Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jean-Jacques Quisquater
@inproceedings{DBLP:conf/icisc/CourtoisQ20, author = {Nicolas T. Courtois and Jean{-}Jacques Quisquater}, editor = {Deukjo Hong}, title = {Can a Differential Attack Work for an Arbitrarily Large Number of Rounds?}, booktitle = {Information Security and Cryptology - {ICISC} 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12593}, pages = {157--181}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68890-5\_9}, doi = {10.1007/978-3-030-68890-5\_9}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/CourtoisQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/AndoulakiJQ17, author = {Elli Androulaki and Matthias Jarke and Jean{-}Jacques Quisquater}, title = {Introduction to the Special Theme Blockchain Engineering}, journal = {{ERCIM} News}, volume = {2017}, number = {110}, year = {2017}, url = {https://ercim-news.ercim.eu/en110/special/introduction-to-the-special-theme-blockchain-engineering}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/AndoulakiJQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/Quisquater17, author = {Jean{-}Jacques Quisquater}, title = {Blockchains for Everybody: Individuals, Companies, States and Democracy}, journal = {{ERCIM} News}, volume = {2017}, number = {110}, year = {2017}, url = {https://ercim-news.ercim.eu/en110/special/blockchains-for-everybody-individuals-companies-states-and-democracy}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/Quisquater17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/PetitQ16, author = {Christophe Petit and Jean{-}Jacques Quisquater}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Cryptographic Hash Functions and Expander Graphs: The End of the Story?}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {304--311}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_19}, doi = {10.1007/978-3-662-49301-4\_19}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/PetitQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2016kahn, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4}, doi = {10.1007/978-3-662-49301-4}, isbn = {978-3-662-49300-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2016kahn.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisMMQS15, author = {Nicolas T. Courtois and Theodosis Mourouzis and Michal Misztal and Jean{-}Jacques Quisquater and Guangyan Song}, title = {Can {GOST} Be Made Secure Against Differential Cryptanalysis?}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {145--156}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915266}, doi = {10.1080/01611194.2014.915266}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisMMQS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sofsem/2015srf, editor = {Giuseppe F. Italiano and Tiziana Margaria{-}Steffen and Jaroslav Pokorn{\'{y}} and Jean{-}Jacques Quisquater and Roger Wattenhofer and Roman Spanek and Martin Rimnac}, title = {Proceedings of Student Research Forum Papers and Posters at {SOFSEM} 2015, the 41st International Conference on Current Trends in Theory and Practice of Computer Science {(SOFSEM} 2015) , Pec pod Snezkou, Czech Republic, January 24-29, 2015}, series = {{CEUR} Workshop Proceedings}, volume = {1326}, publisher = {CEUR-WS.org}, year = {2015}, url = {https://ceur-ws.org/Vol-1326}, urn = {urn:nbn:de:0074-1326-7}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sofsem/2015srf.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sofsem/2015, editor = {Giuseppe F. Italiano and Tiziana Margaria{-}Steffen and Jaroslav Pokorn{\'{y}} and Jean{-}Jacques Quisquater and Roger Wattenhofer}, title = {{SOFSEM} 2015: Theory and Practice of Computer Science - 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sn{\v{e}}{\v{z}}kou, Czech Republic, January 24-29, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8939}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46078-8}, doi = {10.1007/978-3-662-46078-8}, isbn = {978-3-662-46077-1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sofsem/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZhouYSQ13, author = {Yuanyuan Zhou and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Ahmad{-}Reza Sadeghi}, title = {On the Need of Physical Security for Small Embedded Devices: {A} Case Study with {COMP128-1} Implementations in {SIM} Cards}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {230--238}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_20}, doi = {10.1007/978-3-642-39884-1\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ZhouYSQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouYSQ13, author = {Yuanyuan Zhou and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {On the Need of Physical Security for Small Embedded Devices: a Case Study with {COMP128-1} Implementations in {SIM} Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2013}, url = {http://eprint.iacr.org/2013/224}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouYSQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PetitQ12, author = {Christophe Petit and Jean{-}Jacques Quisquater}, editor = {Xiaoyun Wang and Kazue Sako}, title = {On Polynomial Systems Arising from a Weil Descent}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {451--466}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_28}, doi = {10.1007/978-3-642-34961-4\_28}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/PetitQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/KimQ12, author = {Chong Hee Kim and Jean{-}Jacques Quisquater}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Attacks Against {RSA-CRT} Implementation}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {125--136}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_8}, doi = {10.1007/978-3-642-29656-7\_8}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/KimQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/Ghernaouti-HelieTQ12, author = {Solange Ghernaouti{-}Helie and Jens T{\"{o}}lle and Jean{-}Jacques Quisquater}, title = {Cybercrime and Privacy Issues - Introduction to the Special Theme}, journal = {{ERCIM} News}, volume = {2012}, number = {90}, year = {2012}, url = {http://ercim-news.ercim.eu/en90/special/cybercrime-and-privacy-issues-introduction-to-the-special-theme}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/Ghernaouti-HelieTQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitQ12, author = {Christophe Petit and Jean{-}Jacques Quisquater}, title = {On Polynomial Systems Arising from a Weil Descent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2012}, url = {http://eprint.iacr.org/2012/146}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CietQS11, author = {Mathieu Ciet and Jean{-}Jacques Quisquater and Francesco Sica}, title = {Compact elliptic curve representations}, journal = {J. Math. Cryptol.}, volume = {5}, number = {1}, pages = {89--100}, year = {2011}, url = {https://doi.org/10.1515/jmc.2011.007}, doi = {10.1515/JMC.2011.007}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/CietQS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PaarQS11, author = {Christof Paar and Jean{-}Jacques Quisquater and Berk Sunar}, title = {Guest Editorial}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {245--246}, year = {2011}, url = {https://doi.org/10.1007/s00145-011-9099-9}, doi = {10.1007/S00145-011-9099-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PaarQS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/PetitQ11, author = {Christophe Petit and Jean{-}Jacques Quisquater}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Cayley Hash Functions}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {183--184}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_126}, doi = {10.1007/978-1-4419-5906-5\_126}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/PetitQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/QuisquaterS11, author = {Jean{-}Jacques Quisquater and David Samyde}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Electromagnetic Attack}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {382--385}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_125}, doi = {10.1007/978-1-4419-5906-5\_125}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/QuisquaterS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/LibertQ11, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Identity-Based Cryptosystems}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {588--594}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_127}, doi = {10.1007/978-1-4419-5906-5\_127}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/LibertQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/QuisquaterA11, author = {Jean{-}Jacques Quisquater and Gildas Avoine}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Passport Security}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {913--916}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_129}, doi = {10.1007/978-1-4419-5906-5\_129}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/QuisquaterA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/StandaertQ11, author = {Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Physical Security}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {928--929}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_130}, doi = {10.1007/978-1-4419-5906-5\_130}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/StandaertQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/QuisquaterS11a, author = {Jean{-}Jacques Quisquater and David Samyde}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Radio Frequency Attacks}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1015--1021}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_133}, doi = {10.1007/978-1-4419-5906-5\_133}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/QuisquaterS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/StandaertQ11a, author = {Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Time-Memory Trade-offs}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1297--1299}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_137}, doi = {10.1007/978-1-4419-5906-5\_137}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/StandaertQ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitQ11, author = {Christophe Petit and Jean{-}Jacques Quisquater}, title = {Rubik's for cryptographers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {638}, year = {2011}, url = {http://eprint.iacr.org/2011/638}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BulensSQ10, author = {Philippe Bulens and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {How to strongly link data and its medium: the paper case}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {3}, pages = {125--136}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0032}, doi = {10.1049/IET-IFS.2009.0032}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BulensSQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LibertQY10, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, title = {Key Evolution Systems in Untrusted Update Environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {37:1--37:34}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880031}, doi = {10.1145/1880022.1880031}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LibertQY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PetitQ10, author = {Christophe Petit and Jean{-}Jacques Quisquater}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Preimages for the Tillich-Z{\'{e}}mor Hash Function}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {282--301}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_20}, doi = {10.1007/978-3-642-19574-7\_20}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/PetitQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BarretoLMQ10, author = {Paulo S. L. M. Barreto and Beno{\^{\i}}t Libert and Noel McCullagh and Jean{-}Jacques Quisquater}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Signcryption Schemes Based on the Diffie-Hellman Problem}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {57--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_4}, doi = {10.1007/978-3-540-89411-7\_4}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/series/isc/BarretoLMQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BarretoLMQ10a, author = {Paulo S. L. M. Barreto and Beno{\^{\i}}t Libert and Noel McCullagh and Jean{-}Jacques Quisquater}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Signcryption Schemes Based on Bilinear Maps}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {71--97}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_5}, doi = {10.1007/978-3-540-89411-7\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BarretoLMQ10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/StandaertPYQYO10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu and Jean{-}Jacques Quisquater and Moti Yung and Elisabeth Oswald}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Leakage Resilient Cryptography in Practice}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {99--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_5}, doi = {10.1007/978-3-642-14452-3\_5}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/StandaertPYQYO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2010evt, editor = {Douglas W. Jones and Jean{-}Jacques Quisquater and Eric Rescorla}, title = {2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '10, Washington, D.C., USA, August 9-10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/evtwote10}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2010evt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ManulisLKBQ09, author = {Mark Manulis and Damien Leroy and Fran{\c{c}}ois Koeune and Olivier Bonaventure and Jean{-}Jacques Quisquater}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Authenticated wireless roaming via tunnels: making mobile guests feel at home}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {92--103}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533072}, doi = {10.1145/1533057.1533072}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ManulisLKBQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PetitQTZ09, author = {Christophe Petit and Jean{-}Jacques Quisquater and Jean{-}Pierre Tillich and Gilles Z{\'{e}}mor}, editor = {Marc Fischlin}, title = {Hard and Easy Components of Collision Search in the Z{\'{e}}mor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {182--194}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_12}, doi = {10.1007/978-3-642-00862-7\_12}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/PetitQTZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/CathaloNQ09, author = {Julien Cathalo and David Naccache and Jean{-}Jacques Quisquater}, editor = {Matthew Geoffrey Parker}, title = {Comparing with {RSA}}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {326--335}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_19}, doi = {10.1007/978-3-642-10868-6\_19}, timestamp = {Wed, 01 Sep 2021 10:36:08 +0200}, biburl = {https://dblp.org/rec/conf/ima/CathaloNQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/CourtoisOQ09, author = {Nicolas T. Courtois and Sean O'Neil and Jean{-}Jacques Quisquater}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Practical Algebraic Attacks on the Hitag2 Stream Cipher}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {167--176}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_14}, doi = {10.1007/978-3-642-04474-8\_14}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/CourtoisOQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/AboudaggaMEQ09, author = {Nidal Aboudagga and Giacomo de Meulenaer and Mohamed Eltoweissy and Jean{-}Jacques Quisquater}, title = {{IMAPS:} Imbricated authentication protocol suite for mobile users and groups}, booktitle = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings}, pages = {30--36}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/LCN.2009.5355156}, doi = {10.1109/LCN.2009.5355156}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/AboudaggaMEQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MarneffePQ09, author = {Olivier de Marneffe and Olivier Pereira and Jean{-}Jacques Quisquater}, editor = {David Jefferson and Joseph Lorenzo Hall and Tal Moran}, title = {Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios}, booktitle = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/evtwote-09/electing-university-president-using-open-audit-voting-analysis-real-world-use}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/MarneffePQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2009, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7}, doi = {10.1007/978-3-642-03944-7}, isbn = {978-3-642-03943-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CathaloNQ09, author = {Julien Cathalo and David Naccache and Jean{-}Jacques Quisquater}, title = {Comparing With {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2009}, url = {http://eprint.iacr.org/2009/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CathaloNQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeulenaerPQ09, author = {Giacomo de Meulenaer and Christophe Petit and Jean{-}Jacques Quisquater}, title = {Hardware Implementations of a Variant of the Z{\'{e}}mor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2009}, url = {http://eprint.iacr.org/2009/229}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MeulenaerPQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertPYQYO09, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu and Jean{-}Jacques Quisquater and Moti Yung and Elisabeth Oswald}, title = {Leakage Resilient Cryptography in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2009}, url = {http://eprint.iacr.org/2009/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertPYQYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MassoudiLVMQ08, author = {Ayoub Massoudi and Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and Christophe De Vleeschouwer and Beno{\^{\i}}t Macq and Jean{-}Jacques Quisquater}, title = {Overview on Selective Encryption of Image and Video: Challenges and Perspectives}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/179290}, doi = {10.1155/2008/179290}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/MassoudiLVMQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/RobertMVLJKKDPBQ08, author = {Romain Robert and Mark Manulis and Florence De Villenfagne and Damien Leroy and Julien Jost and Fran{\c{c}}ois Koeune and Caroline Ker and Jean{-}Marc Dinant and Yves Poullet and Olivier Bonaventure and Jean{-}Jacques Quisquater}, title = {WiFi Roaming: Legal Implications and Security Constraints}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {3}, pages = {205--241}, year = {2008}, url = {https://doi.org/10.1093/ijlit/ean016}, doi = {10.1093/IJLIT/EAN016}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/RobertMVLJKKDPBQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/SebeDMDQ08, author = {Francesc Seb{\'{e}} and Josep Domingo{-}Ferrer and Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}} and Yves Deswarte and Jean{-}Jacques Quisquater}, title = {Efficient Remote Data Possession Checking in Critical Information Infrastructures}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {20}, number = {8}, pages = {1034--1038}, year = {2008}, url = {https://doi.org/10.1109/TKDE.2007.190647}, doi = {10.1109/TKDE.2007.190647}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/SebeDMDQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BulensSQPR08, author = {Philippe Bulens and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Pascal Pellegrin and Ga{\"{e}}l Rouvroy}, editor = {Serge Vaudenay}, title = {Implementation of the {AES-128} on Virtex-5 FPGAs}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {16--26}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_2}, doi = {10.1007/978-3-540-68164-9\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BulensSQPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/KimQ08, author = {Chong Hee Kim and Jean{-}Jacques Quisquater}, editor = {Gilles Grimaud and Fran{\c{c}}ois{-}Xavier Standaert}, title = {New Differential Fault Analysis on {AES} Key Schedule: Two Faults Are Enough}, booktitle = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2008, London, UK, September 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5189}, pages = {48--60}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85893-5\_4}, doi = {10.1007/978-3-540-85893-5\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/KimQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LibertQY08, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Key Evolution Systems in Untrusted Update Environments}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {12--21}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_2}, doi = {10.1007/978-3-642-01440-6\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LibertQY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KimBPQ08, author = {Chong Hee Kim and Philippe Bulens and Christophe Petit and Jean{-}Jacques Quisquater}, editor = {Stig Fr. Mj{\o}lsnes and Sjouke Mauw and Sokratis K. Katsikas}, title = {Fault Attacks on Public Key Elements: Application to DLP-Based Schemes}, booktitle = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5057}, pages = {182--195}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69485-4\_13}, doi = {10.1007/978-3-540-69485-4\_13}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europki/KimBPQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AvoineKQ08, author = {Gildas Avoine and Kassem Kalach and Jean{-}Jacques Quisquater}, editor = {Gene Tsudik}, title = {ePassport: Securing International Contacts with Contactless Chips}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {141--155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_11}, doi = {10.1007/978-3-540-85230-8\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AvoineKQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CallasDNOQY08, author = {Jon Callas and Yvo Desmedt and Daniel Nagy and Akira Otsuka and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Gene Tsudik}, title = {Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report)}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {307--313}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_28}, doi = {10.1007/978-3-540-85230-8\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CallasDNOQY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CollardSQ08, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Kaisa Nyberg}, title = {Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {382--397}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_24}, doi = {10.1007/978-3-540-71039-4\_24}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/CollardSQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CastroEQ08, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Jean{-}Jacques Quisquater}, editor = {Kaisa Nyberg}, title = {On the Salsa20 Core Function}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {462--469}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_29}, doi = {10.1007/978-3-540-71039-4\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CastroEQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/PetitVQ08, author = {Christophe Petit and Nicolas Veyrat{-}Charvillon and Jean{-}Jacques Quisquater}, title = {Efficiency and pseudo-randomness of a variant of Z{\'{e}}mor-Tillich hash function}, booktitle = {15th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2008, St. Julien's, Malta, August 31 2008-September 3, 2008}, pages = {906--909}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICECS.2008.4675001}, doi = {10.1109/ICECS.2008.4675001}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icecsys/PetitVQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KimQ08, author = {Chong Hee Kim and Jean{-}Jacques Quisquater}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Method for Detecting Vulnerability to Doubling Attacks}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {97--110}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_7}, doi = {10.1007/978-3-540-88625-9\_7}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/KimQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PetitLQ08, author = {Christophe Petit and Kristin E. Lauter and Jean{-}Jacques Quisquater}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Full Cryptanalysis of {LPS} and Morgenstern Hash Functions}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {263--277}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_18}, doi = {10.1007/978-3-540-85855-3\_18}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/PetitLQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0811-4257, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Pedro Peris{-}Lopez and Jean{-}Jacques Quisquater}, title = {Cryptanalysis of the {SASI} Ultralightweight {RFID} Authentication Protocol with Modular Rotations}, journal = {CoRR}, volume = {abs/0811.4257}, year = {2008}, url = {http://arxiv.org/abs/0811.4257}, eprinttype = {arXiv}, eprint = {0811.4257}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0811-4257.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaceSQ08, author = {Fran{\c{c}}ois Mac{\'{e}} and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2008}, url = {http://eprint.iacr.org/2008/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaceSQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitLQ08, author = {Christophe Petit and Kristin E. Lauter and Jean{-}Jacques Quisquater}, title = {Full Cryptanalysis of {LPS} and Morgenstern Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2008}, url = {http://eprint.iacr.org/2008/173}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitLQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisLKBQ08, author = {Mark Manulis and Damien Leroy and Fran{\c{c}}ois Koeune and Olivier Bonaventure and Jean{-}Jacques Quisquater}, title = {Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2008}, url = {http://eprint.iacr.org/2008/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisLKBQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/KimQ07, author = {Chong Hee Kim and Jean{-}Jacques Quisquater}, title = {Faults, Injection Methods, and Fault Attacks}, journal = {{IEEE} Des. Test Comput.}, volume = {24}, number = {6}, pages = {544--545}, year = {2007}, url = {https://doi.org/10.1109/MDT.2007.186}, doi = {10.1109/MDT.2007.186}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/KimQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/StandaertPRQ07, author = {Fran{\c{c}}ois{-}Xavier Standaert and Gilles Piret and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater}, title = {{FPGA} implementations of the {ICEBERG} block cipher}, journal = {Integr.}, volume = {40}, number = {1}, pages = {20--27}, year = {2007}, url = {https://doi.org/10.1016/j.vlsi.2005.12.008}, doi = {10.1016/J.VLSI.2005.12.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/StandaertPRQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/PeetersSQ07, author = {Eric Peeters and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {Power and electromagnetic analysis: Improved model, consequences and comparisons}, journal = {Integr.}, volume = {40}, number = {1}, pages = {52--60}, year = {2007}, url = {https://doi.org/10.1016/j.vlsi.2005.12.013}, doi = {10.1016/J.VLSI.2005.12.013}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/PeetersSQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/DormaleQ07, author = {Guerric Meurice de Dormale and Jean{-}Jacques Quisquater}, title = {High-speed hardware implementations of Elliptic Curve Cryptography: {A} survey}, journal = {J. Syst. Archit.}, volume = {53}, number = {2-3}, pages = {72--84}, year = {2007}, url = {https://doi.org/10.1016/j.sysarc.2006.09.002}, doi = {10.1016/J.SYSARC.2006.09.002}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/DormaleQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LibertQY07, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Forward-secure signatures in untrusted update environments: efficient and generic constructions}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {266--275}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315279}, doi = {10.1145/1315245.1315279}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LibertQY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DormaleBQ07, author = {Guerric Meurice de Dormale and Philippe Bulens and Jean{-}Jacques Quisquater}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Collision Search for Elliptic Curve Discrete Logarithm over GF(2\({}^{\mbox{ \emph{m} }}\)) with {FPGA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {378--393}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_26}, doi = {10.1007/978-3-540-74735-2\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/DormaleBQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MaceSQ07, author = {Fran{\c{c}}ois Mac{\'{e}} and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {427--442}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_29}, doi = {10.1007/978-3-540-74735-2\_29}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MaceSQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CollardSQ08, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {51--65}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_6}, doi = {10.1007/978-3-540-79499-8\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CollardSQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/AboudaggaEQ07, author = {Nidal Aboudagga and Mohamed Eltoweissy and Jean{-}Jacques Quisquater}, editor = {Juan Quemada and Tao Zhang}, title = {Two-level signature delegation for mobile first responder authentication}, booktitle = {Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007}, pages = {16--23}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2007}, url = {https://doi.org/10.1109/COLCOM.2007.4553803}, doi = {10.1109/COLCOM.2007.4553803}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/AboudaggaEQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/MeulenaerGDQ07, author = {Giacomo de Meulenaer and Fran{\c{c}}ois Gosset and Guerric Meurice de Dormale and Jean{-}Jacques Quisquater}, editor = {Kenneth L. Pocek and Duncan A. Buell}, title = {Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware}, booktitle = {{IEEE} Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}}, pages = {197--206}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FCCM.2007.12}, doi = {10.1109/FCCM.2007.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/MeulenaerGDQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/DormaleBQ07, author = {Guerric Meurice de Dormale and John Bass and Jean{-}Jacques Quisquater}, editor = {Kenneth L. Pocek and Duncan A. Buell}, title = {On Solving {RC5} Challenges with FPGAs}, booktitle = {{IEEE} Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}}, pages = {281--282}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FCCM.2007.13}, doi = {10.1109/FCCM.2007.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/DormaleBQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/KimQ07, author = {Chong Hee Kim and Jean{-}Jacques Quisquater}, editor = {Luca Breveglieri and Shay Gueron and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {How can we overcome both side channel analysis and fault attacks on RSA-CRT?}, booktitle = {Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, {FDTC} 2007: Vienna, Austria, 10 September 2007}, pages = {21--29}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FDTC.2007.4318981}, doi = {10.1109/FDTC.2007.4318981}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/KimQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/DormaleBQ07, author = {Guerric Meurice de Dormale and John Bass and Jean{-}Jacques Quisquater}, editor = {Koen Bertels and Walid A. Najjar and Arjan J. van Genderen and Stamatis Vassiliadis}, title = {Solving {RC5} Challenges with Hardware -- a Distributed.net Perspective --}, booktitle = {{FPL} 2007, International Conference on Field Programmable Logic and Applications, Amsterdam, The Netherlands, 27-29 August 2007}, pages = {642--647}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/FPL.2007.4380736}, doi = {10.1109/FPL.2007.4380736}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/DormaleBQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CollardSQ07, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Improving the Time Complexity of Matsui's Linear Cryptanalysis}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {77--88}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_7}, doi = {10.1007/978-3-540-76788-6\_7}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/CollardSQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimSQL07, author = {Chong Hee Kim and Jong Hoon Shin and Jean{-}Jacques Quisquater and Pil Joong Lee}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Safe-Error Attack on {SPA-FA} Resistant Exponentiations Using a {HW} Modular Multiplier}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {273--281}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_22}, doi = {10.1007/978-3-540-76788-6\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimSQL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/LibertQ07, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Tsuyoshi Takagi and Tatsuaki Okamoto and Eiji Okamoto and Takeshi Okamoto}, title = {Practical Time Capsule Signatures in the Standard Model from Bilinear Maps}, booktitle = {Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4575}, pages = {23--38}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73489-5\_3}, doi = {10.1007/978-3-540-73489-5\_3}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/LibertQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertQY07, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Parallel Key-Insulated Public Key Encryption Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {298--314}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_20}, doi = {10.1007/978-3-540-71677-8\_20}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertQY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/Quisquater07, author = {Jean{-}Jacques Quisquater}, editor = {Toshimitsu Masuzawa and S{\'{e}}bastien Tixeuil}, title = {The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults?}, booktitle = {Stabilization, Safety, and Security of Distributed Systems, 9th International Symposium, {SSS} 2007, Paris, France, November 14-16, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4838}, pages = {1}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76627-8\_1}, doi = {10.1007/978-3-540-76627-8\_1}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/sss/Quisquater07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/MarneffePQ07, author = {Olivier de Marneffe and Olivier Pereira and Jean{-}Jacques Quisquater}, editor = {Ammar Alkassar and Melanie Volkamer}, title = {Simulation-Based Analysis of {E2E} Voting Systems}, booktitle = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4896}, pages = {137--149}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77493-8\_12}, doi = {10.1007/978-3-540-77493-8\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/voteid/MarneffePQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/AboudaggaQE07, author = {Nidal Aboudagga and Jean{-}Jacques Quisquater and Mohamed Eltoweissy}, title = {Group Authentication Protocol for Mobile Networks}, booktitle = {Third {IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2007, White Plains, New York, USA, 8-10 October 2007, Proceedings}, pages = {28}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.ieeecomputersociety.org/10.1109/WIMOB.2007.37}, doi = {10.1109/WIMOB.2007.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/AboudaggaQE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KimQ07, author = {Chong Hee Kim and Jean{-}Jacques Quisquater}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Fault Attacks for {CRT} Based {RSA:} New Attacks, New Results, and New Countermeasures}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {215--228}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_18}, doi = {10.1007/978-3-540-72354-7\_18}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KimQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2007, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7}, doi = {10.1007/978-3-540-72354-7}, isbn = {978-3-540-72353-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/MarneffePQ07, author = {Olivier de Marneffe and Olivier Pereira and Jean{-}Jacques Quisquater}, editor = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, title = {Simulation-based analysis of {E2E} voting systems}, booktitle = {Frontiers of Electronic Voting, 29.07. - 03.08.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07311}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1297}, timestamp = {Thu, 10 Jun 2021 13:02:04 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/MarneffePQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertPAQ07, author = {Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters and C{\'{e}}dric Archambeau and Jean{-}Jacques Quisquater}, title = {Towards Security Limits in Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2007}, url = {http://eprint.iacr.org/2007/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertPAQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PereiraQ06, author = {Olivier Pereira and Jean{-}Jacques Quisquater}, title = {On the impossibility of building secure Cliques-type authenticated group key agreement protocols}, journal = {J. Comput. Secur.}, volume = {14}, number = {2}, pages = {197--246}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14204}, doi = {10.3233/JCS-2006-14204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PereiraQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/StandaertPRQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater}, title = {An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays}, journal = {Proc. {IEEE}}, volume = {94}, number = {2}, pages = {383--394}, year = {2006}, url = {https://doi.org/10.1109/JPROC.2005.862437}, doi = {10.1109/JPROC.2005.862437}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/StandaertPRQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/DescampeDRLQM06, author = {Antonin Descampe and Fran{\c{c}}ois{-}Olivier Devaux and Ga{\"{e}}l Rouvroy and Jean{-}Didier Legat and Jean{-}Jacques Quisquater and Beno{\^{\i}}t Macq}, title = {A Flexible Hardware {JPEG} 2000 Decoder for Digital Cinema}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {16}, number = {11}, pages = {1397--1410}, year = {2006}, url = {https://doi.org/10.1109/TCSVT.2006.884573}, doi = {10.1109/TCSVT.2006.884573}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/DescampeDRLQM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/StandaertMPQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Fran{\c{c}}ois Mac{\'{e}} and Eric Peeters and Jean{-}Jacques Quisquater}, editor = {Koen Bertels and Jo{\~{a}}o M. P. Cardoso and Stamatis Vassiliadis}, title = {Updates on the Security of FPGAs Against Power Analysis Attacks}, booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3985}, pages = {335--346}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802839\_42}, doi = {10.1007/11802839\_42}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/StandaertMPQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/DormaleQ06, author = {Guerric Meurice de Dormale and Jean{-}Jacques Quisquater}, editor = {Koen Bertels and Jo{\~{a}}o M. P. Cardoso and Stamatis Vassiliadis}, title = {Iterative Modular Division over GF(2\({}^{\mbox{\emph{m}}}\)): Novel Algorithm and Implementations on {FPGA}}, booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3985}, pages = {370--382}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802839\_45}, doi = {10.1007/11802839\_45}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/DormaleQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/DormaleABQL06, author = {Guerric Meurice de Dormale and Renaud Ambroise and David Bol and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards}, booktitle = {2006 {IEEE} International Conference on Application-Specific Systems, Architecture and Processors {(ASAP} 2006), 11-13 September 2006, Steamboat Springs, Colorado, {USA}}, pages = {347--353}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ASAP.2006.44}, doi = {10.1109/ASAP.2006.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/DormaleABQL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/StandaertPGQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Gilles Piret and Neil Gershenfeld and Jean{-}Jacques Quisquater}, editor = {Josep Domingo{-}Ferrer and Joachim Posegga and Daniel Schreckling}, title = {{SEA:} {A} Scalable Encryption Algorithm for Small Embedded Applications}, booktitle = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3928}, pages = {222--236}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11733447\_16}, doi = {10.1007/11733447\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/StandaertPGQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ArchambeauPSQ06, author = {C{\'{e}}dric Archambeau and Eric Peeters and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Template Attacks in Principal Subspaces}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {1--14}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_1}, doi = {10.1007/11894063\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/ArchambeauPSQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertPAQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters and C{\'{e}}dric Archambeau and Jean{-}Jacques Quisquater}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Towards Security Limits in Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {30--45}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_3}, doi = {10.1007/11894063\_3}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/StandaertPAQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LibertQY06, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Efficient Intrusion-Resilient Signatures Without Random Oracles}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {27--41}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_3}, doi = {10.1007/11937807\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LibertQY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PandeyCQ06, author = {Omkant Pandey and Julien Cathalo and Jean{-}Jacques Quisquater}, editor = {David Pointcheval}, title = {Fair Identification}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {52--63}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_4}, doi = {10.1007/11605805\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PandeyCQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/StandaertRQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater}, title = {{FPGA} Implementations of the {DES} and Triple-DES Masked Against Power Analysis Attacks}, booktitle = {Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006}, pages = {1--4}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/FPL.2006.311315}, doi = {10.1109/FPL.2006.311315}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/StandaertRQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertQ06, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {On Constructing Certificateless Cryptosystems from Identity Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {474--490}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_31}, doi = {10.1007/11745853\_31}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LaguillaumieLQ06, author = {Fabien Laguillaumie and Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Roberto De Prisco and Moti Yung}, title = {Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {63--77}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_5}, doi = {10.1007/11832072\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/LaguillaumieLQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LibertQ05, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Identity Based Encryption Without Redundancy}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {285--300}, year = {2005}, url = {https://doi.org/10.1007/11496137\_20}, doi = {10.1007/11496137\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LibertQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BarretoLMQ05, author = {Paulo S. L. M. Barreto and Beno{\^{\i}}t Libert and Noel McCullagh and Jean{-}Jacques Quisquater}, editor = {Bimal K. Roy}, title = {Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {515--532}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_28}, doi = {10.1007/11593447\_28}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BarretoLMQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PeetersSDQ05, author = {Eric Peeters and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Donckers and Jean{-}Jacques Quisquater}, editor = {Josyula R. Rao and Berk Sunar}, title = {Improved Higher-Order Side-Channel Attacks with {FPGA} Experiments}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {309--323}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_23}, doi = {10.1007/11545262\_23}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/PeetersSDQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CathaloLQ05, author = {Julien Cathalo and Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Efficient and Non-interactive Timed-Release Encryption}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {291--303}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_25}, doi = {10.1007/11602897\_25}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CathaloLQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GoyalJQ05, author = {Vipul Goyal and Abhishek Jain and Jean{-}Jacques Quisquater}, editor = {Dongho Won and Seungjoo Kim}, title = {Improvements to Mitchell's Remote User Authentication Protocol}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {69--80}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_8}, doi = {10.1007/11734727\_8}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GoyalJQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/StandaertLRMQL05, author = {Fran{\c{c}}ois{-}Xavier Standaert and Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and Ga{\"{e}}l Rouvroy and Beno{\^{\i}}t Macq and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Practical Evaluation of a Radial Soft Hash Algorithm}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 2, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {89--94}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.229}, doi = {10.1109/ITCC.2005.229}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/StandaertLRMQL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/StandaertPRQ05, author = {Fran{\c{c}}ois{-}Xavier Standaert and Gilles Piret and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater}, title = {{FPGA} Implementations of the {ICEBERG} Block Cipher}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {556--561}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.155}, doi = {10.1109/ITCC.2005.155}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/StandaertPRQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/StandaertPQ05, author = {Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters and Jean{-}Jacques Quisquater}, title = {On the Masking Countermeasure and Higher-Order Power Analysis Attacks}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {562--567}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.213}, doi = {10.1109/ITCC.2005.213}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/StandaertPQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/AboudaggaREDQ05, author = {Nidal Aboudagga and M. Tamer Refaei and Mohamed Eltoweissy and Luiz A. DaSilva and Jean{-}Jacques Quisquater}, editor = {Azzedine Boukerche and Regina Borges de Araujo}, title = {Authentication protocols for ad hoc networks: taxonomy and research issues}, booktitle = {Q2SWinet'05 - Proceedings of the First {ACM} Workshop on {Q2S} and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005}, pages = {96--104}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1089761.1089777}, doi = {10.1145/1089761.1089777}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mswim/AboudaggaREDQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/patmos/MaceSQL05, author = {Fran{\c{c}}ois Mac{\'{e}} and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Vassilis Paliouras and Johan Vounckx and Diederik Verkest}, title = {A Design Methodology for Secured ICs Using Dynamic Current Mode Logic}, booktitle = {Integrated Circuit and System Design, Power and Timing Modeling, Optimization and Simulation, 15th International Workshop, {PATMOS} 2005, Leuven, Belgium, September 21-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3728}, pages = {550--560}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556930\_56}, doi = {10.1007/11556930\_56}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/patmos/MaceSQL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/LibertQ05, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Henk C. A. van Tilborg}, title = {Identity-Based Cryptosystems}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_192}, doi = {10.1007/0-387-23483-7\_192}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/LibertQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Quisquater05, author = {Jean{-}Jacques Quisquater}, editor = {Henk C. A. van Tilborg}, title = {Eavesdropper}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_118}, doi = {10.1007/0-387-23483-7\_118}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Quisquater05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/QuisquaterS05, author = {Jean{-}Jacques Quisquater and David Samyde}, editor = {Henk C. A. van Tilborg}, title = {Electromagnetic Attack}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_120}, doi = {10.1007/0-387-23483-7\_120}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/QuisquaterS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/QuisquaterS05a, author = {Jean{-}Jacques Quisquater and David Samyde}, editor = {Henk C. A. van Tilborg}, title = {Radio Frequency Attacks}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_341}, doi = {10.1007/0-387-23483-7\_341}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/QuisquaterS05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/QuisquaterS05b, author = {Jean{-}Jacques Quisquater and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Henk C. A. van Tilborg}, title = {Time-memory tradeoffs}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_430}, doi = {10.1007/0-387-23483-7\_430}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/QuisquaterS05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PiretSRQ04, author = {Gilles Piret and Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater}, editor = {Jean{-}Jacques Quisquater and Pierre Paradinas and Yves Deswarte and Anas Abou El Kalam}, title = {On the Security of the DeKaRT Primitive}, booktitle = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {153}, pages = {241--254}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8147-2\_16}, doi = {10.1007/1-4020-8147-2\_16}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/PiretSRQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PereiraQ04, author = {Olivier Pereira and Jean{-}Jacques Quisquater}, title = {Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols}, booktitle = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004), 28-30 June 2004, Pacific Grove, CA, {USA}}, pages = {16--19}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.12}, doi = {10.1109/CSFW.2004.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/PereiraQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LibertQ04, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Tatsuaki Okamoto}, title = {Identity Based Undeniable Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {112--125}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_9}, doi = {10.1007/978-3-540-24660-2\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/LibertQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/RouvroySLQML04, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and Jean{-}Jacques Quisquater and Beno{\^{\i}}t Macq and Jean{-}Didier Legat}, editor = {Aggelos Kiayias and Moti Yung}, title = {Reconfigurable hardware solutions for the digital rights management of digital cinema}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {40--53}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029147}, doi = {10.1145/1029146.1029147}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/RouvroySLQML04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/LibertQ04, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved}, booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, pages = {57--70}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25980-0\_5}, doi = {10.1007/978-3-540-25980-0\_5}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/europki/LibertQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/RouvroyLSMQL04, author = {Ga{\"{e}}l Rouvroy and Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and Fran{\c{c}}ois{-}Xavier Standaert and Beno{\^{\i}}t Macq and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Hardware implementation of a fingerprinting algorithm suited for digital cinema}, booktitle = {2004 12th European Signal Processing Conference, Vienna, Austria, September 6-10, 2004}, pages = {1497--1500}, publisher = {{IEEE}}, year = {2004}, url = {https://ieeexplore.ieee.org/document/7080100/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/RouvroyLSMQL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/StandaertOQP04, author = {Fran{\c{c}}ois{-}Xavier Standaert and Siddika Berna {\"{O}}rs and Jean{-}Jacques Quisquater and Bart Preneel}, editor = {J{\"{u}}rgen Becker and Marco Platzner and Serge Vernalde}, title = {Power Analysis Attacks Against {FPGA} Implementations of the {DES}}, booktitle = {Field Programmable Logic and Application, 14th International Conference , {FPL} 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3203}, pages = {84--94}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30117-2\_11}, doi = {10.1007/978-3-540-30117-2\_11}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/StandaertOQP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/DormaleBQ04, author = {Guerric Meurice de Dormale and Philippe Bulens and Jean{-}Jacques Quisquater}, editor = {J{\"{u}}rgen Becker and Marco Platzner and Serge Vernalde}, title = {Efficient Modular Division Implementation: {ECC} over GF(p) Affine Coordinates Application}, booktitle = {Field Programmable Logic and Application, 14th International Conference , {FPL} 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3203}, pages = {231--240}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30117-2\_25}, doi = {10.1007/978-3-540-30117-2\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/DormaleBQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/DormaleBQ04, author = {Guerric Meurice de Dormale and Philippe Bulens and Jean{-}Jacques Quisquater}, editor = {Oliver Diessel and John Williams}, title = {An improved Montgomery modular inversion targeted for efficient implementation on {FPGA}}, booktitle = {Proceedings of the 2004 {IEEE} International Conference on Field-Programmable Technology, Brisbane, Australia, December 6-8, 2004}, pages = {441--444}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/FPT.2004.1393320}, doi = {10.1109/FPT.2004.1393320}, timestamp = {Fri, 22 Nov 2019 15:44:53 +0100}, biburl = {https://dblp.org/rec/conf/fpt/DormaleBQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/StandaertPRQL04, author = {Fran{\c{c}}ois{-}Xavier Standaert and Gilles Piret and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Bimal K. Roy and Willi Meier}, title = {{ICEBERG} : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {279--299}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_18}, doi = {10.1007/978-3-540-25937-4\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/StandaertPRQL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/CathaloLQ04, author = {Julien Cathalo and Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Kan Zhang and Yuliang Zheng}, title = {Cryptanalysis of a Verifiably Committed Signature Scheme Based on {GPS} and {RSA}}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {52--60}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_5}, doi = {10.1007/978-3-540-30144-8\_5}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/isw/CathaloLQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/RouvroySQL04, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Compact and Efficient Encryption/Decryption Module for {FPGA} Implementation of the {AES} Rijndael Very Well Suited for Small Embedded Applications}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {583--587}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286716}, doi = {10.1109/ITCC.2004.1286716}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/RouvroySQL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertQ04, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {187--200}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_14}, doi = {10.1007/978-3-540-24632-9\_14}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PiretQ04, author = {Gilles Piret and Jean{-}Jacques Quisquater}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {Security of the {MISTY} Structure in the Luby-Rackoff Model: Improved Results}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {100--113}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_7}, doi = {10.1007/978-3-540-30564-4\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PiretQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LibertQ04, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Carlo Blundo and Stelvio Cimato}, title = {Improved Signcryption from q-Diffie-Hellman Problems}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {220--234}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_16}, doi = {10.1007/978-3-540-30598-9\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/LibertQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2004, editor = {Jean{-}Jacques Quisquater and Pierre Paradinas and Yves Deswarte and Anas Abou El Kalam}, title = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {153}, publisher = {Kluwer/Springer}, year = {2004}, isbn = {1-4020-8146-4}, timestamp = {Wed, 16 Jul 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2004, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b99451}, doi = {10.1007/B99451}, isbn = {3-540-22666-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertQ04, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, title = {The Exact Security of an Identity Based Signature and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2004}, url = {http://eprint.iacr.org/2004/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CietNPQ04, author = {Mathieu Ciet and Michael Neve and Eric Peeters and Jean{-}Jacques Quisquater}, title = {Parallel {FPGA} Implementation of {RSA} with Residue Number Systems - Can side-channel threats be avoided? - Extended version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2004}, url = {http://eprint.iacr.org/2004/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CietNPQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PereiraQ03, author = {Olivier Pereira and Jean{-}Jacques Quisquater}, title = {Some Attacks Upon Authenticated Group Key Agreement Protocols}, journal = {J. Comput. Secur.