Jean-Jacques Quisquater

From MaRDI portal
Person:203448

Available identifiers

zbMath Open quisquater.jean-jacquesMaRDI QIDQ203448

List of research outcomes





PublicationDate of PublicationType
Can a differential attack work for an arbitrarily large number of rounds?2022-03-24Paper
Analytical Characteristics of the DES2022-01-08Paper
Dependence of output on input in DES: Small avalanche characteristics2017-04-10Paper
On optimal size in truncated differential attacks2017-03-31Paper
Attacks on Shamir's `RSA for paranoids'2016-06-09Paper
Cryptographic Hash Functions and Expander Graphs: The End of the Story?2016-05-02Paper
SEA: A Scalable Encryption Algorithm for Small Embedded Applications2015-11-11Paper
Rubik’s for Cryptographers2015-10-14Paper
Efficient revocation and threshold pairing based cryptosystems2015-09-04Paper
Fault Attacks Against RSA-CRT Implementation2013-07-09Paper
On Polynomial Systems Arising from a Weil Descent2013-03-19Paper
Compact elliptic curve representations2011-07-11Paper
Signcryption Schemes Based on the Diffie–Hellman Problem2011-05-18Paper
Signcryption Schemes Based on Bilinear Maps2011-05-18Paper
Preimages for the Tillich-Zémor Hash Function2011-03-15Paper
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad2010-03-09Paper
A New Type of Timing Attack: Application to GPS2010-03-09Paper
Comparing with RSA2010-01-07Paper
Practical Algebraic Attacks on the Hitag2 Stream Cipher2009-09-29Paper
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups2009-05-14Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security2009-04-29Paper
Key Evolution Systems in Untrusted Update Environments2009-04-29Paper
Efficient Intrusion-Resilient Signatures Without Random Oracles2009-01-15Paper
Authentication of sequences with the SL2 hash function: application to video sequences2008-12-21Paper
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions2008-11-27Paper
Full Cryptanalysis of LPS and Morgenstern Hash Functions2008-11-20Paper
On the Salsa20 Core Function2008-09-18Paper
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent2008-09-18Paper
Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA2008-09-16Paper
Implementation of the AES-128 on Virtex-5 FPGAs2008-06-13Paper
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes2008-06-12Paper
Improving the Time Complexity of Matsui’s Linear Cryptanalysis2008-05-06Paper
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps2008-03-18Paper
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps2007-11-29Paper
Identity Based Encryption Without Redundancy2007-09-24Paper
Parallel Key-Insulated Public Key Encryption Without Random Oracles2007-09-04Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-16Paper
Security in Communication Networks2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
Fast Software Encryption2005-12-27Paper
https://portal.mardi4nfdi.de/entity/Q44724132004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44720612004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44705842004-07-01Paper
https://portal.mardi4nfdi.de/entity/Q44348882003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44257452003-09-11Paper
https://portal.mardi4nfdi.de/entity/Q44257412003-09-11Paper
https://portal.mardi4nfdi.de/entity/Q44256822003-09-11Paper
https://portal.mardi4nfdi.de/entity/Q44138512003-07-21Paper
https://portal.mardi4nfdi.de/entity/Q44081972003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q44082112003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q47885682003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q47978152003-03-09Paper
https://portal.mardi4nfdi.de/entity/Q47885572003-02-02Paper
https://portal.mardi4nfdi.de/entity/Q45362342002-11-28Paper
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies2002-11-25Paper
On Rabin-Type Signatures2002-11-25Paper
https://portal.mardi4nfdi.de/entity/Q27244392002-07-22Paper
How to choose secret parameters for RSA-type cryptosystems over elliptic curves2002-06-10Paper
https://portal.mardi4nfdi.de/entity/Q42492832001-03-18Paper
https://portal.mardi4nfdi.de/entity/Q49544122000-06-07Paper
https://portal.mardi4nfdi.de/entity/Q49406852000-03-01Paper
Chinese remaindering based cryptosystems in the presence of faults2000-01-05Paper
Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams1999-01-10Paper
https://portal.mardi4nfdi.de/entity/Q43736431998-07-03Paper
https://portal.mardi4nfdi.de/entity/Q43757171998-03-05Paper
https://portal.mardi4nfdi.de/entity/Q43434231997-11-23Paper
https://portal.mardi4nfdi.de/entity/Q43417951997-10-20Paper
https://portal.mardi4nfdi.de/entity/Q44005771997-01-01Paper
CORSAIR: A Smart Card for Public Key Cryptosystems1994-02-17Paper
https://portal.mardi4nfdi.de/entity/Q40369021993-05-18Paper
Table of large \(({\Delta{}}, D)\)-graphs1993-01-16Paper
https://portal.mardi4nfdi.de/entity/Q34956431990-01-01Paper
Propagation Characteristics of the DES1985-01-01Paper
Grands Graphes De Degré Et Diamètre Fixés1983-01-01Paper
https://portal.mardi4nfdi.de/entity/Q47443271983-01-01Paper
Tables of large graphs with given degree and diameter1982-01-01Paper
https://portal.mardi4nfdi.de/entity/Q41284181976-01-01Paper
https://portal.mardi4nfdi.de/entity/Q40823011975-01-01Paper
Permutation cascades with normalized cells1973-01-01Paper
https://portal.mardi4nfdi.de/entity/Q44047891973-01-01Paper
https://portal.mardi4nfdi.de/entity/Q56845871972-01-01Paper

Research outcomes over time

This page was built for person: Jean-Jacques Quisquater