Publications

Search publications by date:
1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | Latest | Forthcoming
BibTeX - Year 2005

Publications dated 2005

January 2005

Julien Cathalo, Jean-Sébastien Coron, and David Naccache. From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited, In S. Vaudenay, editor(s), 8th International Workshop on Practice and Theory in Public-Key Cryptography (PKC 2005), Volume 3386 of Lecture Notes in Computer Science, pages 234-243, January 2005 PDF BibTeX

Gilles Piret, and Jean-Jacques Quisquater. Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results, In H. Handschuh and A. Hasan, editor(s), Selected Areas in Cryptography, 11th Annual International Workshop, SAC 2004, Volume 3357 of Lecture Notes in Computer Science, pages 100-115, Springer-Verlag, January 2005 PDF BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Left-to-right modular multiplication without large integer comparisons, January 2005 BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Karatsuba-like Squaring, January 2005 BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Low-Cost Elliptic Curve Digital Signature Cryptoprocessor Based on Affine Coordinates – First Results, January 2005 BibTeX

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Novel iterative digit-serial modular division over GF(2^m), CRyptographic Advances in Secure Hardware -- CRASH 2005, January 2005 PDF BibTeX

Ludovic Perret. A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem, Advances in Cryptology - EUROCRYPT 2005, Volume 3494 of Lecture Notes in Computer Science, pages 354-370, Springer-Verlag, January 2005 BibTeX

Ludovic Perret. A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words, Proceedings of International Workshop on Coding and Cryptography (WCC 2005), pages 235-244, January 2005 BibTeX

Françoise Levy-dit-Vehel, and Ludovic Perret. On Wagner-Magyarik Cryptosystem, Proceedings of International Workshop on Coding and Cryptography (WCC 2005), pages 285-294, January 2005 BibTeX

February 2005

Jean-Jacques Quisquater, and François-Xavier Standaert. Exhaustive Key Search of the DES: Updates and Refinements, SHARCS 2005, February 2005, To appear BibTeX

March 2005

François Mace, François-Xavier Standaert, Jean-Didier Legat, and Jean-Jacques Quisquater. Recommendations for Secure IC's and ASIC's, CEPA2 Workshop - What Technologies in Defence Applications for Digital Signal Processing Now and in the Future, pages NA, March 2005 PDF BibTeX

April 2005

François-Xavier Standaert, Eric Peeters, and Jean-Jacques Quisquater. On the Masking Countermeasure and Higher-Order Power Analysis Attacks, ITCC 2005, Volume 1, pages 562-567, IEEE Computer Society, April 2005 BibTeX

François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, and Jean-Jacques Quisquater. FPGA Implementations of the ICEBERG Block Cipher, ITCC 2005, April 2005, To appear BibTeX

François-Xavier Standaert, Frédéric Lefèbvre, Gaël Rouvroy, Jean-Jacques Quisquater, Benoit Macq, and Jean-Didier Legat. Practical Evaluation of a Radial Soft Hash Algorithm, ITCC 2005, April 2005, To appear BibTeX

May 2005

Philippe Léglise, François-Xavier Standaert, Gaël Rouvroy, and Jean-Jacques Quisquater. Efficient Implementation of Recent Stream Ciphers on Reconfigurable Hardware Devices, 26th Symposium on Information Theory in the Benelux, pages 261-268, May 2005 BibTeX

June 2005

Benoit Libert, and Jean-Jacques Quisquater. Identity Based Encryption without Redundancy, In J. Ioannidis, A. Keromytis and M. Yung, editor(s), 3rd Applied Cryptography and Network Security conference (ACNS'05), Volume 3531 of Lecture Notes in Computer Science, pages 285-300, Springer, June 2005 BibTeX

July 2005

Mathieu Ciet, and Marc Joye. Elliptic curve cryptosystems in the presence of permanent and transient faults, In Designs Codes and Cryptography, Volume 36-1, July 2005 BibTeX

François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, and Jean-Jacques Quisquater. SEA: a Scalable Encryption Algorithm for Small Embedded Applications, Workshop on Lightweight Crypto, July 2005 BibTeX

August 2005

Eric Peeters, François-Xavier Standaert, Nicolas Donckers, and Jean-Jacques Quisquater. Improved Higher Order Side-Channel Attacks with FPGA experiments, In Josyula R. Rao, Berk Sunar, editor(s), Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2005, Volume 3659 of Lecture Notes in Computer Science, pages 309-323, Spinger-Verlag, August 2005 BibTeX

September 2005

François Mace, François-Xavier Standaert, Jean-Jacques Quisquater, and Jean-Didier Legat. A Design Methodology for Secured ICs Using Dynamic Current Mode Logic, In V. Paliouras, editor(s), Power and Timing Modeling, Optimization and Simulation - Proceedings of PATMOS 2005, Lecture Notes in Computer Science, pages 550-560, Springer, September 2005 PDF BibTeX

Tal G. Malkin, François-Xavier Standaert, and Moti Yung. A Comparative Cost/Security Analysis of Fault Attack Countermeasures, FDTC 2005/2006, Volume 4236 of Lecture Notes in Computer Science, pages 159-172, September 2005 BibTeX

October 2005

Nidal Aboudagga, Mohamed Tamer Refaei, Mohamed Eltoweissy, Luiz A DaSilva, and Jean-Jacques Quisquater. Authentication protocols for ad hoc networks: Taxonomy and research issues, Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, October 2005 PDF BibTeX

Ran Canetti, Dilsun Kaynar, Ling Cheung, Moses Liskov, Nancy Lynch, Olivier Pereira, and Roberto Segala. Using Probabilistic I/O Automata to Improve the Analysis of Cryptographic Protocols., In ERCIM News-63, pages 40--41, October 2005 BibTeX

Kassem Kalach, and Jean-Pierre David. Hardware Implementation of Large Number Multiplication by FFT with Modular Arithmetic, October 2005 BibTeX

December 2005

Paulo S. L. M. Barreto, Benoit Libert, Noel McCullagh, and Jean-Jacques Quisquater. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps, In B. Roy, editor(s), Asiacrypt 2005, Volume 3788 of Lecture Notes in Computer Science, pages 515-532, Springer, December 2005 PDF BibTeX

Julien Cathalo, Benoit Libert, and Jean-Jacques Quisquater. Efficient and Non-Interactive Timed-Release Encryption, In S. Qing, W. Mao, J. Lopez and G. Wang, editor(s), Information and Communications Security: 7th International Conference, ICICS 2005, Volume 3783 of Lecture Notes in Computer Science, pages 291-303, Springer, December 2005 PDF BibTeX

Damien Giry, and Michael Neve. eMail Address Protection Study, Information Security and Cryptology - CISC 2005, pages 247-256, Higher Education Press, December 2005 BibTeX

Copyright Notice

(click here to expand/retract)