}, volume = {11}, number = {4}, pages = {555--580}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11404}, doi = {10.3233/JCS-2003-11404}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PereiraQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/NeveFQ03, author = {Amaury N{\`{e}}ve and Denis Flandre and Jean{-}Jacques Quisquater}, title = {{SOI} Technology for Future High-Performance Smart Cards}, journal = {{IEEE} Micro}, volume = {23}, number = {3}, pages = {58--67}, year = {2003}, url = {https://doi.org/10.1109/MM.2003.1209467}, doi = {10.1109/MM.2003.1209467}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/NeveFQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/RouvroySQL03, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Efficient Uses of FPGAs for Implementations of {DES} and Its Experimental Linear Cryptanalysis}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {4}, pages = {473--482}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1190588}, doi = {10.1109/TC.2003.1190588}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/RouvroySQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PiretQ03, author = {Gilles Piret and Jean{-}Jacques Quisquater}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Differential Fault Attack Technique against {SPN} Structures, with Application to the {AES} and {KHAZAD}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {77--88}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_7}, doi = {10.1007/978-3-540-45238-6\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/PiretQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CathaloKQ03, author = {Julien Cathalo and Fran{\c{c}}ois Koeune and Jean{-}Jacques Quisquater}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A New Type of Timing Attack: Application to {GPS}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {291--303}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_24}, doi = {10.1007/978-3-540-45238-6\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CathaloKQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertRQL03, author = {Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {334--350}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_27}, doi = {10.1007/978-3-540-45238-6\_27}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/StandaertRQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/RaghunathanRHQ03, author = {Anand Raghunathan and Srivaths Ravi and Sunil Hattangady and Jean{-}Jacques Quisquater}, title = {Securing Mobile Appliances: New Challenges for the System Designer}, booktitle = {2003 Design, Automation and Test in Europe Conference and Exposition {(DATE} 2003), 3-7 March 2003, Munich, Germany}, pages = {10176--10183}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DATE.2003.1186383}, doi = {10.1109/DATE.2003.1186383}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/RaghunathanRHQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CietLSQ03, author = {Mathieu Ciet and Tanja Lange and Francesco Sica and Jean{-}Jacques Quisquater}, editor = {Eli Biham}, title = {Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {388--400}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_24}, doi = {10.1007/3-540-39200-9\_24}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CietLSQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/StandaertRQL03, author = {Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Steve Trimberger and Russell Tessier}, title = {A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact {AES} {RIJNDAEL}}, booktitle = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable Gate Arrays, {FPGA} 2003, Monterey, CA, USA, February 23-25, 2003}, pages = {216--224}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/611817.611849}, doi = {10.1145/611817.611849}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpga/StandaertRQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/RouvroySQL03, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Steve Trimberger and Russell Tessier}, title = {Design strategies and modified descriptions to optimize cipher {FPGA} implementations: fast and compact results for {DES} and triple-DES}, booktitle = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable Gate Arrays, {FPGA} 2003, Monterey, CA, USA, February 23-25, 2003}, pages = {247}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/611817.611879}, doi = {10.1145/611817.611879}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpga/RouvroySQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/RouvroySQL03, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Peter Y. K. Cheung and George A. Constantinides and Jos{\'{e}} T. de Sousa}, title = {Design Strategies and Modified Descriptions to Optimize Cipher {FPGA} Implementations: Fast and Compact Results for {DES} and Triple-DES}, booktitle = {Field Programmable Logic and Application, 13th International Conference, {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2778}, pages = {181--193}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45234-8\_19}, doi = {10.1007/978-3-540-45234-8\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/fpl/RouvroySQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/StandaertOSQ03, author = {Fran{\c{c}}ois{-}Xavier Standaert and Lo{\"{\i}}c van Oldeneel tot Oldenzeel and David Samyde and Jean{-}Jacques Quisquater}, editor = {Peter Y. K. Cheung and George A. Constantinides and Jos{\'{e}} T. de Sousa}, title = {Power Analysis of FPGAs: How Practical is the Attack?}, booktitle = {Field Programmable Logic and Application, 13th International Conference, {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2778}, pages = {701--711}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45234-8\_68}, doi = {10.1007/978-3-540-45234-8\_68}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/StandaertOSQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/RouvroySQL03, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Efficient {FPGA} Implementation of Block Cipher {MISTY1}}, booktitle = {17th International Parallel and Distributed Processing Symposium {(IPDPS} 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings}, pages = {185}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IPDPS.2003.1213343}, doi = {10.1109/IPDPS.2003.1213343}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/RouvroySQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/LibertQ03, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, title = {A new identity based signcryption scheme from pairings}, booktitle = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La Sorbonne, Paris, France, 31 March - 4 April, 2003}, pages = {155--158}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ITW.2003.1216718}, doi = {10.1109/ITW.2003.1216718}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/LibertQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/LibertQ03, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Elizabeth Borowsky and Sergio Rajsbaum}, title = {Efficient revocation and threshold pairing based cryptosystems}, booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July 13-16, 2003}, pages = {163--171}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/872035.872059}, doi = {10.1145/872035.872059}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/LibertQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sisw/NevePSQ03, author = {Michael Neve and Eric Peeters and David Samyde and Jean{-}Jacques Quisquater}, title = {Memories: {A} Survey of Their Secure Uses in Smart Cards}, booktitle = {2nd International {IEEE} Security in Storage Workshop {(SISW} 2003), Information Assurance, The Storage Security Perspective, 31 October 2003, Washington, DC, {USA}}, pages = {62--72}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SISW.2003.10004}, doi = {10.1109/SISW.2003.10004}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sisw/NevePSQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/QuisquaterS03, author = {Jean{-}Jacques Quisquater and David Samyde}, editor = {Edward J. Delp III and Ping Wah Wong}, title = {Signal processing for smart cards}, booktitle = {Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, January 20, 2003}, series = {{SPIE} Proceedings}, volume = {5020}, pages = {229--239}, publisher = {{SPIE}}, year = {2003}, url = {https://doi.org/10.1117/12.477333}, doi = {10.1117/12.477333}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/QuisquaterS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/DeswarteQS03, author = {Yves Deswarte and Jean{-}Jacques Quisquater and Ayda Sa{\"{\i}}dane}, editor = {Sushil Jajodia and Leon Strous}, title = {Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers}, booktitle = {Integrity and Internal Control in Information Systems {VI} - {IFIP} {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland}, series = {{IFIP}}, volume = {140}, pages = {1--11}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-7901-X\_1}, doi = {10.1007/1-4020-7901-X\_1}, timestamp = {Tue, 23 May 2017 01:07:20 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/DeswarteQS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertQ03, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, title = {New identity based signcryption schemes from pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2003}, url = {http://eprint.iacr.org/2003/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PiretQ03, author = {Gilles Piret and Jean{-}Jacques Quisquater}, title = {Integral Cryptanalysis on reduced-round Safer++}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2003}, url = {http://eprint.iacr.org/2003/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiretQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertQ03a, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, title = {Identity Based Undeniable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2003}, url = {http://eprint.iacr.org/2003/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertQ03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/Quisquater02, author = {Jean{-}Jacques Quisquater}, editor = {Peter Honeyman}, title = {Awards}, booktitle = {Proceedings of the Fifth Smart Card Research and Advanced Application Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}}, publisher = {{USENIX}}, year = {2002}, timestamp = {Wed, 04 Jul 2018 13:06:35 +0200}, biburl = {https://dblp.org/rec/conf/cardis/Quisquater02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/QuisquaterS02, author = {Jean{-}Jacques Quisquater and David Samyde}, editor = {Peter Honeyman}, title = {Automatic Code Recognition for Smartcards Using a Kohonen Neural Network}, booktitle = {Proceedings of the Fifth Smart Card Research and Advanced Application Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/cardis02/quisquater.html}, timestamp = {Tue, 14 Sep 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/QuisquaterS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Quisquater02, author = {Jean{-}Jacques Quisquater}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {{CHES:} Past, Present, and Future}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {1}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_1}, doi = {10.1007/3-540-36400-5\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Quisquater02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CietQS02, author = {Mathieu Ciet and Jean{-}Jacques Quisquater and Francesco Sica}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Preventing Differential Analysis in {GLV} Elliptic Curve Scalar Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {540--550}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_39}, doi = {10.1007/3-540-36400-5\_39}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CietQS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertRQL02, author = {Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Time-Memory Tradeoff Using Distinguished Points: New Analysis {\&} {FPGA} Results}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {593--609}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_43}, doi = {10.1007/3-540-36400-5\_43}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/StandaertRQL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JoyeQYY02, author = {Marc Joye and Jean{-}Jacques Quisquater and Sung{-}Ming Yen and Moti Yung}, editor = {Bart Preneel}, title = {Observability Analysis - Detecting When Improved Cryptosystems Fail}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {17--29}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_2}, doi = {10.1007/3-540-45760-7\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JoyeQYY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/HachezQ02, author = {Ga{\"{e}}l Hachez and Jean{-}Jacques Quisquater}, title = {Which directions for asymmetric watermarking?