Follow
Quisquater Jean-Jacques
Quisquater Jean-Jacques
UCL Crypto Group, professor em. of cryptography, security
Verified email at uclouvain.be
Title
Cited by
Cited by
Year
Electromagnetic analysis (ema): Measures and counter-measures for smart cards
JJ Quisquater, D Samyde
International Conference on Research in Smart Cards, 200-210, 2001
14112001
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
LC Guillou, JJ Quisquater
Workshop on the theory and application of of cryptographic techniques, 123-128, 1988
7711988
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad
G Piret, JJ Quisquater
International workshop on cryptographic hardware and embedded systems, 77-88, 2003
7572003
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
PSLM Barreto, B Libert, N McCullagh, JJ Quisquater
International conference on the theory and application of cryptology and …, 2005
6692005
A “paradoxical” indentity-based signature scheme resulting from zero-knowledge
LC Guillou, JJ Quisquater
Conference on the Theory and Application of Cryptography, 216-231, 1988
6391988
Provably secure authenticated group Diffie-Hellman key exchange
E Bresson, O Chevassut, D Pointcheval
ACM Transactions on Information and System Security (TISSEC) 10 (3), 10-es, 2007
6062007
Cryptology for digital TV broadcasting
BM Macq, JJ Quisquater
Proceedings of the IEEE 83 (6), 944-957, 1995
5921995
Fast decipherment algorithm for RSA public-key cryptosystem
JJ Quisquater, C Couvreur
Electronics letters 21 (18), 905-907, 1982
5741982
Efficient remote data possession checking in critical information infrastructures
F Sebé, J Domingo-Ferrer, A Martinez-Balleste, Y Deswarte, ...
IEEE Transactions on Knowledge and Data Engineering 20 (8), 1034-1038, 2008
4752008
A practical implementation of the timing attack
JF Dhem, F Koeune, PA Leroux, P Mestré, JJ Quisquater, JL Willems
International Conference on Smart Card Research and Advanced Applications …, 1998
4531998
Remote integrity checking
Y Deswarte, JJ Quisquater, A Saïdane
Working conference on integrity and internal control in information systems …, 2003
4372003
A new identity based signcryption scheme from pairings
B Libert, JJ Quisquater
Proceedings 2003 IEEE Information Theory Workshop (Cat. No. 03EX674), 155-158, 2003
4272003
Template attacks in principal subspaces
C Archambeau, E Peeters, FX Standaert, JJ Quisquater
International Workshop on Cryptographic Hardware and Embedded Systems, 1-14, 2006
3492006
Electing a university president using open-audit voting: Analysis of real-world use of Helios
B Adida, O De Marneffe, O Pereira, JJ Quisquater
EVT/WOTE 9 (10), 2009
2982009
SEA: A scalable encryption algorithm for small embedded applications
FX Standaert, G Piret, N Gershenfeld, JJ Quisquater
International Conference on Smart Card Research and Advanced Applications …, 2006
2902006
How to explain zero-knowledge protocols to your children
JJ Quisquater, M Quisquater, M Quisquater, M Quisquater, L Guillou, ...
Conference on the Theory and Application of Cryptology, 628-631, 1989
2901989
Hessian elliptic curves and side-channel attacks
M Joye, JJ Quisquater
International workshop on cryptographic hardware and embedded systems, 402-410, 2001
2722001
Design of a secure timestamping service with minimal trust requirement
H Massias, XS Avila, JJ Quisquater
the 20th Symposium on Information Theory in the Benelux, 1999
2611999
Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applications
G Rouvroy, FX Standaert, JJ Quisquater, JD Legat
International Conference on Information Technology: Coding and Computing …, 2004
2422004
Strategies for interconnection networks: some methods from graph theory
JJQ JC Bermond, C Delorme
Journal of Parallel and Distributed Computing 3 (4), 433-449, 1986
2411986
The system can't perform the operation now. Try again later.
Articles 1–20