Pr. Jean-Jacques Quisquater

2
Address:Microelectronics Laboratory, Place du Levant, 3
Office:b.110
Voice:+32 475 48 47 60
Fax:+32 (0) 2 358 55 83
E-Mail:
Homepage:http://www.dice.ucl.ac.be/crypto/jjq.html

Seminars given

May 17, 2005 - GSEC COURSE: Digital Rights Management: from theory to implementations.
by Pr. Jean-Jacques Quisquater

April 25, 2007 - Foundations of Cryptography -- 1/4) Building secure systems: which foundations for cryptography?
by Pr. Jean-Jacques Quisquater , Pr. Olivier Pereira

May 02, 2007 - Foundations of Cryptography -- 2/4) More building blocks for cryptography
by Pr. Jean-Jacques Quisquater , Pr. Olivier Pereira

May 09, 2007 - Foundations of Cryptography -- 3/4) From blocks to buildings: composing cryptographic primitives
by Pr. Jean-Jacques Quisquater , Pr. Olivier Pereira

May 16, 2007 - Foundations of Cryptography -- 4/4) From buildings to cities: mechanizing cryptographic proofs
by Pr. Jean-Jacques Quisquater , Pr. Olivier Pereira

June 14, 2007 - Pas de mot de passe pour le passeport biométrique belge
by Gildas Avoine , Kassem Kalach , Pr. Jean-Jacques Quisquater

December 22, 2010 - Codes, Chiffres, Cryptographie, Cartes à puce : 4 Clés historiques pour la sécurité
by Pr. Jean-Jacques Quisquater

December 19, 2012 - Codes, Chiffres, Cryptographie, Cartes à puce : 4 Clés historiques pour les Communications et la Cybersécurité
by Pr. Jean-Jacques Quisquater

BibTeX - Quisquater

Publications

Christophe Petit, and Jean-Jacques Quisquater. Rubik's for cryptographers, In Notices of the American Mathematical Society, June 2013 BibTeX

Christophe Petit, and Jean-Jacques Quisquater. On polynomial systems arising from a Weil descent, Asiacrypt 2012, Lecture Notes in Computer Science (LNCS), Springer, December 2012 PDF BibTeX

Christophe Petit, and Jean-Jacques Quisquater. Cayley hash functions, Henk C. A. van Tilborg and Sushil Jajodia ed., In Encyclopedia of cryptography and security - 2nd edition, Springer, January 2011 BibTeX

Benoit Libert, Jean-Jacques Quisquater, and Moti Yung. Key Evolution Systems in Untrusted Update Environments, In ACM Transactions on Information and System Security (TISSEC), Volume 13-4, December 2010 BibTeX

François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, and Elisabeth Oswald. Leakage Resilient Cryptography in Practice, In Towards Hardware Intrinsic Security: Foundation and Practice, pages 105-139, Springer, November 2010 BibTeX

Philippe Bulens, François-Xavier Standaert, and Jean-Jacques Quisquater. How to Strongly Link Data and its Medium: the Paper Case, In IET Information Security, Volume 2-4, pages 125-236, September 2010 BibTeX

Christophe Petit, and Jean-Jacques Quisquater. Preimages for the Tillich-Zémor hash function, In Alex Biryukov and Guang Gong and Douglas R. Stinson, editor(s), SAC2010 Selected Areas in Cryptography, Volume 6544 of Lecture Notes in Computer Science, pages 282-301, Springer, August 2010 PDF BibTeX

Julien Cathalo, David Naccache, and Jean-Jacques Quisquater. Comparing with RSA, Twelfth IMA International Conference on Cryptography and Coding, Lecture Notes in Computer Science, Springer-Verlag, December 2009 PDF BibTeX

Nidal Aboudagga, Giacomo de Meulenaer, Mohamed Eltoweissy, and Jean-Jacques Quisquater. IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups, IEEE Conference on Local Computer Networks (LCN 2009), IEEE Computer Society, October 2009 PDF BibTeX

Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris Mitchell, and Jean-Jacques Quisquater. 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice (WISTP 2009), September 2009 BibTeX