}, booktitle = {11th European Signal Processing Conference, {EUSIPCO} 2002, Toulouse, France, September 3-6, 2002}, pages = {1--4}, publisher = {{IEEE}}, year = {2002}, url = {https://ieeexplore.ieee.org/document/7072297/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/HachezQ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/QuisquaterSRDL02, author = {Jean{-}Jacques Quisquater and Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Pierre David and Jean{-}Didier Legat}, editor = {Manfred Glesner and Peter Zipf and Michel Renovell}, title = {A Cryptanalytic Time-Memory Tradeoff: First {FPGA} Implementation}, booktitle = {Field-Programmable Logic and Applications, Reconfigurable Computing Is Going Mainstream, 12th International Conference, {FPL} 2002, Montpellier, France, September 2-4, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2438}, pages = {780--789}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46117-5\_80}, doi = {10.1007/3-540-46117-5\_80}, timestamp = {Sat, 30 Sep 2023 09:41:27 +0200}, biburl = {https://dblp.org/rec/conf/fpl/QuisquaterSRDL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/KoeuneRSQDL02, author = {Fran{\c{c}}ois Koeune and Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Pierre David and Jean{-}Didier Legat}, editor = {Manfred Glesner and Peter Zipf and Michel Renovell}, title = {An {FPGA} Implementation of the Linear Cryptanalysis}, booktitle = {Field-Programmable Logic and Applications, Reconfigurable Computing Is Going Mainstream, 12th International Conference, {FPL} 2002, Montpellier, France, September 2-4, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2438}, pages = {845--852}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46117-5\_87}, doi = {10.1007/3-540-46117-5\_87}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/KoeuneRSQDL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SicaCQ02, author = {Francesco Sica and Mathieu Ciet and Jean{-}Jacques Quisquater}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {21--36}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_3}, doi = {10.1007/3-540-36492-7\_3}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SicaCQ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sisw/SamydeSAQ02, author = {David Samyde and Sergei P. Skorobogatov and Ross J. Anderson and Jean{-}Jacques Quisquater}, title = {On a New Way to Read Data from Memory}, booktitle = {Proceedings of the First International {IEEE} Security in Storage Workshop, {SISW} 2002, Greenbelt, Maryland, USA, December 11, 2002}, pages = {65--69}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SISW.2002.1183512}, doi = {10.1109/SISW.2002.1183512}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sisw/SamydeSAQ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GuillouUQ01, author = {Louis C. Guillou and Michel Ugon and Jean{-}Jacques Quisquater}, title = {Cryptographic authentication protocols for smart cards}, journal = {Comput. Networks}, volume = {36}, number = {4}, pages = {437--451}, year = {2001}, url = {https://doi.org/10.1016/S1389-1286(01)00165-7}, doi = {10.1016/S1389-1286(01)00165-7}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GuillouUQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JoyeQT01, author = {Marc Joye and Jean{-}Jacques Quisquater and Tsuyoshi Takagi}, title = {How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves}, journal = {Des. Codes Cryptogr.}, volume = {23}, number = {3}, pages = {297--316}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JoyeQT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BressonCPQ01, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval and Jean{-}Jacques Quisquater}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Provably authenticated group Diffie-Hellman key exchange}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {255--264}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502018}, doi = {10.1145/501983.502018}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BressonCPQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyeQ01, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Hessian Elliptic Curves and Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {402--410}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_33}, doi = {10.1007/3-540-44709-1\_33}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/JoyeQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PereiraQ01, author = {Olivier Pereira and Jean{-}Jacques Quisquater}, title = {A Security Analysis of the Cliques Protocols Suites}, booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, pages = {73--81}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSFW.2001.930137}, doi = {10.1109/CSFW.2001.930137}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/PereiraQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JoyeQY01, author = {Marc Joye and Jean{-}Jacques Quisquater and Moti Yung}, editor = {David Naccache}, title = {On the Power of Misbehaving Adversaries and Security Analysis of the Original {EPOC}}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {208--222}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_16}, doi = {10.1007/3-540-45353-9\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JoyeQY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esmart/QuisquaterS01, author = {Jean{-}Jacques Quisquater and David Samyde}, editor = {Isabelle Attali and Thomas P. Jensen}, title = {ElectroMagnetic Analysis {(EMA):} Measures and Counter-Measures for Smart Cards}, booktitle = {Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2140}, pages = {200--210}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45418-7\_17}, doi = {10.1007/3-540-45418-7\_17}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esmart/QuisquaterS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/JoyeQ01, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {Bahram Honary}, title = {On Rabin-Type Signatures}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {99--113}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_10}, doi = {10.1007/3-540-45325-3\_10}, timestamp = {Wed, 18 Mar 2020 16:01:01 +0100}, biburl = {https://dblp.org/rec/conf/ima/JoyeQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchindlerKQ01, author = {Werner Schindler and Fran{\c{c}}ois Koeune and Jean{-}Jacques Quisquater}, editor = {Bahram Honary}, title = {Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {245--267}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_22}, doi = {10.1007/3-540-45325-3\_22}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/SchindlerKQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/CietQS01, author = {Mathieu Ciet and Jean{-}Jacques Quisquater and Francesco Sica}, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, pages = {108--116}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3\_11}, doi = {10.1007/3-540-45311-3\_11}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/CietQS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PereiraQ01, author = {Olivier Pereira and Jean{-}Jacques Quisquater}, editor = {Michel Dupuy and Pierre Paradinas}, title = {Security Analysis of the Cliques Protocols Suites: First Results}, booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}, series = {{IFIP} Conference Proceedings}, volume = {193}, pages = {151--166}, publisher = {Kluwer}, year = {2001}, timestamp = {Fri, 25 Jul 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PereiraQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HachezKQ00, author = {Ga{\"{e}}l Hachez and Fran{\c{c}}ois Koeune and Jean{-}Jacques Quisquater}, editor = {Josep Domingo{-}Ferrer and David Chan and Anthony Watson}, title = {Biometrics, Access Control, Smart Cards: {A} not so Simple Combination}, booktitle = {Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {180}, pages = {273--288}, publisher = {Kluwer}, year = {2000}, timestamp = {Thu, 01 Aug 2002 11:36:41 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HachezKQ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HachezQ00, author = {Ga{\"{e}}l Hachez and Jean{-}Jacques Quisquater}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Montgomery Exponentiation with no Final Subtractions: Improved Results}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {293--301}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_23}, doi = {10.1007/3-540-44499-8\_23}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/HachezQ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/HachezHJQV00, author = {Ga{\"{e}}l Hachez and Laurent Den Hollander and Mehrdad Jalali and Jean{-}Jacques Quisquater and Christophe Vasserot}, editor = {Josef Pieprzyk and Eiji Okamoto and Jennifer Seberry}, title = {Towards a Practical Secure Framework for Mobile Code Commerce}, booktitle = {Information Security, Third International Workshop, {ISW} 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1975}, pages = {164--178}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44456-4\_13}, doi = {10.1007/3-540-44456-4\_13}, timestamp = {Sun, 02 Jun 2019 21:14:19 +0200}, biburl = {https://dblp.org/rec/conf/isw/HachezHJQV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/1998, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10721064}, doi = {10.1007/10721064}, isbn = {3-540-67923-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JoyeLQ99, author = {Marc Joye and Arjen K. Lenstra and Jean{-}Jacques Quisquater}, title = {Chinese Remaindering Based Cryptosystems in the Presence of Faults}, journal = {J. Cryptol.}, volume = {12}, number = {4}, pages = {241--245}, year = {1999}, url = {https://doi.org/10.1007/s001459900055}, doi = {10.1007/S001459900055}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JoyeLQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acpc/VeriansLQM99, author = {Xavier Verians and Jean{-}Didier Legat and Jean{-}Jacques Quisquater and Beno{\^{\i}}t Macq}, editor = {Peter Zinterhof and Mari{\'{a}}n Vajtersic and Andreas Uhl}, title = {A New Parallelism Management Scheme for Multiprocessor Systems}, booktitle = {Parallel Computation, 4th International {ACPC} Conference Including Special Tracks on Parallel Numerics (ParNum'99) and Parallel Computing in Image Processing, Video Processing, and Multimedia, Salzburg, Austria, February 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1557}, pages = {246--256}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49164-3\_23}, doi = {10.1007/3-540-49164-3\_23}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acpc/VeriansLQM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euromicro/GilmontLQ99, author = {Tanguy Gilmont and Jean{-}Didier Legat and Jean{-}Jacques Quisquater}, title = {Enhancing Security in the Memory Management Unit}, booktitle = {25th {EUROMICRO} '99 Conference, Informatics: Theory and Practice for the New Millenium, 8-10 September 1999, Milan, Italy}, pages = {1449}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/EURMIC.1999.794507}, doi = {10.1109/EURMIC.1999.794507}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euromicro/GilmontLQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europar/VeriansLQM99, author = {Xavier Verians and Jean{-}Didier Legat and Jean{-}Jacques Quisquater and Beno{\^{\i}}t Macq}, editor = {Patrick Amestoy and Philippe Berger and Michel J. Dayd{\'{e}} and Iain S. Duff and Val{\'{e}}rie Frayss{\'{e}} and Luc Giraud and Daniel Ruiz}, title = {A Graph-Oriented Task Manager for Small Multiprocessor Systems}, booktitle = {Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31 - September 3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1685}, pages = {735--744}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48311-X\_103}, doi = {10.1007/3-540-48311-X\_103}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europar/VeriansLQM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SternHKQ99, author = {Julien P. Stern and Ga{\"{e}}l Hachez and Fran{\c{c}}ois Koeune and Jean{-}Jacques Quisquater}, editor = {Andreas Pfitzmann}, title = {Robust Object Watermarking: Application to Code}, booktitle = {Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1768}, pages = {368--378}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719724\_25}, doi = {10.1007/10719724\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/SternHKQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DesmedtLQ99, author = {Yvo Desmedt and Tri Van Le and Jean{-}Jacques Quisquater}, editor = {Andreas Pfitzmann}, title = {Nonbinary Audio Cryptography}, booktitle = {Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1768}, pages = {478--489}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719724\_33}, doi = {10.1007/10719724\_33}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DesmedtLQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcard/NeveFQ99, author = {Amaury N{\`{e}}ve and Denis Flandre and Jean{-}Jacques Quisquater}, editor = {Scott B. Guthery and Peter Honeyman}, title = {Feasibility of the Smart Card in Silicon-On-Insulator {(SOI)} Technology}, booktitle = {Proceedings of the 1st Workshop on Smartcard Technology, Smartcard 1999, Chicago, Illinois, USA, May 10-11, 1999}, publisher = {{USENIX} Association}, year = {1999}, url = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/feasibility-smart-card-silicon-insulator-soi}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/smartcard/NeveFQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/GilmontLQ99, author = {Tanguy Gilmont and Jean{-}Didier Legat and Jean{-}Jacques Quisquater}, editor = {Ping Wah Wong and Edward J. Delp III}, title = {Architecture of security management unit for safe hosting of multiple agents}, booktitle = {Security and Watermarking of Multimedia Contents, San Jose, CA, USA, January 23, 1999}, series = {{SPIE} Proceedings}, volume = {3657}, pages = {472--483}, publisher = {{SPIE}}, year = {1999}, url = {https://doi.org/10.1117/12.344697}, doi = {10.1117/12.344697}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/GilmontLQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/Kabasele-TendayQL99, author = {Jean{-}Marie Kabasele{-}Tenday and Jean{-}Jacques Quisquater and Marc Lobelle}, title = {Deriving a Role-Based Access Control Model from the {OBBAC} Model}, booktitle = {8th Workshop on Enabling Technologies {(WETICE} '99), Infrastructure for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA, Proceedings}, pages = {147--151}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ENABL.1999.805190}, doi = {10.1109/ENABL.1999.805190}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/Kabasele-TendayQL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/MassiasAQ99, author = {Henri Massias and X. Serret Avila and Jean{-}Jacques Quisquater}, title = {Timestamps: Main Issues on Their Use and Implementation}, booktitle = {8th Workshop on Enabling Technologies {(WETICE} '99), Infrastructure for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA, Proceedings}, pages = {178--183}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ENABL.1999.805196}, doi = {10.1109/ENABL.1999.805196}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/MassiasAQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cg/DarmstaedterDQM98, author = {V. Darmstaedter and Jean{-}Fran{\c{c}}ois Delaigle and Jean{-}Jacques Quisquater and Beno{\^{\i}}t Macq}, title = {Low cost spatial watermarking}, journal = {Comput. Graph.}, volume = {22}, number = {4}, pages = {417--424}, year = {1998}, url = {https://doi.org/10.1016/S0097-8493(98)00031-4}, doi = {10.1016/S0097-8493(98)00031-4}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cg/DarmstaedterDQM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JoyeQ98, author = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Reducing the Elliptic Curve Cryptosystem of Meyer-M{\"{u}}uller to the Cryptosystem of Rabin-Williams}, journal = {Des. Codes Cryptogr.