Jean-Jacques Quisquater

From MaRDI portal
Person:203448


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Can a differential attack work for an arbitrarily large number of rounds?
 
2022-03-24Paper
Analytical characteristics of the DES
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
2022-01-08Paper
Dependence of output on input in DES: small avalanche characteristics
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
2017-04-10Paper
On optimal size in truncated differential attacks
Studia Scientiarum Mathematicarum Hungarica
2017-03-31Paper
Attacks on Shamir's `RSA for paranoids'
Information Processing Letters
2016-06-09Paper
Cryptographic hash functions and expander graphs: the end of the story?
The New Codebreakers
2016-05-02Paper
SEA: A Scalable Encryption Algorithm for Small Embedded Applications
Smart Card Research and Advanced Applications
2015-11-11Paper
Rubik’s for Cryptographers
Notices of the American Mathematical Society
2015-10-14Paper
Efficient revocation and threshold pairing based cryptosystems
Proceedings of the twenty-second annual symposium on Principles of distributed computing
2015-09-04Paper
Fault attacks against RSA-CRT implementation
Information Security and Cryptography
2013-07-09Paper
On polynomial systems arising from a Weil descent
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Compact elliptic curve representations
Journal of Mathematical Cryptology
2011-07-11Paper
Signcryption schemes based on the Diffie-Hellman problem
Practical Signcryption
2011-05-18Paper
Signcryption schemes based on bilinear maps
Practical Signcryption
2011-05-18Paper
Preimages for the Tillich-Zémor hash function
Selected Areas in Cryptography
2011-03-15Paper
A differential fault attack technique against SPN structures, with application to the AES and KHAZAD.
Lecture Notes in Computer Science
2010-03-09Paper
A new type of timing attack: application to GPS.
Lecture Notes in Computer Science
2010-03-09Paper
Comparing with RSA
Cryptography and Coding
2010-01-07Paper
Practical Algebraic Attacks on the Hitag2 Stream Cipher
Lecture Notes in Computer Science
2009-09-29Paper
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
Public Key Cryptography – PKC 2004
2009-05-14Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Key Evolution Systems in Untrusted Update Environments
Information Security and Cryptology
2009-04-29Paper
Efficient Intrusion-Resilient Signatures Without Random Oracles
Information Security and Cryptology
2009-01-15Paper
Authentication of sequences with the SL2 hash function: application to video sequences
Journal of Computer Security
2008-12-21Paper
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions
Lecture Notes in Computer Science
2008-11-27Paper
Full Cryptanalysis of LPS and Morgenstern Hash Functions
Lecture Notes in Computer Science
2008-11-20Paper
On the Salsa20 Core Function
Fast Software Encryption
2008-09-18Paper
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
Fast Software Encryption
2008-09-18Paper
Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
Implementation of the AES-128 on Virtex-5 FPGAs
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
Public Key Infrastructure
2008-06-12Paper
Improving the Time Complexity of Matsui’s Linear Cryptanalysis
Lecture Notes in Computer Science
2008-05-06Paper
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
Lecture Notes in Computer Science
2008-03-18Paper
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Identity Based Encryption Without Redundancy
Applied Cryptography and Network Security
2007-09-24Paper
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Public Key Cryptography – PKC 2007
2007-09-04Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
scientific article; zbMATH DE number 2080177 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2079917 (Why is no real title available?)
 
2004-08-03Paper
scientific article; zbMATH DE number 2077189 (Why is no real title available?)
 
2004-07-01Paper
scientific article; zbMATH DE number 2009969 (Why is no real title available?)
 
2003-11-26Paper
scientific article; zbMATH DE number 1979312 (Why is no real title available?)
 
2003-09-11Paper
scientific article; zbMATH DE number 1979308 (Why is no real title available?)
 
2003-09-11Paper
scientific article; zbMATH DE number 1979270 (Why is no real title available?)
 
2003-09-11Paper
scientific article; zbMATH DE number 1951602 (Why is no real title available?)
 
2003-07-21Paper
scientific article; zbMATH DE number 1941130 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1941137 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1857519 (Why is no real title available?)
 
2003-05-19Paper
scientific article; zbMATH DE number 1878345 (Why is no real title available?)
 
2003-03-09Paper
scientific article; zbMATH DE number 1857508 (Why is no real title available?)
 
2003-02-02Paper
scientific article; zbMATH DE number 1759301 (Why is no real title available?)
 
2002-11-28Paper
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies
Cryptography and Coding
2002-11-25Paper
On Rabin-Type Signatures
Cryptography and Coding
2002-11-25Paper
scientific article; zbMATH DE number 1617928 (Why is no real title available?)
 
2002-07-22Paper
How to choose secret parameters for RSA-type cryptosystems over elliptic curves
Designs, Codes and Cryptography
2002-06-10Paper
scientific article; zbMATH DE number 1302809 (Why is no real title available?)
 
2001-03-18Paper
scientific article; zbMATH DE number 1456814 (Why is no real title available?)
 
2000-06-07Paper
scientific article; zbMATH DE number 1406770 (Why is no real title available?)
 
2000-03-01Paper
Chinese remaindering based cryptosystems in the presence of faults
Journal of Cryptology
2000-01-05Paper
Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams
Designs, Codes and Cryptography
1999-01-10Paper
scientific article; zbMATH DE number 1107698 (Why is no real title available?)
 
1998-07-03Paper
scientific article; zbMATH DE number 1113951 (Why is no real title available?)
 
1998-03-05Paper
scientific article; zbMATH DE number 1030981 (Why is no real title available?)
 
1997-11-23Paper
scientific article; zbMATH DE number 1024100 (Why is no real title available?)
 
1997-10-20Paper
scientific article; zbMATH DE number 1182512 (Why is no real title available?)
 
1997-01-01Paper
CORSAIR: A Smart Card for Public Key Cryptosystems
Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings
1994-02-17Paper
scientific article; zbMATH DE number 177057 (Why is no real title available?)
 
1993-05-18Paper
Table of large \(({\Delta{}}, D)\)-graphs
Discrete Applied Mathematics
1993-01-16Paper
scientific article; zbMATH DE number 4170086 (Why is no real title available?)
 
1990-01-01Paper
Propagation Characteristics of the DES
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
1985-01-01Paper
Grands Graphes De Degré Et Diamètre Fixés
Combinatorial Mathematics, Proceedings of the International Colloquium on Graph Theory and Combinatorics
1983-01-01Paper
scientific article; zbMATH DE number 3799729 (Why is no real title available?)
 
1983-01-01Paper
Tables of large graphs with given degree and diameter
Information Processing Letters
1982-01-01Paper
scientific article; zbMATH DE number 3555904 (Why is no real title available?)
 
1976-01-01Paper
scientific article; zbMATH DE number 3501011 (Why is no real title available?)
 
1975-01-01Paper
Permutation cascades with normalized cells
Information and Control
1973-01-01Paper
scientific article; zbMATH DE number 3438746 (Why is no real title available?)
 
1973-01-01Paper
scientific article; zbMATH DE number 3422278 (Why is no real title available?)
 
1972-01-01Paper


Research outcomes over time


This page was built for person: Jean-Jacques Quisquater