Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Marc Joye
@inproceedings{DBLP:conf/ctrsa/Joye23, author = {Marc Joye}, editor = {Mike Rosulek}, title = {On-Line/Off-Line DCR-Based Homomorphic Encryption and Applications}, booktitle = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13871}, pages = {115--131}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30872-7\_5}, doi = {10.1007/978-3-031-30872-7\_5}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Joye23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joye23, author = {Marc Joye}, title = {On-Line/Off-Line DCR-based Homomorphic Encryption and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2023}, url = {https://eprint.iacr.org/2023/048}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Joye23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joye23a, author = {Marc Joye}, title = {{TFHE} Public-Key Encryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2023}, url = {https://eprint.iacr.org/2023/603}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joye23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Joye22, author = {Marc Joye}, title = {SoK: Fully Homomorphic Encryption over the [Discretized] Torus}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {661--692}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.661-692}, doi = {10.46586/TCHES.V2022.I4.661-692}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Joye22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Joye022, author = {Marc Joye and Michael Walter}, editor = {Michael Brenner and Anamaria Costache and Kurt Rohloff}, title = {Liberating {TFHE:} Programmable Bootstrapping with General Quotient Polynomials}, booktitle = {Proceedings of the 10th Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, Los Angeles, CA, USA, 7 November 2022}, pages = {1--11}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560827.3563376}, doi = {10.1145/3560827.3563376}, timestamp = {Tue, 08 Nov 2022 16:34:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Joye022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cesar/Joye22, author = {Marc Joye}, editor = {Gurvan le Guernic}, title = {{FHE:} End-to-End Encryption for Everyone (keynote abstract)}, booktitle = {Proceedings of the 29th Computer {\&} Electronics Security Application Rendezvous co-located with the 7th European Cyber Week {(ECW} 2022), Rennes, France, November 15-16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3329}, pages = {11}, publisher = {CEUR-WS.org}, year = {2022}, url = {http://ceur-ws.org/Vol-3329/keynote-02.pdf}, timestamp = {Thu, 04 Jan 2024 17:07:13 +0100}, biburl = {https://dblp.org/rec/conf/cesar/Joye22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/JoyeP22, author = {Marc Joye and Pascal Paillier}, editor = {Shlomi Dolev and Jonathan Katz and Amnon Meisels}, title = {Blind Rotation in Fully Homomorphic Encryption with Extended Keys}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13301}, pages = {1--18}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07689-3\_1}, doi = {10.1007/978-3-031-07689-3\_1}, timestamp = {Fri, 24 Jun 2022 18:23:22 +0200}, biburl = {https://dblp.org/rec/conf/cscml/JoyeP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joye22, author = {Marc Joye}, title = {On NTRU-{\(\nu\)}-um Modulo X\({}^{\mbox{N}}\) {\^{a}}{\^{}}' 1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1092}, year = {2022}, url = {https://eprint.iacr.org/2022/1092}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joye22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joye022, author = {Marc Joye and Michael Walter}, title = {Liberating {TFHE:} Programmable Bootstrapping with General Quotient Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2022}, url = {https://eprint.iacr.org/2022/1177}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joye022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/JoyeLNN20, author = {Marc Joye and Oleksandra Lapiha and Ky Nguyen and David Naccache}, title = {The Eleventh Power Residue Symbol}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {111--122}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0077}, doi = {10.1515/JMC-2020-0077}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/JoyeLNN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Joye21, author = {Marc Joye}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Balanced Non-adjacent Forms}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, pages = {553--576}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4\_19}, doi = {10.1007/978-3-030-92078-4\_19}, timestamp = {Fri, 03 Dec 2021 17:36:40 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Joye21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/ChillottiJP21, author = {Ilaria Chillotti and Marc Joye and Pascal Paillier}, editor = {Shlomi Dolev and Oded Margalit and Benny Pinkas and Alexander A. Schwarzmann}, title = {Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks}, booktitle = {Cyber Security Cryptography and Machine Learning - 5th International Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12716}, pages = {1--19}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78086-9\_1}, doi = {10.1007/978-3-030-78086-9\_1}, timestamp = {Mon, 03 Jan 2022 22:32:47 +0100}, biburl = {https://dblp.org/rec/conf/cscml/ChillottiJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiJP21, author = {Ilaria Chillotti and Marc Joye and Pascal Paillier}, title = {Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2021}, url = {https://eprint.iacr.org/2021/091}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierGJN21, author = {Eric Brier and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Marc Joye and David Naccache}, title = {Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1106}, year = {2021}, url = {https://eprint.iacr.org/2021/1106}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierGJN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joye21, author = {Marc Joye}, title = {Balanced Non-Adjacent Forms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1161}, year = {2021}, url = {https://eprint.iacr.org/2021/1161}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joye21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joye21a, author = {Marc Joye}, title = {Guide to Fully Homomorphic Encryption over the [Discretized] Torus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1402}, year = {2021}, url = {https://eprint.iacr.org/2021/1402}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Joye21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BrierFJN20, author = {{\'{E}}ric Brier and Houda Ferradi and Marc Joye and David Naccache}, title = {New number-theoretic cryptographic primitives}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {224--235}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0035}, doi = {10.1515/JMC-2019-0035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BrierFJN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Joye20, author = {Marc Joye}, title = {Protecting {ECC} Against Fault Attacks: The Ring Extension Method Revisited}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {254--267}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0030}, doi = {10.1515/JMC-2019-0030}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Joye20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DattaJF19, author = {Amit Datta and Marc Joye and Nadia Fawaz}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Private Data Aggregation over Selected Subsets of Users}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {375--391}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_21}, doi = {10.1007/978-3-030-31578-8\_21}, timestamp = {Thu, 17 Mar 2022 14:41:28 +0100}, biburl = {https://dblp.org/rec/conf/cans/DattaJF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JoyeP19, author = {Marc Joye and Fabien A. P. Petitcolas}, editor = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and Guillermo Navarro{-}Arribas and Alex Biryukov and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {{PINFER:} Privacy-Preserving Inference - Logistic Regression, Support Vector Machines, and More, over Encrypted Data}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2019 International Workshops, {DPM} 2019 and {CBT} 2019, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11737}, pages = {3--21}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31500-9\_1}, doi = {10.1007/978-3-030-31500-9\_1}, timestamp = {Mon, 05 Feb 2024 20:29:40 +0100}, biburl = {https://dblp.org/rec/conf/esorics/JoyeP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-01865, author = {Marc Joye and Fabien A. P. Petitcolas}, title = {{PINFER:} Privacy-Preserving Inference for Machine Learning}, journal = {CoRR}, volume = {abs/1910.01865}, year = {2019}, url = {http://arxiv.org/abs/1910.01865}, eprinttype = {arXiv}, eprint = {1910.01865}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-01865.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierFJN19, author = {Eric Brier and Houda Ferradi and Marc Joye and David Naccache}, title = {New Number-Theoretic Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2019}, url = {https://eprint.iacr.org/2019/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierFJN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joye19, author = {Marc Joye}, title = {Protecting {ECC} Against Fault Attacks: The Ring Extension Method Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2019}, url = {https://eprint.iacr.org/2019/495}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joye19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeLNN19, author = {Marc Joye and Oleksandra Lapiha and Ky Nguyen and David Naccache}, title = {The Eleventh Power Residue Symbol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {870}, year = {2019}, url = {https://eprint.iacr.org/2019/870}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeLNN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joye19a, author = {Marc Joye}, title = {Evaluating Octic Residue Symbols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1196}, year = {2019}, url = {https://eprint.iacr.org/2019/1196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joye19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GiacomelliJJPY18, author = {Irene Giacomelli and Somesh Jha and Marc Joye and C. David Page and Kyonghwan Yoon}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {243--261}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_13}, doi = {10.1007/978-3-319-93387-0\_13}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/GiacomelliJJPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JoyeM18, author = {Marc Joye and Yan Michalevsky}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Daniel E. Holcomb and Jorge Guajardo}, title = {{RSA} Signatures Under Hardware Restrictions}, booktitle = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {51--54}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3266444.3266451}, doi = {10.1145/3266444.3266451}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JoyeM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AmbroseBFJLM18, author = {Christopher Ambrose and Joppe W. Bos and Bj{\"{o}}rn Fay and Marc Joye and Manfred Lochter and Bruce Murray}, editor = {Nigel P. Smart}, title = {Differential Attacks on Deterministic Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {339--353}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_18}, doi = {10.1007/978-3-319-76953-0\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AmbroseBFJLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JoyeS18, author = {Marc Joye and Fariborz Salehi}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Private yet Efficient Decision Tree Evaluation}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {243--259}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_16}, doi = {10.1007/978-3-319-95729-6\_16}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JoyeS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MichalevskyJ18, author = {Yan Michalevsky and Marc Joye}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Decentralized Policy-Hiding {ABE} with Receiver Privacy}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {548--567}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_27}, doi = {10.1007/978-3-319-98989-1\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MichalevskyJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/JoyeP18, author = {Marc Joye and Alain Passel{\`{e}}gue}, editor = {Dario Catalano and Roberto De Prisco}, title = {Function-Revealing Encryption - Definitions and Constructions}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {527--543}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_28}, doi = {10.1007/978-3-319-98113-0\_28}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/JoyeP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-00125, author = {Fabrice Benhamouda and Marc Joye}, title = {How to Profile Privacy-Conscious Users in Recommender Systems}, journal = {CoRR}, volume = {abs/1812.00125}, year = {2018}, url = {http://arxiv.org/abs/1812.00125}, eprinttype = {arXiv}, eprint = {1812.00125}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-00125.