Skip to main content
  • Book
  • © 2012

Cryptography and Security: From Theory to Applications

Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

  • High quality selected papers
  • State-of-the-art research
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6805)

Part of the book sub series: Security and Cryptology (LNSC)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 chapters)

  1. Front Matter

  2. Personal Tributes and Re-visits of Jean-Jacques’s Legacy

    1. The Hidden Side of Jean-Jacques Quisquater

      • Michaël Quisquater
      Pages 1-2
    2. DES Collisions Revisited

      • Sebastiaan Indesteege, Bart Preneel
      Pages 13-24
    3. Line Directed Hypergraphs

      • Jean-Claude Bermond, Fahir Ergincan, Michel Syska
      Pages 25-34
  3. Symmetric Cryptography

    1. Increasing Block Sizes Using Feistel Networks: The Example of the AES

      • Jacques Patarin, Benjamin Gittins, Joana Treger
      Pages 67-82
    2. Authenticated-Encryption with Padding: A Formal Security Treatment

      • Kenneth G. Paterson, Gaven J. Watson
      Pages 83-107
  4. Asymmetric Cryptography

    1. Traceable Signature with Stepping Capabilities

      • Olivier Blazy, David Pointcheval
      Pages 108-131
    2. Deniable RSA Signature

      • Serge Vaudenay
      Pages 132-142
    3. Autotomic Signatures

      • David Naccache, David Pointcheval
      Pages 143-155
    4. Fully Forward-Secure Group Signatures

      • Benoît Libert, Moti Yung
      Pages 156-184
    5. Public Key Encryption for the Forgetful

      • Puwen Wei, Yuliang Zheng, Xiaoyun Wang
      Pages 185-206
    6. Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping

      • Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier
      Pages 207-232
  5. Side Channel Attacks

    1. Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems

      • Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
      Pages 233-247
    2. EM Probes Characterisation for Security Analysis

      • Benjamin Mounier, Anne-Lise Ribotta, Jacques Fournier, Michel Agoyan, Assia Tria
      Pages 248-264
    3. Masking with Randomized Look Up Tables

      • François-Xavier Standaert, Christophe Petit, Nicolas Veyrat-Charvillon
      Pages 283-299

About this book

This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests".

Editors and Affiliations

  • Département d’informatique, École normale supérieure, Paris Cedex 05, France

    David Naccache

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access