Stop the war!
Остановите войну!
for scientists:
default search action
Jean-Jacques Quisquater
Person information
- affiliation: Université catholique de Louvain, Belgium
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c166]Nicolas T. Courtois, Jean-Jacques Quisquater:
Can a Differential Attack Work for an Arbitrarily Large Number of Rounds? ICISC 2020: 157-181
2010 – 2019
- 2017
- [i21]Elli Androulaki, Matthias Jarke, Jean-Jacques Quisquater:
Introduction to the Special Theme Blockchain Engineering. ERCIM News 2017(110) (2017) - [i20]Jean-Jacques Quisquater:
Blockchains for Everybody: Individuals, Companies, States and Democracy. ERCIM News 2017(110) (2017) - 2016
- [c165]Christophe Petit, Jean-Jacques Quisquater:
Cryptographic Hash Functions and Expander Graphs: The End of the Story? The New Codebreakers 2016: 304-311 - [e13]Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater:
The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Lecture Notes in Computer Science 9100, Springer 2016, ISBN 978-3-662-49300-7 [contents] - 2015
- [j37]Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal, Jean-Jacques Quisquater, Guangyan Song:
Can GOST Be Made Secure Against Differential Cryptanalysis? Cryptologia 39(2): 145-156 (2015) - [e12]Giuseppe F. Italiano, Tiziana Margaria-Steffen, Jaroslav Pokorný, Jean-Jacques Quisquater, Roger Wattenhofer, Roman Spanek, Martin Rimnac:
Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015, the 41st International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2015) , Pec pod Snezkou, Czech Republic, January 24-29, 2015. CEUR Workshop Proceedings 1326, CEUR-WS.org 2015 [contents] - [e11]Giuseppe F. Italiano, Tiziana Margaria-Steffen, Jaroslav Pokorný, Jean-Jacques Quisquater, Roger Wattenhofer:
SOFSEM 2015: Theory and Practice of Computer Science - 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015. Proceedings. Lecture Notes in Computer Science 8939, Springer 2015, ISBN 978-3-662-46077-1 [contents] - 2013
- [c164]Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater:
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards. Financial Cryptography 2013: 230-238 - [i19]Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater:
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards. IACR Cryptol. ePrint Arch. 2013: 224 (2013) - 2012
- [c163]Christophe Petit, Jean-Jacques Quisquater:
On Polynomial Systems Arising from a Weil Descent. ASIACRYPT 2012: 451-466 - [p4]Chong Hee Kim, Jean-Jacques Quisquater:
Fault Attacks Against RSA-CRT Implementation. Fault Analysis in Cryptography 2012: 125-136 - [i18]Solange Ghernaouti-Helie, Jens Tölle, Jean-Jacques Quisquater:
Cybercrime and Privacy Issues - Introduction to the Special Theme. ERCIM News 2012(90) (2012) - [i17]Christophe Petit, Jean-Jacques Quisquater:
On Polynomial Systems Arising from a Weil Descent. IACR Cryptol. ePrint Arch. 2012: 146 (2012) - 2011
- [j36]Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica:
Compact elliptic curve representations. J. Math. Cryptol. 5(1): 89-100 (2011) - [j35]Christof Paar, Jean-Jacques Quisquater, Berk Sunar:
Guest Editorial. J. Cryptol. 24(2): 245-246 (2011) - [r12]Christophe Petit, Jean-Jacques Quisquater:
Cayley Hash Functions. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 183-184 - [r11]Jean-Jacques Quisquater, David Samyde:
Electromagnetic Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 382-385 - [r10]Benoît Libert, Jean-Jacques Quisquater:
Identity-Based Cryptosystems. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 588-594 - [r9]Jean-Jacques Quisquater, Gildas Avoine:
Passport Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 913-916 - [r8]François-Xavier Standaert, Jean-Jacques Quisquater:
Physical Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 928-929 - [r7]Jean-Jacques Quisquater, David Samyde:
Radio Frequency Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1015-1021 - [r6]François-Xavier Standaert, Jean-Jacques Quisquater:
Time-Memory Trade-offs. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1297-1299 - [i16]Christophe Petit, Jean-Jacques Quisquater:
Rubik's for cryptographers. IACR Cryptol. ePrint Arch. 2011: 638 (2011) - 2010
- [j34]Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater:
How to strongly link data and its medium: the paper case. IET Inf. Secur. 4(3): 125-136 (2010) - [j33]Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Key Evolution Systems in Untrusted Update Environments. ACM Trans. Inf. Syst. Secur. 13(4): 37:1-37:34 (2010) - [c162]Christophe Petit, Jean-Jacques Quisquater:
Preimages for the Tillich-Zémor Hash Function. Selected Areas in Cryptography 2010: 282-301 - [p3]Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater:
