Skip to main content

A Brief Survey of Research Jointly with Jean-Jacques Quisquater

  • Chapter

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6805))

Abstract

This paper surveys research jointly with Jean-Jacques Quisquater, primarily the joint work on DES, on exhaustive key search machines, and on information hiding.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bengio, S., Brassard, G., Desmedt, Y., Goutier, C., Quisquater, J.-J.: Aspects and importance of secure implementations of identification systems. Manuscript M209 Philips Research Laboratory (1987); Appeared partially in Journal of Cryptology

    Google Scholar 

  2. Bengio, S., Brassard, G., Desmedt, Y.G., Goutier, C., Quisquater, J.-J.: Secure implementations of identification systems. Journal of Cryptology 4, 175–183 (1991)

    Article  Google Scholar 

  3. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology 4, 3–72 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  4. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Davies, D.W.: Some regular properties of the Data Encryption Standard algorithm. In: NPL note 1981, Presented at Crypto 1981 (1981)

    Google Scholar 

  6. Davies, D.W., Price, W.L.: Security for Computer Networks. John Wiley and Sons, New York (1984)

    Google Scholar 

  7. Davio, M., Deschamps, J.-P., Thayse, A.: Discrete and switching functions. McGraw-Hill, New York (1978)

    MATH  Google Scholar 

  8. Davio, M., Desmedt, Y., Fosseprez, M., Govaerts, R., Hulsbosch, J., Neutjens, P., Piret, P., Quisquater, J.-J., Vandewalle, J., Wouters, P.: Analytical characteristics of the DES. In: Chaum, D. (ed.) Proc. Crypto 1983, pp. 171–202. Plenum Press, New York (1984)

    Google Scholar 

  9. Davio, M., Desmedt, Y., Goubert, J., Hoornaert, F., Quisquater, J.-J.: Efficient hardware and software implementations for the DES. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 144–146. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  10. Desmedt, Y.: A survey of almost 30 years of joint research with Prof. Quisquater. Presented at Jean-Jacques Quisquater Emeritus day, Université Catholique de Louvain, Belgium, (November 26, 2010), http://www.cs.ucl.ac.uk/staff/y.desmedt/slides/JJQ-retirement.pdf

  11. Desmedt, Y.G., Hou, S., Quisquater, J.-J.: Audio and optical cryptography. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 392–404. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Desmedt, Y., Le, T.V., Quisquater, J.-J.: Nonbinary audio cryptography. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 392–404. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Desmedt, Y., Quisquater, J.-J.: Public key systems based on the difficulty of tampering (Is there a difference between DES and RSA?). In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 111–117. Springer, Heidelberg (1987)

    Google Scholar 

  14. Desmedt, Y.G., Quisquater, J.-J., Davio, M.: Dependence of output on input in DES: Small avalanche characteristics. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 359–376. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  15. Desmedt, Y.G., Hou, S., Quisquater, J.-J.: Cerebral cryptography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 62–72. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  16. Diffie, W., Hellman, M.E.: Exhaustive cryptanalysis of the NBS Data Encryption Standard. Computer 10, 74–84 (1977)

    Article  Google Scholar 

  17. Dussé, S.R., Kaliski Jr., B.S.: A cryptographic library for the motorola DSP 56000. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 230–244. Springer, Heidelberg (1991)

    Google Scholar 

  18. Gaj, K., Orlowski, A.: Facts and myths of enigma: Breaking stereotypes. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 106–122. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  19. Lenstra, A.K., Manassw, M.S.: Factoring by electronic mail. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 355–371. Springer, Heidelberg (1990)

    Google Scholar 

  20. Merillat, P.D.: Secure stand-alone positive personnel identity verification system (SSA-PPIV). Technical Report SAND79–0070 Sandia National Laboratories (March 1979)

    Google Scholar 

  21. Quisquater, J.-J., Delescaille, J.-P.: Other cycling tests for DES. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 255–256. Springer, Heidelberg (1988)

    Google Scholar 

  22. Quisquater, J.-J., Desmedt, Y.G.: Chinese lotto as an exhaustive code-breaking machine. Computer 24, 14–22 (1991)

    Article  Google Scholar 

  23. Quisquater, J.-J., Desmedt, Y.: Watch for the Chinese Loto and the Chinese Dragon. Presented at the rump session of Crypto 1987, Santa Barbara, California (1987)

    Google Scholar 

  24. Quisquater, J.-J., Desmedt, Y.G., Davio, M.: The Importance of Good Key Scheduling Schemes (how to make a secure DES scheme with ≤ 48 bit keys?) In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 537–542. Springer, Heidelberg (1986)

    Google Scholar 

  25. Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210–218. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  26. Rouvroy, G., Standaert, F.-X., Quisquater, J.-J., Legat, J.-D.: Efficient uses of FPGAs for implementations of DES and its experimental linear cryptanalysis. IEEE Trans. Computers 52, 473–482 (2003)

    Article  Google Scholar 

  27. Schaumuller-Bichl, I.: Zur analyse des data encryption standard und synthese verwandter chiffriersystems. Master’s thesis Universitat Linz, Austria (1981)

    Google Scholar 

  28. Schaumüller-Bichl, I.: Cryptonalysis of the data encryption standard by the method of formal coding. In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol. 149, pp. 235–255. Springer, Heidelberg (1983)

    Chapter  Google Scholar 

  29. Shamir, A.: Personal communication during Crypto 1986 (August 1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Desmedt, Y. (2012). A Brief Survey of Research Jointly with Jean-Jacques Quisquater. In: Naccache, D. (eds) Cryptography and Security: From Theory to Applications. Lecture Notes in Computer Science, vol 6805. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28368-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28368-0_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28367-3

  • Online ISBN: 978-3-642-28368-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics