Cryptographers' World
 

Jean-Jacques Quisquater


Author's Web Page Link

58 papers in database with 2668 citations StarStarStar

Editor of 3 conference proceedings books

H-number: 26

Conference Proceedings

 
1. Marc JoyeJean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings. Springer, 2004. ISBN 3-540-22666-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Louis C. GuillouJean-Jacques Quisquater, editors, Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding. Springer, 1995. ISBN 3-540-59409-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. Jean-Jacques QuisquaterJoos Vandewalle, editors, Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings. Springer, 1990. ISBN 3-540-53433-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Marc Joye,  Jean-Jacques Quisquater,  Tsuyoshi Takagi,  How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves, Designs, Codes and Cryptography, Volume 23(3), pp. 297 - 316, Springer, 2001.

[Electronic Edition][Cited 1 times ]

2. Marc Joye,  Arjen K. Lenstra,  Jean-Jacques Quisquater,  Chinese Remaindering Based Cryptosystems in the Presence of Faults, Journal of Cryptology, Volume 12(4), pp. 241 - 245, Springer, 1999.

[Cited 101 times Red StarRed Star]

3. Marc Joye,  Jean-Jacques Quisquater,  Reducing the Elliptic Curve Cryptosystem of Meyer-MĂĽuller to the Cryptosystem of Rabin-Williams, Designs, Codes and Cryptography, Volume 14(1), pp. 53 - 56, Springer, 1998.

[Electronic Edition][No citation]

4. Samy Bengio,  Gilles Brassard,  Yvo Desmedt,  Claude Goutier,  Jean-Jacques Quisquater,  Secure Implementations of Identification Systems, Journal of Cryptology, Volume 4(3), pp. 175 - 183, Springer, 1991.

[Cited 41 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Philippe Bulens,  François-Xavier Standaert,  Jean-Jacques Quisquater,  Pascal Pellegrin,  GaĂ«l Rouvroy,  Implementation of the AES-128 on Virtex-5 FPGAs, pp. 16 - 26, AFRICACRYPT 2008.

[Electronic Edition][Cited 19 times ]

2. Baudoin Collard,  François-Xavier Standaert,  Jean-Jacques Quisquater,  Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent, pp. 382 - 397, FSE 2008.

[Electronic Edition][Cited 11 times ]

3. Julio CĂ©sar Hernández Castro,  Juan M. EstĂ©vez-Tapiador,  Jean-Jacques Quisquater,  On the Salsa20 Core Function, pp. 462 - 469, FSE 2008.

[Electronic Edition][Cited 2 times ]

4. Guerric Meurice de Dormale,  Philippe Bulens,  Jean-Jacques Quisquater,  Collision Search for Elliptic Curve Discrete Logarithm over GF(2, pp. 378 - 393, CHES 2007.

[Electronic Edition][Cited 8 times ]

5. François MacĂ©,  François-Xavier Standaert,  Jean-Jacques Quisquater,  Information Theoretic Evaluation of Side-Channel Resistant Logic Styles, pp. 427 - 442, CHES 2007.

[Electronic Edition][Cited 17 times ]

6. BenoĂ®t Libert,  Jean-Jacques Quisquater,  Moti Yung,  Parallel Key-Insulated Public Key Encryption Without Random Oracles, pp. 298 - 314, PKC 2007.

[Electronic Edition][Cited 8 times ]

7. BenoĂ®t Libert,  Jean-Jacques Quisquater,  On Constructing Certificateless Cryptosystems from Identity Based Encryption, pp. 474 - 490, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 68 times Red Star]

8. Omkant Pandey,  Julien Cathalo,  Jean-Jacques Quisquater,  Fair Identification, pp. 52 - 63, CT-RSA 2006.

[Electronic Edition][No citation]

9. CĂ©dric Archambeau,  Eric Peeters,  François-Xavier Standaert,  Jean-Jacques Quisquater,  Template Attacks in Principal Subspaces, pp. 1 - 14, CHES 2006.

[Electronic Edition][Cited 36 times ]

10. François-Xavier Standaert,  Eric Peeters,  CĂ©dric Archambeau,  Jean-Jacques Quisquater,  Towards Security Limits in Side-Channel Attacks, pp. 30 - 45, CHES 2006.

[Electronic Edition][Cited 28 times ]

11. Paulo S. L. M. Barreto,  BenoĂ®t Libert,  Noel McCullagh,  Jean-Jacques Quisquater,  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps, pp. 515 - 532, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 179 times Red StarRed Star]

12. Eric Peeters,  François-Xavier Standaert,  Nicolas Donckers,  Jean-Jacques Quisquater,  Improved Higher-Order Side-Channel Attacks with FPGA Experiments, pp. 309 - 323, CHES 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 41 times ]

13. BenoĂ®t Libert,  Jean-Jacques Quisquater,  Identity Based Encryption Without Redundancy, pp. 285 - 300, ACNS 2005.

[Electronic Edition][Cited 18 times ]

14. Gilles Piret,  Jean-Jacques Quisquater,  Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results, pp. 100 - 113, SAC 2004.

