Abstract
This paper surveys research jointly with Jean-Jacques Quisquater, primarily the joint work on DES, on exhaustive key search machines, and on information hiding.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bengio, S., Brassard, G., Desmedt, Y., Goutier, C., Quisquater, J.-J.: Aspects and importance of secure implementations of identification systems. Manuscript M209 Philips Research Laboratory (1987); Appeared partially in Journal of Cryptology
Bengio, S., Brassard, G., Desmedt, Y.G., Goutier, C., Quisquater, J.-J.: Secure implementations of identification systems. Journal of Cryptology 4, 175–183 (1991)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology 4, 3–72 (1991)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Davies, D.W.: Some regular properties of the Data Encryption Standard algorithm. In: NPL note 1981, Presented at Crypto 1981 (1981)
Davies, D.W., Price, W.L.: Security for Computer Networks. John Wiley and Sons, New York (1984)
Davio, M., Deschamps, J.-P., Thayse, A.: Discrete and switching functions. McGraw-Hill, New York (1978)
Davio, M., Desmedt, Y., Fosseprez, M., Govaerts, R., Hulsbosch, J., Neutjens, P., Piret, P., Quisquater, J.-J., Vandewalle, J., Wouters, P.: Analytical characteristics of the DES. In: Chaum, D. (ed.) Proc. Crypto 1983, pp. 171–202. Plenum Press, New York (1984)
Davio, M., Desmedt, Y., Goubert, J., Hoornaert, F., Quisquater, J.-J.: Efficient hardware and software implementations for the DES. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 144–146. Springer, Heidelberg (1985)
Desmedt, Y.: A survey of almost 30 years of joint research with Prof. Quisquater. Presented at Jean-Jacques Quisquater Emeritus day, Université Catholique de Louvain, Belgium, (November 26, 2010), http://www.cs.ucl.ac.uk/staff/y.desmedt/slides/JJQ-retirement.pdf
Desmedt, Y.G., Hou, S., Quisquater, J.-J.: Audio and optical cryptography. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 392–404. Springer, Heidelberg (1998)
Desmedt, Y., Le, T.V., Quisquater, J.-J.: Nonbinary audio cryptography. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 392–404. Springer, Heidelberg (2000)
Desmedt, Y., Quisquater, J.-J.: Public key systems based on the difficulty of tampering (Is there a difference between DES and RSA?). In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 111–117. Springer, Heidelberg (1987)
Desmedt, Y.G., Quisquater, J.-J., Davio, M.: Dependence of output on input in DES: Small avalanche characteristics. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 359–376. Springer, Heidelberg (1985)
Desmedt, Y.G., Hou, S., Quisquater, J.-J.: Cerebral cryptography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 62–72. Springer, Heidelberg (1998)
Diffie, W., Hellman, M.E.: Exhaustive cryptanalysis of the NBS Data Encryption Standard. Computer 10, 74–84 (1977)
Dussé, S.R., Kaliski Jr., B.S.: A cryptographic library for the motorola DSP 56000. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 230–244. Springer, Heidelberg (1991)
Gaj, K., Orlowski, A.: Facts and myths of enigma: Breaking stereotypes. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 106–122. Springer, Heidelberg (2003)
Lenstra, A.K., Manassw, M.S.: Factoring by electronic mail. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 355–371. Springer, Heidelberg (1990)
Merillat, P.D.: Secure stand-alone positive personnel identity verification system (SSA-PPIV). Technical Report SAND79–0070 Sandia National Laboratories (March 1979)
Quisquater, J.-J., Delescaille, J.-P.: Other cycling tests for DES. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 255–256. Springer, Heidelberg (1988)
Quisquater, J.-J., Desmedt, Y.G.: Chinese lotto as an exhaustive code-breaking machine. Computer 24, 14–22 (1991)
Quisquater, J.-J., Desmedt, Y.: Watch for the Chinese Loto and the Chinese Dragon. Presented at the rump session of Crypto 1987, Santa Barbara, California (1987)
Quisquater, J.-J., Desmedt, Y.G., Davio, M.: The Importance of Good Key Scheduling Schemes (how to make a secure DES scheme with ≤ 48 bit keys?) In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 537–542. Springer, Heidelberg (1986)
Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210–218. Springer, Heidelberg (1997)
Rouvroy, G., Standaert, F.-X., Quisquater, J.-J., Legat, J.-D.: Efficient uses of FPGAs for implementations of DES and its experimental linear cryptanalysis. IEEE Trans. Computers 52, 473–482 (2003)
Schaumuller-Bichl, I.: Zur analyse des data encryption standard und synthese verwandter chiffriersystems. Master’s thesis Universitat Linz, Austria (1981)
Schaumüller-Bichl, I.: Cryptonalysis of the data encryption standard by the method of formal coding. In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol. 149, pp. 235–255. Springer, Heidelberg (1983)
Shamir, A.: Personal communication during Crypto 1986 (August 1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Desmedt, Y. (2012). A Brief Survey of Research Jointly with Jean-Jacques Quisquater. In: Naccache, D. (eds) Cryptography and Security: From Theory to Applications. Lecture Notes in Computer Science, vol 6805. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28368-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-28368-0_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28367-3
Online ISBN: 978-3-642-28368-0
eBook Packages: Computer ScienceComputer Science (R0)