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MichalevskyJ18, author = {Yan Michalevsky and Marc Joye}, title = {Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2018}, url = {https://eprint.iacr.org/2018/753}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MichalevskyJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeM18, author = {Marc Joye and Yan Michalevsky}, title = {{RSA} Signatures Under Hardware Restrictions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {878}, year = {2018}, url = {https://eprint.iacr.org/2018/878}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BenhamoudaHJL17, author = {Fabrice Benhamouda and Javier Herranz and Marc Joye and Beno{\^{\i}}t Libert}, title = {Efficient Cryptosystems From 2\({}^{\mbox{k}}\)-th Power Residue Symbols}, journal = {J. Cryptol.}, volume = {30}, number = {2}, pages = {519--549}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9229-5}, doi = {10.1007/S00145-016-9229-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BenhamoudaHJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Joye17, author = {Marc Joye}, title = {Cryptanalysis of a Privacy-Preserving Aggregation Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {693--694}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2519889}, doi = {10.1109/TDSC.2016.2519889}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Joye17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JoyeL17, author = {Marc Joye and Beno{\^{\i}}t Libert}, editor = {Helena Handschuh}, title = {Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {19--35}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_2}, doi = {10.1007/978-3-319-52153-4\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JoyeL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2017, editor = {Marc Joye and Abderrahmane Nitaj}, title = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10239}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57339-7}, doi = {10.1007/978-3-319-57339-7}, isbn = {978-3-319-57338-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joye17, author = {Marc Joye}, title = {Privacy-Preserving Ridge Regression Without Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {732}, year = {2017}, url = {http://eprint.iacr.org/2017/732}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joye17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmbroseBFJLM17, author = {Christopher Ambrose and Joppe W. Bos and Bj{\"{o}}rn Fay and Marc Joye and Manfred Lochter and Bruce Murray}, title = {Differential Attacks on Deterministic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {975}, year = {2017}, url = {http://eprint.iacr.org/2017/975}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmbroseBFJLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiacomelliJJPY17, author = {Irene Giacomelli and Somesh Jha and Marc Joye and C. David Page and Kyonghwan Yoon}, title = {Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {979}, year = {2017}, url = {http://eprint.iacr.org/2017/979}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiacomelliJJPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GoundarJ16, author = {Raveen R. Goundar and Marc Joye}, title = {Inversion-free arithmetic on elliptic curves through isomorphisms}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {187--199}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0131-8}, doi = {10.1007/S13389-016-0131-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GoundarJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LibertJY16, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung}, title = {Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares}, journal = {Theor. Comput. Sci.}, volume = {645}, pages = {1--24}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2016.02.031}, doi = {10.1016/J.TCS.2016.02.031}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/LibertJY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BenhamoudaJL16, author = {Fabrice Benhamouda and Marc Joye and Beno{\^{\i}}t Libert}, title = {A New Framework for Privacy-Preserving Aggregation of Time-Series Data}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {3}, pages = {10:1--10:21}, year = {2016}, url = {https://doi.org/10.1145/2873069}, doi = {10.1145/2873069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BenhamoudaJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Joye16, author = {Marc Joye}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Secure ElGamal-Type Cryptosystems Without Message Encoding}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {470--478}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_29}, doi = {10.1007/978-3-662-49301-4\_29}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Joye16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Joye16, author = {Marc Joye}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Identity-Based Cryptosystems and Quadratic Residuosity}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {225--254}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_9}, doi = {10.1007/978-3-662-49384-7\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Joye16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeP16, author = {Marc Joye and Alain Passel{\`{e}}gue}, title = {Practical Trade-Offs for Multi-Input Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2016}, url = {http://eprint.iacr.org/2016/622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TunstallJ15, author = {Michael Tunstall and Marc Joye}, title = {The distributions of individual bits in the output of multiplicative operations}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {71--90}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0110-9}, doi = {10.1007/S12095-014-0110-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TunstallJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LibertPJY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Linearly homomorphic structure-preserving signatures and their applications}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {441--477}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0079-1}, doi = {10.1007/S10623-015-0079-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LibertPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LibertPJY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound {QA-NIZK} Proofs and Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {681--707}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_28}, doi = {10.1007/978-3-662-48797-6\_28}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LibertPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertJYP15, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung and Thomas Peters}, editor = {Jonathan Katz}, title = {Secure Efficient History-Hiding Append-Only Signatures in the Standard Model}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {450--473}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_20}, doi = {10.1007/978-3-662-46447-2\_20}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertJYP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Joye15, author = {Marc Joye}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {A Key-private Cryptosystem from the Quadratic Residuosity}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {398--404}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005569703980404}, doi = {10.5220/0005569703980404}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Joye15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2014, editor = {Marc Joye and Amir Moradi}, title = {Smart Card Research and Advanced Applications - 13th International Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8968}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16763-3}, doi = {10.1007/978-3-319-16763-3}, isbn = {978-3-319-16762-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPJY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound {QA-NIZK} Proofs and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2015}, url = {http://eprint.iacr.org/2015/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LibertJYP14, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung and Thomas Peters}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {1--21}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_1}, doi = {10.1007/978-3-662-45608-8\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LibertJYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/KarroumiRJ14, author = {Mohamed Karroumi and Benjamin Richard and Marc Joye}, editor = {Emmanuel Prouff}, title = {Addition with Blinded Operands}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {41--55}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_4}, doi = {10.1007/978-3-319-10175-0\_4}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/KarroumiRJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LibertJ14, author = {Beno{\^{\i}}t Libert and Marc Joye}, editor = {Josh Benaloh}, title = {Group Signatures with Message-Dependent Opening in the Standard Model}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {286--306}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_15}, doi = {10.1007/978-3-319-04852-9\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/LibertJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertPJY14, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {514--532}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_29}, doi = {10.1007/978-3-642-55220-5\_29}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertPJY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertYJP14, author = {Beno{\^{\i}}t Libert and Moti Yung and Marc Joye and Thomas Peters}, editor = {Hugo Krawczyk}, title = {Traceable Group Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {592--610}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_34}, doi = {10.1007/978-3-642-54631-0\_34}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertYJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/LibertJY13, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Shlomi Dolev}, title = {Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares}, booktitle = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '14, Paris, France, July 15-18, 2014}, pages = {303--312}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611462.2611498}, doi = {10.1145/2611462.2611498}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/LibertJY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertJYP14, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung and Thomas Peters}, title = {Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2014}, url = {http://eprint.iacr.org/2014/743}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertJYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AimaniJ13, author = {Laila El Aimani and Marc Joye}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Toward Practical Group Encryption}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {237--252}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_15}, doi = {10.1007/978-3-642-38980-1\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AimaniJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cai/Joye13, author = {Marc Joye}, editor = {Traian Muntean and Dimitrios Poulakis and Robert Rolland}, title = {On Elliptic Curve Paillier Schemes}, booktitle = {Algebraic Informatics - 5th International Conference, {CAI} 2013, Porquerolles, France, September 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8080}, pages = {6}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40663-8\_3}, doi = {10.1007/978-3-642-40663-8\_3}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cai/Joye13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NikolaenkoIWJTB13, author = {Valeria Nikolaenko and Stratis Ioannidis and Udi Weinsberg and Marc Joye and Nina Taft and Dan Boneh}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Privacy-preserving matrix factorization}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {801--812}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516751}, doi = {10.1145/2508859.2516751}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NikolaenkoIWJTB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertPJY13, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Ran Canetti and Juan A. Garay}, title = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {289--307}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_17}, doi = {10.1007/978-3-642-40084-1\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertPJY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JoyeL13, author = {Marc Joye and Beno{\^{\i}}t Libert}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Efficient Cryptosystems from 2\({}^{\mbox{ \emph{k} }}\)-th Power Residue Symbols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {76--92}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_5}, doi = {10.1007/978-3-642-38348-9\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JoyeL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JoyeL13, author = {Marc Joye and Beno{\^{\i}}t Libert}, editor = {Ahmad{-}Reza Sadeghi}, title = {A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {111--125}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_10}, doi = {10.1007/978-3-642-39884-1\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JoyeL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/Joye13, author = {Marc Joye}, editor = {Wieland Fischer and J{\"{o}}rn{-}Marc Schmidt}, title = {Elliptic Curve Cryptosystems in the Presence of Faults}, booktitle = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013}, pages = {73}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FDTC.2013.10}, doi = {10.1109/FDTC.2013.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/Joye13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NikolaenkoWIJBT13, author = {Valeria Nikolaenko and Udi Weinsberg and Stratis Ioannidis and Marc Joye and Dan Boneh and Nina Taft}, title = {Privacy-Preserving Ridge Regression on Hundreds of Millions of Records}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {334--348}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.30}, doi = {10.1109/SP.2013.30}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/NikolaenkoWIJBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPJY13, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2013}, url = {http://eprint.iacr.org/2013/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPJY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeL13, author = {Marc Joye and Beno{\^{\i}}t Libert}, title = {Efficient Cryptosystems From 2\({}^{\mbox{k}}\)-th Power Residue Symbols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2013}, url = {http://eprint.iacr.org/2013/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPJY13a, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2013}, url = {http://eprint.iacr.org/2013/691}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPJY13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Joye12, author = {Marc Joye}, editor = {David Naccache}, title = {On Quisquater's Multiplication Algorithm}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {3--7}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_2}, doi = {10.1007/978-3-642-28368-0\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Joye12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JoyeL12, author = {Marc Joye and Tancr{\`{e}}de Lepoint}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Partial Key Exposure on {RSA} with Private Exponents Larger Than {N}}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {369--380}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_25}, doi = {10.1007/978-3-642-29101-2\_25}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/JoyeL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Joye12, author = {Marc Joye}, title = {A Method for Preventing "Skipping" Attacks}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {12--15}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.14}, doi = {10.1109/SPW.2012.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Joye12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/364229655, editor = {Marc Joye and Michael Tunstall}, title = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7}, doi = {10.1007/978-3-642-29656-7}, isbn = {978-3-642-29655-0}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/364229655.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AimaniJ12, author = {Laila El Aimani and Marc Joye}, title = {Toward Practical Group Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2012}, url = {http://eprint.iacr.org/2012/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AimaniJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Joye11, author = {Marc Joye}, title = {How (Not) to design strong-RSA signatures}, journal = {Des. Codes Cryptogr.}, volume = {59}, number = {1-3}, pages = {169--182}, year = {2011}, url = {https://doi.org/10.1007/s10623-010-9453-1}, doi = {10.1007/S10623-010-9453-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Joye11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimSRPJ11, author = {Jongsung Kim and Jaechul Sung and Ermaliza Razali and Raphael C.{-}W. Phan and Marc Joye}, title = {Notions and relations for RKA-secure permutation and function families}, journal = {Des. Codes Cryptogr.}, volume = {60}, number = {1}, pages = {15--35}, year = {2011}, url = {https://doi.org/10.1007/s10623-010-9414-8}, doi = {10.1007/S10623-010-9414-8}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/KimSRPJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GoundarJMRV11, author = {Raveen R. Goundar and Marc Joye and Atsuko Miyaji and Matthieu Rivain and Alexandre Venelli}, title = {Scalar multiplication on Weierstra{\ss} elliptic curves from Co-\emph{Z} arithmetic}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {2}, pages = {161--176}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0012-0}, doi = {10.1007/S13389-011-0012-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GoundarJMRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/HutterJS11, author = {Michael Hutter and Marc Joye and Yannick Sierra}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-\emph{Z} Coordinate