1![Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain](https://www.pdfsearch.io/img/c24d4baf51aa6f20b3c7c96705dce8c3.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2006-05-04 18:26:31
|
---|
2![Exhaustive Key Search of the DES: Updates and Refinements Jean-Jacques Quisquater & Fran¸cois-Xavier Standaert UCL Crypto Group Laboratoire de Micro´electronique Universit´e Catholique de Louvain Exhaustive Key Search of the DES: Updates and Refinements Jean-Jacques Quisquater & Fran¸cois-Xavier Standaert UCL Crypto Group Laboratoire de Micro´electronique Universit´e Catholique de Louvain](https://www.pdfsearch.io/img/268c2a2cd4c08420406acb3268b34e38.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2005-03-13 11:27:25
|
---|
3![Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be](https://www.pdfsearch.io/img/fa597a5d28afbd30b740cd42e372d690.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2006-04-17 02:57:49
|
---|
4![On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards Ryan Zhou, Yu Yu, F-X Standaert, Jean-Jacques Quisquater Brightsight On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards Ryan Zhou, Yu Yu, F-X Standaert, Jean-Jacques Quisquater Brightsight](https://www.pdfsearch.io/img/3978bc0c2efe97a98d70e6813f4d25bb.jpg) | Add to Reading ListSource URL: fc13.ifca.aiLanguage: English - Date: 2013-04-04 03:04:00
|
---|
5![Cryptanalysis of a Verifiably Committed Signature Scheme based on GPS and RSA Julien Cathalo? , Benoˆıt Libert?? and Jean-Jacques Quisquater Universit´e catholique de Louvain Place du LevantLouvain-la-Neuve, B Cryptanalysis of a Verifiably Committed Signature Scheme based on GPS and RSA Julien Cathalo? , Benoˆıt Libert?? and Jean-Jacques Quisquater Universit´e catholique de Louvain Place du LevantLouvain-la-Neuve, B](https://www.pdfsearch.io/img/fb2af3ae1f767a0eec61d109d3443f94.jpg) | Add to Reading ListSource URL: perso.uclouvain.beLanguage: English - Date: 2006-12-14 09:56:49
|
---|
6![On Polynomial Systems Arising from a Weil Descent Christophe Petit? and Jean-Jacques Quisquater?? UCL Crypto Group, Universit´e catholique de Louvain Place du LevantLouvain-la-Neuve (Belgium) On Polynomial Systems Arising from a Weil Descent Christophe Petit? and Jean-Jacques Quisquater?? UCL Crypto Group, Universit´e catholique de Louvain Place du LevantLouvain-la-Neuve (Belgium)](https://www.pdfsearch.io/img/0fad5a970ff759c32517e43f448bec59.jpg) | Add to Reading ListSource URL: www.uclouvain.beLanguage: English - Date: 2012-08-28 09:32:40
|
---|
7![1 IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups Nidal Aboudagga∗ ,Giacomo de Meulenaer∗ , Mohamed Eltoweissy† and Jean-Jacques Quisquater∗ ∗ UCL-Crypto group, Place du Levant 3, 1 1 IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups Nidal Aboudagga∗ ,Giacomo de Meulenaer∗ , Mohamed Eltoweissy† and Jean-Jacques Quisquater∗ ∗ UCL-Crypto group, Place du Levant 3, 1](https://www.pdfsearch.io/img/5a373f7561e0438644801bac07ceb2e6.jpg) | Add to Reading ListSource URL: www.uclouvain.beLanguage: English - Date: 2011-12-14 05:30:34
|
---|
8![Hardware Implementations of a Variant of the Z´ emor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? Giacomo de Meulenaer Christophe Petit and Jean-Jacques Quisquater Hardware Implementations of a Variant of the Z´ emor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? Giacomo de Meulenaer Christophe Petit and Jean-Jacques Quisquater](https://www.pdfsearch.io/img/7adec2f61270e3ca2c9131df5b183aaf.jpg) | Add to Reading ListSource URL: www.uclouvain.beLanguage: English - Date: 2011-12-14 05:30:37
|
---|
9![Published in Journal of Computer Security 5(3):213–223, AUTHENTICATION OF SEQUENCES WITH THE SL2 HASH FUNCTION: APPLICATION TO VIDEO SEQUENCES Jean-Jacques Quisquater Published in Journal of Computer Security 5(3):213–223, AUTHENTICATION OF SEQUENCES WITH THE SL2 HASH FUNCTION: APPLICATION TO VIDEO SEQUENCES Jean-Jacques Quisquater](https://www.pdfsearch.io/img/7679f54f7ee303fc4ef43d6ca4d5be87.jpg) | Add to Reading ListSource URL: joye.site88.netLanguage: English - Date: 2015-09-04 19:44:14
|
---|
10![Fault Attacks on Public Key Elements: Application to DLP-based Schemes Chong-Hee Kim? , Philippe Bulens?? , Christophe Petit? ? ? and Jean-Jacques Quisquater UCL Crypto Group, Universit´e Catholique de Louvain, 3 Place Fault Attacks on Public Key Elements: Application to DLP-based Schemes Chong-Hee Kim? , Philippe Bulens?? , Christophe Petit? ? ? and Jean-Jacques Quisquater UCL Crypto Group, Universit´e Catholique de Louvain, 3 Place](https://www.pdfsearch.io/img/47065588ec7b5745f4921b32b01d9d23.jpg) | Add to Reading ListSource URL: www.uclouvain.beLanguage: English - Date: 2011-12-14 05:30:35
|
---|