What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jean-Jacques Quisquater
Google Scholar
83
publications in security and cryptology related venues
Year
Venue
Title
2020
conf/icisc
Can a Differential Attack Work for an Arbitrarily Large Number of Rounds?
Nicolas T. Courtois
Jean-Jacques Quisquater
2013
conf/fc
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards.
Yuanyuan Zhou
Yu Yu
François-Xavier Standaert
Jean-Jacques Quisquater
2012
conf/asiacrypt
On Polynomial Systems Arising from a Weil Descent.
Christophe Petit
Jean-Jacques Quisquater
2011
journals/joc
Guest Editorial.
Christof Paar
Jean-Jacques Quisquater
Berk Sunar
2010
conf/sacrypt
Preimages for the Tillich-Zémor Hash Function.
Christophe Petit
Jean-Jacques Quisquater
2009
conf/ccs
Authenticated wireless roaming via tunnels: making mobile guests feel at home.
Mark Manulis
Damien Leroy
François Koeune
Olivier Bonaventure
Jean-Jacques Quisquater
2009
conf/uss
Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios.
Olivier de Marneffe
Olivier Pereira
Jean-Jacques Quisquater
2009
conf/ctrsa
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security.
Christophe Petit
Jean-Jacques Quisquater
Jean-Pierre Tillich
Gilles Zémor
2008
conf/fse
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent.
Baudoin Collard
François-Xavier Standaert
Jean-Jacques Quisquater
2008
conf/fse
On the Salsa20 Core Function.
Julio César Hernández Castro
Juan M. Estévez-Tapiador
Jean-Jacques Quisquater
2008
conf/fc
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Jon Callas
Yvo Desmedt
Daniel Nagy
Akira Otsuka
Jean-Jacques Quisquater
Moti Yung
2008
conf/fc
ePassport: Securing International Contacts with Contactless Chips.
Gildas Avoine
Kassem Kalach
Jean-Jacques Quisquater
2008
conf/icics
Method for Detecting Vulnerability to Doubling Attacks.
Chong Hee Kim
Jean-Jacques Quisquater
2008
conf/africacrypt
Implementation of the AES-128 on Virtex-5 FPGAs.
Philippe Bulens
François-Xavier Standaert
Jean-Jacques Quisquater
Pascal Pellegrin
Gaël Rouvroy
2007
conf/ccs
Forward-secure signatures in untrusted update environments: efficient and generic constructions.
Benoît Libert
Jean-Jacques Quisquater
Moti Yung
2007
conf/icisc
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.
Chong Hee Kim
Jong Hoon Shin
Jean-Jacques Quisquater
Pil Joong Lee
2007
conf/icisc
Improving the Time Complexity of Matsui's Linear Cryptanalysis.
Baudoin Collard
François-Xavier Standaert
Jean-Jacques Quisquater
2007
conf/ches
</sup>) with FPGA.
Guerric Meurice de Dormale
Philippe Bulens
Jean-Jacques Quisquater
2007
conf/ches
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles.
François Macé
François-Xavier Standaert
Jean-Jacques Quisquater
2007
conf/pkc
Parallel Key-Insulated Public Key Encryption Without Random Oracles.
Benoît Libert
Jean-Jacques Quisquater
Moti Yung
2007
conf/fdtc
How can we overcome both side channel analysis and fault attacks on RSA-CRT?
Chong Hee Kim
Jean-Jacques Quisquater
2006
conf/ches
Towards Security Limits in Side-Channel Attacks.
François-Xavier Standaert
Eric Peeters
Cédric Archambeau
Jean-Jacques Quisquater
2006
conf/ches
Template Attacks in Principal Subspaces.
Cédric Archambeau
Eric Peeters
François-Xavier Standaert
Jean-Jacques Quisquater
2006
conf/pkc
On Constructing Certificateless Cryptosystems from Identity Based Encryption.
Benoît Libert
Jean-Jacques Quisquater
2006
conf/ctrsa
Fair Identification.
