BibTeX records: Jean-Jacques Quisquater

download as .bib file

@inproceedings{DBLP:conf/icisc/CourtoisQ20,
  author       = {Nicolas T. Courtois and
                  Jean{-}Jacques Quisquater},
  editor       = {Deukjo Hong},
  title        = {Can a Differential Attack Work for an Arbitrarily Large Number of
                  Rounds?},
  booktitle    = {Information Security and Cryptology - {ICISC} 2020 - 23rd International
                  Conference, Seoul, South Korea, December 2-4, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12593},
  pages        = {157--181},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68890-5\_9},
  doi          = {10.1007/978-3-030-68890-5\_9},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/CourtoisQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/AndoulakiJQ17,
  author       = {Elli Androulaki and
                  Matthias Jarke and
                  Jean{-}Jacques Quisquater},
  title        = {Introduction to the Special Theme Blockchain Engineering},
  journal      = {{ERCIM} News},
  volume       = {2017},
  number       = {110},
  year         = {2017},
  url          = {https://ercim-news.ercim.eu/en110/special/introduction-to-the-special-theme-blockchain-engineering},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/AndoulakiJQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/Quisquater17,
  author       = {Jean{-}Jacques Quisquater},
  title        = {Blockchains for Everybody: Individuals, Companies, States and Democracy},
  journal      = {{ERCIM} News},
  volume       = {2017},
  number       = {110},
  year         = {2017},
  url          = {https://ercim-news.ercim.eu/en110/special/blockchains-for-everybody-individuals-companies-states-and-democracy},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/Quisquater17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/PetitQ16,
  author       = {Christophe Petit and
                  Jean{-}Jacques Quisquater},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Cryptographic Hash Functions and Expander Graphs: The End of the Story?},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {304--311},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_19},
  doi          = {10.1007/978-3-662-49301-4\_19},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/PetitQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2016kahn,
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4},
  doi          = {10.1007/978-3-662-49301-4},
  isbn         = {978-3-662-49300-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/2016kahn.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisMMQS15,
  author       = {Nicolas T. Courtois and
                  Theodosis Mourouzis and
                  Michal Misztal and
                  Jean{-}Jacques Quisquater and
                  Guangyan Song},
  title        = {Can {GOST} Be Made Secure Against Differential Cryptanalysis?},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {145--156},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915266},
  doi          = {10.1080/01611194.2014.915266},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisMMQS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sofsem/2015srf,
  editor       = {Giuseppe F. Italiano and
                  Tiziana Margaria{-}Steffen and
                  Jaroslav Pokorn{\'{y}} and
                  Jean{-}Jacques Quisquater and
                  Roger Wattenhofer and
                  Roman Spanek and
                  Martin Rimnac},
  title        = {Proceedings of Student Research Forum Papers and Posters at {SOFSEM}
                  2015, the 41st International Conference on Current Trends in Theory
                  and Practice of Computer Science {(SOFSEM} 2015) , Pec pod Snezkou,
                  Czech Republic, January 24-29, 2015},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1326},
  publisher    = {CEUR-WS.org},
  year         = {2015},
  url          = {https://ceur-ws.org/Vol-1326},
  urn          = {urn:nbn:de:0074-1326-7},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sofsem/2015srf.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sofsem/2015,
  editor       = {Giuseppe F. Italiano and
                  Tiziana Margaria{-}Steffen and
                  Jaroslav Pokorn{\'{y}} and
                  Jean{-}Jacques Quisquater and
                  Roger Wattenhofer},
  title        = {{SOFSEM} 2015: Theory and Practice of Computer Science - 41st International
                  Conference on Current Trends in Theory and Practice of Computer Science,
                  Pec pod Sn{\v{e}}{\v{z}}kou, Czech Republic, January 24-29, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8939},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46078-8},
  doi          = {10.1007/978-3-662-46078-8},
  isbn         = {978-3-662-46077-1},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ZhouYSQ13,
  author       = {Yuanyuan Zhou and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {On the Need of Physical Security for Small Embedded Devices: {A} Case
                  Study with {COMP128-1} Implementations in {SIM} Cards},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {230--238},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_20},
  doi          = {10.1007/978-3-642-39884-1\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ZhouYSQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouYSQ13,
  author       = {Yuanyuan Zhou and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {On the Need of Physical Security for Small Embedded Devices: a Case
                  Study with {COMP128-1} Implementations in {SIM} Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/224},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouYSQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PetitQ12,
  author       = {Christophe Petit and
                  Jean{-}Jacques Quisquater},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {On Polynomial Systems Arising from a Weil Descent},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {451--466},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_28},
  doi          = {10.1007/978-3-642-34961-4\_28},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PetitQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/KimQ12,
  author       = {Chong Hee Kim and
                  Jean{-}Jacques Quisquater},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Attacks Against {RSA-CRT} Implementation},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {125--136},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_8},
  doi          = {10.1007/978-3-642-29656-7\_8},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/KimQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/Ghernaouti-HelieTQ12,
  author       = {Solange Ghernaouti{-}Helie and
                  Jens T{\"{o}}lle and
                  Jean{-}Jacques Quisquater},
  title        = {Cybercrime and Privacy Issues - Introduction to the Special Theme},
  journal      = {{ERCIM} News},
  volume       = {2012},
  number       = {90},
  year         = {2012},
  url          = {http://ercim-news.ercim.eu/en90/special/cybercrime-and-privacy-issues-introduction-to-the-special-theme},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/Ghernaouti-HelieTQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitQ12,
  author       = {Christophe Petit and
                  Jean{-}Jacques Quisquater},
  title        = {On Polynomial Systems Arising from a Weil Descent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/146},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CietQS11,
  author       = {Mathieu Ciet and
                  Jean{-}Jacques Quisquater and
                  Francesco Sica},
  title        = {Compact elliptic curve representations},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {1},
  pages        = {89--100},
  year         = {2011},
  url          = {https://doi.org/10.1515/jmc.2011.007},
  doi          = {10.1515/JMC.2011.007},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/CietQS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PaarQS11,
  author       = {Christof Paar and
                  Jean{-}Jacques Quisquater and
                  Berk Sunar},
  title        = {Guest Editorial},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {245--246},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-011-9099-9},
  doi          = {10.1007/S00145-011-9099-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PaarQS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/PetitQ11,
  author       = {Christophe Petit and
                  Jean{-}Jacques Quisquater},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Cayley Hash Functions},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {183--184},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_126},
  doi          = {10.1007/978-1-4419-5906-5\_126},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/PetitQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/QuisquaterS11,
  author       = {Jean{-}Jacques Quisquater and
                  David Samyde},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Electromagnetic Attack},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {382--385},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_125},
  doi          = {10.1007/978-1-4419-5906-5\_125},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/QuisquaterS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/LibertQ11,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Identity-Based Cryptosystems},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {588--594},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_127},
  doi          = {10.1007/978-1-4419-5906-5\_127},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/LibertQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/QuisquaterA11,
  author       = {Jean{-}Jacques Quisquater and
                  Gildas Avoine},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Passport Security},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {913--916},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_129},
  doi          = {10.1007/978-1-4419-5906-5\_129},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/QuisquaterA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/StandaertQ11,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Physical Security},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {928--929},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_130},
  doi          = {10.1007/978-1-4419-5906-5\_130},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/StandaertQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/QuisquaterS11a,
  author       = {Jean{-}Jacques Quisquater and
                  David Samyde},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Radio Frequency Attacks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1015--1021},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_133},
  doi          = {10.1007/978-1-4419-5906-5\_133},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/QuisquaterS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/StandaertQ11a,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Time-Memory Trade-offs},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1297--1299},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_137},
  doi          = {10.1007/978-1-4419-5906-5\_137},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/StandaertQ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitQ11,
  author       = {Christophe Petit and
                  Jean{-}Jacques Quisquater},
  title        = {Rubik's for cryptographers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {638},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/638},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BulensSQ10,
  author       = {Philippe Bulens and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {How to strongly link data and its medium: the paper case},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {125--136},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0032},
  doi          = {10.1049/IET-IFS.2009.0032},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BulensSQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LibertQY10,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  title        = {Key Evolution Systems in Untrusted Update Environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {37:1--37:34},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880031},
  doi          = {10.1145/1880022.1880031},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LibertQY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PetitQ10,
  author       = {Christophe Petit and
                  Jean{-}Jacques Quisquater},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Preimages for the Tillich-Z{\'{e}}mor Hash Function},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {282--301},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_20},
  doi          = {10.1007/978-3-642-19574-7\_20},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PetitQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarretoLMQ10,
  author       = {Paulo S. L. M. Barreto and
                  Beno{\^{\i}}t Libert and
                  Noel McCullagh and
                  Jean{-}Jacques Quisquater},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Signcryption Schemes Based on the Diffie-Hellman Problem},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {57--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_4},
  doi          = {10.1007/978-3-540-89411-7\_4},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/series/isc/BarretoLMQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarretoLMQ10a,
  author       = {Paulo S. L. M. Barreto and
                  Beno{\^{\i}}t Libert and
                  Noel McCullagh and
                  Jean{-}Jacques Quisquater},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Signcryption Schemes Based on Bilinear Maps},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {71--97},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_5},
  doi          = {10.1007/978-3-540-89411-7\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BarretoLMQ10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/StandaertPYQYO10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu and
                  Jean{-}Jacques Quisquater and
                  Moti Yung and
                  Elisabeth Oswald},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Leakage Resilient Cryptography in Practice},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {99--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_5},
  doi          = {10.1007/978-3-642-14452-3\_5},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/StandaertPYQYO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2010evt,
  editor       = {Douglas W. Jones and
                  Jean{-}Jacques Quisquater and
                  Eric Rescorla},
  title        = {2010 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '10, Washington, D.C., USA, August 9-10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/evtwote10},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2010evt.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ManulisLKBQ09,
  author       = {Mark Manulis and
                  Damien Leroy and
                  Fran{\c{c}}ois Koeune and
                  Olivier Bonaventure and
                  Jean{-}Jacques Quisquater},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Authenticated wireless roaming via tunnels: making mobile guests feel
                  at home},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {92--103},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533072},
  doi          = {10.1145/1533057.1533072},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ManulisLKBQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PetitQTZ09,
  author       = {Christophe Petit and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Pierre Tillich and
                  Gilles Z{\'{e}}mor},
  editor       = {Marc Fischlin},
  title        = {Hard and Easy Components of Collision Search in the Z{\'{e}}mor-Tillich
                  Hash Function: New Attacks and Reduced Variants with Equivalent Security},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_12},
  doi          = {10.1007/978-3-642-00862-7\_12},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PetitQTZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CathaloNQ09,
  author       = {Julien Cathalo and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  editor       = {Matthew Geoffrey Parker},
  title        = {Comparing with {RSA}},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {326--335},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_19},
  doi          = {10.1007/978-3-642-10868-6\_19},
  timestamp    = {Wed, 01 Sep 2021 10:36:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/CathaloNQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/CourtoisOQ09,
  author       = {Nicolas T. Courtois and
                  Sean O'Neil and
                  Jean{-}Jacques Quisquater},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Practical Algebraic Attacks on the Hitag2 Stream Cipher},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {167--176},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_14},