Representation}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {170--187}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_11}, doi = {10.1007/978-3-642-21969-6\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/HutterJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/JoyeK11, author = {Marc Joye and Mohamed Karroumi}, editor = {Emmanuel Prouff}, title = {Memory-Efficient Fault Countermeasures}, booktitle = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7079}, pages = {84--101}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27257-8\_6}, doi = {10.1007/978-3-642-27257-8\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/JoyeK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DevigneJ11, author = {Julien Devigne and Marc Joye}, editor = {Aggelos Kiayias}, title = {Binary Huff Curves}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {340--355}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_22}, doi = {10.1007/978-3-642-19074-2\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DevigneJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JoyeL11, author = {Marc Joye and Tancr{\`{e}}de Lepoint}, editor = {Yan Chen and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Traitor tracing schemes for protected software implementations}, booktitle = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011}, pages = {15--22}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046631.2046636}, doi = {10.1145/2046631.2046636}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/JoyeL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infosechicomnet/2011, editor = {Marc Joye and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7011}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24586-2}, doi = {10.1007/978-3-642-24586-2}, isbn = {978-3-642-24585-5}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosechicomnet/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/JoyeO11, author = {Marc Joye and Francis Olivier}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Side-Channel Analysis}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1198--1204}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_516}, doi = {10.1007/978-1-4419-5906-5\_516}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/JoyeO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/JoyeTV10, author = {Marc Joye and Mehdi Tibouchi and Damien Vergnaud}, editor = {Guillaume Hanrot and Fran{\c{c}}ois Morain and Emmanuel Thom{\'{e}}}, title = {Huff's Model for Elliptic Curves}, booktitle = {Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6197}, pages = {234--250}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14518-6\_20}, doi = {10.1007/978-3-642-14518-6\_20}, timestamp = {Thu, 14 Oct 2021 10:35:26 +0200}, biburl = {https://dblp.org/rec/conf/ants/JoyeTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/JoyeNP10, author = {Marc Joye and David Naccache and St{\'{e}}phanie Porte}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {The Polynomial Composition Problem in (Z/\emph{n}Z)[\emph{X}]}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {1--12}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_1}, doi = {10.1007/978-3-642-12510-2\_1}, timestamp = {Sat, 30 May 2020 20:05:42 +0200}, biburl = {https://dblp.org/rec/conf/cardis/JoyeNP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoundarJM10, author = {Raveen R. Goundar and Marc Joye and Atsuko Miyaji}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Co-\emph{Z} Addition Formul{\ae} and Binary Ladders on Elliptic Curves - (Extended Abstract)}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {65--79}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_5}, doi = {10.1007/978-3-642-15031-9\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GoundarJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TunstallJ10, author = {Michael Tunstall and Marc Joye}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Coordinate Blinding over Large Prime Fields}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {443--455}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_30}, doi = {10.1007/978-3-642-15031-9\_30}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/TunstallJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FarashahiJ10, author = {Reza Rezaeian Farashahi and Marc Joye}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Efficient Arithmetic on Hessian Curves}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {243--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_15}, doi = {10.1007/978-3-642-13013-7\_15}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FarashahiJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2010, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1866870}, isbn = {978-1-4503-0091-9}, timestamp = {Wed, 28 Mar 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2010, editor = {Luca Breveglieri and Marc Joye and Israel Koren and David Naccache and Ingrid Verbauwhede}, title = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2010, Santa Barbara, California, USA, 21 August 2010}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5575321/proceeding}, isbn = {978-0-7695-4169-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pairing/2010, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1}, doi = {10.1007/978-3-642-17455-1}, isbn = {978-3-642-17454-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoundarJM10, author = {Raveen R. Goundar and Marc Joye and Atsuko Miyaji}, title = {Co-Z Addition Formulae and Binary Ladders on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2010}, url = {http://eprint.iacr.org/2010/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoundarJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeTV10, author = {Marc Joye and Mehdi Tibouchi and Damien Vergnaud}, title = {Huff's Model for Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2010}, url = {http://eprint.iacr.org/2010/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/AtenieseCJT09, author = {Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik}, title = {Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {320--322}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028030}, doi = {10.1504/IJACT.2009.028030}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/AtenieseCJT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/JoyeT09, author = {Marc Joye and Michael Tunstall}, editor = {Bart Preneel}, title = {Exponent Recoding and Regular Exponentiation Algorithms}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {334--349}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_21}, doi = {10.1007/978-3-642-02384-2\_21}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/JoyeT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Joye09, author = {Marc Joye}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {On Cryptographic Schemes Based on Discrete Logarithms and Factoring}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {41--52}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_3}, doi = {10.1007/978-3-642-10433-6\_3}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/Joye09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/AlessioJ09, author = {Davide Alessio and Marc Joye}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {A simple construction for public-key encryption with revocable anonymity: the honest-sender case}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {11--16}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655051}, doi = {10.1145/1655048.1655051}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/AlessioJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/Joye09, author = {Marc Joye}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Elisabeth Oswald and Jean{-}Pierre Seifert}, title = {Protecting {RSA} against Fault Attacks: The Embedding Method}, booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2009, Lausanne, Switzerland, 6 September 2009}, pages = {41--45}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FDTC.2009.32}, doi = {10.1109/FDTC.2009.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/Joye09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Chevallier-MamesJ09, author = {Beno{\^{\i}}t Chevallier{-}Mames and Marc Joye}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Chosen-Ciphertext Secure RSA-Type Cryptosystems}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {32--46}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_5}, doi = {10.1007/978-3-642-04642-1\_5}, timestamp = {Sun, 02 Jun 2019 21:26:38 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Chevallier-MamesJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Joye09, author = {Marc Joye}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Highly Regular \emph{m}-Ary Powering Ladders}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {350--363}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_22}, doi = {10.1007/978-3-642-05445-7\_22}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Joye09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Joye09, author = {Marc Joye}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Basics of Side-Channel Analysis}, booktitle = {Cryptographic Engineering}, pages = {365--380}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_13}, doi = {10.1007/978-0-387-71817-0\_13}, timestamp = {Tue, 26 Jun 2018 16:12:55 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Joye09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:series/ciss/2009-2, editor = {Marc Joye and Gregory Neven}, title = {Identity-Based Cryptography}, series = {Cryptology and Information Security Series}, volume = {2}, publisher = {{IOS} Press}, year = {2009}, url = {http://ebooks.iospress.nl/volume/identity-based-cryptography}, isbn = {978-1-58603-947-9}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ciss/2009-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chevallier-MamesJ09, author = {Beno{\^{\i}}t Chevallier{-}Mames and Marc Joye}, title = {Chosen-Ciphertext Secure RSA-type Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2009}, url = {http://eprint.iacr.org/2009/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chevallier-MamesJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BernsteinBJLP08, author = {Daniel J. Bernstein and Peter Birkner and Marc Joye and Tanja Lange and Christiane Peters}, editor = {Serge Vaudenay}, title = {Twisted Edwards Curves}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {389--405}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_26}, doi = {10.1007/978-3-540-68164-9\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BernsteinBJLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/DurandJK08, author = {Alain Durand and Marc Joye and Mohamed Karroumi}, title = {Laundering and Repackaging of Multimedia Content in Content Distribution Systems}, booktitle = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008}, pages = {1344--1351}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/APSCC.2008.129}, doi = {10.1109/APSCC.2008.129}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/DurandJK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Joye08, author = {Marc Joye}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {An Efficient On-Line/Off-Line Signature Scheme without Random Oracles}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {98--107}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_7}, doi = {10.1007/978-3-540-89641-8\_7}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/Joye08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/Joye08, author = {Marc Joye}, editor = {Luca Breveglieri and Shay Gueron and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {On the Security of a Unified Countermeasure}, booktitle = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008}, pages = {87--91}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FDTC.2008.8}, doi = {10.1109/FDTC.2008.