Michaël Quisquater

According to our database1, Michaël Quisquater authored at least 14 papers between 1989 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Fast multipoint evaluation and interpolation of polynomials in the LCH-basis over F<sub>P</sub><sup>r</sup>.
Proceedings of the ISSAC '20: International Symposium on Symbolic and Algebraic Computation, 2020

2018
Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

2015
Deterministic root finding in finite fields.
ACM Commun. Comput. Algebra, 2015

2012
Higher-Order Masking Schemes for S-Boxes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

The Hidden Side of Jean-Jacques Quisquater.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Montgomery's Trick and Fast Implementation of Masked AES.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Secure Multiplicative Masking of Power Functions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2007
Cryptanalysis of White Box DES Implementations.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

2005
Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degree <i>l</i> and order <i>k</i>.
Inf. Process. Lett., 2005

2004
On Multiple Linear Approximations.
Proceedings of the Advances in Cryptology, 2004

2003
A new inequality in discrete Fourier theory.
IEEE Trans. Inf. Theory, 2003

2002
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem.
Proceedings of the Public Key Cryptography, 2002

1989


  Loading...