Search For:

Displaying 1-23 out of 23 total
Memories: A Survey of Their Secure Uses in Smart Cards
Found in: Security in Storage Workshop, International IEEE
By Michael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater
Issue Date:October 2003
pp. 62
Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (identification data, cryptographic key, etc). This is why it is subject to many ...
 
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis
Found in: IEEE Transactions on Computers
By Gaël Rouvroy, Francois-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
Issue Date:April 2003
pp. 473-482
<p><b>Abstract</b>—In its basic version, linear cryptanalysis is a known-plaintext attack that uses a linear relation between input-bits, output-bits, and key-bits of an encryption algorithm that holds with a certain probability. If enoug...
 
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards
Found in: Application-Specific Systems, Architectures and Processors, IEEE International Conference on
By Guerric Meurice de Dormale, Renaud Ambroise, David Bol, Jean-Jacques Quisquater, Jean-Didier Legat
Issue Date:September 2006
pp. 347-353
This paper proposes different low-cost coprocessors for public key authentication on 8-bit smart cards. Elliptic curve cryptography is used for its efficiency per bit of key and the Elliptic Curve Digital Signature Algorithm is chosen. For this functionali...
 
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications
Found in: Information Technology: Coding and Computing, International Conference on
By Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
Issue Date:April 2004
pp. 583
Hardware implementations of the Advanced Encryption Standard (AES) Rijndael algorithm have recently been the object of an intensive evaluation. Several papers describe efficient architectures for ASICs and FPGAs. In this context, the highest effort was dev...
 
Efficient FPGA Implementation of Block Cipher MISTY1
Found in: Parallel and Distributed Processing Symposium, International
By Gael Rouvroy, Francois-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
Issue Date:April 2003
pp. 185b
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algorithms to obtain a set of the next generation of cryptographic primitives. In order to achieve this objective, the project needs to evaluate mathematical se...
 
Enhancing Security in the Memory Management Unit
Found in: EUROMICRO Conference
By Tanguy Gilmont, Jean-Didier Legat, Jean-Jacques Quisquater
Issue Date:September 1999
pp. 1449
We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software privacy. The memory management unit which provides multitasking and virtual memo...
 
SCALPS: Smart Card for Limited Payment Systems
Found in: IEEE Micro
By Jean-François Dhem, Daniel Veithen, Jean-Jacques Quisquater
Issue Date:June 1996
pp. 42-51
Today, many smart card processors are able to perform a 512-bit RSA signature in less than 100 ms. This power is not always necessary. We may reduce the costs (die size) by conceiving a standalone working crypto-processor well suited for some kinds of appl...
 
Faults, Injection Methods, and Fault Attacks
Found in: IEEE Design and Test of Computers
By Chong Hee Kim, Jean-Jacques Quisquater
Issue Date:November 2007
pp. 544-545
In a fault attack, errors are induced during the computation of a cryptographic algorithm, and the faulty results are exploited to extract information about the secret key in embedded systems. Fault attacks can break an unprotected system more quickly than...
 
Two-level signature delegation for mobile first responder authentication
Found in: International Conference on Collaborative Computing: Networking, Applications and Worksharing
By Nidal Aboudagga, Mohamed Eltoweissyy, Jean-Jacques Quisquater
Issue Date:November 2007
pp. 16-23
The deployment of wireless networks is in permanent growth. To exploit their intrinsic mobility advantages, collaborative networks such as first responder networks (FRNs) have recently adopted wireless networking technologies, albiet at a small scale. FRNs...
 
Group Authentication Protocol for Mobile Networks
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Nidal Aboudagga, Jean-Jacques Quisquater, Mohamed Eltoweissy
Issue Date:October 2007
pp. 28
The rapid progress and the wide-spread use of the In- ternet and wireless communications in our professional en- deavors and personal lives are making indispensable the need for ubiquitous authenticated connectivity for both mo- bile individuals and groups...
 
How can we overcome both side channel analysis and fault attacks on RSA-CRT?
Found in: Fault Diagnosis and Tolerance in Cryptography, Workshop on
By Chong Hee Kim, Jean-Jacques Quisquater
Issue Date:September 2007
pp. 21-29
RSA cryptosystem is one of the most widely used algorithms nowadays. However when it is implemented in embedded devices such as smart cards, it can be vulnerable to power analysis attacks and fault attacks. To defeat all known side channel attacks and faul...
 
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Found in: IEEE Transactions on Knowledge and Data Engineering
By Francesc Sebé, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Yves Deswarte, Jean-Jacques Quisquater
Issue Date:August 2008
pp. 1034-1038
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit...
 
On Solving RC5 Challenges with FPGAs
Found in: Field-Programmable Custom Computing Machines, Annual IEEE Symposium on
By Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater
Issue Date:April 2007
pp. 281-282
This work explores a hardware design alternative and a cost assessment of an FPGA-based brute force attack against the challenge RC5-72. The aim is to develop an alternative to software-based solutions for distributed.net. Hardware platforms, particularly ...
   
FPGA Implementations of the ICEBERG Block Cipher
Found in: Information Technology: Coding and Computing, International Conference on
By François-Xavier Standaert, Gilles Piret, Gael Rouvroy, Jean-Jacques Quisquater
Issue Date:April 2005
pp. 556-561
This paper presents FPGA (Field Programmable Gate Array) implementations of ICEBERG, a block cipher designed for reconfigurable hardware implementations and presented at FSE 2004. All its components are involutional and allow very efficient combinations of...
 
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Found in: Information Technology: Coding and Computing, International Conference on
By François-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater
Issue Date:April 2005
pp. 562-567
Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values. As a consequence, the power consumption of the running implementation becomes unpredic...
 
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols
Found in: Computer Security Foundations Workshop, IEEE
By Olivier Pereira, Jean-Jacques Quisquater
Issue Date:June 2004
pp. 16
The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols showed to be flawed at CSFW 2001. Even though the corresponding attacks (or some variants of them) have been rediscovered in several different frameworks, no fixed version of these protoc...
 
SOI Technology for Future High-Performance Smart Cards
Found in: IEEE Micro
By Amaury Nève, Denis Flandre, Jean-Jacques Quisquater
Issue Date:May 2003
pp. 58-67
<p>Chips based on silicon-on-insulator technology meet the tough performance and security requirements presented by smart cards. A test chip manufactured in a fully depleted SOI process incorporates a charge pump and random-number generator, critical...
 
On a New Way to Read Data from Memory
Found in: Security in Storage Workshop, International IEEE
By David Samyde, Sergei Skorobogatov, Ross Anderson, Jean-Jacques Quisquater
Issue Date:December 2002
pp. 65
This paper explains a new family of techniques to extract data from semiconductor memory, without using the read-out circuitry provided for the purpose. What these techniques have in common is the use of semi- invasive probing methods to induce measurable ...
 
A Security Analysis of the Cliques Protocols Suites
Found in: Computer Security Foundations Workshop, IEEE
By Olivier Pereira, Jean-Jacques Quisquater
Issue Date:June 2001
pp. 0073
Abstract: Secure group protocols are not easy to design: this paper will show new attacks found against a protocol suite for sharing key. The method we propose to analyse these protocols is very systematic, and can be applied to numerous protocols of this ...
 
Chinese Lotto as an Exhaustive Code-Breaking Machine
Found in: Computer
By Jean-Jacques Quisquater, Yvo G. Desmedt
Issue Date:November 1991
pp. 14-22
<p>It is demonstrated that some problems can be solved inexpensively using widely distributed computers instead of an expensive supercomputer. This is illustrated by discussing how to make a simple fault-tolerant exhaustive code-breaking machine. The...
 
Authenticated wireless roaming via tunnels: making mobile guests feel at home
Found in: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09)
By Damien Leroy, Francois Koeune, Jean-Jacques Quisquater, Mark Manulis, Olivier Bonaventure
Issue Date:March 2009
pp. 48-54
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals try to keep the service provider role behind the home network and let the fore...
     
Provably authenticated group Diffie-Hellman key exchange
Found in: Proceedings of the 8th ACM conference on Computer and Communications Security (CCS '01)
By David Pointcheval, Emmanuel Bresson, Jean-Jacques Quisquater, Olivier Chevassut
Issue Date:November 2001
pp. 255-264
Group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to provide a pool of players with a shared secret key which may later be used, for example, to achieve multicast message integrity. Over the years, several schemes have been o...
     
On the importance of securing your bins: the garbage-man-in-the-middle attack
Found in: Proceedings of the 4th ACM conference on Computer and communications security (CCS '97)
By Jean-Jacques Quisquater, Marc Joye
Issue Date:April 1997
pp. 135-141
We introduce a new definition of confidentiality. It is demonstrated that this new definition, called prerequisite confidentiality, is more effective than previous definitions.We have developed a modelling scheme that is based upon event systems in order t...
     
 1