|
Personal Tributes and Re-visits of Jean-Jacques's Legacy |
|
|
|
The Hidden Side of Jean-Jacques Quisquater |
|
|
1 | (2) |
|
|
On Quisquater's Multiplication Algorithm |
|
|
3 | (5) |
|
|
A Brief Survey of Research Jointly with Jean-Jacques Quisquater |
|
|
8 | (5) |
|
|
|
13 | (12) |
|
|
|
Line Directed Hypergraphs |
|
|
25 | (10) |
|
|
|
|
|
|
Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq |
|
|
35 | (20) |
|
|
|
Self-similarity Attacks on Block Ciphers and Application to KeeLoq |
|
|
55 | (12) |
|
|
Increasing Block Sizes Using Feistel Networks: The Example of the AES |
|
|
67 | (16) |
|
|
|
|
Authenticated-Encryption with Padding: A Formal Security Treatment |
|
|
83 | (25) |
|
|
|
|
|
Traceable Signature with Stepping Capabilities |
|
|
108 | (24) |
|
|
|
Deniable RSA Signature: The Raise and Fall of Ali Baba |
|
|
132 | (11) |
|
|
|
143 | (13) |
|
|
|
Fully Forward-Secure Group Signatures |
|
|
156 | (29) |
|
|
|
Public Key Encryption for the Forgetful |
|
|
185 | (22) |
|
|
|
|
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping |
|
|
207 | (26) |
|
|
|
|
|
|
|
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems |
|
|
233 | (15) |
|
|
|
|
EM Probes Characterisation for Security Analysis |
|
|
248 | (17) |
|
|
|
|
|
|
An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost |
|
|
265 | (18) |
|
|
|
Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders |
|
|
283 | (17) |
|
Francois-Xavier Standaert |
|
|
|
Nicolas Veyrat-Charvillon |
|
|
Hardware and Implementations |
|
|
|
Efficient Implementation of True Random Number Generator Based on SRAM PUFs |
|
|
300 | (19) |
|
|
|
|
|
|
Operand Folding Hardware Multipliers |
|
|
319 | (10) |
|
|
|
|
|
|
SIMPL Systems as a Keyless Cryptographic and Security Primitive |
|
|
329 | (26) |
|
|
Cryptography with Asynchronous Logic Automata |
|
|
355 | (9) |
|
|
|
|
|
|
|
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors |
|
|
364 | (19) |
|
|
|
|
|
|
|
|
Smart Cards and Information Security |
|
|
|
The Challenges Raised by the Privacy-Preserving Identity Card |
|
|
383 | (22) |
|
|
|
The Next Smart Card Nightmare: Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things |
|
|
405 | (20) |
|
|
|
|
425 | (17) |
|
|
Dynamic Secure Cloud Storage with Provenance |
|
|
442 | (23) |
|
|
|
|
|
|
Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage |
|
|
465 | (9) |
|
|
|
As Diverse as Jean-Jacques' Scientific Interests |
|
|
|
A Nagell Algorithm in Any Characteristic |
|
|
474 | (6) |
|
|
|
480 | (4) |
|
|
|
Fooling a Liveness-Detecting Capacitive Fingerprint Scanner |
|
|
484 | (7) |
|
|
|
|
|
Physical Simulation of Inarticulate Robots |
|
|
491 | (10) |
|
|
|
|
Author Index |
|
501 | |