  doi          = {10.1007/978-3-642-04474-8\_14},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/CourtoisOQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/AboudaggaMEQ09,
  author       = {Nidal Aboudagga and
                  Giacomo de Meulenaer and
                  Mohamed Eltoweissy and
                  Jean{-}Jacques Quisquater},
  title        = {{IMAPS:} Imbricated authentication protocol suite for mobile users
                  and groups},
  booktitle    = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  pages        = {30--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCN.2009.5355156},
  doi          = {10.1109/LCN.2009.5355156},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/AboudaggaMEQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MarneffePQ09,
  author       = {Olivier de Marneffe and
                  Olivier Pereira and
                  Jean{-}Jacques Quisquater},
  editor       = {David Jefferson and
                  Joseph Lorenzo Hall and
                  Tal Moran},
  title        = {Electing a University President Using Open-Audit Voting: Analysis
                  of Real-World Use of Helios},
  booktitle    = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/evtwote-09/electing-university-president-using-open-audit-voting-analysis-real-world-use},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MarneffePQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2009,
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7},
  doi          = {10.1007/978-3-642-03944-7},
  isbn         = {978-3-642-03943-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CathaloNQ09,
  author       = {Julien Cathalo and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Comparing With {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CathaloNQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeulenaerPQ09,
  author       = {Giacomo de Meulenaer and
                  Christophe Petit and
                  Jean{-}Jacques Quisquater},
  title        = {Hardware Implementations of a Variant of the Z{\'{e}}mor-Tillich
                  Hash Function: Can a Provably Secure Hash Function be very efficient
                  ?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/229},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MeulenaerPQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertPYQYO09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu and
                  Jean{-}Jacques Quisquater and
                  Moti Yung and
                  Elisabeth Oswald},
  title        = {Leakage Resilient Cryptography in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertPYQYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MassoudiLVMQ08,
  author       = {Ayoub Massoudi and
                  Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and
                  Christophe De Vleeschouwer and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Jacques Quisquater},
  title        = {Overview on Selective Encryption of Image and Video: Challenges and
                  Perspectives},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/179290},
  doi          = {10.1155/2008/179290},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/MassoudiLVMQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/RobertMVLJKKDPBQ08,
  author       = {Romain Robert and
                  Mark Manulis and
                  Florence De Villenfagne and
                  Damien Leroy and
                  Julien Jost and
                  Fran{\c{c}}ois Koeune and
                  Caroline Ker and
                  Jean{-}Marc Dinant and
                  Yves Poullet and
                  Olivier Bonaventure and
                  Jean{-}Jacques Quisquater},
  title        = {WiFi Roaming: Legal Implications and Security Constraints},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {205--241},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/ean016},
  doi          = {10.1093/IJLIT/EAN016},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/RobertMVLJKKDPBQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/SebeDMDQ08,
  author       = {Francesc Seb{\'{e}} and
                  Josep Domingo{-}Ferrer and
                  Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}} and
                  Yves Deswarte and
                  Jean{-}Jacques Quisquater},
  title        = {Efficient Remote Data Possession Checking in Critical Information
                  Infrastructures},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {20},
  number       = {8},
  pages        = {1034--1038},
  year         = {2008},
  url          = {https://doi.org/10.1109/TKDE.2007.190647},
  doi          = {10.1109/TKDE.2007.190647},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/SebeDMDQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BulensSQPR08,
  author       = {Philippe Bulens and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Pascal Pellegrin and
                  Ga{\"{e}}l Rouvroy},
  editor       = {Serge Vaudenay},
  title        = {Implementation of the {AES-128} on Virtex-5 FPGAs},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {16--26},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_2},
  doi          = {10.1007/978-3-540-68164-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BulensSQPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/KimQ08,
  author       = {Chong Hee Kim and
                  Jean{-}Jacques Quisquater},
  editor       = {Gilles Grimaud and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {New Differential Fault Analysis on {AES} Key Schedule: Two Faults
                  Are Enough},
  booktitle    = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2008, London, UK, September 8-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5189},
  pages        = {48--60},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85893-5\_4},
  doi          = {10.1007/978-3-540-85893-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/KimQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LibertQY08,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Key Evolution Systems in Untrusted Update Environments},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {12--21},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_2},
  doi          = {10.1007/978-3-642-01440-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LibertQY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/KimBPQ08,
  author       = {Chong Hee Kim and
                  Philippe Bulens and
                  Christophe Petit and
                  Jean{-}Jacques Quisquater},
  editor       = {Stig Fr. Mj{\o}lsnes and
                  Sjouke Mauw and
                  Sokratis K. Katsikas},
  title        = {Fault Attacks on Public Key Elements: Application to DLP-Based Schemes},
  booktitle    = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5057},
  pages        = {182--195},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69485-4\_13},
  doi          = {10.1007/978-3-540-69485-4\_13},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europki/KimBPQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AvoineKQ08,
  author       = {Gildas Avoine and
                  Kassem Kalach and
                  Jean{-}Jacques Quisquater},
  editor       = {Gene Tsudik},
  title        = {ePassport: Securing International Contacts with Contactless Chips},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_11},
  doi          = {10.1007/978-3-540-85230-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AvoineKQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CallasDNOQY08,
  author       = {Jon Callas and
                  Yvo Desmedt and
                  Daniel Nagy and
                  Akira Otsuka and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Gene Tsudik},
  title        = {Real Electronic Cash Versus Academic Electronic Cash Versus Paper
                  Cash (Panel Report)},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {307--313},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_28},
  doi          = {10.1007/978-3-540-85230-8\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CallasDNOQY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CollardSQ08,
  author       = {Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Kaisa Nyberg},
  title        = {Experiments on the Multiple Linear Cryptanalysis of Reduced Round
                  Serpent},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {382--397},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_24},
  doi          = {10.1007/978-3-540-71039-4\_24},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CollardSQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CastroEQ08,
  author       = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Juan M. Est{\'{e}}vez{-}Tapiador and
                  Jean{-}Jacques Quisquater},
  editor       = {Kaisa Nyberg},
  title        = {On the Salsa20 Core Function},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {462--469},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_29},
  doi          = {10.1007/978-3-540-71039-4\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CastroEQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/PetitVQ08,
  author       = {Christophe Petit and
                  Nicolas Veyrat{-}Charvillon and
                  Jean{-}Jacques Quisquater},
  title        = {Efficiency and pseudo-randomness of a variant of Z{\'{e}}mor-Tillich
                  hash function},
  booktitle    = {15th {IEEE} International Conference on Electronics, Circuits and
                  Systems, {ICECS} 2008, St. Julien's, Malta, August 31 2008-September
                  3, 2008},
  pages        = {906--909},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICECS.2008.4675001},
  doi          = {10.1109/ICECS.2008.4675001},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icecsys/PetitVQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KimQ08,
  author       = {Chong Hee Kim and
                  Jean{-}Jacques Quisquater},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Method for Detecting Vulnerability to Doubling Attacks},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_7},
  doi          = {10.1007/978-3-540-88625-9\_7},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/KimQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PetitLQ08,
  author       = {Christophe Petit and
                  Kristin E. Lauter and
                  Jean{-}Jacques Quisquater},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Full Cryptanalysis of {LPS} and Morgenstern Hash Functions},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {263--277},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_18},
  doi          = {10.1007/978-3-540-85855-3\_18},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/PetitLQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0811-4257,
  author       = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Juan M. Est{\'{e}}vez{-}Tapiador and
                  Pedro Peris{-}Lopez and
                  Jean{-}Jacques Quisquater},
  title        = {Cryptanalysis of the {SASI} Ultralightweight {RFID} Authentication
                  Protocol with Modular Rotations},
  journal      = {CoRR},
  volume       = {abs/0811.4257},
  year         = {2008},
  url          = {http://arxiv.org/abs/0811.4257},
  eprinttype    = {arXiv},
  eprint       = {0811.4257},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0811-4257.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaceSQ08,
  author       = {Fran{\c{c}}ois Mac{\'{e}} and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaceSQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitLQ08,
  author       = {Christophe Petit and
                  Kristin E. Lauter and
                  Jean{-}Jacques Quisquater},
  title        = {Full Cryptanalysis of {LPS} and Morgenstern Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/173},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitLQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisLKBQ08,
  author       = {Mark Manulis and
                  Damien Leroy and
                  Fran{\c{c}}ois Koeune and
                  Olivier Bonaventure and
                  Jean{-}Jacques Quisquater},
  title        = {Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel
                  at Home},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisLKBQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/KimQ07,
  author       = {Chong Hee Kim and
                  Jean{-}Jacques Quisquater},
  title        = {Faults, Injection Methods, and Fault Attacks},
  journal      = {{IEEE} Des. Test Comput.},
  volume       = {24},
  number       = {6},
  pages        = {544--545},
  year         = {2007},
  url          = {https://doi.org/10.1109/MDT.2007.186},
  doi          = {10.1109/MDT.2007.186},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/KimQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/StandaertPRQ07,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Piret and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater},
  title        = {{FPGA} implementations of the {ICEBERG} block cipher},
  journal      = {Integr.},
  volume       = {40},
  number       = {1},
  pages        = {20--27},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.vlsi.2005.12.008},
  doi          = {10.1016/J.VLSI.2005.12.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/StandaertPRQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/PeetersSQ07,
  author       = {Eric Peeters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {Power and electromagnetic analysis: Improved model, consequences and
                  comparisons},
  journal      = {Integr.},
  volume       = {40},
  number       = {1},
  pages        = {52--60},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.vlsi.2005.12.013},
  doi          = {10.1016/J.VLSI.2005.12.013},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/PeetersSQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/DormaleQ07,
  author       = {Guerric Meurice de Dormale and
                  Jean{-}Jacques Quisquater},
  title        = {High-speed hardware implementations of Elliptic Curve Cryptography:
                  {A} survey},
  journal      = {J. Syst. Archit.},
  volume       = {53},
  number       = {2-3},
  pages        = {72--84},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.sysarc.2006.09.002},
  doi          = {10.1016/J.SYSARC.2006.09.002},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/DormaleQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LibertQY07,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Forward-secure signatures in untrusted update environments: efficient
                  and generic constructions},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {266--275},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315279},
  doi          = {10.1145/1315245.1315279},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LibertQY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DormaleBQ07,
  author       = {Guerric Meurice de Dormale and
                  Philippe Bulens and
                  Jean{-}Jacques Quisquater},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Collision Search for Elliptic Curve Discrete Logarithm over GF(2\({}^{\mbox{
                  \emph{m} }}\)) with {FPGA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {378--393},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_26},
  doi          = {10.1007/978-3-540-74735-2\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DormaleBQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MaceSQ07,
  author       = {Fran{\c{c}}ois Mac{\'{e}} and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {427--442},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_29},
  doi          = {10.1007/978-3-540-74735-2\_29},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MaceSQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CollardSQ08,
  author       = {Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {51--65},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_6},
  doi          = {10.1007/978-3-540-79499-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CollardSQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/AboudaggaEQ07,
  author       = {Nidal Aboudagga and
                  Mohamed Eltoweissy and
                  Jean{-}Jacques Quisquater},
  editor       = {Juan Quemada and
                  Tao Zhang},
  title        = {Two-level signature delegation for mobile first responder authentication},
  booktitle    = {Proceedings of the 3rd International Conference on Collaborative Computing:
                  Networking, Applications and Worksharing, White Plains, New York,
                  USA, November 12-15, 2007},
  pages        = {16--23},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2007},
  url          = {https://doi.org/10.1109/COLCOM.2007.4553803},
  doi          = {10.1109/COLCOM.2007.4553803},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/AboudaggaEQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/MeulenaerGDQ07,
  author       = {Giacomo de Meulenaer and
                  Fran{\c{c}}ois Gosset and
                  Guerric Meurice de Dormale and
                  Jean{-}Jacques Quisquater},
  editor       = {Kenneth L. Pocek and
                  Duncan A. Buell},
  title        = {Integer Factorization Based on Elliptic Curve Method: Towards Better
                  Exploitation of Reconfigurable Hardware},
