Suivre
Quisquater Jean-Jacques
Quisquater Jean-Jacques
UCL Crypto Group, professor em. of cryptography, security
Adresse e-mail validée de uclouvain.be
Titre
Citée par
Citée par
Année
Electromagnetic analysis (ema): Measures and counter-measures for smart cards
JJ Quisquater, D Samyde
Smart Card Programming and Security: International Conference on Research in …, 2001
15572001
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
LC Guillou, JJ Quisquater
Advances in Cryptology—EUROCRYPT’88: Workshop on the Theory and Application …, 1988
8411988
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad
G Piret, JJ Quisquater
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
8362003
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
PSLM Barreto, B Libert, N McCullagh, JJ Quisquater
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
7282005
A “paradoxical” indentity-based signature scheme resulting from zero-knowledge
LC Guillou, JJ Quisquater
Advances in Cryptology—CRYPTO’88: Proceedings 8, 216-231, 1990
6771990
Provably secure authenticated group Diffie-Hellman key exchange
E Bresson, O Chevassut, D Pointcheval
ACM Transactions on Information and System Security (TISSEC) 10 (3), 10-es, 2007
6412007
Fast decipherment algorithm for RSA public-key cryptosystem
JJ Quisquater, C Couvreur
Electronics letters 21 (18), 905-907, 1982
6081982
Cryptology for digital TV broadcasting
BM Macq, JJ Quisquater
Proceedings of the IEEE 83 (6), 944-957, 1995
5901995
Efficient remote data possession checking in critical information infrastructures
F Sebé, J Domingo-Ferrer, A Martinez-Balleste, Y Deswarte, ...
IEEE Transactions on Knowledge and Data Engineering 20 (8), 1034-1038, 2008
4932008
A practical implementation of the timing attack
JF Dhem, F Koeune, PA Leroux, P Mestré, JJ Quisquater, JL Willems
Smart Card Research and Applications: Third International Conference, CARDIS …, 2000
4902000
Remote integrity checking: How to trust files stored on untrusted servers
Y Deswarte, JJ Quisquater, A Saïdane
Integrity and Internal Control in Information Systems VI: IFIP TC11/WG11. 5 …, 2004
4752004
A new identity based signcryption scheme from pairings
B Libert, JJ Quisquater
Proceedings 2003 IEEE Information Theory Workshop (Cat. No. 03EX674), 155-158, 2003
4542003
Template attacks in principal subspaces
C Archambeau, E Peeters, FX Standaert, JJ Quisquater
Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006
3952006
How to explain zero-knowledge protocols to your children
JJ Quisquater, M Quisquater, M Quisquater, M Quisquater, L Guillou, ...
Conference on the Theory and Application of Cryptology, 628-631, 1989
3241989
Electing a university president using open-audit voting: Analysis of real-world use of Helios
B Adida, O De Marneffe, O Pereira, JJ Quisquater
EVT/WOTE 9 (10), 2009
3192009
SEA: A scalable encryption algorithm for small embedded applications
FX Standaert, G Piret, N Gershenfeld, JJ Quisquater
Smart Card Research and Advanced Applications: 7th IFIP WG 8.8/11.2 …, 2006
3162006
Design of a secure timestamping service with minimal trust requirement
H Massias, XS Avila, JJ Quisquarter
Symposium on Information theory in the Benelux, 79-86, 1999
3021999
Hessian elliptic curves and side-channel attacks
M Joye, JJ Quisquater
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
2932001
Power and electromagnetic analysis: Improved model, consequences and comparisons
E Peeters, FX Standaert, JJ Quisquater
Integration 40 (1), 52-60, 2007
2642007
Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applications
G Rouvroy, FX Standaert, JJ Quisquater, JD Legat
International Conference on Information Technology: Coding and Computing …, 2004
2532004
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20