}, volume = {14}, number = {1}, pages = {53--56}, year = {1998}, url = {https://doi.org/10.1023/A:1008256404676}, doi = {10.1023/A:1008256404676}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JoyeQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GilbertGOQ98, author = {Henri Gilbert and Dipankar Gupta and Andrew M. Odlyzko and Jean{-}Jacques Quisquater}, title = {Attacks on Shamir's 'RSA for Paranoids'}, journal = {Inf. Process. Lett.}, volume = {68}, number = {4}, pages = {197--199}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(98)00160-4}, doi = {10.1016/S0020-0190(98)00160-4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/GilbertGOQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DesmedtHQ98, author = {Yvo Desmedt and Shuang Hou and Jean{-}Jacques Quisquater}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Audio and Optical Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {392--404}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_31}, doi = {10.1007/3-540-49649-1\_31}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DesmedtHQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DhemKLMQW98, author = {Jean{-}Fran{\c{c}}ois Dhem and Fran{\c{c}}ois Koeune and Philippe{-}Alexandre Leroux and Patrick Mestr{\'{e}} and Jean{-}Jacques Quisquater and Jean{-}Louis Willems}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {A Practical Implementation of the Timing Attack}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {167--182}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_15}, doi = {10.1007/10721064\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DhemKLMQW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DhemQ98, author = {Jean{-}Fran{\c{c}}ois Dhem and Jean{-}Jacques Quisquater}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {Recent Results on Modular Multiplications for Smart Cards}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {336--352}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_31}, doi = {10.1007/10721064\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DhemQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/EizenbergQ98, author = {G{\'{e}}rard Eizenberg and Jean{-}Jacques Quisquater}, editor = {Jean{-}Jacques Quisquater and Yves Deswarte and Catherine Meadows and Dieter Gollmann}, title = {Panel Session: Watermarking}, booktitle = {Computer Security - {ESORICS} 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1485}, pages = {275}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055869}, doi = {10.1007/BFB0055869}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/EizenbergQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DesmedtHQ98, author = {Yvo Desmedt and Shuang Hou and Jean{-}Jacques Quisquater}, editor = {David Aucsmith}, title = {Cerebral Cryptography}, booktitle = {Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1525}, pages = {62--72}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49380-8\_5}, doi = {10.1007/3-540-49380-8\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DesmedtHQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/1998, editor = {Jean{-}Jacques Quisquater and Yves Deswarte and Catherine Meadows and Dieter Gollmann}, title = {Computer Security - {ESORICS} 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1485}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055851}, doi = {10.1007/BFB0055851}, isbn = {3-540-65004-0}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Quisquater97, author = {Jean{-}Jacques Quisquater}, title = {The adolescence of smart cards}, journal = {Future Gener. Comput. Syst.}, volume = {13}, number = {1}, pages = {3--7}, year = {1997}, url = {https://doi.org/10.1016/S0167-739X(97)89108-X}, doi = {10.1016/S0167-739X(97)89108-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/Quisquater97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DhemQ97, author = {Jean{-}Fran{\c{c}}ois Dhem and Jean{-}Jacques Quisquater}, title = {Lossless compression algorithms for smart cards: {A} progress report}, journal = {Future Gener. Comput. Syst.}, volume = {13}, number = {1}, pages = {27--38}, year = {1997}, url = {https://doi.org/10.1016/S0167-739X(97)89109-1}, doi = {10.1016/S0167-739X(97)89109-1}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/DhemQ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/QuisquaterJ97, author = {Jean{-}Jacques Quisquater and Marc Joye}, title = {Authentication of Sequences with the {SL2} Hash Function: Application to Video Sequences}, journal = {J. Comput. Secur.}, volume = {5}, number = {3}, pages = {213--224}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5303}, doi = {10.3233/JCS-1997-5303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/QuisquaterJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JoyeQ97, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {Richard Graveman and Philippe A. Janson and Clifford Neuman and Li Gong}, title = {On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack}, booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997}, pages = {135--141}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266420.266449}, doi = {10.1145/266420.266449}, timestamp = {Tue, 10 Nov 2020 20:00:22 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JoyeQ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecmast/DelaigleVGMQ97, author = {Jean{-}Fran{\c{c}}ois Delaigle and Christophe De Vleeschouwer and Francois Goffin and Beno{\^{\i}}t Macq and Jean{-}Jacques Quisquater}, editor = {Serge Fdida and Michele Morganti}, title = {Low Cost Watermarking Based on a Human Vision Model}, booktitle = {Multimedia Applications, Services and Techniques - {ECMAST} '97, Second European Conference, Milan, Italy, May 21-23, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1242}, pages = {153--167}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0037350}, doi = {10.1007/BFB0037350}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecmast/DelaigleVGMQ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BleichenbacherJQ97, author = {Daniel Bleichenbacher and Marc Joye and Jean{-}Jacques Quisquater}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {A new and optimal chosen-message attack on RSA-type cryptosystems}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {302--313}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028486}, doi = {10.1007/BFB0028486}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/BleichenbacherJQ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/JoyeQBD97, author = {Marc Joye and Jean{-}Jacques Quisquater and Feng Bao and Robert H. Deng}, editor = {Michael Darnell}, title = {RSA-type Signatures in the Presence of Transient Faults}, booktitle = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester, UK, December 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1355}, pages = {155--160}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0024460}, doi = {10.1007/BFB0024460}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/JoyeQBD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spieSR/GoffinDVMQ97, author = {Francois Goffin and Jean{-}Fran{\c{c}}ois Delaigle and Christophe De Vleeschouwer and Beno{\^{\i}}t Macq and Jean{-}Jacques Quisquater}, editor = {Ishwar K. Sethi and Ramesh C. Jain}, title = {Low-Cost Perceptive Digital Picture Watermarking Method}, booktitle = {Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, February 8-14, 1997}, series = {{SPIE} Proceedings}, volume = {3022}, pages = {264--277}, publisher = {{SPIE}}, year = {1997}, url = {https://doi.org/10.1117/12.263415}, doi = {10.1117/12.263415}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spieSR/GoffinDVMQ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spieSR/QuisquaterMJDB97, author = {Jean{-}Jacques Quisquater and Beno{\^{\i}}t Macq and Marc Joye and N. Degand and A. Bernard}, editor = {Ishwar K. Sethi and Ramesh C. Jain}, title = {Practical Solution to Authentication of Images with a Secure Camera}, booktitle = {Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, February 8-14, 1997}, series = {{SPIE} Proceedings}, volume = {3022}, pages = {290--297}, publisher = {{SPIE}}, year = {1997}, url = {https://doi.org/10.1117/12.263417}, doi = {10.1117/12.263417}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spieSR/QuisquaterMJDB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/DhemVQ96, author = {Jean{-}Fran{\c{c}}ois Dhem and Daniel Veithen and Jean{-}Jacques Quisquater}, title = {{SCALPS:} Smart card for limited payment systems}, journal = {{IEEE} Micro}, volume = {16}, number = {3}, pages = {42--51}, year = {1996}, url = {https://doi.org/10.1109/40.502405}, doi = {10.1109/40.502405}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/DhemVQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/FerreiraMMQW96, author = {Ronald Ferreira and Ralf Malzahn and Peter Marissen and Jean{-}Jacques Quisquater and Thomas Wille}, title = {{FAME:} {A} 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications}, booktitle = {Proceedings of the Second Smart Card Research and Advanced Application Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam, The Netherlands}, year = {1996}, timestamp = {Fri, 15 Oct 2004 16:01:14 +0200}, biburl = {https://dblp.org/rec/conf/cardis/FerreiraMMQW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HartelQ96, author = {Pieter H. Hartel and Jean{-}Jacques Quisquater}, title = {Introduction to {CARDIS} 1996}, booktitle = {Proceedings of the Second Smart Card Research and Advanced Application Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam, The Netherlands}, year = {1996}, timestamp = {Fri, 15 Oct 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HartelQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/LecatQ96, author = {Renaud Lecat and Jean{-}Jacques Quisquater}, title = {Efficient Compression Algorithms for Smart Cards}, booktitle = {Proceedings of the Second Smart Card Research and Advanced Application Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam, The Netherlands}, year = {1996}, timestamp = {Fri, 15 Oct 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/LecatQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/JoyeQ96, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {Rebecca N. Wright and Peter G. Neumann}, title = {Cryptanalysis of RSA-type cryptosystems: {A} visit}, booktitle = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4, 1996}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {38}, pages = {21--31}, publisher = {{DIMACS/AMS}}, year = {1996}, url = {https://doi.org/10.1090/dimacs/038/03}, doi = {10.1090/DIMACS/038/03}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/JoyeQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/EizenbergGKQ96, author = {G{\'{e}}rard Eizenberg and Dominique Gonthier and Alistair Kelman and Jean{-}Jacques Quisquater}, editor = {Elisa Bertino and Helmut Kurth and Giancarlo Martella and Emilio Montolivo}, title = {Authors' Rights and Copyright Protection}, booktitle = {Computer Security - {ESORICS} 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1146}, pages = {324}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61770-1\_44}, doi = {10.1007/3-540-61770-1\_44}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/EizenbergGKQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JoyeQ96, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {T. Mark A. Lomas}, title = {Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {93--100}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_8}, doi = {10.1007/3-540-62494-5\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/JoyeQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/MacqQ95, author = {Beno{\^{\i}}t Macq and Jean{-}Jacques Quisquater}, title = {Cryptology for digital {TV} broadcasting}, journal = {Proc. {IEEE}}, volume = {83}, number = {6}, pages = {944--957}, year = {1995}, url = {https://doi.org/10.1109/5.387094}, doi = {10.1109/5.387094}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/MacqQ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cost/BoucqueauLMQ95, author = {Jean{-}Marc Boucqueau and Sylvie Lacroix and Beno{\^{\i}}t Macq and Jean{-}Jacques Quisquater}, editor = {David Hutchison and Henning Christiansen and Geoff Coulson and Andr{\'{e}} A. S. Danthine}, title = {Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties}, booktitle = {Teleservices and Multimedia Communications, Second International {COST} 237 Workshop, Copenhagen, Denmark, November 20-22, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1052}, pages = {229--243}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-61028-6\_28}, doi = {10.1007/3-540-61028-6\_28}, timestamp = {Mon, 26 Sep 2022 16:14:00 +0200}, biburl = {https://dblp.org/rec/conf/cost/BoucqueauLMQ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BegiunQ95, author = {Philippe B{\'{e}}guin and Jean{-}Jacques Quisquater}, editor = {Don Coppersmith}, title = {Fast Server-Aided {RSA} Signatures Secure Against Active Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {57--69}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_5}, doi = {10.1007/3-540-44750-4\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BegiunQ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/95, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X}, doi = {10.1007/3-540-49264-X}, isbn = {3-540-59409-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BeguinQ94, author = {Philippe B{\'{e}}guin and Jean{-}Jacques Quisquater}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Secure Acceleration of {DSS} Signatures Using Insecure Server}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {249--259}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000439}, doi = {10.1007/BFB0000439}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BeguinQ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DelosQ94, author = {Olivier Delos and Jean{-}Jacques Quisquater}, editor = {Yvo Desmedt}, title = {An Identity-Based Signature Scheme with Bounded Life-Span}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {83--94}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_10}, doi = {10.1007/3-540-48658-5\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DelosQ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fiwac/DelosQ93, author = {Olivier Delos and Jean{-}Jacques Quisquater}, editor = {G{\'{e}}rard D. Cohen and Simon Litsyn and Antoine Lobstein and Gilles Z{\'{e}}mor}, title = {Efficient multi-signature schemes for cooperating entities}, booktitle = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July 19-21, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {781}, pages = {63--74}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57843-9\_9}, doi = {10.1007/3-540-57843-9\_9}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/fiwac/DelosQ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/BermondDQ92, author = {Jean{-}Claude Bermond and Charles Delorme and Jean{-}Jacques Quisquater}, title = {Table of Large (\emph{Delta, D})-Graphs}, journal = {Discret. Appl. Math.