Quisquater Jean-Jacques
Quisquater Jean-Jacques
UCL Crypto Group, professor em. of cryptography, security
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Electromagnetic analysis (ema): Measures and counter-measures for smart cards
JJ Quisquater, D Samyde
International Conference on Research in Smart Cards, 200-210, 2001
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
LC Guillou, JJ Quisquater
Workshop on the theory and application of of cryptographic techniques, 123-128, 1988
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad
G Piret, JJ Quisquater
International workshop on cryptographic hardware and embedded systems, 77-88, 2003
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
PSLM Barreto, B Libert, N McCullagh, JJ Quisquater
International conference on the theory and application of cryptology and …, 2005
A “paradoxical” indentity-based signature scheme resulting from zero-knowledge
LC Guillou, JJ Quisquater
Conference on the Theory and Application of Cryptography, 216-231, 1988
Provably secure authenticated group Diffie-Hellman key exchange
E Bresson, O Chevassut, D Pointcheval
ACM Transactions on Information and System Security (TISSEC) 10 (3), 10-es, 2007
Cryptology for digital TV broadcasting
BM Macq, JJ Quisquater
Proceedings of the IEEE 83 (6), 944-957, 1995
Fast decipherment algorithm for RSA public-key cryptosystem
JJ Quisquater, C Couvreur
Electronics letters 21 (18), 905-907, 1982
Efficient remote data possession checking in critical information infrastructures
F Sebé, J Domingo-Ferrer, A Martinez-Balleste, Y Deswarte, ...
IEEE Transactions on Knowledge and Data Engineering 20 (8), 1034-1038, 2008
A practical implementation of the timing attack
JF Dhem, F Koeune, PA Leroux, P Mestré, JJ Quisquater, JL Willems
International Conference on Smart Card Research and Advanced Applications …, 1998
Remote integrity checking
Y Deswarte, JJ Quisquater, A Saïdane
Working conference on integrity and internal control in information systems …, 2003
A new identity based signcryption scheme from pairings
B Libert, JJ Quisquater
Proceedings 2003 IEEE Information Theory Workshop (Cat. No. 03EX674), 155-158, 2003
Template attacks in principal subspaces
C Archambeau, E Peeters, FX Standaert, JJ Quisquater
International Workshop on Cryptographic Hardware and Embedded Systems, 1-14, 2006
Electing a university president using open-audit voting: Analysis of real-world use of Helios
B Adida, O De Marneffe, O Pereira, JJ Quisquater
EVT/WOTE 9 (10), 2009
How to explain zero-knowledge protocols to your children
JJ Quisquater, M Quisquater, M Quisquater, M Quisquater, L Guillou, ...
Conference on the Theory and Application of Cryptology, 628-631, 1989
SEA: A scalable encryption algorithm for small embedded applications
FX Standaert, G Piret, N Gershenfeld, JJ Quisquater
International Conference on Smart Card Research and Advanced Applications …, 2006
Hessian elliptic curves and side-channel attacks
M Joye, JJ Quisquater
International workshop on cryptographic hardware and embedded systems, 402-410, 2001
Design of a secure timestamping service with minimal trust requirement
H Massias, XS Avila, JJ Quisquater
the 20th Symposium on Information Theory in the Benelux, 1999
Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applications
G Rouvroy, FX Standaert, JJ Quisquater, JD Legat
International Conference on Information Technology: Coding and Computing …, 2004
Strategies for interconnection networks: some methods from graph theory
JJQ JC Bermond, C Delorme
Journal of Parallel and Distributed Computing 3 (4), 433-449, 1986
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20