Quisquater, Jean-Jacques
181  results:
Search for persons X
?
1

Can a Differential Attack Work for an Arbitrarily Large Num..:

, In: Information Security and Cryptology – ICISC 2020; Lecture Notes in Computer Science,
 
?
2

SOFSEM 2015: theory and practice of computer science 

41st International Conference on Current Trends in Theory a...  Lecture notes in computer science ; 8939, Advanced research in computing and software science
 
?
4

Guest Editorial:

Paar, Christof ; Quisquater, Jean-Jacques ; Sunar, Berk
Journal of Cryptology.  24 (2011)  2 - p. 245-246 , 2011
 
?
5

Compact elliptic curve representations:

Ciet, Mathieu ; Quisquater, Jean-Jacques ; Sica, Francesco
Journal of Mathematical Cryptology.  5 (2011)  1 - p. , 2011
 
?
6

Key Evolution Systems in Untrusted Update Environments:

Libert, Benoît ; Quisquater, Jean-Jacques ; Yung, Moti
ACM Transactions on Information and System Security (TISSEC).  13 (2010)  4 - p. 1-34 , 2010
 
?
7

Key Evolution Systems in Untrusted Update Environments:

Libert, Benoît ; Quisquater, Jean-Jacques ; Yung, Moti
ACM Transactions on Information and System Security.  13 (2010)  4 - p. 1-34 , 2010
 
?
8

Information security theory and practice 

smart devices, pervasive systems, and ubiquitous networks ;...  Lecture notes in computer science ; 5746
 
?
9

Authenticated wireless roaming via tunnels : making mobi..:

, In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security,
Manulis, Mark ; Leroy, Damien ; Koeune, Francois.. - p. 92-103 , 2009
 
?
12

Fault attacks for CRT based RSA : new attacks, new resul..:

, In: Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems,
 
?
13

Faults, Injection Methods, and Fault Attacks:

Kim, Chong Hee ; Quisquater, Jean-Jacques
IEEE Design & Test of Computers.  24 (2007)  6 - p. 544-545 , 2007
 
1-15