Jean-Jacques Quisquater

Results: 19



#Item
1Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-05-04 18:26:31
2Exhaustive Key Search of the DES: Updates and Refinements Jean-Jacques Quisquater & Fran¸cois-Xavier Standaert UCL Crypto Group Laboratoire de Micro´electronique Universit´e Catholique de Louvain

Exhaustive Key Search of the DES: Updates and Refinements Jean-Jacques Quisquater & Fran¸cois-Xavier Standaert UCL Crypto Group Laboratoire de Micro´electronique Universit´e Catholique de Louvain

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2005-03-13 11:27:25
3Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be

Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-04-17 02:57:49
4On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards Ryan Zhou, Yu Yu, F-X Standaert, Jean-Jacques Quisquater  Brightsight

On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards Ryan Zhou, Yu Yu, F-X Standaert, Jean-Jacques Quisquater Brightsight

Add to Reading List

Source URL: fc13.ifca.ai

Language: English - Date: 2013-04-04 03:04:00
    5Cryptanalysis of a Verifiably Committed Signature Scheme based on GPS and RSA Julien Cathalo? , Benoˆıt Libert?? and Jean-Jacques Quisquater Universit´e catholique de Louvain Place du LevantLouvain-la-Neuve, B

    Cryptanalysis of a Verifiably Committed Signature Scheme based on GPS and RSA Julien Cathalo? , Benoˆıt Libert?? and Jean-Jacques Quisquater Universit´e catholique de Louvain Place du LevantLouvain-la-Neuve, B

    Add to Reading List

    Source URL: perso.uclouvain.be

    Language: English - Date: 2006-12-14 09:56:49
      6On Polynomial Systems Arising from a Weil Descent Christophe Petit? and Jean-Jacques Quisquater?? UCL Crypto Group, Universit´e catholique de Louvain Place du LevantLouvain-la-Neuve (Belgium)

      On Polynomial Systems Arising from a Weil Descent Christophe Petit? and Jean-Jacques Quisquater?? UCL Crypto Group, Universit´e catholique de Louvain Place du LevantLouvain-la-Neuve (Belgium)

      Add to Reading List

      Source URL: www.uclouvain.be

      Language: English - Date: 2012-08-28 09:32:40
        71  IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups Nidal Aboudagga∗ ,Giacomo de Meulenaer∗ , Mohamed Eltoweissy† and Jean-Jacques Quisquater∗ ∗ UCL-Crypto group, Place du Levant 3, 1

        1 IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups Nidal Aboudagga∗ ,Giacomo de Meulenaer∗ , Mohamed Eltoweissy† and Jean-Jacques Quisquater∗ ∗ UCL-Crypto group, Place du Levant 3, 1

        Add to Reading List

        Source URL: www.uclouvain.be

        Language: English - Date: 2011-12-14 05:30:34
          8Hardware Implementations of a Variant of the Z´ emor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? Giacomo de Meulenaer Christophe Petit and Jean-Jacques Quisquater

          Hardware Implementations of a Variant of the Z´ emor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? Giacomo de Meulenaer Christophe Petit and Jean-Jacques Quisquater

          Add to Reading List

          Source URL: www.uclouvain.be

          Language: English - Date: 2011-12-14 05:30:37
            9Published in Journal of Computer Security 5(3):213–223, AUTHENTICATION OF SEQUENCES WITH THE SL2 HASH FUNCTION: APPLICATION TO VIDEO SEQUENCES Jean-Jacques Quisquater

            Published in Journal of Computer Security 5(3):213–223, AUTHENTICATION OF SEQUENCES WITH THE SL2 HASH FUNCTION: APPLICATION TO VIDEO SEQUENCES Jean-Jacques Quisquater

            Add to Reading List

            Source URL: joye.site88.net

            Language: English - Date: 2015-09-04 19:44:14
              10Fault Attacks on Public Key Elements: Application to DLP-based Schemes Chong-Hee Kim? , Philippe Bulens?? , Christophe Petit? ? ? and Jean-Jacques Quisquater UCL Crypto Group, Universit´e Catholique de Louvain, 3 Place

              Fault Attacks on Public Key Elements: Application to DLP-based Schemes Chong-Hee Kim? , Philippe Bulens?? , Christophe Petit? ? ? and Jean-Jacques Quisquater UCL Crypto Group, Universit´e Catholique de Louvain, 3 Place

              Add to Reading List

              Source URL: www.uclouvain.be

              Language: English - Date: 2011-12-14 05:30:35