Advertisement

Cryptography and Security: From Theory to Applications

Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

  • David Naccache

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6805)

Table of contents

  1. Front Matter
  2. Personal Tributes and Re-visits of Jean-Jacques’s Legacy

    1. Michaël Quisquater
      Pages 1-2
    2. Sebastiaan Indesteege, Bart Preneel
      Pages 13-24
    3. Jean-Claude Bermond, Fahir Ergincan, Michel Syska
      Pages 25-34
  3. Symmetric Cryptography

    1. Jacques Patarin, Benjamin Gittins, Joana Treger
      Pages 67-82
    2. Kenneth G. Paterson, Gaven J. Watson
      Pages 83-107
  4. Asymmetric Cryptography

    1. Olivier Blazy, David Pointcheval
      Pages 108-131
    2. Serge Vaudenay
      Pages 132-142
    3. David Naccache, David Pointcheval
      Pages 143-155
    4. Benoît Libert, Moti Yung
      Pages 156-184
    5. Puwen Wei, Yuliang Zheng, Xiaoyun Wang
      Pages 185-206
    6. Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier
      Pages 207-232
  5. Side Channel Attacks

    1. Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
      Pages 233-247
    2. Benjamin Mounier, Anne-Lise Ribotta, Jacques Fournier, Michel Agoyan, Assia Tria
      Pages 248-264
    3. François-Xavier Standaert, Christophe Petit, Nicolas Veyrat-Charvillon
      Pages 283-299
  6. Hardware and Implementations

    1. Vincent van der Leest, Erik van der Sluis, Geert-Jan Schrijen, Pim Tuyls, Helena Handschuh
      Pages 300-318
    2. Byungchun Chung, Sandra Marcello, Amir-Pasha Mirbaha, David Naccache, Karim Sabeg
      Pages 319-328
    3. Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, Neil Gershenfeld
      Pages 355-363
    4. Jonathan Valamehr, Ted Huffmire, Cynthia Irvine, Ryan Kastner, Çetin Kaya Koç, Timothy Levin et al.
      Pages 364-382
  7. Smart Cards and Information Security

    1. Yves Deswarte, Sébastien Gambs
      Pages 383-404
    2. Guillaume Bouffard, Jean-Louis Lanet
      Pages 405-424
    3. Mike Burmester
      Pages 425-441
    4. Sherman S. M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, Robert H. Deng
      Pages 442-464
  8. As Diverse as Jean-Jacques’ Scientific Interests

    1. Mehdi Tibouchi
      Pages 474-479
    2. Vanessa Gratzer, David Naccache
      Pages 480-483
    3. Edwin Bowden-Peters, Raphael C. -W. Phan, John N. Whitley, David J. Parish
      Pages 484-490
    4. Guillaume Claret, Michaël Mathieu, David Naccache, Guillaume Seguin
      Pages 491-499
  9. Back Matter

About this book

Introduction

This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jacques dedicated his work during his academic career.

Focusing on personal tributes and re-visits of Jean-Jacques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests".

Keywords

biometrics elliptic curves localization privacy public key cryptography security modeling

Editors and affiliations

  • David Naccache
    • 1
  1. 1.Département d’informatiqueÉcole normale supérieureParis Cedex 05France

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-28368-0
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-28367-3
  • Online ISBN 978-3-642-28368-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site