default search action
65. Birthday: Jean-Jacques Quisquater 2012
- David Naccache:
Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Lecture Notes in Computer Science 6805, Springer 2012, ISBN 978-3-642-28367-3
Personal Tributes and Re-visits of Jean-Jacques's Legacy
- Michaël Quisquater:
The Hidden Side of Jean-Jacques Quisquater. 1-2 - Marc Joye:
On Quisquater's Multiplication Algorithm. 3-7 - Yvo Desmedt:
A Brief Survey of Research Jointly with Jean-Jacques Quisquater. 8-12 - Sebastiaan Indesteege, Bart Preneel:
DES Collisions Revisited. 13-24 - Jean-Claude Bermond, Fahir Ö. Ergincan, Michel Syska:
Line Directed Hypergraphs. 25-34
Symmetric Cryptography
- Nicolas T. Courtois, Gregory V. Bard:
Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq. 35-54 - Nicolas T. Courtois:
Self-similarity Attacks on Block Ciphers and Application to KeeLoq. 55-66 - Jacques Patarin, Benjamin Gittins, Joana Treger:
Increasing Block Sizes Using Feistel Networks: The Example of the AES. 67-82 - Kenneth G. Paterson, Gaven J. Watson:
Authenticated-Encryption with Padding: A Formal Security Treatment. 83-107
Asymmetric Cryptography
- Olivier Blazy, David Pointcheval:
Traceable Signature with Stepping Capabilities. 108-131 - Serge Vaudenay:
Deniable RSA Signature - The Raise and Fall of Ali Baba. 132-142 - David Naccache, David Pointcheval:
Autotomic Signatures. 143-155 - Benoît Libert, Moti Yung:
Fully Forward-Secure Group Signatures. 156-184 - Puwen Wei, Yuliang Zheng, Xiaoyun Wang:
Public Key Encryption for the Forgetful. 185-206 - Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. 207-232
Side Channel Attacks
- Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin:
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems. 233-247 - Benjamin Mounier, Anne-Lise Ribotta, Jacques J. A. Fournier, Michel Agoyan, Assia Tria:
EM Probes Characterisation for Security Analysis. 248-264 - Junfeng Fan, Ingrid Verbauwhede:
An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost. 265-282 - François-Xavier Standaert, Christophe Petit, Nicolas Veyrat-Charvillon:
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders. 283-299
Hardware and Implementations
- Vincent van der Leest, Erik van der Sluis, Geert Jan Schrijen, Pim Tuyls, Helena Handschuh:
Efficient Implementation of True Random Number Generator Based on SRAM PUFs. 300-318 - Byungchun Chung, Sandra Marcello, Amir-Pasha Mirbaha, David Naccache, Karim Sabeg:
Operand Folding Hardware Multipliers. 319-328 - Ulrich Rührmair:
SIMPL Systems as a Keyless Cryptographic and Security Primitive. 329-354 - Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, Neil Gershenfeld:
Cryptography with Asynchronous Logic Automata. 355-363 - Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine, Ryan Kastner, Çetin Kaya Koç, Timothy E. Levin, Timothy Sherwood:
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. 364-382
Smart Cards and Information Security
- Yves Deswarte, Sébastien Gambs:
The Challenges Raised by the Privacy-Preserving Identity Card. 383-404 - Guillaume Bouffard, Jean-Louis Lanet:
The Next Smart Card Nightmare - Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things. 405-424 - Mike Burmester:
Localization Privacy. 425-441 - Sherman S. M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, Robert H. Deng:
Dynamic Secure Cloud Storage with Provenance. 442-464 - George I. Davida, Yair Frankel:
Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage. 465-473
As Diverse as Jean-Jacques' Scientific Interests
- Mehdi Tibouchi:
A Nagell Algorithm in Any Characteristic. 474-479 - Vanessa Gratzer, David Naccache:
How to Read a Signature? 480-483 - Edwin Bowden-Peters, Raphael C.-W. Phan, John N. Whitley, David J. Parish:
Fooling a Liveness-Detecting Capacitive Fingerprint Scanner. 484-490 - Guillaume Claret, Michaël Mathieu, David Naccache, Guillaume Seguin:
Physical Simulation of Inarticulate Robots. 491-499
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.