User menu

Accès à distance ? S'identifier sur le proxy UCLouvain

Search

Displaying 7 results.
    • Speech
    Improved and multiple linear cryptanalysis of reduced round serpent
    Collard, Baudoin[UCL] Standaert, François-Xavier[UCL] Quisquater, Jean-Jacques[UCL] (2008) Information Security and Cryptology. Third SKLOIS Conference, Inscrypt 2007 — Xining, China
    • Speech
    Implementation of the AES-128 on Virtex-5 FPGAs
    Bulens, Philippe[UCL] Standaert, François-Xavier[UCL] Quisquater, Jean-Jacques[UCL] Pellegrin, P. Rouvroy, G. (2008) Progress in Cryptology-AFRICACRYPT 2008. First International Conference on Cryptology in Africa — Casablanca, Morocco
    • Speech
    Experiments on the multiple linear cryptanalysis of reduced round serpent
    Collard, Baudoin[UCL] Standaert, François-Xavier[UCL] Quisquater, Jean-Jacques[UCL] (2008) Fast Software Encryption. 15th International Workshop, FSE 2008 — Lausanne, Switzerland
    • Speech
    Fault Attacks on Public Key Elements: Application to DLP based Schemes
    Kim, Chong Hee[UCL] Bulens, Philippe[UCL] Petit, Christophe[UCL] Quisquater, Jean-Jacques[UCL] (2008) Fifth European PKI Workshop (EUROPKI 2008) — Trondheim (Norway)
    • Speech
    FPGA Implementation of SQUASH
    Gosset, François[UCL] Standaert, François-Xavier[UCL] Quisquater, Jean-Jacques[UCL] (2008) Proceedings of the 29th Symposium on Information Theory in the Benelux — Leuven/Belgium
    • Journal article
    WiFi roaming: legal implications and security constraints
    Robert, Richard[UCL] Quisquater, Jean-Jacques[UCL] Manulis, M. De Villenfagne, F. Leroy, Damien[UCL] Jost, J. Koeune, François[UCL] Ker, C. Dinant, J.-M. Poullet, Y. Bonaventure, Olivier[UCL] (2008) International Journal of Law and Information Technology — Vol. 16, no. 3, p. 205-241 (2008)
    • Journal article
    FPGA implementation(s) of a scalable encryption algorithm
    Macé, François[UCL] Standaert, François-Xavier[UCL] Quisquater, Jean-Jacques[UCL] (2008) IEEE Transactions on Very Large Scale Integration (VLSI) Systems — Vol. 16, no. 2, p. 212-216 (2008)