Signcryption Schemes Based on the Diffie-Hellman Problem. Practical Signcryption 2010: 57-69 - [p2]Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater:
Signcryption Schemes Based on Bilinear Maps. Practical Signcryption 2010: 71-97 - [p1]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. Towards Hardware-Intrinsic Security 2010: 99-134 - [e10]Douglas W. Jones, Jean-Jacques Quisquater, Eric Rescorla:
2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '10, Washington, D.C., USA, August 9-10, 2010. USENIX Association 2010 [contents]
2000 – 2009
- 2009
- [c161]Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated wireless roaming via tunnels: making mobile guests feel at home. AsiaCCS 2009: 92-103 - [c160]Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor:
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. CT-RSA 2009: 182-194 - [c159]Julien Cathalo, David Naccache, Jean-Jacques Quisquater:
Comparing with RSA. IMACC 2009: 326-335 - [c158]Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater:
Practical Algebraic Attacks on the Hitag2 Stream Cipher. ISC 2009: 167-176 - [c157]Nidal Aboudagga, Giacomo de Meulenaer, Mohamed Eltoweissy, Jean-Jacques Quisquater:
IMAPS: Imbricated authentication protocol suite for mobile users and groups. LCN 2009: 30-36 - [c156]Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater:
Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios. EVT/WOTE 2009 - [e9]Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater:
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings. Lecture Notes in Computer Science 5746, Springer 2009, ISBN 978-3-642-03943-0 [contents] - [i15]Julien Cathalo, David Naccache, Jean-Jacques Quisquater:
Comparing With RSA. IACR Cryptol. ePrint Arch. 2009: 21 (2009) - [i14]Giacomo de Meulenaer, Christophe Petit, Jean-Jacques Quisquater:
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? IACR Cryptol. ePrint Arch. 2009: 229 (2009) - [i13]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. IACR Cryptol. ePrint Arch. 2009: 341 (2009) - 2008
- [j32]Ayoub Massoudi, Frédéric Lefèbvre, Christophe De Vleeschouwer, Benoît Macq, Jean-Jacques Quisquater:
Overview on Selective Encryption of Image and Video: Challenges and Perspectives. EURASIP J. Inf. Secur. 2008 (2008) - [j31]Romain Robert, Mark Manulis, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, Jean-Jacques Quisquater:
WiFi Roaming: Legal Implications and Security Constraints. Int. J. Law Inf. Technol. 16(3): 205-241 (2008) - [j30]Francesc Sebé, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Yves Deswarte, Jean-Jacques Quisquater:
Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008) - [c155]Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy:
Implementation of the AES-128 on Virtex-5 FPGAs. AFRICACRYPT 2008: 16-26 - [c154]Chong Hee Kim, Jean-Jacques Quisquater:
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. CARDIS 2008: 48-60 - [c153]Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Key Evolution Systems in Untrusted Update Environments. Inscrypt 2008: 12-21 - [c152]Chong Hee Kim, Philippe Bulens, Christophe Petit, Jean-Jacques Quisquater:
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. EuroPKI 2008: 182-195 - [c151]Gildas Avoine, Kassem Kalach, Jean-Jacques Quisquater:
ePassport: Securing International Contacts with Contactless Chips. Financial Cryptography 2008: 141-155 - [c150]Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung:
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). Financial Cryptography 2008: 307-313 - [c149]Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. FSE 2008: 382-397 - [c148]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater:
On the Salsa20 Core Function. FSE 2008: 462-469 - [c147]Christophe Petit, Nicolas Veyrat-Charvillon, Jean-Jacques Quisquater:
Efficiency and pseudo-randomness of a variant of Zémor-Tillich hash function. ICECS 2008: 906-909 - [c146]Chong Hee Kim, Jean-Jacques Quisquater:
Method for Detecting Vulnerability to Doubling Attacks. ICICS 2008: 97-110 - [c145]Christophe Petit, Kristin E. Lauter, Jean-Jacques Quisquater:
Full Cryptanalysis of LPS and Morgenstern Hash Functions. SCN 2008: 263-277 - [i12]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater:
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations. CoRR abs/0811.4257 (2008) - [i11]François Macé, François-Xavier Standaert, Jean-Jacques Quisquater:
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. IACR Cryptol. ePrint Arch. 2008: 5 (2008) - [i10]Christophe Petit, Kristin E. Lauter, Jean-Jacques Quisquater:
Full Cryptanalysis of LPS and Morgenstern Hash Function. IACR Cryptol. ePrint Arch. 2008: 173 (2008) - [i9]Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home. IACR Cryptol. ePrint Arch. 2008: 382 (2008) - 2007