[Electronic Edition][Cited 6 times ]

15. BenoĂ®t Libert,  Jean-Jacques Quisquater,  Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups, pp. 187 - 200, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 63 times Red Star]

16. BenoĂ®t Libert,  Jean-Jacques Quisquater,  Identity Based Undeniable Signatures, pp. 112 - 125, CT-RSA 2004.

[Electronic Edition][Cited 50 times Red Star]

17. François-Xavier Standaert,  Gilles Piret,  GaĂ«l Rouvroy,  Jean-Jacques Quisquater,  Jean-Didier Legat,  ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware, pp. 279 - 299, FSE 2004.

[Electronic Edition][Cited 15 times ]

18. Gilles Piret,  Jean-Jacques Quisquater,  A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD, pp. 77 - 88, CHES 2003.

[Electronic Edition][Cited 118 times Red StarRed Star]

19. Julien Cathalo,  François Koeune,  Jean-Jacques Quisquater,  A New Type of Timing Attack: Application to GPS, pp. 291 - 303, CHES 2003.

[Electronic Edition][Cited 20 times ]

20. François-Xavier Standaert,  GaĂ«l Rouvroy,  Jean-Jacques Quisquater,  Jean-Didier Legat,  Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs, pp. 334 - 350, CHES 2003.

[Electronic Edition][Cited 98 times Red Star]

21. Mathieu Ciet,  Tanja Lange,  Francesco Sica,  Jean-Jacques Quisquater,  Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms, pp. 388 - 400, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 31 times ]

22. Jean-Jacques Quisquater,  CHES: Past, Present, and Future, pp. 1 - 1, CHES 2002.

[Electronic Edition][No citation]

23. Mathieu Ciet,  Jean-Jacques Quisquater,  Francesco Sica,  Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication, pp. 540 - 550, CHES 2002.

[Electronic Edition][Cited 11 times ]

24. François-Xavier Standaert,  GaĂ«l Rouvroy,  Jean-Jacques Quisquater,  Jean-Didier Legat,  A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results, pp. 593 - 609, CHES 2002.

[Electronic Edition][Cited 32 times ]

25. Francesco Sica,  Mathieu Ciet,  Jean-Jacques Quisquater,  Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves, pp. 21 - 36, SAC 2002.

[Electronic Edition][Cited 21 times ]

26. Marc Joye,  Jean-Jacques Quisquater,  Sung-Ming Yen,  Moti Yung,  Observability Analysis - Detecting When Improved Cryptosystems Fail, pp. 17 - 29, CT-RSA 2002.

[Electronic Edition][Cited 22 times ]

27. Mathieu Ciet,  Jean-Jacques Quisquater,  Francesco Sica,  A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography, pp. 108 - 116, INDOCRYPT 2001.

[Electronic Edition][Cited 19 times ]

28. Marc Joye,  Jean-Jacques Quisquater,  Hessian Elliptic Curves and Side-Channel Attacks, pp. 402 - 410, CHES 2001.

[Electronic Edition][Cited 125 times Red StarRed Star]

29. Marc Joye,  Jean-Jacques Quisquater,  Moti Yung,  On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC, pp. 208 - 222, CT-RSA 2001.

[Electronic Edition][Cited 40 times ]

30. GaĂ«l Hachez,  Jean-Jacques Quisquater,  Montgomery Exponentiation with no Final Subtractions: Improved Results, pp. 293 - 301, CHES 2000.

[Electronic Edition][Cited 88 times Red Star]

31. Yvo Desmedt,  Shuang Hou,  Jean-Jacques Quisquater,  Audio and Optical Cryptography, pp. 392 - 404, ASIACRYPT 1998.

[Electronic Edition][Cited 14 times ]

32. Philippe BĂ©guin,  Jean-Jacques Quisquater,  Fast Server-Aided RSA Signatures Secure Against Active Attacks, pp. 57 - 69, CRYPTO 1995.

[Electronic Edition][Cited 37 times ]

33. Philippe BĂ©guin,  Jean-Jacques Quisquater,  Secure Acceleration of DSS Signatures Using Insecure Server, pp. 249 - 259, ASIACRYPT 1994.

[Electronic Edition][Cited 13 times ]

34. Olivier Delos,  Jean-Jacques Quisquater,  An Identity-Based Signature Scheme with Bounded Life-Span, pp. 83 - 94, CRYPTO 1994.

[Electronic Edition][Cited 6 times ]

35. Louis C. Guillou,  Jean-Jacques Quisquater,  Michael Walker,  Peter Landrock,  Caroline Shafer,  Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery", pp. 465 - 473, EUROCRYPT 1990.

