quisquater,
Feng Bao,
Robert H. Deng:
RSA-type Signatures in the Presence of Transient Faults.
IMA Int. Conf. 1997: 155-160 |
45 | | Francois Goffin,
Jean-François Delaigle,
Christophe De Vleeschouwer,
Benoit M. Macq,
Jean-Jacques Quisquater:
Low-Cost Perceptive Digital Picture Watermarking Method.
Storage and Retrieval for Image and Video Databases (SPIE) 1997: 264-277 |
44 | | Jean-Jacques Quisquater,
Benoit M. Macq,
Marc Joye,
N. Degand,
A. Bernard:
Practical Solution to Authentication of Images with a Secure Camera.
Storage and Retrieval for Image and Video Databases (SPIE) 1997: 290-297 |
43 | | Jean-Jacques Quisquater,
Marc Joye:
Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences.
Journal of Computer Security 5(3): 213-224 (1997) |
1996 |
42 | | Renaud Lecat,
Jean-Jacques Quisquater:
Efficient Compression Algorithms for Smart Cards.
CARDIS 1996 |
41 | | Ronald Ferreira,
Ralf Malzahn,
Peter Marissen,
Jean-Jacques Quisquater,
Thomas Wille:
FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications.
CARDIS 1996 |
40 | | Pieter H. Hartel,
Jean-Jacques Quisquater:
Introduction to CARDIS 1996.
CARDIS 1996 |
39 | EE | Gérard Eizenberg,
Dominique Gonthier,
Alistair Kelman,
Jean-Jacques Quisquater:
Authors' Rights and Copyright Protection.
ESORICS 1996: 324 |
38 | | Marc Joye,
Jean-Jacques Quisquater:
Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves.
Security Protocols Workshop 1996: 93-100 |
1995 |
37 | | Louis C. Guillou,
Jean-Jacques Quisquater:
Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding
Springer 1995 |
36 | | Jean-Marc Boucqueau,
Sylvie Lacroix,
Benoit M. Macq,
Jean-Jacques Quisquater:
Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties.
COST 237 Workshop 1995: 229-243 |
35 | EE | Philippe Béguin,
Jean-Jacques Quisquater:
Fast Server-Aided RSA Signatures Secure Against Active Attacks.
CRYPTO 1995: 57-69 |
1994 |
34 | | Philippe Béguin,
Jean-Jacques Quisquater:
Secure Acceleration of DSS Signatures Using Insecure Server.
ASIACRYPT 1994: 249-259 |
33 | EE | Olivier Delos,
Jean-Jacques Quisquater:
An Identity-Based Signature Scheme with Bounded Life-Span.
CRYPTO 1994: 83-94 |
1993 |
32 | | Olivier Delos,
Jean-Jacques Quisquater:
Efficient multi-signature schemes for cooperating entities.
Algebraic Coding 1993: 63-74 |
1992 |
31 | | Yves Deswarte,
Gérard Eizenberg,
Jean-Jacques Quisquater:
Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings
Springer 1992 |
30 | EE | Jean-Claude Bermond,
Charles Delorme,
Jean-Jacques Quisquater:
Table of Large (Delta, D)-Graphs.
Discrete Applied Mathematics 37/38: 575-577 (1992) |
29 | | Jean-Claude Bermond,
Pavol Hell,
Jean-Jacques Quisquater:
Construction of Large Packet Radio Networks.
Parallel Processing Letters 2: 3-12 (1992) |
1991 |
28 | | Dominique de Waleffe,
Jean-Jacques Quisquater:
Better Login Protocols for Computer Networks.
Computer Security and Industrial Cryptography 1991: 50-70 |
27 | | Jean-Jacques Quisquater,
Yvo Desmedt:
Chinese Lotto as an Exhaustive Code-Breaking Machine.
IEEE Computer 24(11): 14-22 (1991) |
26 | | Samy Bengio,
Gilles Brassard,
Yvo Desmedt,
Claude Goutier,
Jean-Jacques Quisquater:
Secure Implementations of Identification Systems.
J. Cryptology 4(3): 175-183 (1991) |
1990 |
25 | | Jean-Jacques Quisquater,
Joos Vandewalle:
Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings
Springer 1990 |
24 | EE | Dominique de Waleffe,
Jean-Jacques Quisquater:
CORSAIR: A SMART Card for Public Key Cryptosystems.
CRYPTO 1990: 502-513 |
23 | | Dominique de Waleffe,
Jean-Jacques Quisquater:
Better Login Protocols for Computer Networks.
