Publications

Search publications by date:
1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | 2019 | Latest | Forthcoming
BibTeX - Year 2007

Publications dated 2007

January 2007

Philippe Bulens, Kassem Kalach, François-Xavier Standaert, and Jean-Jacques Quisquater. FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile, January 2007, http://sasc.cry BibTeX

February 2007

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. High-speed Hardware Implementations of Elliptic Curve Cryptography: A Survey, In Journal of Systems Architecture, Special Issue on Embedded Hardware for Cryptosystems, Volume 53-2-3, pages 72-84, February 2007 BibTeX

March 2007

Ilham Hassoune, François Mace, Denis Flandre, and Jean-Didier Legat. Dynamic differential self-timed logic families for robust and low-power security ICs, In INTEGRATION, the VLSI Journal, Volume 40, pages 355-364, March 2007 BibTeX

Ran Canetti, Ling Cheung, Nancy Lynch, and Olivier Pereira. On the Role of Scheduling in Simulation-Based Security, In R. Focardi, editor(s), Proceedings of the 7th International Workshop on Issues in the Theory of Security (WITS 2007), pages 22--37, March 2007 BibTeX

April 2007

Benoit Libert, Jean-Jacques Quisquater, and Moti Yung. Parallel Key-Insulated Public Key Encryption Without Random Oracles, In T. Okamoto and X. Wang, editor(s), Public Key Cryptography 2007 (PKC'07), Volume 4450 of Lecture Notes in Computer Science, pages 298-314, Springer, April 2007 BibTeX

Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware, IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07), pages 197-207, IEEE Computer Society Press, April 2007 PDF BibTeX

Guerric Meurice de Dormale, John Bass, and Jean-Jacques Quisquater. On Solving RC5 Challenges with FPGAs, IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07), pages 281-282, IEEE Computer Society Press, April 2007 BibTeX

May 2007

Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Area and Time Trade-offs for Iterative Modular Division over GF(2^m): Novel Algorithm and Implementations on FPGA, In International Journal of Electronics, Volume 94-5, pages 515-529, May 2007 BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures, Workshop in Information Security Theory and Practices: Smart cards, Mobile and Ubiquitous computing systems - WISTP 2007, Volume 4462 of Lecture Notes in Computer Science, pages 215-228, Springer-Verlag, May 2007 BibTeX

July 2007

Tadashi Araragi, and Olivier Pereira. Automatic Verification of Simulatability in Security Protocols, In M. Backes and Y. Lakhnech, editor(s), Workshop on Formal and Computational Cryptography - FCC 2007, July 2007, To appear BibTeX

Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, and Olivier Pereira. Compositional Security for Task-PIOAs, In A. Sabelfeld, editor(s), Proceedings of the 20th IEEE Computer Security Foundations Symposium, pages 125-139, IEEE Computer Society Press, July 2007 BibTeX

Emmanuel Bresson, and Mark Manulis. Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust, 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Volume 4610 of Lecture Notes in Computer Science, pages 395-409, Springer Verlag, July 2007 BibTeX

François Mace, François-Xavier Standaert, and Jean-Jacques Quisquater. ASIC Implementations of the Block Cipher SEA for Constrained Applications, Proceedings of the Third International Conference on RFID Security - RFIDSec 2007, pages 103 - 114, July 2007 BibTeX

Benoit Libert, and Jean-Jacques Quisquater. Practical Time Capsule Signatures in the Standard Model from Bilinear Maps, In T. Takagi and T. Okamoto, editor(s), 1st International Conference on Pairing-based Cryptography (Pairing 2007), Volume 4575 of Lecture Notes in Computer Science, pages 23-38, Springer, July 2007 BibTeX

August 2007

Mark Manulis. Provably Secure Group Key Exchange, Christoph Paar, Ahmad-Reza Sadeghi, Joerg Schwenk ed., August 2007 BibTeX

Guerric Meurice de Dormale, John Bass, and Jean-Jacques Quisquater. Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --, International Conference on Field Programmable Logic and Applications (FPL 2007), pages 642-647, IEEE Computer Society Press, August 2007 BibTeX

Mark Manulis, and Joerg Schwenk. Provably Secure Framework for Information Aggregation in Sensor Networks, Computational Science and Its Applications - ICCSA 2007, International Conference, Part I, Volume 4705 of Lecture Notes in Computer Science, pages 603-621, Springer, August 2007 BibTeX

September 2007

François-Xavier Standaert, Jean-Jacques Quisquater, and Baudoin Collard. Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent, Inscrypt 2007, Volume 4990 of Lecture Notes in Computer Science, pages 51-65, Springer, September 2007 PDF BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. How can we overcome both side channel analysis and fault attacks on RSA-CRT?, 4th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2007, pages 21-29, IEEE Computer Society Press, September 2007 BibTeX

François Mace, François-Xavier Standaert, and Jean-Jacques Quisquater. Simulation-Based Evaluation of Logic Styles to Counteract Side-Channel Attacks, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Volume 4727 of Lecture Notes in Computer Sciences, pages 427-442, Springer, September 2007 BibTeX

Guerric Meurice de Dormale, Philippe Bulens, and Jean-Jacques Quisquater. Collision Search for Elliptic Curve Discrete Logarithm over GF(2^m) with FPGA, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Volume 4727 of Lecture Notes in Computer Science, pages 378-393, Springer, September 2007 BibTeX

Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Elliptic Curve Factorization Method : Towards Better Exploitation of Reconfigurable Hardware, Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'07), September 2007 PDF BibTeX

October 2007

Emmanuel Bresson, Mark Manulis, and Joerg Schwenk. On Security Models and Compilers for Group Key Exchange Protocols, 2nd International Workshop on Security (IWSEC 2007), Volume 4752 of Lecture Notes in Computer Science, pages 292-307, Springer, October 2007 BibTeX

Nidal Aboudagga, Mohamed Eltoweissy, and Jean-Jacques Quisquater. Group Authentication Protocol for Mobile Networks, In Wimob, pages 28, October 2007, http://doi.ieee BibTeX

Benoit Libert, Jean-Jacques Quisquater, and Moti Yung. Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions, In S. De Capitani di Vimercati and P. Syverson, editor(s), 14th ACM Conference on Computer and Communications Security (ACM CCS'07), pages 266-275, ACM, October 2007 BibTeX

November 2007

Chong Hee Kim, and Jean-Jacques Quisquater. Faults, Injection Methods, and Fault Attacks, In IEEE Design and Test of Computers, Volume 24-6, pages 544-545, November 2007 BibTeX

Iwen Coisel, Sébastien Canard, and Jacques Traoré. Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use, In Willy Susilo, Joseph K. Liu, Yi Mu, editor(s), ProvSec, Volume 4784 of Lecture Notes in Computer Science (LNCS), pages 122 - 137, Springer, November 2007 PDF BibTeX

Nidal Aboudagga, Mohamed Eltoweissy, and Jean-Jacques Quisquater. Two-Level Signature Delegation For Mobile First Responder Authentication, In TrustCol-2007, November 2007 BibTeX

Olivier de Marneffe, Olivier Pereira, and Jean-Jacques Quisquater. Simulation-Based Analysis of E2E Voting Systems, In A. Alkassar and M. Volkamer, editor(s), Proceedings of the First Conference on E-Voting and Identity (VOTE-ID 2007), Volume 4896 of Lecture Notes in Computer Science, pages 137-149, Springer, November 2007 BibTeX

Baudoin Collard, François-Xavier Standaert, and Jean-Jacques Quisquater. Improving the Time Complexity of Matsui's Linear Cryptanalysis, In K.-H. Nam and G. Rhee, editor(s), The International Conference on Information Security and Cryptology - ICISC 2007, Volume 4817 of Lecture Notes in Computer Science, pages 77-88, Springer, November 2007 PDF BibTeX

Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, and Pil Joong Lee. Safe-Error Attack on SPA-FA resistant exponentiations using a HW modular multiplier, The International Conference on Information Security and Cryptology - ICISC 2007, Volume 4817 of Lecture Notes in Computer Science, pages 273 - 281, Springer, November 2007 BibTeX

Copyright Notice

(click here to expand/retract)