[Electronic Edition][Cited 13 times ]

36. Dominique de Waleffe,  Jean-Jacques Quisquater,  CORSAIR: A SMART Card for Public Key Cryptosystems, pp. 502 - 513, CRYPTO 1990.

[Electronic Edition][Cited 20 times ]

37. Marijke De Soete,  Jean-Jacques Quisquater,  Klaus Vedder,  A Signature with Shared Verification Scheme, pp. 253 - 262, CRYPTO 1989.

[Electronic Edition][Cited 13 times ]

38. Jean-Jacques Quisquater,  Jean-Paul Delescaille,  How Easy is Collision Search. New Results and Applications to DES, pp. 408 - 413, CRYPTO 1989.

[Electronic Edition][Cited 41 times ]

39. Jean-Jacques Quisquater,  Myriam Quisquater,  Muriel Quisquater,  MichaĂ«l Quisquater,  Louis C. Guillou,  Marie Annick Guillou,  GaĂŻd Guillou,  Anna Guillou,  GwenolĂ© Guillou,  Soazig Guillou,  Thomas A. Berson,  How to Explain Zero-Knowledge Protocols to Your Children, pp. 628 - 631, CRYPTO 1989.

[Electronic Edition][Cited 83 times Red Star]

40. Jean-Jacques Quisquater,  AndrĂ© Bouckaert,  Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary), pp. 662 - 664, EUROCRYPT 1989.

[Electronic Edition][No citation]

41. Jean-Jacques Quisquater,  Jean-Paul Delescaille,  How Easy is Collision Search? Application to DES (Extended Summary), pp. 429 - 434, EUROCRYPT 1989.

[Electronic Edition][Cited 77 times Red Star]

42. Jean-Jacques Quisquater,  Marc Girault,  2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms, pp. 102 - 109, EUROCRYPT 1989.

[Electronic Edition][Cited 36 times ]

43. Louis C. Guillou,  Jean-Jacques Quisquater,  A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge, pp. 216 - 231, CRYPTO 1988.

[Electronic Edition][Cited 346 times Red StarRed StarRed Star]

44. Louis C. Guillou,  Jean-Jacques Quisquater,  A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory, pp. 123 - 128, EUROCRYPT 1988.

[Electronic Edition][Cited 439 times Red StarRed StarRed Star]

45. Jean-Jacques Quisquater,  Secret Distribution of Keys for Public-Key Systems, pp. 203 - 208, CRYPTO 1987.

[Electronic Edition][Cited 5 times ]

46. Jean-Jacques Quisquater,  Jean-Paul Delescaille,  Other Cycling Tests for DES (Abstract), pp. 255 - 256, CRYPTO 1987.

[Electronic Edition][Cited 5 times ]

47. Louis C. Guillou,  Jean-Jacques Quisquater,  Efficient Digital Public-Key Signature with Shadow (Abstract), pp. 223 - 223, CRYPTO 1987.

[Electronic Edition][No citation]

48. Yvo Desmedt,  Jean-Jacques Quisquater,  Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?), pp. 111 - 117, CRYPTO 1986.

[Electronic Edition][Cited 62 times Red Star]

49. Yvo Desmedt,  Frank Hoornaert,  Jean-Jacques Quisquater,  Several Exhaustive Key Search Machines and DES, pp. 17 - 19, EUROCRYPT 1986.

[Electronic Edition][Cited 4 times ]

50. Jean-Jacques Quisquater,  Yvo Desmedt,  Marc Davio,  The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys), pp. 537 - 542, CRYPTO 1985.

[Electronic Edition][Cited 9 times ]

51. Yvo Desmedt,  Jean-Jacques Quisquater,  Marc Davio,  Dependence of Output on Input in DES: Small Avalanche Characteristics, pp. 359 - 376, CRYPTO 1984.

[Electronic Edition][Cited 26 times ]

52. Marc Davio,  Yvo Desmedt,  Jo Goubert,  Frank Hoornaert,  Jean-Jacques Quisquater,  Efficient Hardware and Software Implementations for the DES, pp. 144 - 146, CRYPTO 1984.

[Electronic Edition][Cited 31 times ]

53. Marc Davio,  Yvo Desmedt,  Jean-Jacques Quisquater,  Propagation Characteristics of the DES, pp. 62 - 73, EUROCRYPT 1984.

[Electronic Edition][Cited 7 times ]

54. Marc Davio,  Yvo Desmedt,  Marc Fosseprez,  RenĂ© Govaerts,  Jan Hulsbosch,  Patrik Neutjens,  Philippe Piret,  Jean-Jacques Quisquater,  Joos Vandewalle,  Pascal Wouters,  Analytical Characteristics of the DES, pp. 171 - 202, CRYPTO 1983.

[Electronic Edition][Cited 44 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...