Ben Adida, Olivier de Marneffe, Olivier Pereira, and Jean-Jacques Quisquater. Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios, In D. Jefferson, J.L. Hall, T. Moran, editor(s), Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, Usenix, August 2009 PDF BibTeX

Giacomo de Meulenaer, Christophe Petit, and Jean-Jacques Quisquater. Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?, In Cryptology ePrint Archive, May 2009, Report 2009/229 PDF BibTeX

Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, and Gilles Zémor. Hard and Easy Components of Collision Search for the Zémor-Tillich Hash Function : new Attacks and reduced variants with equival, In Marc Fischlin, editor(s), CT-RSA, Lecture Notes in Computer Science, pages 182-194, Springer, April 2009 PDF BibTeX

Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, and Jean-Jacques Quisquater. Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home, In R. Safavi-Naini and V. Varadharajan, editor(s), ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), March 2009, to appear BibTeX

Julien Cathalo, David Naccache, and Jean-Jacques Quisquater. Comparing With RSA, In Cryptology ePrint Archive, January 2009, Report 2009/021 BibTeX

Romain Robert, Mark Manulis, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, and Jean-Jacques Quisquater. WiFi Roaming: Legal Implications and Security Constraints, In International Journal of Law and Information Technology, Volume 16-3, pages 205-241, October 2008 BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. Method for Detecting Vulnerability to Doubling Attacks, 10th International Conference on Information and Communications Security - ICICS 2008, Volume 5308 of Lecture Notes in Computer Science, pages 97-110, Springer-Verlag, October 2008 BibTeX

Christophe Petit, Kristin Lauter, and Jean-Jacques Quisquater. Full Cryptanalysis of LPS and Morgenstern Hash Functions, In Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti, editor(s), SCN 2008 - Sixth Conference on Security and Cryptography for Networks, Volume 5229 of Lecture Notes in Computer Science, pages 263-277, Springer Verlag, September 2008 PDF BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. New Differential Fault Analysis on AES Key Schedule: Two Faults are enough, Eighth Smart Card Research and Advanced Application IFIP Conference - CARDIS 2008, Volume 5189 of Lecture Notes in Computer Science, pages 48-60, Springer-Verlag, September 2008 BibTeX

Christophe Petit, Jean-Jacques Quisquater, and Nicolas Veyrat-Charvillon. Efficiency and Pseudo-randomness of a Variant of Zémor-Tillich Hash Function, In Joseph Micallef , editor(s), ICECS2008 - IEEE International Conference on Electronics, Circuits, and Systems, pages 906-909, IEEE, August 2008 PDF BibTeX

Chong Hee Kim, Philippe Bulens, Christophe Petit, and Jean-Jacques Quisquater. Fault Attacks on Public Key Elements: Application to DLP based Schemes, Fifth European PKI Workshop - EUROPKI 2008, Volume 5057 of Lecture Notes in Computer Science, pages 182 - 195, Springer, June 2008 PDF BibTeX

Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, and Gaël Rouvroy. Implementation of the AES-128 on Virtex-5 FPGAs, Progress in Cryptology - AfricaCrypt 2008, Volume 5023 of Lecture Notes in Computer Science, pages 16 - 26, Springer, June 2008 BibTeX

François Gosset, François-Xavier Standaert, and Jean-Jacques Quisquater. FPGA Implementation of SQUASH, Twenty-ninth Symposium on Information Theory in the Benelux, May 2008 BibTeX

Jean-Jacques Quisquater, Baudoin Collard, and François-Xavier Standaert. Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent, Fast Software Encryption 2008, Volume 5086 of Lecture Notes on Computer Science, pages 382-397, Springer, February 2008 PDF BibTeX

François Mace, François-Xavier Standaert, and Jean-Jacques Quisquater. FPGA Implementation(s) of a Scalable Encryption Algorithm, In IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Volume 16-2, pages 212-216, February 2008 BibTeX

Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, and Pil Joong Lee. Safe-Error Attack on SPA-FA resistant exponentiations using a HW modular multiplier, The International Conference on Information Security and Cryptology - ICISC 2007, Volume 4817 of Lecture Notes in Computer Science, pages 273 - 281, Springer, November 2007 BibTeX

Baudoin Collard, François-Xavier Standaert, and Jean-Jacques Quisquater. Improving the Time Complexity of Matsui's Linear Cryptanalysis, In K.-H. Nam and G. Rhee, editor(s), The International Conference on Information Security and Cryptology - ICISC 2007, Volume 4817 of Lecture Notes in Computer Science, pages 77-88, Springer, November 2007 PDF BibTeX

Olivier de Marneffe, Olivier Pereira, and Jean-Jacques Quisquater. Simulation-Based Analysis of E2E Voting Systems, In A. Alkassar and M. Volkamer, editor(s), Proceedings of the First Conference on E-Voting and Identity (VOTE-ID 2007), Volume 4896 of Lecture Notes in Computer Science, pages 137-149, Springer, November 2007 BibTeX

Nidal Aboudagga, Mohamed Eltoweissy, and Jean-Jacques Quisquater. Two-Level Signature Delegation For Mobile First Responder Authentication, In TrustCol-2007, November 2007 BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. Faults, Injection Methods, and Fault Attacks, In IEEE Design and Test of Computers, Volume 24-6, pages 544-545, November 2007 BibTeX

Benoit Libert, Jean-Jacques Quisquater, and Moti Yung. Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions, In S. De Capitani di Vimercati and P. Syverson, editor(s), 14th ACM Conference on Computer and Communications Security (ACM CCS'07), pages 266-275, ACM, October 2007 BibTeX

Nidal Aboudagga, Mohamed Eltoweissy, and Jean-Jacques Quisquater. Group Authentication Protocol for Mobile Networks, In Wimob, pages 28, October 2007, http://doi.ieee BibTeX

Guerric Meurice de Dormale, Philippe Bulens, and Jean-Jacques Quisquater. Collision Search for Elliptic Curve Discrete Logarithm over GF(2^m) with FPGA, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Volume 4727 of Lecture Notes in Computer Science, pages 378-393, Springer, September 2007 BibTeX

Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Elliptic Curve Factorization Method : Towards Better Exploitation of Reconfigurable Hardware, Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'07), September 2007 PDF BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. How can we overcome both side channel analysis and fault attacks on RSA-CRT?, 4th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2007, pages 21-29, IEEE Computer Society Press, September 2007 BibTeX

François Mace, François-Xavier Standaert, and Jean-Jacques Quisquater. Simulation-Based Evaluation of Logic Styles to Counteract Side-Channel Attacks, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Volume 4727 of Lecture Notes in Computer Sciences, pages 427-442, Springer, September 2007 BibTeX

François-Xavier Standaert, Jean-Jacques Quisquater, and Baudoin Collard. Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent, Inscrypt 2007, Volume 4990 of Lecture Notes in Computer Science, pages 51-65, Springer, September 2007 PDF BibTeX

Guerric Meurice de Dormale, John Bass, and Jean-Jacques Quisquater. Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --, International Conference on Field Programmable Logic and Applications (FPL 2007), pages 642-647, IEEE Computer Society Press, August 2007 BibTeX

Benoit Libert, and Jean-Jacques Quisquater. Practical Time Capsule Signatures in the Standard Model from Bilinear Maps, In T. Takagi and T. Okamoto, editor(s), 1st International Conference on Pairing-based Cryptography (Pairing 2007), Volume 4575 of Lecture Notes in Computer Science, pages 23-38, Springer, July 2007 BibTeX

François Mace, François-Xavier Standaert, and Jean-Jacques Quisquater. ASIC Implementations of the Block Cipher SEA for Constrained Applications, Proceedings of the Third International Conference on RFID Security - RFIDSec 2007, pages 103 - 114, July 2007 BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures, Workshop in Information Security Theory and Practices: Smart cards, Mobile and Ubiquitous computing systems - WISTP 2007, Volume 4462 of Lecture Notes in Computer Science, pages 215-228, Springer-Verlag, May 2007 BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Area and Time Trade-offs for Iterative Modular Division over GF(2^m): Novel Algorithm and Implementations on FPGA, In International Journal of Electronics, Volume 94-5, pages 515-529, May 2007 BibTeX

