1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | 2019 | 2020 | Latest | Forthcoming
Publications dated 2007
January 2007
Philippe Bulens, Kassem Kalach, François-Xavier Standaert, and Jean-Jacques Quisquater. FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile, January 2007, http://sasc.cry BibTeX
February 2007
Guerric Meurice de Dormale, and Jean-Jacques Quisquater. High-speed Hardware Implementations of Elliptic Curve Cryptography: A Survey, In Journal of Systems Architecture, Special Issue on Embedded Hardware for Cryptosystems, Volume 53-2-3, pages 72-84, February 2007 BibTeX
March 2007
Ilham Hassoune, François Mace, Denis Flandre, and Jean-Didier Legat. Dynamic differential self-timed logic families for robust and low-power security ICs, In INTEGRATION, the VLSI Journal, Volume 40, pages 355-364, March 2007 BibTeX
Ran Canetti, Ling Cheung, Nancy Lynch, and Olivier Pereira. On the Role of Scheduling in Simulation-Based Security, In R. Focardi, editor(s), Proceedings of the 7th International Workshop on Issues in the Theory of Security (WITS 2007), pages 22--37, March 2007 BibTeX
April 2007
Benoit Libert, Jean-Jacques Quisquater, and Moti Yung. Parallel Key-Insulated Public Key Encryption Without Random Oracles, In T. Okamoto and X. Wang, editor(s), Public Key Cryptography 2007 (PKC'07), Volume 4450 of Lecture Notes in Computer Science, pages 298-314, Springer, April 2007 BibTeX
Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware, IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07), pages 197-207, IEEE Computer Society Press, April 2007 PDF BibTeX
Guerric Meurice de Dormale, John Bass, and Jean-Jacques Quisquater. On Solving RC5 Challenges with FPGAs, IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07), pages 281-282, IEEE Computer Society Press, April 2007 BibTeX
May 2007
Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Area and Time Trade-offs for Iterative Modular Division over GF(2^m): Novel Algorithm and Implementations on FPGA, In International Journal of Electronics, Volume 94-5, pages 515-529, May 2007 BibTeX
Chong Hee Kim, and Jean-Jacques Quisquater. Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures, Workshop in Information Security Theory and Practices: Smart cards, Mobile and Ubiquitous computing systems - WISTP 2007, Volume 4462 of Lecture Notes in Computer Science, pages 215-228, Springer-Verlag, May 2007 BibTeX
July 2007
Tadashi Araragi, and Olivier Pereira. Automatic Verification of Simulatability in Security Protocols, In M. Backes and Y. Lakhnech, editor(s), Workshop on Formal and Computational Cryptography - FCC 2007, July 2007, To appear BibTeX
Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, and Olivier Pereira. Compositional Security for Task-PIOAs, In A. Sabelfeld, editor(s), Proceedings of the 20th IEEE Computer Security Foundations Symposium, pages 125-139, IEEE Computer Society Press, July 2007 BibTeX
Emmanuel Bresson, and Mark Manulis. Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust, 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Volume 4610 of Lecture Notes in Computer Science, pages 395-409, Springer Verlag, July 2007 BibTeX
François Mace, François-Xavier Standaert, and Jean-Jacques Quisquater. ASIC Implementations of the Block Cipher SEA for Constrained Applications, Proceedings of the Third International Conference on RFID Security - RFIDSec 2007, pages 103 - 114, July 2007 BibTeX
Benoit Libert, and Jean-Jacques Quisquater. Practical Time Capsule Signatures in the Standard Model from Bilinear Maps, In T. Takagi and T. Okamoto, editor(s), 1st International Conference on Pairing-based Cryptography (Pairing 2007), Volume 4575 of Lecture Notes in Computer Science, pages 23-38, Springer, July 2007 BibTeX
August 2007
Mark Manulis. Provably Secure Group Key Exchange, Christoph Paar, Ahmad-Reza Sadeghi, Joerg Schwenk ed., August 2007 BibTeX
Guerric Meurice de Dormale, John Bass, and Jean-Jacques Quisquater. Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --, International Conference on Field Programmable Logic and Applications (FPL 2007), pages 642-647, IEEE Computer Society Press, August 2007 BibTeX
Mark Manulis, and Joerg Schwenk. Provably Secure Framework for Information Aggregation in Sensor Networks, Computational Science and Its Applications - ICCSA 2007, International Conference, Part I, Volume 4705 of Lecture Notes in Computer Science, pages 603-621, Springer, August 2007 BibTeX
September 2007
François-Xavier Standaert, Jean-Jacques Quisquater, and Baudoin Collard. Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent, Inscrypt 2007, Volume 4990 of Lecture Notes in Computer Science, pages 51-65, Springer, September 2007 PDF BibTeX
Chong Hee Kim, and Jean-Jacques Quisquater. How can we overcome both side channel analysis and fault attacks on RSA-CRT?, 4th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2007, pages 21-29, IEEE Computer Society Press, September 2007 BibTeX
François Mace, François-Xavier Standaert, and Jean-Jacques Quisquater. Simulation-Based Evaluation of Logic Styles to Counteract Side-Channel Attacks, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Volume 4727 of Lecture Notes in Computer Sciences, pages 427-442, Springer, September 2007 BibTeX
Guerric Meurice de Dormale, Philippe Bulens, and Jean-Jacques Quisquater. Collision Search for Elliptic Curve Discrete Logarithm over GF(2^m) with FPGA, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Volume 4727 of Lecture Notes in Computer Science, pages 378-393, Springer, September 2007 BibTeX
Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Elliptic Curve Factorization Method : Towards Better Exploitation of Reconfigurable Hardware, Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'07), September 2007 PDF BibTeX
October 2007
Emmanuel Bresson, Mark Manulis, and Joerg Schwenk. On Security Models and Compilers for Group Key Exchange Protocols, 2nd International Workshop on Security (IWSEC 2007), Volume 4752 of Lecture Notes in Computer Science, pages 292-307, Springer, October 2007 BibTeX
Nidal Aboudagga, Mohamed Eltoweissy, and Jean-Jacques Quisquater. Group Authentication Protocol for Mobile Networks, In Wimob, pages 28, October 2007, http://doi.ieee BibTeX
Benoit Libert, Jean-Jacques Quisquater, and Moti Yung. Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions, In S. De Capitani di Vimercati and P. Syverson, editor(s), 14th ACM Conference on Computer and Communications Security (ACM CCS'07), pages 266-275, ACM, October 2007 BibTeX
November 2007
Chong Hee Kim, and Jean-Jacques Quisquater. Faults, Injection Methods, and Fault Attacks, In IEEE Design and Test of Computers, Volume 24-6, pages 544-545, November 2007 BibTeX
Iwen Coisel, Sébastien Canard, and Jacques Traoré. Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use, In Willy Susilo, Joseph K. Liu, Yi Mu, editor(s), ProvSec, Volume 4784 of Lecture Notes in Computer Science (LNCS), pages 122 - 137, Springer, November 2007 PDF BibTeX
Nidal Aboudagga, Mohamed Eltoweissy, and Jean-Jacques Quisquater. Two-Level Signature Delegation For Mobile First Responder Authentication, In TrustCol-2007, November 2007 BibTeX
Olivier de Marneffe, Olivier Pereira, and Jean-Jacques Quisquater. Simulation-Based Analysis of E2E Voting Systems, In A. Alkassar and M. Volkamer, editor(s), Proceedings of the First Conference on E-Voting and Identity (VOTE-ID 2007), Volume 4896 of Lecture Notes in Computer Science, pages 137-149, Springer, November 2007 BibTeX
Baudoin Collard, François-Xavier Standaert, and Jean-Jacques Quisquater. Improving the Time Complexity of Matsui's Linear Cryptanalysis, In K.-H. Nam and G. Rhee, editor(s), The International Conference on Information Security and Cryptology - ICISC 2007, Volume 4817 of Lecture Notes in Computer Science, pages 77-88, Springer, November 2007 PDF BibTeX
Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, and Pil Joong Lee. Safe-Error Attack on SPA-FA resistant exponentiations using a HW modular multiplier, The International Conference on Information Security and Cryptology - ICISC 2007, Volume 4817 of Lecture Notes in Computer Science, pages 273 - 281, Springer, November 2007 BibTeX