- [j29]Chong Hee Kim, Jean-Jacques Quisquater:
Faults, Injection Methods, and Fault Attacks. IEEE Des. Test Comput. 24(6): 544-545 (2007) - [j28]François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater:
FPGA implementations of the ICEBERG block cipher. Integr. 40(1): 20-27 (2007) - [j27]Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater:
Power and electromagnetic analysis: Improved model, consequences and comparisons. Integr. 40(1): 52-60 (2007) - [j26]Guerric Meurice de Dormale, Jean-Jacques Quisquater:
High-speed hardware implementations of Elliptic Curve Cryptography: A survey. J. Syst. Archit. 53(2-3): 72-84 (2007) - [c144]Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Forward-secure signatures in untrusted update environments: efficient and generic constructions. CCS 2007: 266-275 - [c143]Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater:
Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA. CHES 2007: 378-393 - [c142]François Macé, François-Xavier Standaert, Jean-Jacques Quisquater:
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. CHES 2007: 427-442 - [c141]Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. Inscrypt 2007: 51-65 - [c140]Nidal Aboudagga, Mohamed Eltoweissy, Jean-Jacques Quisquater:
Two-level signature delegation for mobile first responder authentication. CollaborateCom 2007: 16-23 - [c139]Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, Jean-Jacques Quisquater:
Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware. FCCM 2007: 197-206 - [c138]Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater:
On Solving RC5 Challenges with FPGAs. FCCM 2007: 281-282 - [c137]Chong Hee Kim, Jean-Jacques Quisquater:
How can we overcome both side channel analysis and fault attacks on RSA-CRT? FDTC 2007: 21-29 - [c136]Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater:
Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --. FPL 2007: 642-647 - [c135]Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Improving the Time Complexity of Matsui's Linear Cryptanalysis. ICISC 2007: 77-88 - [c134]Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee:
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. ICISC 2007: 273-281 - [c133]Benoît Libert, Jean-Jacques Quisquater:
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. Pairing 2007: 23-38 - [c132]Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Parallel Key-Insulated Public Key Encryption Without Random Oracles. Public Key Cryptography 2007: 298-314 - [c131]Jean-Jacques Quisquater:
The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? SSS 2007: 1 - [c130]Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater:
Simulation-Based Analysis of E2E Voting Systems. VOTE-ID 2007: 137-149 - [c129]Nidal Aboudagga, Jean-Jacques Quisquater, Mohamed Eltoweissy:
Group Authentication Protocol for Mobile Networks. WiMob 2007: 28 - [c128]Chong Hee Kim, Jean-Jacques Quisquater:
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. WISTP 2007: 215-228 - [e8]Damien Sauveron, Constantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater:
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings. Lecture Notes in Computer Science 4462, Springer 2007, ISBN 978-3-540-72353-0 [contents] - [i8]Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater:
Simulation-based analysis of E2E voting systems. Frontiers of Electronic Voting 2007 - [i7]François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater:
Towards Security Limits in Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2007: 222 (2007) - 2006
- [j25]Olivier Pereira, Jean-Jacques Quisquater:
On the impossibility of building secure Cliques-type authenticated group key agreement protocols. J. Comput. Secur. 14(2): 197-246 (2006) - [j24]François-Xavier Standaert, Eric Peeters, Gaël Rouvroy, Jean-Jacques Quisquater:
An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays. Proc. IEEE 94(2): 383-394 (2006) - [j23]Antonin Descampe, François-Olivier Devaux, Gaël Rouvroy, Jean-Didier Legat, Jean-Jacques Quisquater, Benoît Macq:
A Flexible Hardware JPEG 2000 Decoder for Digital Cinema. IEEE Trans. Circuits Syst. Video Technol. 16(11): 1397-1410 (2006) - [c127]François-Xavier Standaert, François Macé, Eric Peeters, Jean-Jacques Quisquater:
Updates on the Security of FPGAs Against Power Analysis Attacks. ARC 2006: 335-346 - [c126]Guerric Meurice de Dormale, Jean-Jacques Quisquater:
Iterative Modular Division over GF(2m): Novel Algorithm and Implementations on FPGA. ARC 2006: 370-382 - [c125]Guerric Meurice de Dormale, Renaud Ambroise, David Bol, Jean-Jacques Quisquater, Jean-Didier Legat:
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards. ASAP 2006: 347-353 - [c124]François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater:
