Quisquater, Jean-Jacques
12  results:
Search for persons X
?
1

Can a Differential Attack Work for an Arbitrarily Large Num..:

, In: Information Security and Cryptology – ICISC 2020; Lecture Notes in Computer Science,
 
?
2

Authenticated wireless roaming via tunnels : making mobi..:

, In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security,
Manulis, Mark ; Leroy, Damien ; Koeune, Francois.. - p. 92-103 , 2009
 
?
3

Fault Attacks for CRT Based RSA: New Attacks, New Results, ..:

, In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems; Lecture Notes in Computer Science,
 
?
4

Fault attacks for CRT based RSA : new attacks, new resul..:

, In: Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems,
 
?
5

Forward-secure signatures in untrusted update environments ..:

, In: Proceedings of the 14th ACM conference on Computer and communications security,
 
?
6

Authentication protocols for ad hoc networks : taxonomy ..:

, In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks,
 
?
7

Efficient revocation and threshold pairing based cryptosyst..:

, In: Proceedings of the twenty-second annual symposium on Principles of distributed computing,
 
?
8

Design strategies and modified descriptions to optimize cip..:

, In: Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays,
 
?
9

A methodology to implement block ciphers in reconfigurable ..:

, In: Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays,
 
?
10

Securing Mobile Appliances : New Challenges for the Syst..:

, In: Proceedings of the conference on Design, Automation and Test in Europe - Volume 1,
 
?
11

Provably authenticated group Diffie-Hellman key exchange:

, In: Proceedings of the 8th ACM conference on Computer and Communications Security,
 
?
12

On the importance of securing your bins : the garbage-ma..:

, In: Proceedings of the 4th ACM conference on Computer and communications security,
Joye, Marc ; Quisquater, Jean-Jacques - p. 135-141 , 1997
 
1-12