ESORICS 1990: 163-172 |
22 | EE | Louis C. Guillou,
Jean-Jacques Quisquater,
Michael Walker,
Peter Landrock,
Caroline Shafer:
Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery".
EUROCRYPT 1990: 465-473 |
1989 |
21 | EE | Marijke De Soete,
Jean-Jacques Quisquater,
Klaus Vedder:
A Signature with Shared Verification Scheme.
CRYPTO 1989: 253-262 |
20 | EE | Jean-Jacques Quisquater,
Jean-Paul Delescaille:
How Easy is Collision Search. New Results and Applications to DES.
CRYPTO 1989: 408-413 |
19 | EE | Jean-Jacques Quisquater,
Myriam Quisquater,
Muriel Quisquater,
Michaël Quisquater,
Louis C. Guillou,
Marie Annick Guillou,
Gaïd Guillou,
Anna Guillou,
Gwenolé Guillou,
Soazig Guillou,
Thomas A. Berson:
How to Explain Zero-Knowledge Protocols to Your Children.
CRYPTO 1989: 628-631 |
18 | EE | Jean-Jacques Quisquater,
Marc Girault:
2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms.
EUROCRYPT 1989: 102-109 |
17 | EE | Jean-Jacques Quisquater,
Jean-Paul Delescaille:
How Easy is Collision Search? Application to DES (Extended Summary).
EUROCRYPT 1989: 429-434 |
16 | EE | Jean-Jacques Quisquater,
André Bouckaert:
Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary).
EUROCRYPT 1989: 662-664 |
1988 |
15 | EE | Louis C. Guillou,
Jean-Jacques Quisquater:
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge.
CRYPTO 1988: 216-231 |
14 | EE | Louis C. Guillou,
Jean-Jacques Quisquater:
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory.
EUROCRYPT 1988: 123-128 |
1987 |
13 | EE | Jean-Jacques Quisquater:
Secret Distribution of Keys for Public-Key Systems.
CRYPTO 1987: 203-208 |
12 | EE | Louis C. Guillou,
Jean-Jacques Quisquater:
Efficient Digital Public-Key Signature with Shadow (Abstract).
CRYPTO 1987: 223 |
11 | EE | Jean-Jacques Quisquater,
Jean-Paul Delescaille:
Other Cycling Tests for DES (Abstract).
CRYPTO 1987: 255-256 |
1986 |
10 | EE | Yvo Desmedt,
Jean-Jacques Quisquater:
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?).
CRYPTO 1986: 111-117 |
9 | | Yvo Desmedt,
Frank Hoornaert,
Jean-Jacques Quisquater:
Several Exhaustive Key Search Machines and DES.
EUROCRYPT 1986: 17-19 |
8 | | Jean-Claude Bermond,
Charles Delorme,
Jean-Jacques Quisquater:
Strategies for Interconnection Networks: Some Methods from Graph Theory.
J. Parallel Distrib. Comput. 3(4): 433-449 (1986) |
1985 |
7 | EE | Jean-Jacques Quisquater,
Yvo Desmedt,
Marc Davio:
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys).
CRYPTO 1985: 537-542 |
1984 |
6 | EE | Marc Davio,
Yvo Desmedt,
Jo Goubert,
Frank Hoornaert,
Jean-Jacques Quisquater:
Efficient Hardware and Software Implementations for the DES.
CRYPTO 1984: 144-146 |
5 | EE | Yvo Desmedt,
Jean-Jacques Quisquater,
Marc Davio:
Dependence of Output on Input in DES: Small Avalanche Characteristics.
CRYPTO 1984: 359-376 |
4 | EE | Marc Davio,
Yvo Desmedt,
Jean-Jacques Quisquater:
Propagation Characteristics of the DES.
EUROCRYPT 1984: 62-73 |
1983 |
3 | | Marc Davio,
Yvo Desmedt,
Marc Fosseprez,
René Govaerts,
Jan Hulsbosch,
Patrik Neutjens,
Philippe Piret,
Jean-Jacques Quisquater,
Joos Vandewalle,
Pascal Wouters:
Analytical Characteristics of the DES.
CRYPTO 1983: 171-202 |
1982 |
2 | | Jean-Claude Bermond,
Charles Delorme,
Jean-Jacques Quisquater:
Tables of Large Graphs with Given Degree and Diameter.
Inf. Process. Lett. 15(1): 10-13 (1982) |
1973 |
1 | | Philippe Delsarte,
Jean-Jacques Quisquater:
Permutation Cascades with Normalized Cells
Information and Control 23(4): 344-356 (1973) |