SEA: A Scalable Encryption Algorithm for Small Embedded Applications. CARDIS 2006: 222-236 - [c123]Cédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater:
Template Attacks in Principal Subspaces. CHES 2006: 1-14 - [c122]François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater:
Towards Security Limits in Side-Channel Attacks. CHES 2006: 30-45 - [c121]Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Efficient Intrusion-Resilient Signatures Without Random Oracles. Inscrypt 2006: 27-41 - [c120]Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater:
Fair Identification. CT-RSA 2006: 52-63 - [c119]François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater:
FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks. FPL 2006: 1-4 - [c118]Benoît Libert, Jean-Jacques Quisquater:
On Constructing Certificateless Cryptosystems from Identity Based Encryption. Public Key Cryptography 2006: 474-490 - [c117]Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater:
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. SCN 2006: 63-77 - 2005
- [c116]Benoît Libert, Jean-Jacques Quisquater:
Identity Based Encryption Without Redundancy. ACNS 2005: 285-300 - [c115]Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater:
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. ASIACRYPT 2005: 515-532 - [c114]Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater:
Improved Higher-Order Side-Channel Attacks with FPGA Experiments. CHES 2005: 309-323 - [c113]Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater:
Efficient and Non-interactive Timed-Release Encryption. ICICS 2005: 291-303 - [c112]Vipul Goyal, Abhishek Jain, Jean-Jacques Quisquater:
Improvements to Mitchell's Remote User Authentication Protocol. ICISC 2005: 69-80 - [c111]François-Xavier Standaert, Frédéric Lefèbvre, Gaël Rouvroy, Benoît Macq, Jean-Jacques Quisquater, Jean-Didier Legat:
Practical Evaluation of a Radial Soft Hash Algorithm. ITCC (2) 2005: 89-94 - [c110]François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater:
FPGA Implementations of the ICEBERG Block Cipher. ITCC (1) 2005: 556-561 - [c109]François-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater:
On the Masking Countermeasure and Higher-Order Power Analysis Attacks. ITCC (1) 2005: 562-567 - [c108]Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater:
Authentication protocols for ad hoc networks: taxonomy and research issues. Q2SWinet 2005: 96-104 - [c107]François Macé, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat:
A Design Methodology for Secured ICs Using Dynamic Current Mode Logic. PATMOS 2005: 550-560 - [r5]Benoît Libert, Jean-Jacques Quisquater:
Identity-Based Cryptosystems. Encyclopedia of Cryptography and Security 2005 - [r4]Jean-Jacques Quisquater:
Eavesdropper. Encyclopedia of Cryptography and Security 2005 - [r3]Jean-Jacques Quisquater, David Samyde:
Electromagnetic Attack. Encyclopedia of Cryptography and Security 2005 - [r2]Jean-Jacques Quisquater, David Samyde:
Radio Frequency Attacks. Encyclopedia of Cryptography and Security 2005 - [r1]Jean-Jacques Quisquater, François-Xavier Standaert:
Time-memory tradeoffs. Encyclopedia of Cryptography and Security 2005 - 2004
- [c106]Gilles Piret, François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater:
On the Security of the DeKaRT Primitive. CARDIS 2004: 241-254 - [c105]Olivier Pereira, Jean-Jacques Quisquater:
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. CSFW 2004: 16-19 - [c104]Benoît Libert, Jean-Jacques Quisquater:
Identity Based Undeniable Signatures. CT-RSA 2004: 112-125 - [c103]Gaël Rouvroy, François-Xavier Standaert, Frédéric Lefèbvre, Jean-Jacques Quisquater, Benoît Macq, Jean-Didier Legat:
Reconfigurable hardware solutions for the digital rights management of digital cinema. Digital Rights Management Workshop 2004: 40-53 - [c102]Benoît Libert, Jean-Jacques Quisquater:
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. EuroPKI 2004: 57-70 - [c101]Gaël Rouvroy, Frédéric Lefèbvre, François-Xavier Standaert, Benoît Macq, Jean-Jacques Quisquater, Jean-Didier Legat:
Hardware implementation of a fingerprinting algorithm suited for digital cinema. EUSIPCO 2004: 1497-1500 - [c100]François-Xavier Standaert, Siddika Berna Örs, Jean-Jacques Quisquater, Bart Preneel:
Power Analysis Attacks Against FPGA Implementations of the DES. FPL 2004: 84-94 - [c99]Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater:
Efficient Modular Division Implementation: ECC over GF(p) Affine Coordinates Application. FPL 2004: 231-240 - [c98]Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater:
An improved Montgomery modular inversion targeted for efficient implementation on FPGA. FPT 2004: 441-444 - [c97]François-Xavier Standaert,