The following pages link to Jean-Jacques Quisquater (Q203448):
Displayed 50 items.
- Attacks on Shamir's `RSA for paranoids' (Q293447) (← links)
- Can a differential attack work for an arbitrarily large number of rounds? (Q831646) (← links)
- Item:Q203448 (redirect page) (← links)
- Tables of large graphs with given degree and diameter (Q1164611) (← links)
- Table of large \(({\Delta{}}, D)\)-graphs (Q1199460) (← links)
- Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams (Q1379660) (← links)
- Chinese remaindering based cryptosystems in the presence of faults (Q1819121) (← links)
- (Q2724439) (← links)
- Cryptographic Hash Functions and Expander Graphs: The End of the Story? (Q2803636) (← links)
- Fault Attacks Against RSA-CRT Implementation (Q2838302) (← links)
- Efficient revocation and threshold pairing based cryptosystems (Q2943754) (← links)
- On optimal size in truncated differential attacks (Q2973173) (← links)
- Dependence of output on input in DES: Small avalanche characteristics (Q2974491) (← links)
- Signcryption Schemes Based on the Diffie–Hellman Problem (Q3000030) (← links)
- Signcryption Schemes Based on Bilinear Maps (Q3000031) (← links)
- Compact elliptic curve representations (Q3015226) (← links)
- Grands Graphes De Degré Et Diamètre Fixés (Q3043184) (← links)
- Preimages for the Tillich-Zémor Hash Function (Q3084262) (← links)
- Rubik’s for Cryptographers (Q3193019) (← links)
- Permutation cascades with normalized cells (Q3214818) (← links)
- Practical Algebraic Attacks on the Hitag2 Stream Cipher (Q3399209) (← links)
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications (Q3452237) (← links)
- (Q3495643) (← links)
- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes (Q3506358) (← links)
- Implementation of the AES-128 on Virtex-5 FPGAs (Q3506369) (← links)
- Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA (Q3525061) (← links)
- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent (Q3525688) (← links)
- On the Salsa20 Core Function (Q3525695) (← links)
- Full Cryptanalysis of LPS and Morgenstern Hash Functions (Q3540051) (← links)
- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions (Q3541879) (← links)
- Authentication of sequences with the SL2 hash function: application to video sequences (Q3546372) (← links)
- Identity Based Encryption Without Redundancy (Q3593152) (← links)
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security (Q3623044) (← links)
- Key Evolution Systems in Untrusted Update Environments (Q3623068) (← links)
- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups (Q3626853) (← links)
- Comparing with RSA (Q3654626) (← links)
- Propagation Characteristics of the DES (Q3728807) (← links)
- (Q4036902) (← links)
- (Q4082301) (← links)
- (Q4128418) (← links)
- (Q4249283) (← links)
- CORSAIR: A Smart Card for Public Key Cryptosystems (Q4279599) (← links)
- (Q4341795) (← links)
- (Q4343423) (← links)
- (Q4373643) (← links)
- (Q4375717) (← links)
- (Q4400577) (← links)
- (Q4404789) (← links)
- (Q4408197) (← links)
- (Q4408211) (← links)