Marc Davio
Philips
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Marc Davio.
international cryptology conference | 1984
Marc Davio; Yvo Desmedt; Marc Fosséprez; René Govaerts; Jan Hulsbosch; Patrik Neutjens; Philippe Piret; Jean-Jacques Quisquater; Joos Vandewalle; Pascal Wouters
The necessity to use cryptography in order to protect stored and transmitted data has been recognized in many commercial applications, such as electronic funds transfer (EFT), automated clearinghouses, etc ... (Diffie and Hellman, 1979).
international cryptology conference | 1985
Marc Davio; Yvo Desmedt; Jo Goubert; Frank Hoonaert; Jean-Jacques Quisquater
Importance of DES: NBS, ANSI and ISO (in study) have DES as standards.The available devices or programs have some tedious properties for an extensive use: ? hardware is expensive or slow, and limited, ? software is slow.We describe methods for obtaining efficient hardware and software implementations for the DES, i.e.
international cryptology conference | 1985
Yvo Desmedt; Jean-Jacques Quisquater; Marc Davio
New general properties in the S-boxes were found. Techniques and theorems are presented which allow to evaluate the non-substitution effect in f and the key clustering in DES. Examples are given. Its importance related to the security of DES is discussed.
international cryptology conference | 1986
Jean-Jacques Quisquater; Yvo Desmedt; Marc Davio
In DES the key scheduling scheme uses mainly shift registers. By modifying this key scheduling, conventional cryptosystems can be designed which are, e.g., strong against exhaustive key search attacks (without increasing the key size), or have public key like properties. Other effects obtainable by modifying the key scheduling and their importance are discussed.
theory and application of cryptographic techniques | 1985
Marc Davio; Yvo Desmedt; Jean-Jacques Quisquater
New general properties in the S-boxes were found. Techniques and theorems are presented which allow to evaluate the nonsubstitution effect in f and the key clustering in DES. Examples are given. Its importance related to the security of DES is discussed.
design automation conference | 1985
Peter J. M. van Laarhoven; Emile H. L. Aarts; Marc Davio
PHIPLA, a new algorithm for logic minimization, is presented. The algorithm sets out to find optimal sum-of-products representations for a set of Boolean functions, thus contributing to area minimization of the Programmable Logic Array corresponding to the set of functions. The results of a comparative study of PHIPLA and two other algorithms, SPAM and PRESTOL-II, are presented. From these results it is concluded that PHIPLA generates representations which are competitive with those generated by SPAM and PRESTOL-II, whilst the algorithm is extremely fast for small problems (up to 12 variables).
european design automation conference | 1991
F. Crowet; Marc Davio; C. Dierieck; J. Durieu; G. Louis; Chantal Ykman-Couvreur
PHIFACT is a program to synthesize combinational blocks for performance. This is mainly achieved by design space exploration at logic level. The basic multi-level architecture of the block is gradually constructed during a Boolean phase, where look ahead tools guarantee optimality. During a subsequent local restructuring phase, optimal circuits scattered in subregions of the design space are explored and selected. This is mainly based on a steepest descent method in various directions. Consequently either the complete design space, or selected subregions can be examined. Both progresses are intimately connected, placing PHIFACT in the forefront of logic synthesis tools for performance.<<ETX>>
Archive | 1988
Louis Guillou; Marc Davio; Jean-Jacques Quisquater
RésuméCantonné dans l’analyse de révolution des techniques à clé publique, cet article n’aborde pas du tout l’usage de ces techniques sur les réseaux de communication ou de diffusion. La carte à puce est la seule application partiellement abordée, non pas que la carte soit une application privilégiée, mais parce que la carte apporte une solution sécurisée et efficace à la mémorisation et à l’utilisation de paramètres secrets. Cet article est une rapide synthèse sur l’état de l’art dans le domaine des techniques à clé publique, ce vaste sujet où hasard et redondance jouent les premiers rôles, principalement dans les techniques d’intégrité: identification, authentication, signature.AbstractRestricted to an analysis of technical evolutions, this document does not deal with the use of public keys in communication and broadcasting networks. Smart card is the only application which is partially dealt with, not because it should be an exceptional application, but rather because smart cards are very efficient and very secure for both storing and using secret parameters. This document is a brief synthesis of this large subject where randomness and redundancy play the major roles, mainly in integrity techniques: identification, authentication and signature.
Archive | 1988
Marc Davio; Philippe Societe Civil Gautier; Willem Societe Civi Isphording; Jean-Jacques Quisquater; Herve; Sizabuire
Archive | 1979
Marc Davio; Gery Jean Antoine Bioul