  booktitle    = {{IEEE} Symposium on Field-Programmable Custom Computing Machines,
                  {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}},
  pages        = {197--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FCCM.2007.12},
  doi          = {10.1109/FCCM.2007.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/MeulenaerGDQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/DormaleBQ07,
  author       = {Guerric Meurice de Dormale and
                  John Bass and
                  Jean{-}Jacques Quisquater},
  editor       = {Kenneth L. Pocek and
                  Duncan A. Buell},
  title        = {On Solving {RC5} Challenges with FPGAs},
  booktitle    = {{IEEE} Symposium on Field-Programmable Custom Computing Machines,
                  {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}},
  pages        = {281--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FCCM.2007.13},
  doi          = {10.1109/FCCM.2007.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/DormaleBQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/KimQ07,
  author       = {Chong Hee Kim and
                  Jean{-}Jacques Quisquater},
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {How can we overcome both side channel analysis and fault attacks on
                  RSA-CRT?},
  booktitle    = {Fourth International Workshop on Fault Diagnosis and Tolerance in
                  Cryptography, 2007, {FDTC} 2007: Vienna, Austria, 10 September 2007},
  pages        = {21--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FDTC.2007.4318981},
  doi          = {10.1109/FDTC.2007.4318981},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/KimQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/DormaleBQ07,
  author       = {Guerric Meurice de Dormale and
                  John Bass and
                  Jean{-}Jacques Quisquater},
  editor       = {Koen Bertels and
                  Walid A. Najjar and
                  Arjan J. van Genderen and
                  Stamatis Vassiliadis},
  title        = {Solving {RC5} Challenges with Hardware -- a Distributed.net Perspective
                  --},
  booktitle    = {{FPL} 2007, International Conference on Field Programmable Logic and
                  Applications, Amsterdam, The Netherlands, 27-29 August 2007},
  pages        = {642--647},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/FPL.2007.4380736},
  doi          = {10.1109/FPL.2007.4380736},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/DormaleBQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CollardSQ07,
  author       = {Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Improving the Time Complexity of Matsui's Linear Cryptanalysis},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {77--88},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_7},
  doi          = {10.1007/978-3-540-76788-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/CollardSQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimSQL07,
  author       = {Chong Hee Kim and
                  Jong Hoon Shin and
                  Jean{-}Jacques Quisquater and
                  Pil Joong Lee},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Safe-Error Attack on {SPA-FA} Resistant Exponentiations Using a {HW}
                  Modular Multiplier},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {273--281},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_22},
  doi          = {10.1007/978-3-540-76788-6\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimSQL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/LibertQ07,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Tsuyoshi Takagi and
                  Tatsuaki Okamoto and
                  Eiji Okamoto and
                  Takeshi Okamoto},
  title        = {Practical Time Capsule Signatures in the Standard Model from Bilinear
                  Maps},
  booktitle    = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
                  Tokyo, Japan, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4575},
  pages        = {23--38},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73489-5\_3},
  doi          = {10.1007/978-3-540-73489-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/LibertQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertQY07,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Parallel Key-Insulated Public Key Encryption Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {298--314},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_20},
  doi          = {10.1007/978-3-540-71677-8\_20},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertQY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/Quisquater07,
  author       = {Jean{-}Jacques Quisquater},
  editor       = {Toshimitsu Masuzawa and
                  S{\'{e}}bastien Tixeuil},
  title        = {The Power of Cryptographic Attacks: Is Your Network Really Secure
                  Against Side Channels Attacks and Malicious Faults?},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems, 9th International
                  Symposium, {SSS} 2007, Paris, France, November 14-16, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4838},
  pages        = {1},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76627-8\_1},
  doi          = {10.1007/978-3-540-76627-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/Quisquater07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/MarneffePQ07,
  author       = {Olivier de Marneffe and
                  Olivier Pereira and
                  Jean{-}Jacques Quisquater},
  editor       = {Ammar Alkassar and
                  Melanie Volkamer},
  title        = {Simulation-Based Analysis of {E2E} Voting Systems},
  booktitle    = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007,
                  Bochum, Germany, October 4-5, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4896},
  pages        = {137--149},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77493-8\_12},
  doi          = {10.1007/978-3-540-77493-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/MarneffePQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/AboudaggaQE07,
  author       = {Nidal Aboudagga and
                  Jean{-}Jacques Quisquater and
                  Mohamed Eltoweissy},
  title        = {Group Authentication Protocol for Mobile Networks},
  booktitle    = {Third {IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2007, White Plains, New York,
                  USA, 8-10 October 2007, Proceedings},
  pages        = {28},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.ieeecomputersociety.org/10.1109/WIMOB.2007.37},
  doi          = {10.1109/WIMOB.2007.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/AboudaggaQE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KimQ07,
  author       = {Chong Hee Kim and
                  Jean{-}Jacques Quisquater},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Fault Attacks for {CRT} Based {RSA:} New Attacks, New Results, and
                  New Countermeasures},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {215--228},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_18},
  doi          = {10.1007/978-3-540-72354-7\_18},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KimQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2007,
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7},
  doi          = {10.1007/978-3-540-72354-7},
  isbn         = {978-3-540-72353-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/MarneffePQ07,
  author       = {Olivier de Marneffe and
                  Olivier Pereira and
                  Jean{-}Jacques Quisquater},
  editor       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  title        = {Simulation-based analysis of {E2E} voting systems},
  booktitle    = {Frontiers of Electronic Voting, 29.07. - 03.08.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07311},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1297},
  timestamp    = {Thu, 10 Jun 2021 13:02:04 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/MarneffePQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertPAQ07,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters and
                  C{\'{e}}dric Archambeau and
                  Jean{-}Jacques Quisquater},
  title        = {Towards Security Limits in Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertPAQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PereiraQ06,
  author       = {Olivier Pereira and
                  Jean{-}Jacques Quisquater},
  title        = {On the impossibility of building secure Cliques-type authenticated
                  group key agreement protocols},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {197--246},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14204},
  doi          = {10.3233/JCS-2006-14204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PereiraQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/StandaertPRQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater},
  title        = {An Overview of Power Analysis Attacks Against Field Programmable Gate
                  Arrays},
  journal      = {Proc. {IEEE}},
  volume       = {94},
  number       = {2},
  pages        = {383--394},
  year         = {2006},
  url          = {https://doi.org/10.1109/JPROC.2005.862437},
  doi          = {10.1109/JPROC.2005.862437},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/StandaertPRQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/DescampeDRLQM06,
  author       = {Antonin Descampe and
                  Fran{\c{c}}ois{-}Olivier Devaux and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Didier Legat and
                  Jean{-}Jacques Quisquater and
                  Beno{\^{\i}}t Macq},
  title        = {A Flexible Hardware {JPEG} 2000 Decoder for Digital Cinema},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {16},
  number       = {11},
  pages        = {1397--1410},
  year         = {2006},
  url          = {https://doi.org/10.1109/TCSVT.2006.884573},
  doi          = {10.1109/TCSVT.2006.884573},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/DescampeDRLQM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/StandaertMPQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Fran{\c{c}}ois Mac{\'{e}} and
                  Eric Peeters and
                  Jean{-}Jacques Quisquater},
  editor       = {Koen Bertels and
                  Jo{\~{a}}o M. P. Cardoso and
                  Stamatis Vassiliadis},
  title        = {Updates on the Security of FPGAs Against Power Analysis Attacks},
  booktitle    = {Reconfigurable Computing: Architectures and Applications, Second International
                  Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3985},
  pages        = {335--346},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11802839\_42},
  doi          = {10.1007/11802839\_42},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/StandaertMPQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/DormaleQ06,
  author       = {Guerric Meurice de Dormale and
                  Jean{-}Jacques Quisquater},
  editor       = {Koen Bertels and
                  Jo{\~{a}}o M. P. Cardoso and
                  Stamatis Vassiliadis},
  title        = {Iterative Modular Division over GF(2\({}^{\mbox{\emph{m}}}\)): Novel
                  Algorithm and Implementations on {FPGA}},
  booktitle    = {Reconfigurable Computing: Architectures and Applications, Second International
                  Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3985},
  pages        = {370--382},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11802839\_45},
  doi          = {10.1007/11802839\_45},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/DormaleQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/DormaleABQL06,
  author       = {Guerric Meurice de Dormale and
                  Renaud Ambroise and
                  David Bol and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards},
  booktitle    = {2006 {IEEE} International Conference on Application-Specific Systems,
                  Architecture and Processors {(ASAP} 2006), 11-13 September 2006, Steamboat
                  Springs, Colorado, {USA}},
  pages        = {347--353},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ASAP.2006.44},
  doi          = {10.1109/ASAP.2006.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/DormaleABQL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/StandaertPGQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Piret and
                  Neil Gershenfeld and
                  Jean{-}Jacques Quisquater},
  editor       = {Josep Domingo{-}Ferrer and
                  Joachim Posegga and
                  Daniel Schreckling},
  title        = {{SEA:} {A} Scalable Encryption Algorithm for Small Embedded Applications},
  booktitle    = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3928},
  pages        = {222--236},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11733447\_16},
  doi          = {10.1007/11733447\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/StandaertPGQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ArchambeauPSQ06,
  author       = {C{\'{e}}dric Archambeau and
                  Eric Peeters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Template Attacks in Principal Subspaces},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_1},
  doi          = {10.1007/11894063\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ArchambeauPSQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertPAQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters and
                  C{\'{e}}dric Archambeau and
                  Jean{-}Jacques Quisquater},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Towards Security Limits in Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {30--45},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_3},
  doi          = {10.1007/11894063\_3},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertPAQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LibertQY06,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Efficient Intrusion-Resilient Signatures Without Random Oracles},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {27--41},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_3},
  doi          = {10.1007/11937807\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LibertQY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PandeyCQ06,
  author       = {Omkant Pandey and
                  Julien Cathalo and
                  Jean{-}Jacques Quisquater},
  editor       = {David Pointcheval},
  title        = {Fair Identification},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {52--63},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_4},
  doi          = {10.1007/11605805\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PandeyCQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/StandaertRQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater},
  title        = {{FPGA} Implementations of the {DES} and Triple-DES Masked Against
                  Power Analysis Attacks},
  booktitle    = {Proceedings of the 2006 International Conference on Field Programmable
                  Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/FPL.2006.311315},
  doi          = {10.1109/FPL.2006.311315},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/StandaertRQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertQ06,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {On Constructing Certificateless Cryptosystems from Identity Based
                  Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {474--490},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_31},
  doi          = {10.1007/11745853\_31},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/LaguillaumieLQ06,
  author       = {Fabien Laguillaumie and
                  Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Universal Designated Verifier Signatures Without Random Oracles or
                  Non-black Box Assumptions},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_5},
  doi          = {10.1007/11832072\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/LaguillaumieLQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LibertQ05,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Identity Based Encryption Without Redundancy},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {285--300},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_20},
  doi          = {10.1007/11496137\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LibertQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BarretoLMQ05,
  author       = {Paulo S. L. M. Barreto and
                  Beno{\^{\i}}t Libert and
                  Noel McCullagh and
                  Jean{-}Jacques Quisquater},
  editor       = {Bimal K. Roy},
  title        = {Efficient and Provably-Secure Identity-Based Signatures and Signcryption
                  from Bilinear Maps},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {515--532},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_28},
  doi          = {10.1007/11593447\_28},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BarretoLMQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PeetersSDQ05,
  author       = {Eric Peeters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Donckers and
                  Jean{-}Jacques Quisquater},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Improved Higher-Order Side-Channel Attacks with {FPGA} Experiments},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_23},
  doi          = {10.1007/11545262\_23},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PeetersSDQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CathaloLQ05,
  author       = {Julien Cathalo and
                  Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {Efficient and Non-interactive Timed-Release Encryption},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {291--303},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_25},
  doi          = {10.1007/11602897\_25},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/CathaloLQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GoyalJQ05,
  author       = {Vipul Goyal and
                  Abhishek Jain and
                  Jean{-}Jacques Quisquater},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Improvements to Mitchell's Remote User Authentication Protocol},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {69--80},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_8},
  doi          = {10.1007/11734727\_8},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GoyalJQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/StandaertLRMQL05,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and
                  Ga{\"{e}}l Rouvroy and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Practical Evaluation of a Radial Soft Hash Algorithm},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 2, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {89--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.229},
  doi          = {10.1109/ITCC.2005.229},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/StandaertLRMQL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/StandaertPRQ05,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Piret and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater},
  title        = {{FPGA} Implementations of the {ICEBERG} Block Cipher},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {556--561},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.155},
  doi          = {10.1109/ITCC.2005.155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/StandaertPRQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/StandaertPQ05,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters and
                  Jean{-}Jacques Quisquater},
  title        = {On the Masking Countermeasure and Higher-Order Power Analysis Attacks},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {562--567},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.213},
  doi          = {10.1109/ITCC.2005.213},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/StandaertPQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/AboudaggaREDQ05,
  author       = {Nidal Aboudagga and
                  M. Tamer Refaei and
                  Mohamed Eltoweissy and
                  Luiz A. DaSilva and
                  Jean{-}Jacques Quisquater},
  editor       = {Azzedine Boukerche and
                  Regina Borges de Araujo},
  title        = {Authentication protocols for ad hoc networks: taxonomy and research
                  issues},
  booktitle    = {Q2SWinet'05 - Proceedings of the First {ACM} Workshop on {Q2S} and
                  Security for Wireless and Mobile Networks, Montreal, Quebec, Canada,
                  October 13, 2005},
  pages        = {96--104},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1089761.1089777},
  doi          = {10.1145/1089761.1089777},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mswim/AboudaggaREDQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/patmos/MaceSQL05,
  author       = {Fran{\c{c}}ois Mac{\'{e}} and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Vassilis Paliouras and
                  Johan Vounckx and
                  Diederik Verkest},
  title        = {A Design Methodology for Secured ICs Using Dynamic Current Mode Logic},
  booktitle    = {Integrated Circuit and System Design, Power and Timing Modeling, Optimization
                  and Simulation, 15th International Workshop, {PATMOS} 2005, Leuven,
                  Belgium, September 21-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3728},
  pages        = {550--560},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556930\_56},
  doi          = {10.1007/11556930\_56},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/patmos/MaceSQL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/LibertQ05,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Henk C. A. van Tilborg},
  title        = {Identity-Based Cryptosystems},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_192},
  doi          = {10.1007/0-387-23483-7\_192},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/LibertQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Quisquater05,
  author       = {Jean{-}Jacques Quisquater},
  editor       = {Henk C. A. van Tilborg},
  title        = {Eavesdropper},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_118},
  doi          = {10.1007/0-387-23483-7\_118},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Quisquater05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/QuisquaterS05,
  author       = {Jean{-}Jacques Quisquater and
                  David Samyde},
  editor       = {Henk C. A. van Tilborg},
  title        = {Electromagnetic Attack},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_120},
  doi          = {10.1007/0-387-23483-7\_120},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/QuisquaterS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/QuisquaterS05a,
  author       = {Jean{-}Jacques Quisquater and
                  David Samyde},
  editor       = {Henk C. A. van Tilborg},
  title        = {Radio Frequency Attacks},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_341},
  doi          = {10.1007/0-387-23483-7\_341},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/QuisquaterS05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/QuisquaterS05b,
  author       = {Jean{-}Jacques Quisquater and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Henk C. A. van Tilborg},
  title        = {Time-memory tradeoffs},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_430},
  doi          = {10.1007/0-387-23483-7\_430},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/QuisquaterS05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PiretSRQ04,
  author       = {Gilles Piret and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater},
  editor       = {Jean{-}Jacques Quisquater and
                  Pierre Paradinas and
                  Yves Deswarte and
                  Anas Abou El Kalam},
  title        = {On the Security of the DeKaRT Primitive},
  booktitle    = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World
                  Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International
                  Conference on Smart Card Research and Advanced Applications (CARDIS),
                  22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {153},
  pages        = {241--254},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8147-2\_16},
  doi          = {10.1007/1-4020-8147-2\_16},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/PiretSRQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PereiraQ04,
  author       = {Olivier Pereira and
                  Jean{-}Jacques Quisquater},
  title        = {Generic Insecurity of Cliques-Type Authenticated Group Key Agreement
                  Protocols},
  booktitle    = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
                  28-30 June 2004, Pacific Grove, CA, {USA}},
  pages        = {16--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.12},
  doi          = {10.1109/CSFW.2004.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PereiraQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LibertQ04,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Tatsuaki Okamoto},
  title        = {Identity Based Undeniable Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {112--125},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_9},
  doi          = {10.1007/978-3-540-24660-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LibertQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/RouvroySLQML04,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and
                  Jean{-}Jacques Quisquater and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Didier Legat},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Reconfigurable hardware solutions for the digital rights management
                  of digital cinema},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {40--53},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029147},
  doi          = {10.1145/1029146.1029147},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/RouvroySLQML04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/LibertQ04,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {What Is Possible with Identity Based Cryptography for PKIs and What
                  Still Must Be Improved},
  booktitle    = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  pages        = {57--70},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25980-0\_5},
  doi          = {10.1007/978-3-540-25980-0\_5},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/LibertQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/RouvroyLSMQL04,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Hardware implementation of a fingerprinting algorithm suited for digital
                  cinema},
  booktitle    = {2004 12th European Signal Processing Conference, Vienna, Austria,
                  September 6-10, 2004},
  pages        = {1497--1500},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://ieeexplore.ieee.org/document/7080100/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/RouvroyLSMQL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/StandaertOQP04,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Siddika Berna {\"{O}}rs and
                  Jean{-}Jacques Quisquater and
                  Bart Preneel},
  editor       = {J{\"{u}}rgen Becker and
                  Marco Platzner and
                  Serge Vernalde},
  title        = {Power Analysis Attacks Against {FPGA} Implementations of the {DES}},
  booktitle    = {Field Programmable Logic and Application, 14th International Conference
                  , {FPL} 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3203},
  pages        = {84--94},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30117-2\_11},
  doi          = {10.1007/978-3-540-30117-2\_11},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/StandaertOQP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/DormaleBQ04,
  author       = {Guerric Meurice de Dormale and
                  Philippe Bulens and
                  Jean{-}Jacques Quisquater},
  editor       = {J{\"{u}}rgen Becker and
                  Marco Platzner and
                  Serge Vernalde},
  title        = {Efficient Modular Division Implementation: {ECC} over GF(p) Affine
                  Coordinates Application},
  booktitle    = {Field Programmable Logic and Application, 14th International Conference
                  , {FPL} 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3203},
  pages        = {231--240},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30117-2\_25},
  doi          = {10.1007/978-3-540-30117-2\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/DormaleBQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/DormaleBQ04,
  author       = {Guerric Meurice de Dormale and
                  Philippe Bulens and
                  Jean{-}Jacques Quisquater},
  editor       = {Oliver Diessel and
                  John Williams},
  title        = {An improved Montgomery modular inversion targeted for efficient implementation
                  on {FPGA}},
  booktitle    = {Proceedings of the 2004 {IEEE} International Conference on Field-Programmable
                  Technology, Brisbane, Australia, December 6-8, 2004},
  pages        = {441--444},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/FPT.2004.1393320},
  doi          = {10.1109/FPT.2004.1393320},
  timestamp    = {Fri, 22 Nov 2019 15:44:53 +0100},
  biburl       = {https://dblp.org/rec/conf/fpt/DormaleBQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/StandaertPRQL04,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Piret and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {{ICEBERG} : An Involutional Cipher Efficient for Block Encryption
                  in Reconfigurable Hardware},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {279--299},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_18},
  doi          = {10.1007/978-3-540-25937-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/StandaertPRQL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/CathaloLQ04,
  author       = {Julien Cathalo and
                  Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Cryptanalysis of a Verifiably Committed Signature Scheme Based on
                  {GPS} and {RSA}},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {52--60},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_5},
  doi          = {10.1007/978-3-540-30144-8\_5},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/CathaloLQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/RouvroySQL04,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Compact and Efficient Encryption/Decryption Module for {FPGA} Implementation
                  of the {AES} Rijndael Very Well Suited for Small Embedded Applications},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {583--587},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286716},
  doi          = {10.1109/ITCC.2004.1286716},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/RouvroySQL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertQ04,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {187--200},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_14},
  doi          = {10.1007/978-3-540-24632-9\_14},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PiretQ04,
  author       = {Gilles Piret and
                  Jean{-}Jacques Quisquater},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {Security of the {MISTY} Structure in the Luby-Rackoff Model: Improved
                  Results},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {100--113},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_7},
  doi          = {10.1007/978-3-540-30564-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PiretQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/LibertQ04,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Improved Signcryption from q-Diffie-Hellman Problems},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {220--234},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_16},
  doi          = {10.1007/978-3-540-30598-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/LibertQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/2004,
  editor       = {Jean{-}Jacques Quisquater and
                  Pierre Paradinas and
                  Yves Deswarte and
                  Anas Abou El Kalam},
  title        = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World
                  Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International
                  Conference on Smart Card Research and Advanced Applications (CARDIS),
                  22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {153},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  isbn         = {1-4020-8146-4},
  timestamp    = {Wed, 16 Jul 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2004,
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b99451},
  doi          = {10.1007/B99451},
  isbn         = {3-540-22666-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertQ04,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  title        = {The Exact Security of an Identity Based Signature and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CietNPQ04,
  author       = {Mathieu Ciet and
                  Michael Neve and
                  Eric Peeters and
                  Jean{-}Jacques Quisquater},
  title        = {Parallel {FPGA} Implementation of {RSA} with Residue Number Systems
                  - Can side-channel threats be avoided? - Extended version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CietNPQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PereiraQ03,
  author       = {Olivier Pereira and
                  Jean{-}Jacques Quisquater},
  title        = {Some Attacks Upon Authenticated Group Key Agreement Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {555--580},
  year         = {2003},
  url          = {https://doi.org/10.3233/jcs-2003-11404},
  doi          = {10.3233/JCS-2003-11404},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PereiraQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/NeveFQ03,
  author       = {Amaury N{\`{e}}ve and
                  Denis Flandre and
                  Jean{-}Jacques Quisquater},
  title        = {{SOI} Technology for Future High-Performance Smart Cards},
  journal      = {{IEEE} Micro},
  volume       = {23},
  number       = {3},
  pages        = {58--67},
  year         = {2003},
  url          = {https://doi.org/10.1109/MM.2003.1209467},
  doi          = {10.1109/MM.2003.1209467},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/NeveFQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/RouvroySQL03,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Efficient Uses of FPGAs for Implementations of {DES} and Its Experimental
                  Linear Cryptanalysis},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {4},
  pages        = {473--482},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1190588},
  doi          = {10.1109/TC.2003.1190588},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/RouvroySQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PiretQ03,
  author       = {Gilles Piret and
                  Jean{-}Jacques Quisquater},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Differential Fault Attack Technique against {SPN} Structures, with
                  Application to the {AES} and {KHAZAD}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {77--88},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_7},
  doi          = {10.1007/978-3-540-45238-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PiretQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CathaloKQ03,
  author       = {Julien Cathalo and
                  Fran{\c{c}}ois Koeune and
                  Jean{-}Jacques Quisquater},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A New Type of Timing Attack: Application to {GPS}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {291--303},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_24},
  doi          = {10.1007/978-3-540-45238-6\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CathaloKQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertRQL03,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Efficient Implementation of Rijndael Encryption in Reconfigurable
                  Hardware: Improvements and Design Tradeoffs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {334--350},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_27},
  doi          = {10.1007/978-3-540-45238-6\_27},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertRQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/RaghunathanRHQ03,
  author       = {Anand Raghunathan and
                  Srivaths Ravi and
                  Sunil Hattangady and
                  Jean{-}Jacques Quisquater},
  title        = {Securing Mobile Appliances: New Challenges for the System Designer},
  booktitle    = {2003 Design, Automation and Test in Europe Conference and Exposition
                  {(DATE} 2003), 3-7 March 2003, Munich, Germany},
  pages        = {10176--10183},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DATE.2003.1186383},
  doi          = {10.1109/DATE.2003.1186383},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/RaghunathanRHQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CietLSQ03,
  author       = {Mathieu Ciet and
                  Tanja Lange and
                  Francesco Sica and
                  Jean{-}Jacques Quisquater},
  editor       = {Eli Biham},
  title        = {Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using
                  Fast Endomorphisms},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {388--400},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_24},
  doi          = {10.1007/3-540-39200-9\_24},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CietLSQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/StandaertRQL03,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Steve Trimberger and
                  Russell Tessier},
  title        = {A methodology to implement block ciphers in reconfigurable hardware
                  and its application to fast and compact {AES} {RIJNDAEL}},
  booktitle    = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable
                  Gate Arrays, {FPGA} 2003, Monterey, CA, USA, February 23-25, 2003},
  pages        = {216--224},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/611817.611849},
  doi          = {10.1145/611817.611849},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/StandaertRQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/RouvroySQL03,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Steve Trimberger and
                  Russell Tessier},
  title        = {Design strategies and modified descriptions to optimize cipher {FPGA}
                  implementations: fast and compact results for {DES} and triple-DES},
  booktitle    = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable
                  Gate Arrays, {FPGA} 2003, Monterey, CA, USA, February 23-25, 2003},
  pages        = {247},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/611817.611879},
  doi          = {10.1145/611817.611879},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/RouvroySQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/RouvroySQL03,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Peter Y. K. Cheung and
                  George A. Constantinides and
                  Jos{\'{e}} T. de Sousa},
  title        = {Design Strategies and Modified Descriptions to Optimize Cipher {FPGA}
                  Implementations: Fast and Compact Results for {DES} and Triple-DES},
  booktitle    = {Field Programmable Logic and Application, 13th International Conference,
                  {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2778},
  pages        = {181--193},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45234-8\_19},
  doi          = {10.1007/978-3-540-45234-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/RouvroySQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/StandaertOSQ03,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel and
                  David Samyde and
                  Jean{-}Jacques Quisquater},
  editor       = {Peter Y. K. Cheung and
                  George A. Constantinides and
                  Jos{\'{e}} T. de Sousa},
  title        = {Power Analysis of FPGAs: How Practical is the Attack?},
  booktitle    = {Field Programmable Logic and Application, 13th International Conference,
                  {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2778},
  pages        = {701--711},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45234-8\_68},
  doi          = {10.1007/978-3-540-45234-8\_68},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/StandaertOSQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/RouvroySQL03,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Efficient {FPGA} Implementation of Block Cipher {MISTY1}},
  booktitle    = {17th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings},
  pages        = {185},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IPDPS.2003.1213343},
  doi          = {10.1109/IPDPS.2003.1213343},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/RouvroySQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/LibertQ03,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  title        = {A new identity based signcryption scheme from pairings},
  booktitle    = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La
                  Sorbonne, Paris, France, 31 March - 4 April, 2003},
  pages        = {155--158},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ITW.2003.1216718},
  doi          = {10.1109/ITW.2003.1216718},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/LibertQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/LibertQ03,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Elizabeth Borowsky and
                  Sergio Rajsbaum},
  title        = {Efficient revocation and threshold pairing based cryptosystems},
  booktitle    = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
                  Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
                  13-16, 2003},
  pages        = {163--171},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/872035.872059},
  doi          = {10.1145/872035.872059},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/LibertQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sisw/NevePSQ03,
  author       = {Michael Neve and
                  Eric Peeters and
                  David Samyde and
                  Jean{-}Jacques Quisquater},
  title        = {Memories: {A} Survey of Their Secure Uses in Smart Cards},
  booktitle    = {2nd International {IEEE} Security in Storage Workshop {(SISW} 2003),
                  Information Assurance, The Storage Security Perspective, 31 October
                  2003, Washington, DC, {USA}},
  pages        = {62--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SISW.2003.10004},
  doi          = {10.1109/SISW.2003.10004},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sisw/NevePSQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/QuisquaterS03,
  author       = {Jean{-}Jacques Quisquater and
                  David Samyde},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong},
  title        = {Signal processing for smart cards},
  booktitle    = {Security and Watermarking of Multimedia Contents V, Santa Clara, CA,
                  USA, January 20, 2003},
  series       = {{SPIE} Proceedings},
  volume       = {5020},
  pages        = {229--239},
  publisher    = {{SPIE}},
  year         = {2003},
  url          = {https://doi.org/10.1117/12.477333},
  doi          = {10.1117/12.477333},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/QuisquaterS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/DeswarteQS03,
  author       = {Yves Deswarte and
                  Jean{-}Jacques Quisquater and
                  Ayda Sa{\"{\i}}dane},
  editor       = {Sushil Jajodia and
                  Leon Strous},
  title        = {Remote Integrity Checking - How to Trust Files Stored on Untrusted
                  Servers},
  booktitle    = {Integrity and Internal Control in Information Systems {VI} - {IFIP}
                  {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control
                  in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland},
  series       = {{IFIP}},
  volume       = {140},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-7901-X\_1},
  doi          = {10.1007/1-4020-7901-X\_1},
  timestamp    = {Tue, 23 May 2017 01:07:20 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/DeswarteQS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertQ03,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  title        = {New identity based signcryption schemes from pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PiretQ03,
  author       = {Gilles Piret and
                  Jean{-}Jacques Quisquater},
  title        = {Integral Cryptanalysis on reduced-round Safer++},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PiretQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertQ03a,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  title        = {Identity Based Undeniable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertQ03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Quisquater02,
  author       = {Jean{-}Jacques Quisquater},
  editor       = {Peter Honeyman},
  title        = {Awards},
  booktitle    = {Proceedings of the Fifth Smart Card Research and Advanced Application
                  Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  publisher    = {{USENIX}},
  year         = {2002},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Quisquater02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/QuisquaterS02,
  author       = {Jean{-}Jacques Quisquater and
                  David Samyde},
  editor       = {Peter Honeyman},
  title        = {Automatic Code Recognition for Smartcards Using a Kohonen Neural Network},
  booktitle    = {Proceedings of the Fifth Smart Card Research and Advanced Application
                  Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/cardis02/quisquater.html},
  timestamp    = {Tue, 14 Sep 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/QuisquaterS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Quisquater02,
  author       = {Jean{-}Jacques Quisquater},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {{CHES:} Past, Present, and Future},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {1},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_1},
  doi          = {10.1007/3-540-36400-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Quisquater02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CietQS02,
  author       = {Mathieu Ciet and
                  Jean{-}Jacques Quisquater and
                  Francesco Sica},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Preventing Differential Analysis in {GLV} Elliptic Curve Scalar Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {540--550},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_39},
  doi          = {10.1007/3-540-36400-5\_39},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CietQS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertRQL02,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Time-Memory Tradeoff Using Distinguished Points: New Analysis {\&}
                  {FPGA} Results},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {593--609},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_43},
  doi          = {10.1007/3-540-36400-5\_43},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertRQL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JoyeQYY02,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Sung{-}Ming Yen and
                  Moti Yung},
  editor       = {Bart Preneel},
  title        = {Observability Analysis - Detecting When Improved Cryptosystems Fail},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {17--29},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_2},
  doi          = {10.1007/3-540-45760-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JoyeQYY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/HachezQ02,
  author       = {Ga{\"{e}}l Hachez and
                  Jean{-}Jacques Quisquater},
  title        = {Which directions for asymmetric watermarking?},
  booktitle    = {11th European Signal Processing Conference, {EUSIPCO} 2002, Toulouse,
                  France, September 3-6, 2002},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://ieeexplore.ieee.org/document/7072297/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/HachezQ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/QuisquaterSRDL02,
  author       = {Jean{-}Jacques Quisquater and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Pierre David and
                  Jean{-}Didier Legat},
  editor       = {Manfred Glesner and
                  Peter Zipf and
                  Michel Renovell},
  title        = {A Cryptanalytic Time-Memory Tradeoff: First {FPGA} Implementation},
  booktitle    = {Field-Programmable Logic and Applications, Reconfigurable Computing
                  Is Going Mainstream, 12th International Conference, {FPL} 2002, Montpellier,
                  France, September 2-4, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2438},
  pages        = {780--789},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46117-5\_80},
  doi          = {10.1007/3-540-46117-5\_80},
  timestamp    = {Sat, 30 Sep 2023 09:41:27 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/QuisquaterSRDL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/KoeuneRSQDL02,
  author       = {Fran{\c{c}}ois Koeune and
                  Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Pierre David and
                  Jean{-}Didier Legat},
  editor       = {Manfred Glesner and
                  Peter Zipf and
                  Michel Renovell},
  title        = {An {FPGA} Implementation of the Linear Cryptanalysis},
  booktitle    = {Field-Programmable Logic and Applications, Reconfigurable Computing
                  Is Going Mainstream, 12th International Conference, {FPL} 2002, Montpellier,
                  France, September 2-4, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2438},
  pages        = {845--852},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46117-5\_87},
  doi          = {10.1007/3-540-46117-5\_87},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/KoeuneRSQDL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SicaCQ02,
  author       = {Francesco Sica and
                  Mathieu Ciet and
                  Jean{-}Jacques Quisquater},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient
                  Endomorphisms: Elliptic and Hyperelliptic Curves},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_3},
  doi          = {10.1007/3-540-36492-7\_3},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SicaCQ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sisw/SamydeSAQ02,
  author       = {David Samyde and
                  Sergei P. Skorobogatov and
                  Ross J. Anderson and
                  Jean{-}Jacques Quisquater},
  title        = {On a New Way to Read Data from Memory},
  booktitle    = {Proceedings of the First International {IEEE} Security in Storage
                  Workshop, {SISW} 2002, Greenbelt, Maryland, USA, December 11, 2002},
  pages        = {65--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SISW.2002.1183512},
  doi          = {10.1109/SISW.2002.1183512},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sisw/SamydeSAQ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/GuillouUQ01,
  author       = {Louis C. Guillou and
                  Michel Ugon and
                  Jean{-}Jacques Quisquater},
  title        = {Cryptographic authentication protocols for smart cards},
  journal      = {Comput. Networks},
  volume       = {36},
  number       = {4},
  pages        = {437--451},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1389-1286(01)00165-7},
  doi          = {10.1016/S1389-1286(01)00165-7},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/GuillouUQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JoyeQT01,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Tsuyoshi Takagi},
  title        = {How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic
                  Curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {23},
  number       = {3},
  pages        = {297--316},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JoyeQT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BressonCPQ01,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval and
                  Jean{-}Jacques Quisquater},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Provably authenticated group Diffie-Hellman key exchange},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {255--264},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502018},
  doi          = {10.1145/501983.502018},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BressonCPQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeQ01,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Hessian Elliptic Curves and Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {402--410},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_33},
  doi          = {10.1007/3-540-44709-1\_33},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/JoyeQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PereiraQ01,
  author       = {Olivier Pereira and
                  Jean{-}Jacques Quisquater},
  title        = {A Security Analysis of the Cliques Protocols Suites},
  booktitle    = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
                  11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages        = {73--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSFW.2001.930137},
  doi          = {10.1109/CSFW.2001.930137},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PereiraQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JoyeQY01,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {David Naccache},
  title        = {On the Power of Misbehaving Adversaries and Security Analysis of the
                  Original {EPOC}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {208--222},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_16},
  doi          = {10.1007/3-540-45353-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JoyeQY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esmart/QuisquaterS01,
  author       = {Jean{-}Jacques Quisquater and
                  David Samyde},
  editor       = {Isabelle Attali and
                  Thomas P. Jensen},
  title        = {ElectroMagnetic Analysis {(EMA):} Measures and Counter-Measures for
                  Smart Cards},
  booktitle    = {Smart Card Programming and Security, International Conference on Research
                  in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2140},
  pages        = {200--210},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45418-7\_17},
  doi          = {10.1007/3-540-45418-7\_17},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esmart/QuisquaterS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/JoyeQ01,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {Bahram Honary},
  title        = {On Rabin-Type Signatures},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {99--113},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_10},
  doi          = {10.1007/3-540-45325-3\_10},
  timestamp    = {Wed, 18 Mar 2020 16:01:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/JoyeQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchindlerKQ01,
  author       = {Werner Schindler and
                  Fran{\c{c}}ois Koeune and
                  Jean{-}Jacques Quisquater},
  editor       = {Bahram Honary},
  title        = {Improving Divide and Conquer Attacks against Cryptosystems by Better
                  Error Detection / Correction Strategies},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {245--267},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_22},
  doi          = {10.1007/3-540-45325-3\_22},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SchindlerKQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/CietQS01,
  author       = {Mathieu Ciet and
                  Jean{-}Jacques Quisquater and
                  Francesco Sica},
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {A Secure Family of Composite Finite Fields Suitable for Fast Implementation
                  of Elliptic Curve Cryptography},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  pages        = {108--116},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3\_11},
  doi          = {10.1007/3-540-45311-3\_11},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/CietQS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PereiraQ01,
  author       = {Olivier Pereira and
                  Jean{-}Jacques Quisquater},
  editor       = {Michel Dupuy and
                  Pierre Paradinas},
  title        = {Security Analysis of the Cliques Protocols Suites: First Results},
  booktitle    = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
                  Annual Working Conference on Information Security (IFIP/Sec'01), June
                  11-13, 2001, Paris, France},
  series       = {{IFIP} Conference Proceedings},
  volume       = {193},
  pages        = {151--166},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Fri, 25 Jul 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PereiraQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HachezKQ00,
  author       = {Ga{\"{e}}l Hachez and
                  Fran{\c{c}}ois Koeune and
                  Jean{-}Jacques Quisquater},
  editor       = {Josep Domingo{-}Ferrer and
                  David Chan and
                  Anthony Watson},
  title        = {Biometrics, Access Control, Smart Cards: {A} not so Simple Combination},
  booktitle    = {Smart Card Research and Advanced Applications, Proceedings of the
                  Fourth Working Conference on Smart Card Research and Advanced Applications,
                  {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {180},
  pages        = {273--288},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Thu, 01 Aug 2002 11:36:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HachezKQ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HachezQ00,
  author       = {Ga{\"{e}}l Hachez and
                  Jean{-}Jacques Quisquater},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Montgomery Exponentiation with no Final Subtractions: Improved Results},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {293--301},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_23},
  doi          = {10.1007/3-540-44499-8\_23},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HachezQ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HachezHJQV00,
  author       = {Ga{\"{e}}l Hachez and
                  Laurent Den Hollander and
                  Mehrdad Jalali and
                  Jean{-}Jacques Quisquater and
                  Christophe Vasserot},
  editor       = {Josef Pieprzyk and
                  Eiji Okamoto and
                  Jennifer Seberry},
  title        = {Towards a Practical Secure Framework for Mobile Code Commerce},
  booktitle    = {Information Security, Third International Workshop, {ISW} 2000, Wollongong,
                  NSW, Australia, December 20-21, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1975},
  pages        = {164--178},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44456-4\_13},
  doi          = {10.1007/3-540-44456-4\_13},
  timestamp    = {Sun, 02 Jun 2019 21:14:19 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HachezHJQV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/1998,
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10721064},
  doi          = {10.1007/10721064},
  isbn         = {3-540-67923-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JoyeLQ99,
  author       = {Marc Joye and
                  Arjen K. Lenstra and
                  Jean{-}Jacques Quisquater},
  title        = {Chinese Remaindering Based Cryptosystems in the Presence of Faults},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {241--245},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900055},
  doi          = {10.1007/S001459900055},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JoyeLQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acpc/VeriansLQM99,
  author       = {Xavier Verians and
                  Jean{-}Didier Legat and
                  Jean{-}Jacques Quisquater and
                  Beno{\^{\i}}t Macq},
  editor       = {Peter Zinterhof and
                  Mari{\'{a}}n Vajtersic and
                  Andreas Uhl},
  title        = {A New Parallelism Management Scheme for Multiprocessor Systems},
  booktitle    = {Parallel Computation, 4th International {ACPC} Conference Including
                  Special Tracks on Parallel Numerics (ParNum'99) and Parallel Computing
                  in Image Processing, Video Processing, and Multimedia, Salzburg, Austria,
                  February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1557},
  pages        = {246--256},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49164-3\_23},
  doi          = {10.1007/3-540-49164-3\_23},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acpc/VeriansLQM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euromicro/GilmontLQ99,
  author       = {Tanguy Gilmont and
                  Jean{-}Didier Legat and
                  Jean{-}Jacques Quisquater},
  title        = {Enhancing Security in the Memory Management Unit},
  booktitle    = {25th {EUROMICRO} '99 Conference, Informatics: Theory and Practice
                  for the New Millenium, 8-10 September 1999, Milan, Italy},
  pages        = {1449},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/EURMIC.1999.794507},
  doi          = {10.1109/EURMIC.1999.794507},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euromicro/GilmontLQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/VeriansLQM99,
  author       = {Xavier Verians and
                  Jean{-}Didier Legat and
                  Jean{-}Jacques Quisquater and
                  Beno{\^{\i}}t Macq},
  editor       = {Patrick Amestoy and
                  Philippe Berger and
                  Michel J. Dayd{\'{e}} and
                  Iain S. Duff and
                  Val{\'{e}}rie Frayss{\'{e}} and
                  Luc Giraud and
                  Daniel Ruiz},
  title        = {A Graph-Oriented Task Manager for Small Multiprocessor Systems},
  booktitle    = {Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference,
                  Toulouse, France, August 31 - September 3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1685},
  pages        = {735--744},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48311-X\_103},
  doi          = {10.1007/3-540-48311-X\_103},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/VeriansLQM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SternHKQ99,
  author       = {Julien P. Stern and
                  Ga{\"{e}}l Hachez and
                  Fran{\c{c}}ois Koeune and
                  Jean{-}Jacques Quisquater},
  editor       = {Andreas Pfitzmann},
  title        = {Robust Object Watermarking: Application to Code},
  booktitle    = {Information Hiding, Third International Workshop, IH'99, Dresden,
                  Germany, September 29 - October 1, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1768},
  pages        = {368--378},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719724\_25},
  doi          = {10.1007/10719724\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/SternHKQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DesmedtLQ99,
  author       = {Yvo Desmedt and
                  Tri Van Le and
                  Jean{-}Jacques Quisquater},
  editor       = {Andreas Pfitzmann},
  title        = {Nonbinary Audio Cryptography},
  booktitle    = {Information Hiding, Third International Workshop, IH'99, Dresden,
                  Germany, September 29 - October 1, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1768},
  pages        = {478--489},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719724\_33},
  doi          = {10.1007/10719724\_33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DesmedtLQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcard/NeveFQ99,
  author       = {Amaury N{\`{e}}ve and
                  Denis Flandre and
                  Jean{-}Jacques Quisquater},
  editor       = {Scott B. Guthery and
                  Peter Honeyman},
  title        = {Feasibility of the Smart Card in Silicon-On-Insulator {(SOI)} Technology},
  booktitle    = {Proceedings of the 1st Workshop on Smartcard Technology, Smartcard
                  1999, Chicago, Illinois, USA, May 10-11, 1999},
  publisher    = {{USENIX} Association},
  year         = {1999},
  url          = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/feasibility-smart-card-silicon-insulator-soi},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcard/NeveFQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/GilmontLQ99,
  author       = {Tanguy Gilmont and
                  Jean{-}Didier Legat and
                  Jean{-}Jacques Quisquater},
  editor       = {Ping Wah Wong and
                  Edward J. Delp III},
  title        = {Architecture of security management unit for safe hosting of multiple
                  agents},
  booktitle    = {Security and Watermarking of Multimedia Contents, San Jose, CA, USA,
                  January 23, 1999},
  series       = {{SPIE} Proceedings},
  volume       = {3657},
  pages        = {472--483},
  publisher    = {{SPIE}},
  year         = {1999},
  url          = {https://doi.org/10.1117/12.344697},
  doi          = {10.1117/12.344697},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/GilmontLQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/Kabasele-TendayQL99,
  author       = {Jean{-}Marie Kabasele{-}Tenday and
                  Jean{-}Jacques Quisquater and
                  Marc Lobelle},
  title        = {Deriving a Role-Based Access Control Model from the {OBBAC} Model},
  booktitle    = {8th Workshop on Enabling Technologies {(WETICE} '99), Infrastructure
                  for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA,
                  Proceedings},
  pages        = {147--151},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ENABL.1999.805190},
  doi          = {10.1109/ENABL.1999.805190},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/Kabasele-TendayQL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/MassiasAQ99,
  author       = {Henri Massias and
                  X. Serret Avila and
                  Jean{-}Jacques Quisquater},
  title        = {Timestamps: Main Issues on Their Use and Implementation},
  booktitle    = {8th Workshop on Enabling Technologies {(WETICE} '99), Infrastructure
                  for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA,
                  Proceedings},
  pages        = {178--183},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ENABL.1999.805196},
  doi          = {10.1109/ENABL.1999.805196},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/MassiasAQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cg/DarmstaedterDQM98,
  author       = {V. Darmstaedter and
                  Jean{-}Fran{\c{c}}ois Delaigle and
                  Jean{-}Jacques Quisquater and
                  Beno{\^{\i}}t Macq},
  title        = {Low cost spatial watermarking},
  journal      = {Comput. Graph.},
  volume       = {22},
  number       = {4},
  pages        = {417--424},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0097-8493(98)00031-4},
  doi          = {10.1016/S0097-8493(98)00031-4},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cg/DarmstaedterDQM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JoyeQ98,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Reducing the Elliptic Curve Cryptosystem of Meyer-M{\"{u}}uller
                  to the Cryptosystem of Rabin-Williams},
  journal      = {Des. Codes Cryptogr.},
  volume       = {14},
  number       = {1},
  pages        = {53--56},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008256404676},
  doi          = {10.1023/A:1008256404676},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JoyeQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GilbertGOQ98,
  author       = {Henri Gilbert and
                  Dipankar Gupta and
                  Andrew M. Odlyzko and
                  Jean{-}Jacques Quisquater},
  title        = {Attacks on Shamir's 'RSA for Paranoids'},
  journal      = {Inf. Process. Lett.},
  volume       = {68},
  number       = {4},
  pages        = {197--199},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(98)00160-4},
  doi          = {10.1016/S0020-0190(98)00160-4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/GilbertGOQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DesmedtHQ98,
  author       = {Yvo Desmedt and
                  Shuang Hou and
                  Jean{-}Jacques Quisquater},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Audio and Optical Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {392--404},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_31},
