#### Filter Results:

- Full text PDF available (20)

#### Publication Year

2002

2008

- This year (0)
- Last 5 years (0)
- Last 10 years (1)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
- International Conference on Information…
- 2004

Hardware implementations of the advanced encryption standard (AES) Rijndael algorithm have recently been the object of an intensive evaluation. Several papers describe efficient architectures for ASICs and FPGAs. In this context, the highest effort was devoted to high throughput (up to 20 Gbps) encryption-only designs, fewer works studied low area… (More)

(a) Design methodology. (b) Algorithmic optimization. (c) Implementation schemes. (d) Optimal pipeline.

A cryptanalytic time-memory tradeoff allows the cryptanal-ysis of any N key symmetric cryptosystem in O(N 2 3) operations with O(N 2 3) storage, if a precomputation of O(N) operations has been done in advance. This procedure is well known but did not lead to any realistic implementations. In this paper, the experimental results for the crypt-analysis of DES… (More)

- Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
- IEEE Trans. Computers
- 2003

—In its basic version, linear cryptanalysis is a known-plaintext attack that uses a linear relation between input-bits, output-bits, and key-bits of an encryption algorithm that holds with a certain probability. If enough plaintext-ciphertext pairs are provided, this approximation can be used to assign probabilities to the possible keys and to locate the… (More)

We present a fast involutional block cipher optimized for re-configurable hardware implementations. ICEBERG uses 64-bit text blocks and 128-bit keys. All components are involutional and allow very efficient combinations of encryption/decryption. Hardware implementations of ICEBERG allow to change the key at every clock cycle without any performance loss and… (More)

In 1980, Martin Hellman [1] introduced the concept of crypt-analytic time-memory tradeoffs, which allows the cryptanalysis of any N key symmetric cryptosystem in O(N 2 3) operations with O(N 2 3) storage , provided a precomputation of O(N) is performed beforehand. This procedure is well known but did not lead to realistic implementations. This paper… (More)

- Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy
- AFRICACRYPT
- 2008

This paper presents an updated implementation of the Advanced Encryption Standard (AES) on the recent Xilinx Virtex-5 FP-GAs. We show how a modified slice structure in these reconfigurable hardware devices results in significant improvement of the design efficiency. In particular, a single substitution box of the AES can fit in 8 FPGA slices. We combine… (More)

- François-Xavier Standaert, Eric Peeters, Gaël Rouvroy, Jean-Jacques Quisquater
- Proceedings of the IEEE
- 2006

- François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater
- International Conference on Information…
- 2005

This paper presents FPGA (field programmable gate array) implementations of ICEBERG, a block cipher designed for reconfigurable hardware implementations and presented at FSE 2004. All its components are involutional and allow very efficient combinations of encryption/decryption. The implementations proposed also allow changing the key and encrypt/decrypt… (More)

- Antonin Descampe, François-Olivier Devaux, Gaël Rouvroy, Jean-Didier Legat, Jean-Jacques Quisquater, Benoit M. Macq
- IEEE Trans. Circuits Syst. Video Techn.
- 2006

The image compression standard JPEG 2000 proposes a large set of features, useful for today's multimedia applications. Unfortunately, it is much more complex than older standards. Real-time applications , such as Digital Cinema, require a specific, secure and scalable hardware implementation. In this paper, a decoding scheme is proposed with two main… (More)