}, volume = {37/38}, pages = {575--577}, year = {1992}, url = {https://doi.org/10.1016/0166-218X(92)90160-C}, doi = {10.1016/0166-218X(92)90160-C}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/BermondDQ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppl/BermondHQ92, author = {Jean{-}Claude Bermond and Pavol Hell and Jean{-}Jacques Quisquater}, title = {Construction of Large Packet Radio Networks}, journal = {Parallel Process. Lett.}, volume = {2}, pages = {3--12}, year = {1992}, url = {https://doi.org/10.1142/S012962649200012X}, doi = {10.1142/S012962649200012X}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppl/BermondHQ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/1992, editor = {Yves Deswarte and G{\'{e}}rard Eizenberg and Jean{-}Jacques Quisquater}, title = {Computer Security - {ESORICS} 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {648}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0013888}, doi = {10.1007/BFB0013888}, isbn = {3-540-56246-X}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/1992.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/QuisquaterD91, author = {Jean{-}Jacques Quisquater and Yvo Desmedt}, title = {Chinese Lotto as an Exhaustive Code-Breaking Machine}, journal = {Computer}, volume = {24}, number = {11}, pages = {14--22}, year = {1991}, url = {https://doi.org/10.1109/2.116847}, doi = {10.1109/2.116847}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/QuisquaterD91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BengioBDGQ91, author = {Samy Bengio and Gilles Brassard and Yvo Desmedt and Claude Goutier and Jean{-}Jacques Quisquater}, title = {Secure Implementations of Identification Systems}, journal = {J. Cryptol.}, volume = {4}, number = {3}, pages = {175--183}, year = {1991}, url = {https://doi.org/10.1007/BF00196726}, doi = {10.1007/BF00196726}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BengioBDGQ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/WaleffeQ91, author = {Dominique de Waleffe and Jean{-}Jacques Quisquater}, editor = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {Better Login Protocols for Computer Networks}, booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991}, series = {Lecture Notes in Computer Science}, volume = {741}, pages = {50--70}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57341-0\_55}, doi = {10.1007/3-540-57341-0\_55}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/WaleffeQ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WaleffeQ90, author = {Dominique de Waleffe and Jean{-}Jacques Quisquater}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {{CORSAIR:} {A} {SMART} Card for Public Key Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {502--513}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_35}, doi = {10.1007/3-540-38424-3\_35}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WaleffeQ90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WaleffeQ90, author = {Dominique de Waleffe and Jean{-}Jacques Quisquater}, title = {Better Login Protocols for Computer Networks}, booktitle = {{ESORICS} 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France}, pages = {163--172}, publisher = {{AFCET}}, year = {1990}, timestamp = {Mon, 26 May 2008 15:32:38 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WaleffeQ90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GuillouQWLS90, author = {Louis C. Guillou and Jean{-}Jacques Quisquater and Michael Walker and Peter Landrock and Caroline Shafer}, editor = {Ivan Damg{\aa}rd}, title = {Precautions Taken Against Various Potential Attacks in {ISO/IEC} {DIS} 9796 "Digital Signature Scheme Giving Message Recovery"}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {465--473}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_42}, doi = {10.1007/3-540-46877-3\_42}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GuillouQWLS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/89, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46885-4}, doi = {10.1007/3-540-46885-4}, isbn = {3-540-53433-4}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GuillouDQ89, author = {Louis C. Guillou and Marc Davio and Jean{-}Jacques Quisquater}, title = {Public-Key Techniques: Randomness and Redundancy}, journal = {Cryptologia}, volume = {13}, number = {2}, pages = {167--189}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863880}, doi = {10.1080/0161-118991863880}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GuillouDQ89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SoeteQV89, author = {Marijke De Soete and Jean{-}Jacques Quisquater and Klaus Vedder}, editor = {Gilles Brassard}, title = {A Signature with Shared Verification Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {253--262}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_23}, doi = {10.1007/0-387-34805-0\_23}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SoeteQV89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuisquaterD89, author = {Jean{-}Jacques Quisquater and Jean{-}Paul Delescaille}, editor = {Gilles Brassard}, title = {How Easy is Collision Search. New Results and Applications to {DES}}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {408--413}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_38}, doi = {10.1007/0-387-34805-0\_38}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/QuisquaterD89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuisquaterQQQGGGGGGB89, author = {Jean{-}Jacques Quisquater and Myriam Quisquater and Muriel Quisquater and Micha{\"{e}}l Quisquater and Louis C. Guillou and Marie Annick Guillou and Ga{\"{\i}}d Guillou and Anna Guillou and Gwenol{\'{e}} Guillou and Soazig Guillou and Thomas A. Berson}, editor = {Gilles Brassard}, title = {How to Explain Zero-Knowledge Protocols to Your Children}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {628--631}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_60}, doi = {10.1007/0-387-34805-0\_60}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/QuisquaterQQQGGGGGGB89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/QuisquaterG89, author = {Jean{-}Jacques Quisquater and Marc Girault}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {102--109}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_13}, doi = {10.1007/3-540-46885-4\_13}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/QuisquaterG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/QuisquaterD89, author = {Jean{-}Jacques Quisquater and Jean{-}Paul Delescaille}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {How Easy is Collision Search? Application to {DES} (Extended Summary)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {429--434}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_43}, doi = {10.1007/3-540-46885-4\_43}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/QuisquaterD89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/QuisquaterB89, author = {Jean{-}Jacques Quisquater and Andr{\'{e}} Bouckaert}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {662--664}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_64}, doi = {10.1007/3-540-46885-4\_64}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/QuisquaterB89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuillouQ88, author = {Louis C. Guillou and Jean{-}Jacques Quisquater}, editor = {Shafi Goldwasser}, title = {A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {216--231}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_16}, doi = {10.1007/0-387-34799-2\_16}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuillouQ88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GuillouQ88, author = {Louis C. Guillou and Jean{-}Jacques Quisquater}, editor = {Christoph G. G{\"{u}}nther}, title = {A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {123--128}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_11}, doi = {10.1007/3-540-45961-8\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GuillouQ88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Quisquater87, author = {Jean{-}Jacques Quisquater}, editor = {Carl Pomerance}, title = {Secret Distribution of Keys for Public-Key Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {203--208}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_16}, doi = {10.1007/3-540-48184-2\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Quisquater87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuillouQ87, author = {Louis C. Guillou and Jean{-}Jacques Quisquater}, editor = {Carl Pomerance}, title = {Efficient Digital Public-Key Signature with Shadow (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {223}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_19}, doi = {10.1007/3-540-48184-2\_19}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuillouQ87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuisquaterD87, author = {Jean{-}Jacques Quisquater and Jean{-}Paul Delescaille}, editor = {Carl Pomerance}, title = {Other Cycling Tests for {DES} (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {255--256}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_23}, doi = {10.1007/3-540-48184-2\_23}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/QuisquaterD87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/BermondDQ86, author = {Jean{-}Claude Bermond and Charles Delorme and Jean{-}Jacques Quisquater}, title = {Strategies for Interconnection Networks: Some Methods from Graph Theory}, journal = {J. Parallel Distributed Comput.}, volume = {3}, number = {4}, pages = {433--449}, year = {1986}, url = {https://doi.org/10.1016/0743-7315(86)90008-0}, doi = {10.1016/0743-7315(86)90008-0}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/BermondDQ86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtQ86, author = {Yvo Desmedt and Jean{-}Jacques Quisquater}, editor = {Andrew M. Odlyzko}, title = {Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between {DES} and RSA?)}, booktitle = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California, USA, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {263}, pages = {111--117}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-47721-7\_9}, doi = {10.1007/3-540-47721-7\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtQ86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DesmedtHQ86, author = {Yvo Desmedt and Frank Hoornaert and Jean{-}Jacques Quisquater}, title = {Several Exhaustive Key Search Machines and {DES}}, booktitle = {{EUROCRYPT}}, pages = {17--19}, year = {1986}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DesmedtHQ86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuisquaterDD85, author = {Jean{-}Jacques Quisquater and Yvo Desmedt and Marc Davio}, editor = {Hugh C. Williams}, title = {The Importance of "Good" Key Scheduling Schemes (How to Make a Secure {DES} Scheme with {\textless}= 48 Bit Keys)}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {537--542}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_43}, doi = {10.1007/3-540-39799-X\_43}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/QuisquaterDD85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DavioDGHQ84, author = {Marc Davio and Yvo Desmedt and Jo Goubert and Frank Hoornaert and Jean{-}Jacques Quisquater}, editor = {G. R. Blakley and David Chaum}, title = {Efficient Hardware and Software Implementations for the {DES}}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {144--146}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_14}, doi = {10.1007/3-540-39568-7\_14}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DavioDGHQ84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtQD84, author = {Yvo Desmedt and Jean{-}Jacques Quisquater and Marc Davio}, editor = {G. R. Blakley and David Chaum}, title = {Dependence of Output on Input in {DES:} Small Avalanche Characteristics}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {359--376}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_28}, doi = {10.1007/3-540-39568-7\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtQD84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DavioDQ84, author = {Marc Davio and Yvo Desmedt and Jean{-}Jacques Quisquater}, editor = {Thomas Beth and Norbert Cot and Ingemar Ingemarsson}, title = {Propagation Characteristics of the {DES}}, booktitle = {Advances in Cryptology: Proceedings of {EUROCRYPT} 84, {A} Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {209}, pages = {62--73}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39757-4\_7}, doi = {10.1007/3-540-39757-4\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DavioDQ84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WoutersVQPNHGFDD83, author = {Marc Davio and Yvo Desmedt and Marc Fosseprez and Ren{\'{e}} Govaerts and Jan Hulsbosch and Patrik Neutjens and Philippe Piret and Jean{-}Jacques Quisquater and Joos Vandewalle and Pascal Wouters}, editor = {David Chaum}, title = {Analytical Characteristics of the {DES}}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '83, Santa Barbara, California, USA, August 21-24, 1983}, pages = {171--202}, publisher = {Plenum Press, New York}, year = {1983}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/WoutersVQPNHGFDD83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BermondDQ82, author = {Jean{-}Claude Bermond and Charles Delorme and Jean{-}Jacques Quisquater}, title = {Tables of Large Graphs with Given Degree and Diameter}, journal = {Inf. Process. Lett.}, volume = {15}, number = {1}, pages = {10--13}, year = {1982}, url = {https://doi.org/10.1016/0020-0190(82)90076-X}, doi = {10.1016/0020-0190(82)90076-X}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BermondDQ82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Davio82, author = {Marc Davio and Jean{-}Marie Goethals and Jean{-}Jacques Quisquater}, editor = {Thomas Beth}, title = {Authentication Procedures}, booktitle = {Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982}, series = {Lecture Notes in Computer Science}, volume = {149}, pages = {283--288}, publisher = {Springer}, year = {1982}, url = {https://doi.org/10.1007/3-540-39466-4\_20}, doi = {10.1007/3-540-39466-4\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Davio82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/DelsarteQ73, author = {Philippe Delsarte and Jean{-}Jacques Quisquater}, title = {Permutation Cascades with Normalized Cells}, journal = {Inf. Control.}, volume = {23}, number = {4}, pages = {344--356}, year = {1973}, url = {https://doi.org/10.1016/S0019-9958(73)80003-8}, doi = {10.1016/S0019-9958(73)80003-8}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/DelsarteQ73.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.