Guerric Meurice de Dormale, John Bass, and Jean-Jacques Quisquater. On Solving RC5 Challenges with FPGAs, IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07), pages 281-282, IEEE Computer Society Press, April 2007 BibTeX

Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware, IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07), pages 197-207, IEEE Computer Society Press, April 2007 PDF BibTeX

Benoit Libert, Jean-Jacques Quisquater, and Moti Yung. Parallel Key-Insulated Public Key Encryption Without Random Oracles, In T. Okamoto and X. Wang, editor(s), Public Key Cryptography 2007 (PKC'07), Volume 4450 of Lecture Notes in Computer Science, pages 298-314, Springer, April 2007 BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. High-speed Hardware Implementations of Elliptic Curve Cryptography: A Survey, In Journal of Systems Architecture, Special Issue on Embedded Hardware for Cryptosystems, Volume 53-2-3, pages 72-84, February 2007 BibTeX

Philippe Bulens, Kassem Kalach, François-Xavier Standaert, and Jean-Jacques Quisquater. FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile, January 2007, http://sasc.cry BibTeX

Nidal Aboudagga, Mohamed Eltoweissy, and Jean-Jacques Quisquater. Fast Roaming Authentication in Wireless LANs, 2nd International Computer Engineering Conference: Engineering the Information Society, ICENCO 2006, December 2006 BibTeX

Benoit Libert, Jean-Jacques Quisquater, and Moti Yung. Efficient Intrusion-Resilient Signatures Without Random Oracles, In H. Lipmaa and M. Yung, editor(s), Inscrypt 2006, Volume 4318 of Lecture Notes in Computer Science, pages 27-41, Springer, December 2006 BibTeX

Antonin Descampe, François-Olivier Devaux, Gaël Rouvroy, Jean-Didier Legat, Jean-Jacques Quisquater, and Benoit Macq. A Flexible, Hardware JPEG 2000 Decoder for Digital Cinema, In IEEE Transactions on Circuits and Systems for Video, Volume 16-11, pages 1397-1410, November 2006 BibTeX

François-Xavier Standaert, Eric Peeters, Cédric Archambeau, and Jean-Jacques Quisquater. Towards Security Limits of Side-Channel Attacks, In Louis Goubin and Mitsuru Matsui, editor(s), Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2006, Volume 4249 of LNCS, pages 30-45, Springer, October 2006 BibTeX

Cédric Archambeau, Eric Peeters, François-Xavier Standaert, and Jean-Jacques Quisquater. Template Attacks in Principal Subspaces, In Louis Goubin and Mitsuru Matsui, editor(s), Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2006, Volume 4249 of LNCS, pages 1--14, Springer, October 2006 BibTeX

Guerric Meurice de Dormale, Renaud Ambroise, David Bol, Jean-Jacques Quisquater, and Jean-Didier Legat. Low-Cost Elliptic Curve Digital Signature Coprocessor, In Nikitas Dimopoulos, Sanjay Rajopadhye, Wayne Luk, and Yvon S, editor(s), Application-specific Systems, Architectures and Processors (ASAP'06), pages 347-353, September 2006 BibTeX

Fabien Laguillaumie, Benoit Libert, and Jean-Jacques Quisquater. Universal Designated Verifier Signatures Without Random Oracles or Non-Black Box Assumptions, In R. De Prisco and M. Yung, editor(s), Security and Cryptography for Networks (SCN'06), Volume 4116 of Lecture Notes in Computer Science, pages 63-77, Springer, September 2006, To Appear BibTeX

Eric Peeters, François-Xavier Standaert, and Jean-Jacques Quisquater. Power and Electromagnetic Analysis: Improved Model, Consequences and Comparisons, In Special Issue of Integration, The VLSI Journal: Embedded Cryptographic Hardware, September 2006, To Appear PDF BibTeX

Michael Neve, Eric Peeters, Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Faster and smaller hardware implementation of XTR, In Franklin T. Luk, editor(s), Advanced Signal Processing Algorithms, Architectures, and Implementations XVI, Volume 6313 of Proceedings of SPIE, August 2006 BibTeX

François-Xavier Standaert, Gaël Rouvroy, and Jean-Jacques Quisquater. FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks, proceedings of FPL 2006, August 2006 BibTeX

Olivier Pereira, and Jean-Jacques Quisquater. On the Impossibility of Building Secure Cliques-type Authenticated Group Key Agreement Protocols, In Journal of Computer Security, Volume 14-2, pages 197 - 246, May 2006 PDF BibTeX

Benoit Libert, and Jean-Jacques Quisquater. On Constructing Certificateless Cryptosystems from Identity Based Encryption, In M. Yung, editor(s), Public Key Cryptography 2006 (PKC'06), Volume 3958 of Lecture Notes in Computer Science, pages 474-490, Springer, April 2006 BibTeX

Philippe Bulens, Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Hardware for Collision Search on Elliptic Curve over GF(2^m), Special-purpose Hardware for Attacking Cryptographic Systems (SHARCS'06), April 2006 BibTeX

François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, and Jean-Jacques Quisquater. SEA: a Scalable Encryption Algorithm for Small Embedded Applications, CARDIS, Springer-Verlag, April 2006 BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Iterative Modular Division over GF(2^m): Novel Algorithm and Implementations on FPGA, In K. Bertels, J.M.P. Cardoso, and S. Vassiliadis, editor(s), International Workshop on Applied Reconfigurable Computing (ARC2006), Volume 3985 of Lecture Notes in Computer Science, pages 370-382, Springer, March 2006 BibTeX

François-Xavier Standaert, François Mace, Eric Peeters, and Jean-Jacques Quisquater. Updates on the Security of FPGAs Against Power Analysis Attacks, ARC, Volume 3985, pages 335-346, March 2006 BibTeX

François-Xavier Standaert, Eric Peeters, Gaël Rouvroy, and Jean-Jacques Quisquater. An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays, In Proceedings of the IEEE, Volume 94-2, February 2006 BibTeX

Omkant Pandey, Julien Cathalo, and Jean-Jacques Quisquater. Fair Identification, In D. Pointcheval, editor(s), CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006, Volume 3860 of Lecture Notes in Computer Science, pages 52-63, Spinger, February 2006 PDF BibTeX

François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, and Jean-Jacques Quisquater. FPGA Implementations of the ICEBERG Block Cipher, In The VLSI Journal, February 2006 BibTeX

Paulo S. L. M. Barreto, Benoit Libert, Noel McCullagh, and Jean-Jacques Quisquater. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps, In B. Roy, editor(s), Asiacrypt 2005, Volume 3788 of Lecture Notes in Computer Science, pages 515-532, Springer, December 2005 PDF BibTeX

Julien Cathalo, Benoit Libert, and Jean-Jacques Quisquater. Efficient and Non-Interactive Timed-Release Encryption, In S. Qing, W. Mao, J. Lopez and G. Wang, editor(s), Information and Communications Security: 7th International Conference, ICICS 2005, Volume 3783 of Lecture Notes in Computer Science, pages 291-303, Springer, December 2005 PDF BibTeX

Nidal Aboudagga, Mohamed Tamer Refaei, Mohamed Eltoweissy, Luiz A DaSilva, and Jean-Jacques Quisquater. Authentication protocols for ad hoc networks: Taxonomy and research issues, Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, October 2005 PDF BibTeX

François Mace, François-Xavier Standaert, Jean-Jacques Quisquater, and Jean-Didier Legat. A Design Methodology for Secured ICs Using Dynamic Current Mode Logic, In V. Paliouras, editor(s), Power and Timing Modeling, Optimization and Simulation - Proceedings of PATMOS 2005, Lecture Notes in Computer Science, pages 550-560, Springer, September 2005 PDF BibTeX

Eric Peeters, François-Xavier Standaert, Nicolas Donckers, and Jean-Jacques Quisquater. Improved Higher Order Side-Channel Attacks with FPGA experiments, In Josyula R. Rao, Berk Sunar, editor(s), Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2005, Volume 3659 of Lecture Notes in Computer Science, pages 309-323, Spinger-Verlag, August 2005 BibTeX

François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, and Jean-Jacques Quisquater. SEA: a Scalable Encryption Algorithm for Small Embedded Applications, Workshop on Lightweight Crypto, July 2005 BibTeX

Benoit Libert, and Jean-Jacques Quisquater. Identity Based Encryption without Redundancy, In J. Ioannidis, A. Keromytis and M. Yung, editor(s), 3rd Applied Cryptography and Network Security conference (ACNS'05), Volume 3531 of Lecture Notes in Computer Science, pages 285-300, Springer, June 2005 BibTeX

Philippe Léglise, François-Xavier Standaert, Gaël Rouvroy, and Jean-Jacques Quisquater. Efficient Implementation of Recent Stream Ciphers on Reconfigurable Hardware Devices, 26th Symposium on Information Theory in the Benelux, pages 261-268, May 2005 BibTeX

François-Xavier Standaert, Eric Peeters, and Jean-Jacques Quisquater. On the Masking Countermeasure and Higher-Order Power Analysis Attacks, ITCC 2005, Volume 1, pages 562-567, IEEE Computer Society, April 2005 BibTeX

François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, and Jean-Jacques Quisquater. FPGA Implementations of the ICEBERG Block Cipher, ITCC 2005, April 2005, To appear BibTeX

François-Xavier Standaert, Frédéric Lefèbvre, Gaël Rouvroy, Jean-Jacques Quisquater, Benoit Macq, and Jean-Didier Legat. Practical Evaluation of a Radial Soft Hash Algorithm, ITCC 2005, April 2005, To appear BibTeX

François Mace, François-Xavier Standaert, Jean-Didier Legat, and Jean-Jacques Quisquater. Recommendations for Secure IC's and ASIC's, CEPA2 Workshop - What Technologies in Defence Applications for Digital Signal Processing Now and in the Future, pages NA, March 2005 PDF BibTeX

Jean-Jacques Quisquater, and François-Xavier Standaert. Exhaustive Key Search of the DES: Updates and Refinements, SHARCS 2005, February 2005, To appear BibTeX

Gilles Piret, and Jean-Jacques Quisquater. Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results, In H. Handschuh and A. Hasan, editor(s), Selected Areas in Cryptography, 11th Annual International Workshop, SAC 2004, Volume 3357 of Lecture Notes in Computer Science, pages 100-115, Springer-Verlag, January 2005 PDF BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Left-to-right modular multiplication without large integer comparisons, January 2005 BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Karatsuba-like Squaring, January 2005 BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Low-Cost Elliptic Curve Digital Signature Cryptoprocessor Based on Affine Coordinates – First Results, January 2005 BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Novel iterative digit-serial modular division over GF(2^m), CRyptographic Advances in Secure Hardware -- CRASH 2005, January 2005 PDF BibTeX

Guerric Meurice de Dormale, Philippe Bulens, and Jean-Jacques Quisquater. An Improved Montgomery Modular Inversion Targeted for Efficient Implementation on FPGA, In O. Diessel & J.A. Williams, editor(s), International Conference on Field-Programmable Technology - FPT 2004, pages 441-444, December 2004 PDF BibTeX

Nidal Aboudagga, and Jean-Jacques Quisquater. Wireless Security and Roaming Overview, DIMACS Workshop: Mobile and Wireless Security 2004, November 2004 PDF BibTeX

François Mace, François-Xavier Standaert, Ilham Hassoune, Jean-Jacques Quisquater, and Jean-Didier Legat. A Dynamic Current Mode Logic to Counteract Power Analysis Attacks, DCIS 2004 - 19th Conference on Design of Circuits and Integrated Systems, pages 186 - 191, November 2004 PDF BibTeX

Guerric Meurice de Dormale, Philippe Bulens, and Jean-Jacques Quisquater. Efficient Modular Division Implementation --ECC over GF(p) Affine Coordinates Application--, In J. Becker, M. Platzner, S. Vernalde, editor(s), The 14th International Conference on Field Programmable Logic and Applications --- FPL 2004, Volume 3203 of Lecture Notes in Computer Science, pages 231-240, Springer, September 2004 PDF BibTeX

Julien Cathalo, Benoit Libert, and Jean-Jacques Quisquater. Cryptanalysis of a Verifiably Committed Signature Scheme based on GPS and RSA, In Kan Zhang, Yuliang Zheng, editor(s), Information Security Conference (ISC) 2004, Volume 3225 of Lecture Notes in Computer Science, pages 52-60, Springer-Verlag, September 2004 PDF BibTeX

Benoit Libert, and Jean-Jacques Quisquater. Improved Signcryption from q-Diffie-Hellman Problems, In Carlo Blundo, editor(s), 4h Conference on Security in Communication Networks '04 (SCN'04), Volume 3352 of Lecture Notes in Computer Science, pages 220-234, Spinger-Verlag, September 2004 BibTeX

Gaël Rouvroy, Frédéric Lefèbvre, François-Xavier Standaert, Benoit Macq, Jean-Jacques Quisquater, and Jean-Didier Legat. Hardware Implementation of a Fingerprinting Algorithm Suited for Digital Cinema, Eusipco 2004, September 2004 BibTeX

Gilles Piret, François-Xavier Standaert, Gaël Rouvroy, and Jean-Jacques Quisquater. On the Security of the DeKart Primitive, In J.-J. Quisquater, P. Paradinas, Y. Deswarte, and A.A. El Kal, editor(s), Smart Card Research and Advanced Applications (CARDIS 2004), pages 241-254, Kluwer Academic Publishers, August 2004 PDF BibTeX

Mathieu Ciet, Michael Neve, Eric Peeters, and Jean-Jacques Quisquater. Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended Version, July 2004 PDF BibTeX

Jean-Jacques Quisquater, Michael Neve, Eric Peeters, and François-Xavier Standaert. L'émission rayonnée des cartes à puces : une vue d'ensemble, In Revue de l'Electricité et de l'Electronique-6/7, June 2004 BibTeX

Olivier Pereira, and Jean-Jacques Quisquater. Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols, Proceedings of the 17-th IEEE Computer Security Foundations Workshop -- CSFW-17, pages 16-29, IEEE Computer Society Press, June 2004 PDF BibTeX

Nidal Aboudagga, Damien Giry, and Jean-Jacques Quisquater. Wireless Security Design Overview, In R. Pellikaan, editor(s), Twenty-fifth Symposium on Information Theory in the Benelux, pages 153-160, Werkgemeenschap voor Informatie- en Comm, June 2004 PDF BibTeX

Benoit Libert, and Jean-Jacques Quisquater. What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved, In S. Katsikas, S. Gritzalis, J. Lopez, editor(s), First European PKI Workshop (EuroPKI'04), Volume 3093 of Lecture Notes in Computer Science, pages 57-70, Springer-Verlag, June 2004 BibTeX

Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, and Jean-Didier Legat. Compact and Efficient Encryption/Decryption Module for FPGA Implementation of AES Rijndael Very Well Suited for Small Embedd, ITCC 2004, special session on embedded cryptographic hardware, Volume 2, pages 583-587, IEEE Computer Society, April 2004 BibTeX

Benoit Libert, and Jean-Jacques Quisquater. Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups, In F. Bao, editor(s), Public Key Cryptography 2004 (PKC'04), Volume 2947 of Lecture Notes in Computer Science, pages 187-200, Spinger-Verlag, March 2004 PDF BibTeX

Benoit Libert, and Jean-Jacques Quisquater. Identity Based Undeniable Signatures, In T. Okamoto, editor(s), Cryptographer's Track -- RSA 2004, Volume 2964 of Lecture Notes in Computer Science, pages 112-125, Springer-Verlag, February 2004 PDF BibTeX

Copyright Notice

(click here to expand/retract)