User menu

Accès à distance ? S'identifier sur le proxy UCLouvain | Saint-Louis

Search

Displaying 1 - 25 of 188 results.

Pages

    • Speech
    Power analysis of FPGAs: How practical is the attack ?
    Standaert, RX Quisquater, Jean-Jacques[UCL] Oldenzeel, LVTO Samyde, D. (2003) 13th International Conference on Field-Programmable Logic and Applications (FPL 2003) — LISBON(Portugal)
    • Speech
    New differential fault analysis on AES key schedule: two faults are enough
    Chong Hee Kim Quisquater, Jean-Jacques[UCL] (2008) Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008 — London, UK
    • Speech
    Iterative modular division over GF(2/sup m/): novel algorithm and implementations on FPGA
    De Dormale, G. Meurice Quisquater, Jean-Jacques[UCL] (2006) Reconfigurable Computing: Architectures and Applications Second International Workshop, ARC 2006. Revised Selected Papers — Delft, Netherlands
    • Speech
    RSA-type signatures in the presence of transient faults
    Joye, M. Quisquater, Jean-Jacques[UCL] Bao, F Deng, RH (1997) 6th IMA International Conference on Cryptography and Coding — ROYAL AGR COLL, CIRENCESTER (England)
    • Speech
    Practical zero-knowledge protocols
    Quisquater, Jean-Jacques (1990) Proceedings of Compsec International 1990 — London, UK
    • Journal article
    Faults, injection methods, and fault attacks
    Kim, Chong Hee[UCL] Quisquater, Jean-Jacques[UCL] (2007) IEEE Design & Test of Computers — Vol. 24, no. 6, p. 544-545 (2007)
    • Journal article
    Rubik's for Cryptographers (Chinese version)
    Petit, Christophe[UCL] Quisquater, Jean-Jacques[UCL] (2014) Mathematical Advance in Translation — Vol. 33, no.1, p. 5-13 (April 2014)
    • Speech
    Audio and optical cryptography
    Desmedt, Yvo[UCL] Quisquater, Jean-Jacques[UCL] Hou, S (1998) International Conference on the Theory and Application of Cryptology and Information Security — BEIJING(Peoples R China)
    • Speech
    Implementation of the AES-128 on Virtex-5 FPGAs
    Bulens, Philippe[UCL] Standaert, François-Xavier[UCL] Quisquater, Jean-Jacques[UCL] Pellegrin, P. Rouvroy, G. (2008) Progress in Cryptology-AFRICACRYPT 2008. First International Conference on Cryptology in Africa — Casablanca, Morocco
    • Speech
    On the perfect encryption assumption
    Pereira, Olivier[UCL] Quisquater, Jean-Jacques[UCL] (2000) Proc. of the 1st Workshop on Issues in the Theory of Security (WITS’00) — Geneve
    • Speech
    Efficient signcryption with key privacy from gap Diffie-Hellman groups
    Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] (2004) 7th International Workshop on Theory and Practice in Public Key Cryptography — Singapore(Singapore)
    • Speech
    A practical implementation of the timing attack
    Dhem, JF Quisquater, Jean-Jacques[UCL] Koeune, François[UCL] Leroux, PA Mestre, P Willems, JL. (2000) 3rd International Conference on Smart Card Research and Advanced Applications — LOUVAIN LA NEUVE(Belgium)
    • Speech
    Security of the MISTY structure in the Luby-Rackoff model: Improved results
    Piret, G. Quisquater, Jean-Jacques[UCL] (2005) 11th Annual International Workshop on Selected Areas in Cryptography — Univ Waterloo, Waterloo (Canada)
    • Speech
    Universal designated verifier signatures without random oracles or non-black box assumptions
    Laguillaumie, Fabien Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] (2006) 5th International Conferencs on Security and Cryptography for Networks — Maiori(Italy)
    • Speech
    Practical algebraic attacks on the Hitag2 stream cipher
    Courtois, N.T. Quisquater, Jean-Jacques[UCL] O'Neil, S. (2009) Information Security. 12th International Conference, ISC 2009 — Pisa, Italy
    • Speech
    Security Analysis of the Cliques Protocols Suites: First Results.
    Pereira, Olivier[UCL] Quisquater, Jean-Jacques[UCL] (2001) Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01) — Paris
    • Speech
    Analysis of the Gallant-Lambert-Vanstone method based on efficient endomorphisms: Elliptic and hyperelliptic curves
    Sica, F Quisquater, Jean-Jacques[UCL] Ciet, M. (2003) 9th Annual International Workshop on Selected Areas in Cryptography — ST JOHNS(Canada)
    • Journal article
    Cryptographic authentication protocols for smart cards
    Guillou, LC Quisquater, Jean-Jacques[UCL] Ugon, M (2001) Computer Networks — Vol. 36, no. 4, p. 437-451 (2001)
    • Speech
    A new type of timing attack: Application to GPS
    Cathalo, Julien[UCL] Quisquater, Jean-Jacques[UCL] Koeune, François[UCL] (2003) 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003) — COLOGNE(Germany)
    • Speech
    Exhaustive Key Search of the DES: Updates and Refinements
    Quisquater, Jean-Jacques[UCL] Standaert, François-Xavier[UCL] (2005) Proceedings of SHARCS 2005, Special-purpose Hardware for Attacking Cryptographic Systems — Paris/France
    • Journal article
    Attacks on Shamir's 'RSA for paranoids'
    Gilbert, H Quisquater, Jean-Jacques[UCL] Gupta, D Odlyzko, A (1998) Information Processing Letters — Vol. 68, no. 4, p. 197-199 (1998)
    • Speech
    Practical time capsule signatures in the standard model from bilinear maps
    Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] (2007) Pairing-Based Cryptography - Pairing 2007. First International Conference — Tokyo, Japan
    • Speech
    Improved and multiple linear cryptanalysis of reduced round serpent
    Collard, Baudoin[UCL] Standaert, François-Xavier[UCL] Quisquater, Jean-Jacques[UCL] (2008) Information Security and Cryptology. Third SKLOIS Conference, Inscrypt 2007 — Xining, China

Pages