Publications

Search publications by date:
1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | 2019 | Latest | Forthcoming
BibTeX - Year 1998

Publications dated 1998

January 1998

H. Gilbert, and Jean-Jacques Quisquater. Attacks on Shamir's 'RSA for paranoids', In Information Processing Letters 68, pages 197-199, January 1998 PDF BibTeX

Julien Stern. A New and Efficient All-Or-Nothing Disclosure of Secrets, In K. Ohta and D. Pei, editor(s), Proceedings of Asiacrypt'98, Volume 1514 of Lectures Notes in Computer Science, pages 357-371, Springer-Verlag, January 1998 BibTeX

S. Hou, and Jean-Jacques Quisquater. Audio and Optical Cryptography, In K. Ohta and D. Pei, editor(s), Proceedings of Asiacrypt'98, Volume 1514 of Lecture Notes in Computer Science, pages 392-404, Springer-Verlag, January 1998 BibTeX

Jean-François Dhem, François Koeune, Philippe-Alexandre Leroux, Patrick Mestré, Jean-Jacques Quisquater, and Jean-Louis Willems. A practical implementation of the timing attack, In Jean-Jacques Quisquater and Bruce Schneier, editor(s), Proceedings of the Third Working Conference on Smart Card Research and Advanced Applications (CARDIS 1998), Volume 1820 of LNCS, Springer-Verlag, January 1998 PDF BibTeX

Marc Joye, and Jean-Jacques Quisquater. Cryptanalysis of RSA-type cryptosystems: a visit, In R. N. Wright and P. G. Neumann, editor(s), Network Threats, DIMACS Series in Discrete Mathematics an, pages 21-31, American Mathematical Society, January 1998 PDF BibTeX

Marc Joye, and Jean-Jacques Quisquater. Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams, Designs, Codes and Cryptography, Volume 14, pages 53-56, January 1998 PDF BibTeX

Marc Joye, Jean-Jacques Quisquater, and Tsuyoshi Takagi. Are strong primes really stronger?, In D.J. Guan, editor(s), Proc. of the Eighth National Symposium on Information Security, pages 355-367, January 1998 BibTeX

Specifying Security in a Composite System, Information Security Workshop (ISW'1997), Lecture Note in Computer Science, Springer-Verlag, January 1998 BibTeX

Marc Lobelle. Threats in Distance Learning Systems, International World Conference on Continuous Engineering Education, 7th WCCEE 98, January 1998 BibTeX

Towards an Object Based Access Control model, In G.Papp, editor(s), Global-IT Security, IFIP-SEC 1998, January 1998 BibTeX

V. Darmstaedter, Jean-François Delaigle, Jean-Jacques Quisquater, and Benoit Macq. Low-cost spatial watermarking, Computer & Graphics, Volume 22, pages 417-424, January 1998 BibTeX

April 1998

Yvo Desmedt, S. Hou, and Jean-Jacques Quisquater. Cerebral Cryptography, Proceedings of Information Hiding, Second International Workshop, pages 62-72, April 1998 BibTeX

September 1998

Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS 98), Proceedings of the 5th European Sympo, September 1998 BibTeX

D. Augot, Jean-François Delaigle, and C. Fontaine. DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System, Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS 98), Volume 1485 of Lecture Notes in Computer Security, pages 241-256, Springer-Verlag, September 1998 BibTeX

November 1998

Tanguy Gilmont, Jean-Didier Legat, and Jean-Jacques Quisquater. An architecture of security management unit for safe hosting of multiple agents, pages 79-82, November 1998 BibTeX

Copyright Notice

(click here to expand/retract)