  doi          = {10.1007/3-540-49649-1\_31},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DesmedtHQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DhemKLMQW98,
  author       = {Jean{-}Fran{\c{c}}ois Dhem and
                  Fran{\c{c}}ois Koeune and
                  Philippe{-}Alexandre Leroux and
                  Patrick Mestr{\'{e}} and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Louis Willems},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {A Practical Implementation of the Timing Attack},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {167--182},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_15},
  doi          = {10.1007/10721064\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DhemKLMQW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DhemQ98,
  author       = {Jean{-}Fran{\c{c}}ois Dhem and
                  Jean{-}Jacques Quisquater},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Recent Results on Modular Multiplications for Smart Cards},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {336--352},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_31},
  doi          = {10.1007/10721064\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DhemQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/EizenbergQ98,
  author       = {G{\'{e}}rard Eizenberg and
                  Jean{-}Jacques Quisquater},
  editor       = {Jean{-}Jacques Quisquater and
                  Yves Deswarte and
                  Catherine Meadows and
                  Dieter Gollmann},
  title        = {Panel Session: Watermarking},
  booktitle    = {Computer Security - {ESORICS} 98, 5th European Symposium on Research
                  in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1485},
  pages        = {275},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055869},
  doi          = {10.1007/BFB0055869},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/EizenbergQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DesmedtHQ98,
  author       = {Yvo Desmedt and
                  Shuang Hou and
                  Jean{-}Jacques Quisquater},
  editor       = {David Aucsmith},
  title        = {Cerebral Cryptography},
  booktitle    = {Information Hiding, Second International Workshop, Portland, Oregon,
                  USA, April 14-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1525},
  pages        = {62--72},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49380-8\_5},
  doi          = {10.1007/3-540-49380-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DesmedtHQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/1998,
  editor       = {Jean{-}Jacques Quisquater and
                  Yves Deswarte and
                  Catherine Meadows and
                  Dieter Gollmann},
  title        = {Computer Security - {ESORICS} 98, 5th European Symposium on Research
                  in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1485},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055851},
  doi          = {10.1007/BFB0055851},
  isbn         = {3-540-65004-0},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Quisquater97,
  author       = {Jean{-}Jacques Quisquater},
  title        = {The adolescence of smart cards},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {3--7},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-739X(97)89108-X},
  doi          = {10.1016/S0167-739X(97)89108-X},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/Quisquater97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DhemQ97,
  author       = {Jean{-}Fran{\c{c}}ois Dhem and
                  Jean{-}Jacques Quisquater},
  title        = {Lossless compression algorithms for smart cards: {A} progress report},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {27--38},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-739X(97)89109-1},
  doi          = {10.1016/S0167-739X(97)89109-1},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/DhemQ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/QuisquaterJ97,
  author       = {Jean{-}Jacques Quisquater and
                  Marc Joye},
  title        = {Authentication of Sequences with the {SL2} Hash Function: Application
                  to Video Sequences},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {213--224},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5303},
  doi          = {10.3233/JCS-1997-5303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/QuisquaterJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JoyeQ97,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {On the Importance of Securing Your Bins: The Garbage-man-in-the-middle
                  Attack},
  booktitle    = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  pages        = {135--141},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266420.266449},
  doi          = {10.1145/266420.266449},
  timestamp    = {Tue, 10 Nov 2020 20:00:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JoyeQ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecmast/DelaigleVGMQ97,
  author       = {Jean{-}Fran{\c{c}}ois Delaigle and
                  Christophe De Vleeschouwer and
                  Francois Goffin and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Jacques Quisquater},
  editor       = {Serge Fdida and
                  Michele Morganti},
  title        = {Low Cost Watermarking Based on a Human Vision Model},
  booktitle    = {Multimedia Applications, Services and Techniques - {ECMAST} '97, Second
                  European Conference, Milan, Italy, May 21-23, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1242},
  pages        = {153--167},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0037350},
  doi          = {10.1007/BFB0037350},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecmast/DelaigleVGMQ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BleichenbacherJQ97,
  author       = {Daniel Bleichenbacher and
                  Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {A new and optimal chosen-message attack on RSA-type cryptosystems},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {302--313},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028486},
  doi          = {10.1007/BFB0028486},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/BleichenbacherJQ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/JoyeQBD97,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Michael Darnell},
  title        = {RSA-type Signatures in the Presence of Transient Faults},
  booktitle    = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1355},
  pages        = {155--160},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0024460},
  doi          = {10.1007/BFB0024460},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/JoyeQBD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spieSR/GoffinDVMQ97,
  author       = {Francois Goffin and
                  Jean{-}Fran{\c{c}}ois Delaigle and
                  Christophe De Vleeschouwer and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Jacques Quisquater},
  editor       = {Ishwar K. Sethi and
                  Ramesh C. Jain},
  title        = {Low-Cost Perceptive Digital Picture Watermarking Method},
  booktitle    = {Storage and Retrieval for Image and Video Databases V, San Jose, CA,
                  USA, February 8-14, 1997},
  series       = {{SPIE} Proceedings},
  volume       = {3022},
  pages        = {264--277},
  publisher    = {{SPIE}},
  year         = {1997},
  url          = {https://doi.org/10.1117/12.263415},
  doi          = {10.1117/12.263415},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spieSR/GoffinDVMQ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spieSR/QuisquaterMJDB97,
  author       = {Jean{-}Jacques Quisquater and
                  Beno{\^{\i}}t Macq and
                  Marc Joye and
                  N. Degand and
                  A. Bernard},
  editor       = {Ishwar K. Sethi and
                  Ramesh C. Jain},
  title        = {Practical Solution to Authentication of Images with a Secure Camera},
  booktitle    = {Storage and Retrieval for Image and Video Databases V, San Jose, CA,
                  USA, February 8-14, 1997},
  series       = {{SPIE} Proceedings},
  volume       = {3022},
  pages        = {290--297},
  publisher    = {{SPIE}},
  year         = {1997},
  url          = {https://doi.org/10.1117/12.263417},
  doi          = {10.1117/12.263417},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spieSR/QuisquaterMJDB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/DhemVQ96,
  author       = {Jean{-}Fran{\c{c}}ois Dhem and
                  Daniel Veithen and
                  Jean{-}Jacques Quisquater},
  title        = {{SCALPS:} Smart card for limited payment systems},
  journal      = {{IEEE} Micro},
  volume       = {16},
  number       = {3},
  pages        = {42--51},
  year         = {1996},
  url          = {https://doi.org/10.1109/40.502405},
  doi          = {10.1109/40.502405},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/DhemVQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/FerreiraMMQW96,
  author       = {Ronald Ferreira and
                  Ralf Malzahn and
                  Peter Marissen and
                  Jean{-}Jacques Quisquater and
                  Thomas Wille},
  title        = {{FAME:} {A} 3rd Generation Coprocessor for Optimising Public Key Cryptosystems
                  in Smart Card Applications},
  booktitle    = {Proceedings of the Second Smart Card Research and Advanced Application
                  Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam,
                  The Netherlands},
  year         = {1996},
  timestamp    = {Fri, 15 Oct 2004 16:01:14 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/FerreiraMMQW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HartelQ96,
  author       = {Pieter H. Hartel and
                  Jean{-}Jacques Quisquater},
  title        = {Introduction to {CARDIS} 1996},
  booktitle    = {Proceedings of the Second Smart Card Research and Advanced Application
                  Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam,
                  The Netherlands},
  year         = {1996},
  timestamp    = {Fri, 15 Oct 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HartelQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/LecatQ96,
  author       = {Renaud Lecat and
                  Jean{-}Jacques Quisquater},
  title        = {Efficient Compression Algorithms for Smart Cards},
  booktitle    = {Proceedings of the Second Smart Card Research and Advanced Application
                  Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam,
                  The Netherlands},
  year         = {1996},
  timestamp    = {Fri, 15 Oct 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/LecatQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/JoyeQ96,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {Rebecca N. Wright and
                  Peter G. Neumann},
  title        = {Cryptanalysis of RSA-type cryptosystems: {A} visit},
  booktitle    = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4,
                  1996},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {38},
  pages        = {21--31},
  publisher    = {{DIMACS/AMS}},
  year         = {1996},
  url          = {https://doi.org/10.1090/dimacs/038/03},
  doi          = {10.1090/DIMACS/038/03},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/JoyeQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/EizenbergGKQ96,
  author       = {G{\'{e}}rard Eizenberg and
                  Dominique Gonthier and
                  Alistair Kelman and
                  Jean{-}Jacques Quisquater},
  editor       = {Elisa Bertino and
                  Helmut Kurth and
                  Giancarlo Martella and
                  Emilio Montolivo},
  title        = {Authors' Rights and Copyright Protection},
  booktitle    = {Computer Security - {ESORICS} 96, 4th European Symposium on Research
                  in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1146},
  pages        = {324},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61770-1\_44},
  doi          = {10.1007/3-540-61770-1\_44},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/EizenbergGKQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JoyeQ96,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {T. Mark A. Lomas},
  title        = {Protocol Failures for RSA-Like Functions Using Lucas Sequences and
                  Elliptic Curves},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {93--100},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_8},
  doi          = {10.1007/3-540-62494-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JoyeQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/MacqQ95,
  author       = {Beno{\^{\i}}t Macq and
                  Jean{-}Jacques Quisquater},
  title        = {Cryptology for digital {TV} broadcasting},
  journal      = {Proc. {IEEE}},
  volume       = {83},
  number       = {6},
  pages        = {944--957},
  year         = {1995},
  url          = {https://doi.org/10.1109/5.387094},
  doi          = {10.1109/5.387094},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/MacqQ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cost/BoucqueauLMQ95,
  author       = {Jean{-}Marc Boucqueau and
                  Sylvie Lacroix and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Jacques Quisquater},
  editor       = {David Hutchison and
                  Henning Christiansen and
                  Geoff Coulson and
                  Andr{\'{e}} A. S. Danthine},
  title        = {Equitable Conditional Access and Copyright Protection for Image Based
                  on Trusted Third Parties},
  booktitle    = {Teleservices and Multimedia Communications, Second International {COST}
                  237 Workshop, Copenhagen, Denmark, November 20-22, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1052},
  pages        = {229--243},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-61028-6\_28},
  doi          = {10.1007/3-540-61028-6\_28},
  timestamp    = {Mon, 26 Sep 2022 16:14:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cost/BoucqueauLMQ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BegiunQ95,
  author       = {Philippe B{\'{e}}guin and
                  Jean{-}Jacques Quisquater},
  editor       = {Don Coppersmith},
  title        = {Fast Server-Aided {RSA} Signatures Secure Against Active Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {57--69},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_5},
  doi          = {10.1007/3-540-44750-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BegiunQ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/95,
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X},
  doi          = {10.1007/3-540-49264-X},
  isbn         = {3-540-59409-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BeguinQ94,
  author       = {Philippe B{\'{e}}guin and
                  Jean{-}Jacques Quisquater},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Secure Acceleration of {DSS} Signatures Using Insecure Server},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000439},
  doi          = {10.1007/BFB0000439},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BeguinQ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DelosQ94,
  author       = {Olivier Delos and
                  Jean{-}Jacques Quisquater},
  editor       = {Yvo Desmedt},
  title        = {An Identity-Based Signature Scheme with Bounded Life-Span},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {83--94},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_10},
  doi          = {10.1007/3-540-48658-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DelosQ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fiwac/DelosQ93,
  author       = {Olivier Delos and
                  Jean{-}Jacques Quisquater},
  editor       = {G{\'{e}}rard D. Cohen and
                  Simon Litsyn and
                  Antoine Lobstein and
                  Gilles Z{\'{e}}mor},
  title        = {Efficient multi-signature schemes for cooperating entities},
  booktitle    = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July
                  19-21, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {781},
  pages        = {63--74},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57843-9\_9},
  doi          = {10.1007/3-540-57843-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/fiwac/DelosQ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/BermondDQ92,
  author       = {Jean{-}Claude Bermond and
                  Charles Delorme and
                  Jean{-}Jacques Quisquater},
  title        = {Table of Large (\emph{Delta, D})-Graphs},
  journal      = {Discret. Appl. Math.},
  volume       = {37/38},
  pages        = {575--577},
  year         = {1992},
  url          = {https://doi.org/10.1016/0166-218X(92)90160-C},
  doi          = {10.1016/0166-218X(92)90160-C},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/BermondDQ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/BermondHQ92,
  author       = {Jean{-}Claude Bermond and
                  Pavol Hell and
                  Jean{-}Jacques Quisquater},
  title        = {Construction of Large Packet Radio Networks},
  journal      = {Parallel Process. Lett.},
  volume       = {2},
  pages        = {3--12},
  year         = {1992},
  url          = {https://doi.org/10.1142/S012962649200012X},
  doi          = {10.1142/S012962649200012X},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppl/BermondHQ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/1992,
  editor       = {Yves Deswarte and
                  G{\'{e}}rard Eizenberg and
                  Jean{-}Jacques Quisquater},
  title        = {Computer Security - {ESORICS} 92, Second European Symposium on Research
                  in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {648},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/BFb0013888},
  doi          = {10.1007/BFB0013888},
  isbn         = {3-540-56246-X},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/1992.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/QuisquaterD91,
  author       = {Jean{-}Jacques Quisquater and
                  Yvo Desmedt},
  title        = {Chinese Lotto as an Exhaustive Code-Breaking Machine},
  journal      = {Computer},
  volume       = {24},
  number       = {11},
  pages        = {14--22},
  year         = {1991},
  url          = {https://doi.org/10.1109/2.116847},
  doi          = {10.1109/2.116847},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/QuisquaterD91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BengioBDGQ91,
  author       = {Samy Bengio and
                  Gilles Brassard and
                  Yvo Desmedt and
                  Claude Goutier and
                  Jean{-}Jacques Quisquater},
  title        = {Secure Implementations of Identification Systems},
  journal      = {J. Cryptol.},
  volume       = {4},
  number       = {3},
  pages        = {175--183},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF00196726},
  doi          = {10.1007/BF00196726},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BengioBDGQ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/WaleffeQ91,
  author       = {Dominique de Waleffe and
                  Jean{-}Jacques Quisquater},
  editor       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {Better Login Protocols for Computer Networks},
  booktitle    = {Computer Security and Industrial Cryptography - State of the Art and
                  Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991},
  series       = {Lecture Notes in Computer Science},
  volume       = {741},
  pages        = {50--70},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57341-0\_55},
  doi          = {10.1007/3-540-57341-0\_55},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/WaleffeQ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WaleffeQ90,
  author       = {Dominique de Waleffe and
                  Jean{-}Jacques Quisquater},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {{CORSAIR:} {A} {SMART} Card for Public Key Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {502--513},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_35},
  doi          = {10.1007/3-540-38424-3\_35},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WaleffeQ90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WaleffeQ90,
  author       = {Dominique de Waleffe and
                  Jean{-}Jacques Quisquater},
  title        = {Better Login Protocols for Computer Networks},
  booktitle    = {{ESORICS} 90 - First European Symposium on Research in Computer Security,
                  October 24-26, 1990, Toulouse, France},
  pages        = {163--172},
  publisher    = {{AFCET}},
  year         = {1990},
  timestamp    = {Mon, 26 May 2008 15:32:38 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WaleffeQ90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GuillouQWLS90,
  author       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater and
                  Michael Walker and
                  Peter Landrock and
                  Caroline Shafer},
  editor       = {Ivan Damg{\aa}rd},
  title        = {Precautions Taken Against Various Potential Attacks in {ISO/IEC} {DIS}
                  9796 "Digital Signature Scheme Giving Message Recovery"},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {465--473},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_42},
  doi          = {10.1007/3-540-46877-3\_42},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GuillouQWLS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/89,
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46885-4},
  doi          = {10.1007/3-540-46885-4},
  isbn         = {3-540-53433-4},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GuillouDQ89,
  author       = {Louis C. Guillou and
                  Marc Davio and
                  Jean{-}Jacques Quisquater},
  title        = {Public-Key Techniques: Randomness and Redundancy},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {2},
  pages        = {167--189},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863880},
  doi          = {10.1080/0161-118991863880},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GuillouDQ89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SoeteQV89,
  author       = {Marijke De Soete and
                  Jean{-}Jacques Quisquater and
                  Klaus Vedder},
  editor       = {Gilles Brassard},
  title        = {A Signature with Shared Verification Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {253--262},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_23},
  doi          = {10.1007/0-387-34805-0\_23},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SoeteQV89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuisquaterD89,
  author       = {Jean{-}Jacques Quisquater and
                  Jean{-}Paul Delescaille},
  editor       = {Gilles Brassard},
  title        = {How Easy is Collision Search. New Results and Applications to {DES}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {408--413},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_38},
  doi          = {10.1007/0-387-34805-0\_38},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/QuisquaterD89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuisquaterQQQGGGGGGB89,
  author       = {Jean{-}Jacques Quisquater and
                  Myriam Quisquater and
                  Muriel Quisquater and
                  Micha{\"{e}}l Quisquater and
                  Louis C. Guillou and
                  Marie Annick Guillou and
                  Ga{\"{\i}}d Guillou and
                  Anna Guillou and
                  Gwenol{\'{e}} Guillou and
                  Soazig Guillou and
                  Thomas A. Berson},
  editor       = {Gilles Brassard},
  title        = {How to Explain Zero-Knowledge Protocols to Your Children},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {628--631},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_60},
  doi          = {10.1007/0-387-34805-0\_60},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/QuisquaterQQQGGGGGGB89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/QuisquaterG89,
  author       = {Jean{-}Jacques Quisquater and
                  Marc Girault},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {102--109},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_13},
  doi          = {10.1007/3-540-46885-4\_13},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/QuisquaterG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/QuisquaterD89,
  author       = {Jean{-}Jacques Quisquater and
                  Jean{-}Paul Delescaille},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {How Easy is Collision Search? Application to {DES} (Extended Summary)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {429--434},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_43},
  doi          = {10.1007/3-540-46885-4\_43},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/QuisquaterD89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/QuisquaterB89,
  author       = {Jean{-}Jacques Quisquater and
                  Andr{\'{e}} Bouckaert},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {Zero-Knowledge Procedures for Confidential Access to Medical Records
                  (Extended Summary)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {662--664},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_64},
  doi          = {10.1007/3-540-46885-4\_64},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/QuisquaterB89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuillouQ88,
  author       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  editor       = {Shafi Goldwasser},
  title        = {A "Paradoxical" Indentity-Based Signature Scheme Resulting
                  from Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {216--231},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_16},
  doi          = {10.1007/0-387-34799-2\_16},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuillouQ88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GuillouQ88,
  author       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  editor       = {Christoph G. G{\"{u}}nther},
  title        = {A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor
                  Minimizing Both Transmission and Memory},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Davos, Switzerland, May
                  25-27, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {330},
  pages        = {123--128},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-45961-8\_11},
  doi          = {10.1007/3-540-45961-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GuillouQ88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Quisquater87,
  author       = {Jean{-}Jacques Quisquater},
  editor       = {Carl Pomerance},
  title        = {Secret Distribution of Keys for Public-Key Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {203--208},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_16},
  doi          = {10.1007/3-540-48184-2\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Quisquater87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuillouQ87,
  author       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  editor       = {Carl Pomerance},
  title        = {Efficient Digital Public-Key Signature with Shadow (Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {223},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_19},
  doi          = {10.1007/3-540-48184-2\_19},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuillouQ87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuisquaterD87,
  author       = {Jean{-}Jacques Quisquater and
                  Jean{-}Paul Delescaille},
  editor       = {Carl Pomerance},
  title        = {Other Cycling Tests for {DES} (Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {255--256},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_23},
  doi          = {10.1007/3-540-48184-2\_23},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/QuisquaterD87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/BermondDQ86,
  author       = {Jean{-}Claude Bermond and
                  Charles Delorme and
                  Jean{-}Jacques Quisquater},
  title        = {Strategies for Interconnection Networks: Some Methods from Graph Theory},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {3},
  number       = {4},
  pages        = {433--449},
  year         = {1986},
  url          = {https://doi.org/10.1016/0743-7315(86)90008-0},
  doi          = {10.1016/0743-7315(86)90008-0},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/BermondDQ86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtQ86,
  author       = {Yvo Desmedt and
                  Jean{-}Jacques Quisquater},
  editor       = {Andrew M. Odlyzko},
  title        = {Public-Key Systems Based on the Difficulty of Tampering (Is There
                  a Difference Between {DES} and RSA?)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California,
                  USA, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {263},
  pages        = {111--117},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-47721-7\_9},
  doi          = {10.1007/3-540-47721-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtQ86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DesmedtHQ86,
  author       = {Yvo Desmedt and
                  Frank Hoornaert and
                  Jean{-}Jacques Quisquater},
  title        = {Several Exhaustive Key Search Machines and {DES}},
  booktitle    = {{EUROCRYPT}},
  pages        = {17--19},
  year         = {1986},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DesmedtHQ86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuisquaterDD85,
  author       = {Jean{-}Jacques Quisquater and
                  Yvo Desmedt and
                  Marc Davio},
  editor       = {Hugh C. Williams},
  title        = {The Importance of "Good" Key Scheduling Schemes (How to
                  Make a Secure {DES} Scheme with {\textless}= 48 Bit Keys)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {537--542},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_43},
  doi          = {10.1007/3-540-39799-X\_43},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/QuisquaterDD85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DavioDGHQ84,
  author       = {Marc Davio and
                  Yvo Desmedt and
                  Jo Goubert and
                  Frank Hoornaert and
                  Jean{-}Jacques Quisquater},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {Efficient Hardware and Software Implementations for the {DES}},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {144--146},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_14},
  doi          = {10.1007/3-540-39568-7\_14},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DavioDGHQ84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtQD84,
  author       = {Yvo Desmedt and
                  Jean{-}Jacques Quisquater and
                  Marc Davio},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {Dependence of Output on Input in {DES:} Small Avalanche Characteristics},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {359--376},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_28},
  doi          = {10.1007/3-540-39568-7\_28},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtQD84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DavioDQ84,
  author       = {Marc Davio and
                  Yvo Desmedt and
                  Jean{-}Jacques Quisquater},
  editor       = {Thomas Beth and
                  Norbert Cot and
                  Ingemar Ingemarsson},
  title        = {Propagation Characteristics of the {DES}},
  booktitle    = {Advances in Cryptology: Proceedings of {EUROCRYPT} 84, {A} Workshop
                  on the Theory and Application of of Cryptographic Techniques, Paris,
                  France, April 9-11, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {209},
  pages        = {62--73},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39757-4\_7},
  doi          = {10.1007/3-540-39757-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DavioDQ84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WoutersVQPNHGFDD83,
  author       = {Marc Davio and
                  Yvo Desmedt and
                  Marc Fosseprez and
                  Ren{\'{e}} Govaerts and
                  Jan Hulsbosch and
                  Patrik Neutjens and
                  Philippe Piret and
                  Jean{-}Jacques Quisquater and
                  Joos Vandewalle and
                  Pascal Wouters},
  editor       = {David Chaum},
  title        = {Analytical Characteristics of the {DES}},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '83, Santa Barbara,
                  California, USA, August 21-24, 1983},
  pages        = {171--202},
  publisher    = {Plenum Press, New York},
  year         = {1983},
  timestamp    = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/WoutersVQPNHGFDD83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BermondDQ82,
  author       = {Jean{-}Claude Bermond and
                  Charles Delorme and
                  Jean{-}Jacques Quisquater},
  title        = {Tables of Large Graphs with Given Degree and Diameter},
  journal      = {Inf. Process. Lett.},
  volume       = {15},
  number       = {1},
  pages        = {10--13},
  year         = {1982},
  url          = {https://doi.org/10.1016/0020-0190(82)90076-X},
  doi          = {10.1016/0020-0190(82)90076-X},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BermondDQ82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Davio82,
  author       = {Marc Davio and
                  Jean{-}Marie Goethals and
                  Jean{-}Jacques Quisquater},
  editor       = {Thomas Beth},
  title        = {Authentication Procedures},
  booktitle    = {Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein,
                  Germany, March 29 - April 2, 1982},
  series       = {Lecture Notes in Computer Science},
  volume       = {149},
  pages        = {283--288},
  publisher    = {Springer},
  year         = {1982},
  url          = {https://doi.org/10.1007/3-540-39466-4\_20},
  doi          = {10.1007/3-540-39466-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Davio82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/DelsarteQ73,
  author       = {Philippe Delsarte and
                  Jean{-}Jacques Quisquater},
  title        = {Permutation Cascades with Normalized Cells},
  journal      = {Inf. Control.},
  volume       = {23},
  number       = {4},
  pages        = {344--356},
  year         = {1973},
  url          = {https://doi.org/10.1016/S0019-9958(73)80003-8},
  doi          = {10.1016/S0019-9958(73)80003-8},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/DelsarteQ73.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics