Cryptography and Security: From Theory to Applications

Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

  • David Naccache

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6805)

Table of contents

  1. Front Matter
  2. Personal Tributes and Re-visits of Jean-Jacques’s Legacy

    1. Michaël Quisquater
      Pages 1-2
    2. Sebastiaan Indesteege, Bart Preneel
      Pages 13-24
    3. Jean-Claude Bermond, Fahir Ergincan, Michel Syska
      Pages 25-34
  3. Symmetric Cryptography

    1. Jacques Patarin, Benjamin Gittins, Joana Treger
      Pages 67-82
    2. Kenneth G. Paterson, Gaven J. Watson
      Pages 83-107
  4. Asymmetric Cryptography

    1. Olivier Blazy, David Pointcheval
      Pages 108-131
    2. Serge Vaudenay
      Pages 132-142
    3. David Naccache, David Pointcheval
      Pages 143-155
    4. Benoît Libert, Moti Yung
      Pages 156-184
    5. Puwen Wei, Yuliang Zheng, Xiaoyun Wang
      Pages 185-206
    6. Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier
      Pages 207-232
  5. Side Channel Attacks

    1. Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
      Pages 233-247
    2. Benjamin Mounier, Anne-Lise Ribotta, Jacques Fournier, Michel Agoyan, Assia Tria
      Pages 248-264
    3. François-Xavier Standaert, Christophe Petit, Nicolas Veyrat-Charvillon
      Pages 283-299

About this book

Introduction

This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jacques dedicated his work during his academic career.

Focusing on personal tributes and re-visits of Jean-Jacques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests".

Keywords

biometrics elliptic curves localization privacy public key cryptography security modeling

Editors and affiliations

  • David Naccache
    • 1
  1. 1.Département d’informatiqueÉcole normale supérieureParis Cedex 05France

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-28368-0
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-28367-3
  • Online ISBN 978-3-642-28368-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace