Jean-Jacques Quisquater
Affiliations:- Université catholique de Louvain, Belgium
According to our database1,
Jean-Jacques Quisquater
authored at least 228 papers
between 1973 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on id.loc.gov
-
on d-nb.info
-
on uclouvain.be
-
on isni.org
On csauthors.net:
Bibliography
2020
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
2017
ERCIM News, 2017
2016
Proceedings of the New Codebreakers, 2016
2015
2013
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards.
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the Fault Analysis in Cryptography, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the Practical Signcryption, 2010
Proceedings of the Practical Signcryption, 2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
2009
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
IACR Cryptol. ePrint Arch., 2009
Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security.
Proceedings of the Topics in Cryptology, 2009
2008
IEEE Trans. Knowl. Data Eng., 2008
Int. J. Law Inf. Technol., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
EURASIP J. Inf. Secur., 2008
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
CoRR, 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the Public Key Infrastructure, 2008
Proceedings of the Smart Card Research and Advanced Applications, 2008
Proceedings of the Progress in Cryptology, 2008
2007
J. Syst. Archit., 2007
Integr., 2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007
Proceedings of the E-Voting and Identity, First International Conference, 2007
The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults?
Proceedings of the Stabilization, 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the FPL 2007, 2007
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007
Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware.
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Collision Search for Elliptic Curve Discrete Logarithm over GF(2<sup> <i>m</i> </sup>) with FPGA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Forward-secure signatures in untrusted update environments: efficient and generic constructions.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
IEEE Trans. Circuits Syst. Video Technol., 2006
Proc. IEEE, 2006
On the impossibility of building secure Cliques-type authenticated group key agreement protocols.
J. Comput. Secur., 2006
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Public Key Cryptography, 2006
FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks.
Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
Proceedings of the 2006 IEEE International Conference on Application-Specific Systems, 2006
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
Iterative Modular Division over GF(2<sup><i>m</i></sup>): Novel Algorithm and Implementations on FPGA.
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Integrated Circuit and System Design, 2005
Proceedings of the Q2SWinet'05, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps.
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Public Key Cryptography, 2004
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Information Security, 7th International Conference, 2004
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
An improved Montgomery modular inversion targeted for efficient implementation on FPGA.
Proceedings of the 2004 IEEE International Conference on Field-Programmable Technology, 2004
Proceedings of the Field Programmable Logic and Application, 2004
Efficient Modular Division Implementation: ECC over GF(p) Affine Coordinates Application.
Proceedings of the Field Programmable Logic and Application, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved.
Proceedings of the Public Key Infrastructure, 2004
Reconfigurable hardware solutions for the digital rights management of digital cinema.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis.
IEEE Trans. Computers, 2003
J. Comput. Secur., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003
Proceedings of the Field Programmable Logic and Application, 13th International Conference, 2003
A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL.
Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2003
Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES.
Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2003
Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms.
Proceedings of the Advances in Cryptology, 2003
Proceedings of the 2003 Design, 2003
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Proceedings of the First International IEEE Security in Storage Workshop, 2002
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves.
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Field-Programmable Logic and Applications, 2002
Proceedings of the Field-Programmable Logic and Applications, 2002
Proceedings of the 11th European Signal Processing Conference, 2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
Awards.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
2001
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves.
Des. Codes Cryptogr., 2001
Security Analysis of the Cliques Protocols Suites: First Results.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography.
Proceedings of the Progress in Cryptology, 2001
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies.
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Smart Card Programming and Security, 2001
Proceedings of the Topics in Cryptology, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
Proceedings of the CCS 2001, 2001
2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Biometrics, Access Control, Smart Cards: A not so Simple Combination.
Proceedings of the Smart Card Research and Advanced Applications, 2000
1999
J. Cryptol., 1999
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
Proceedings of the 1st Workshop on Smartcard Technology, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
Proceedings of the Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31, 1999
Proceedings of the 25th EUROMICRO '99 Conference, 1999
Proceedings of the Parallel Computation, 1999
1998
Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams.
Des. Codes Cryptogr., 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1997
Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences.
J. Comput. Secur., 1997
Future Gener. Comput. Syst., 1997
Proceedings of the Storage and Retrieval for Image and Video Databases V, 1997
Proceedings of the Storage and Retrieval for Image and Video Databases V, 1997
Proceedings of the Cryptography and Coding, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Multimedia Applications, Services and Techniques, 1997
Proceedings of the CCS '97, 1997
1996
Proceedings of the Security Protocols, 1996
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996
Efficient Compression Algorithms for Smart Cards.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996
Introduction to CARDIS 1996.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996
FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996
1995
Proceedings of the Advances in Cryptology, 1995
Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties.
Proceedings of the Teleservices and Multimedia Communications, 1995
1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Proceedings of the Algebraic Coding, 1993
1992
1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
1990
Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery".
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary).
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
1988
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory.
Proceedings of the Advances in Cryptology, 1988
Proceedings of the Advances in Cryptology, 1988
1987
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987
1986
J. Parallel Distributed Comput., 1986
Several Exhaustive Key Search Machines and DES.
EUROCRYPT, 1986
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?).
Proceedings of the Advances in Cryptology, 1986
1985
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys).
Proceedings of the Advances in Cryptology, 1985
1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984
Proceedings of the Advances in Cryptology, 1984
Proceedings of the Advances in Cryptology, 1984
1983
Analytical Characteristics of the DES.
Proceedings of the Advances in Cryptology, 1983
1982
Proceedings of the Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29, 1982
1973