Omkant Pandey
Julien Cathalo
Jean-Jacques Quisquater
2005
conf/acns
Identity Based Encryption Without Redundancy.
Benoît Libert
Jean-Jacques Quisquater
2005
conf/icisc
Improvements to Mitchell's Remote User Authentication Protocol.
Vipul Goyal
Abhishek Jain
Jean-Jacques Quisquater
2005
conf/ches
Improved Higher-Order Side-Channel Attacks with FPGA Experiments.
Eric Peeters
François-Xavier Standaert
Nicolas Donckers
Jean-Jacques Quisquater
2005
conf/icics
Efficient and Non-interactive Timed-Release Encryption.
Julien Cathalo
Benoît Libert
Jean-Jacques Quisquater
2005
conf/asiacrypt
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps.
Paulo S. L. M. Barreto
Benoît Libert
Noel McCullagh
Jean-Jacques Quisquater
2004
conf/fse
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware.
François-Xavier Standaert
Gilles Piret
Gaël Rouvroy
Jean-Jacques Quisquater
Jean-Didier Legat
2004
conf/pkc
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups.
Benoît Libert
Jean-Jacques Quisquater
2004
conf/ctrsa
Identity Based Undeniable Signatures.
Benoît Libert
Jean-Jacques Quisquater
2004
conf/sacrypt
Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results.
Gilles Piret
Jean-Jacques Quisquater
2003
conf/ches
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs.
François-Xavier Standaert
Gaël Rouvroy
Jean-Jacques Quisquater
Jean-Didier Legat
2003
conf/ches
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD.
Gilles Piret
Jean-Jacques Quisquater
2003
conf/ches
A New Type of Timing Attack: Application to GPS.
Julien Cathalo
François Koeune
Jean-Jacques Quisquater
2003
conf/eurocrypt
Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms.
Mathieu Ciet
Tanja Lange
Francesco Sica
Jean-Jacques Quisquater
2002
conf/ches
Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication.
Mathieu Ciet
Jean-Jacques Quisquater
Francesco Sica
2002
conf/ches
A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results.
François-Xavier Standaert
Gaël Rouvroy
Jean-Jacques Quisquater
Jean-Didier Legat
2002
conf/ches
CHES: Past, Present, and Future.
Jean-Jacques Quisquater
2002
conf/ctrsa
Observability Analysis - Detecting When Improved Cryptosystems Fail.
Marc Joye
Jean-Jacques Quisquater
Sung-Ming Yen
Moti Yung
2002
conf/sacrypt
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves.
Francesco Sica
Mathieu Ciet
Jean-Jacques Quisquater
2001
conf/ccs
Provably authenticated group Diffie-Hellman key exchange.
Emmanuel Bresson
Olivier Chevassut
David Pointcheval
Jean-Jacques Quisquater
2001
conf/sec
Security Analysis of the Cliques Protocols Suites: First Results.
Olivier Pereira
Jean-Jacques Quisquater
2001
conf/ches
Hessian Elliptic Curves and Side-Channel Attacks.
Marc Joye
Jean-Jacques Quisquater
2001
conf/ctrsa
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC.
Marc Joye
Jean-Jacques Quisquater
Moti Yung
2000
conf/ches
Montgomery Exponentiation with no Final Subtractions: Improved Results.
Gaël Hachez
Jean-Jacques Quisquater
1999
journals/joc
Chinese Remaindering Based Cryptosystems in the Presence of Faults.
Marc Joye
Arjen K. Lenstra
Jean-Jacques Quisquater
1999
conf/ih
Nonbinary Audio Cryptography.
Yvo Desmedt
Tri Van Le
Jean-Jacques Quisquater
1999
conf/ih
Robust Object Watermarking: Application to Code.
Julien P. Stern
Gaël Hachez
François Koeune
Jean-Jacques Quisquater
1998
conf/ih
Cerebral Cryptography.
Yvo Desmedt
Shuang Hou
Jean-Jacques Quisquater
1998
conf/esorics
Panel Session: Watermarking.
Gérard Eizenberg
Jean-Jacques Quisquater
1998
conf/asiacrypt
Audio and Optical Cryptography.
Yvo Desmedt
Shuang Hou
Jean-Jacques Quisquater
1997
conf/ccs
On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack.
Marc Joye
Jean-Jacques Quisquater
1997
conf/icics
A new and optimal chosen-message attack on RSA-type cryptosystems.
Daniel Bleichenbacher
Marc Joye
Jean-Jacques Quisquater
1996
conf/esorics
Authors' Rights and Copyright Protection.
Gérard Eizenberg
Dominique Gonthier
Alistair Kelman
Jean-Jacques Quisquater
1995
conf/crypto
Fast Server-Aided RSA Signatures Secure Against Active Attacks.
Philippe Béguin
Jean-Jacques Quisquater
1994
conf/crypto
An Identity-Based Signature Scheme with Bounded Life-Span.
Olivier Delos
Jean-Jacques Quisquater
1994
conf/asiacrypt
Secure Acceleration of DSS Signatures Using Insecure Server.
Philippe Béguin
Jean-Jacques Quisquater
1991
journals/joc
Secure Implementations of Identification Systems.
Samy Bengio
Gilles Brassard
Yvo Desmedt
Claude Goutier
Jean-Jacques Quisquater
1990
conf/crypto
CORSAIR: A SMART Card for Public Key Cryptosystems.
Dominique de Waleffe
Jean-Jacques Quisquater
1990
conf/esorics
Better Login Protocols for Computer Networks.
Dominique de Waleffe
Jean-Jacques Quisquater
1990
conf/eurocrypt
Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery".
Louis C. Guillou
Jean-Jacques Quisquater
Michael Walker
Peter Landrock
Caroline Shafer
1989
conf/crypto
A Signature with Shared Verification Scheme.
Marijke De Soete
Jean-Jacques Quisquater
Klaus Vedder
1989
conf/crypto
How Easy is Collision Search. New Results and Applications to DES.
Jean-Jacques Quisquater
Jean-Paul Delescaille
1989
conf/crypto
How to Explain Zero-Knowledge Protocols to Your Children.
Jean-Jacques Quisquater
Myriam Quisquater
Muriel Quisquater
Michaël Quisquater
Louis C. Guillou
Marie Annick Guillou
Gaïd Guillou
Anna Guillou
Gwenolé Guillou
Soazig Guillou
Thomas A. Berson
1989
conf/eurocrypt
Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary).
Jean-Jacques Quisquater
André Bouckaert
1989
conf/eurocrypt
How Easy is Collision Search? Application to DES (Extended Summary).
Jean-Jacques Quisquater
Jean-Paul Delescaille
1989
conf/eurocrypt
2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms.
Jean-Jacques Quisquater
Marc Girault
1988
conf/crypto
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge.
Louis C. Guillou
Jean-Jacques Quisquater
1988
conf/eurocrypt
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory.
Louis C. Guillou
Jean-Jacques Quisquater
1987
conf/crypto
Other Cycling Tests for DES (Abstract).
Jean-Jacques Quisquater
Jean-Paul Delescaille
1987
conf/crypto
Efficient Digital Public-Key Signature with Shadow (Abstract).
Louis C. Guillou
Jean-Jacques Quisquater
1987
conf/crypto
Secret Distribution of Keys for Public-Key Systems.
Jean-Jacques Quisquater
1986
conf/crypto
Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?).
Yvo Desmedt
Jean-Jacques Quisquater
1986
conf/eurocrypt
Several Exhaustive Key Search Machines and DES.
Yvo Desmedt
Frank Hoornaert
Jean-Jacques Quisquater
1985
conf/crypto
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys).
Jean-Jacques Quisquater
Yvo Desmedt
Marc Davio
1984
conf/crypto
Dependence of Output on Input in DES: Small Avalanche Characteristics.
Yvo Desmedt
Jean-Jacques Quisquater
Marc Davio
1984
conf/crypto
Efficient Hardware and Software Implementations for the DES.
Marc Davio
Yvo Desmedt
Jo Goubert
Frank Hoornaert
Jean-Jacques Quisquater
1984
conf/eurocrypt
Propagation Characteristics of the DES.
Marc Davio
Yvo Desmedt
Jean-Jacques Quisquater
1983
conf/crypto
Analytical Characteristics of the DES.
Marc Davio
Yvo Desmedt
Marc Fosseprez
René Govaerts
Jan Hulsbosch
Patrik Neutjens
Philippe Piret
Jean-Jacques Quisquater
Joos Vandewalle
Pascal Wouters
1982
conf/eurocrypt
Authentication Procedures.
Marc Davio
Jean-Marie Goethals
Jean-Jacques Quisquater
Coauthors
Abhishek Jain
(1)
Akira Otsuka
(1)
Alistair Kelman
(1)
André Bouckaert
(1)
Anna Guillou
(1)
Arjen K. Lenstra
(1)
Baudoin Collard
(2)
Benoît Libert
(8)
Berk Sunar
(1)
Caroline Shafer
(1)
Cédric Archambeau
(2)
Chong Hee Kim
(3)
Christof Paar
(1)
Christophe Petit
(3)
Claude Goutier
(1)
Damien Leroy
(1)
Daniel Bleichenbacher
(1)
Daniel Nagy
(1)
David Pointcheval
(1)
Dominique de Waleffe
(2)
Dominique Gonthier
(1)
Emmanuel Bresson
(1)
Eric Peeters
(3)
Francesco Sica
(3)
François Koeune
(3)
François Macé
(1)
François-Xavier Standaert
(11)
Frank Hoornaert
(2)
Gaël Hachez
(2)
Gaël Rouvroy
(4)
Gaïd Guillou
(1)
Gérard Eizenberg
(2)
Gildas Avoine
(1)
Gilles Brassard
(1)
Gilles Piret
(3)
Gilles Zémor
(1)
Guerric Meurice de Dormale
(1)
Gwenolé Guillou
(1)
Jan Hulsbosch
(1)
Jean-Didier Legat
(3)
Jean-Jacques Quisquater
(83)
Jean-Marie Goethals
(1)
Jean-Paul Delescaille
(3)
Jean-Pierre Tillich
(1)
Jo Goubert
(1)
Jon Callas
(1)
Jong Hoon Shin
(1)
Joos Vandewalle
(1)
Juan M. Estévez-Tapiador
(1)
Julien Cathalo
(3)
Julien P. Stern
(1)
Julio César Hernández Castro
(1)
Kassem Kalach
(1)
Klaus Vedder
(1)
Louis C. Guillou
(5)
Marc Davio
(6)
Marc Fosseprez
(1)
Marc Girault
(1)
Marc Joye
(6)
Marie Annick Guillou
(1)
Marijke De Soete
(1)
Mark Manulis
(1)
Mathieu Ciet
(3)
Michaël Quisquater
(1)
Michael Walker
(1)
Moti Yung
(5)
Muriel Quisquater
(1)
Myriam Quisquater
(1)
Nicolas Donckers
(1)
Nicolas T. Courtois
(1)
Noel McCullagh
(1)
Olivier Bonaventure
(1)
Olivier Chevassut
(1)
Olivier de Marneffe
(1)
Olivier Delos
(1)
Olivier Pereira
(2)
Omkant Pandey
(1)
Pascal Pellegrin
(1)
Pascal Wouters
(1)
Patrik Neutjens
(1)
Paulo S. L. M. Barreto
(1)
Peter Landrock
(1)
Philippe Béguin
(2)
Philippe Bulens
(2)
Philippe Piret
(1)
Pil Joong Lee
(1)
René Govaerts
(1)
Samy Bengio
(1)
Shuang Hou
(2)
Soazig Guillou
(1)
Sung-Ming Yen
(1)
Tanja Lange
(1)
Thomas A. Berson
(1)
Tri Van Le
(1)
Vipul Goyal
(1)
Yu Yu
(1)
Yuanyuan Zhou
(1)
Yvo Desmedt
(12)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to