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/Joye08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Joye08, author = {Marc Joye}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {{RSA} Moduli with a Predetermined Portion: Techniques and Applications}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {116--130}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_9}, doi = {10.1007/978-3-540-79104-1\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Joye08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/Joye08, author = {Marc Joye}, editor = {Joachim von zur Gathen and Jos{\'{e}} Luis Ima{\~{n}}a and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Fast Point Multiplication on Elliptic Curves without Precomputation}, booktitle = {Arithmetic of Finite Fields, 2nd International Workshop, {WAIFI} 2008, Siena, Italy, July 6-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5130}, pages = {36--46}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69499-1\_4}, doi = {10.1007/978-3-540-69499-1\_4}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/waifi/Joye08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2008, editor = {Gregory L. Heileman and Marc Joye}, title = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-290-0}, timestamp = {Tue, 11 Nov 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBJLP08, author = {Daniel J. Bernstein and Peter Birkner and Marc Joye and Tanja Lange and Christiane Peters}, title = {Twisted Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2008}, url = {http://eprint.iacr.org/2008/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBJLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/JoyeMR07, author = {Marc Joye and Pascal Manet and Jean{-}Baptiste Rigaud}, title = {Strengthening hardware {AES} implementations against fault attacks}, journal = {{IET} Inf. Secur.}, volume = {1}, number = {3}, pages = {106--110}, year = {2007}, url = {https://doi.org/10.1049/iet-ifs:20060163}, doi = {10.1049/IET-IFS:20060163}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/JoyeMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Joye07, author = {Marc Joye}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Highly Regular Right-to-Left Algorithms for Scalar Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {135--147}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_10}, doi = {10.1007/978-3-540-74735-2\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Joye07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Chevallier-MamesJ07, author = {Beno{\^{\i}}t Chevallier{-}Mames and Marc Joye}, editor = {Masayuki Abe}, title = {A Practical and Tightly Secure Signature Scheme Without Hash Function}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {339--356}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_22}, doi = {10.1007/11967668\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Chevallier-MamesJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/MassoudiLJ07, author = {Ayoub Massoudi and Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and Marc Joye}, title = {Cryptanalysis of a Video Scrambling Based on Space Filling Curves}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {1683--1686}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4284992}, doi = {10.1109/ICME.2007.4284992}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/MassoudiLJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/RazaliPJ07, author = {Ermaliza Razali and Raphael C.{-}W. Phan and Marc Joye}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {On the Notions of {PRP} - {RKA} , {KR} and {KR} - {RKA} for Block Ciphers}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {188--197}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_13}, doi = {10.1007/978-3-540-75670-5\_13}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/RazaliPJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JoyeT07, author = {Marc Joye and Michael Tunstall}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {Securing OpenSSL against Micro-Architectural Attacks}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {189--196}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JoyeT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CietJLM06, author = {Mathieu Ciet and Marc Joye and Kristin E. Lauter and Peter L. Montgomery}, title = {Trading Inversions for Multiplications in Elliptic Curve Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {189--206}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3299-y}, doi = {10.1007/S10623-005-3299-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CietJLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyeP06, author = {Marc Joye and Pascal Paillier}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Fast Generation of Prime Numbers on Portable Devices: An Update}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {160--173}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_13}, doi = {10.1007/11894063\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyeP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/JoyeL06, author = {Marc Joye and Hung{-}Mei Lin}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {On the {TYS} Signature Scheme}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {338--344}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_37}, doi = {10.1007/11751595\_37}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/JoyeL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseCJT06, author = {Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik}, title = {Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2006}, url = {http://eprint.iacr.org/2006/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseCJT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CietJ05, author = {Mathieu Ciet and Marc Joye}, title = {Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {1}, pages = {33--43}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-1160-8}, doi = {10.1007/S10623-003-1160-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CietJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyePS05, author = {Marc Joye and Pascal Paillier and Berry Schoenmakers}, editor = {Josyula R. Rao and Berk Sunar}, title = {On Second-Order Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {293--308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_22}, doi = {10.1007/11545262\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyePS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/JoyeO05, author = {Marc Joye and Francis Olivier}, editor = {Henk C. A. van Tilborg}, title = {Side-Channel Analysis}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_394}, doi = {10.1007/0-387-23483-7\_394}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/JoyeO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Chevallier-MamesCJ04, author = {Beno{\^{\i}}t Chevallier{-}Mames and Mathieu Ciet and Marc Joye}, title = {Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity}, journal = {{IEEE} Trans. Computers}, volume = {53}, number = {6}, pages = {760--768}, year = {2004}, url = {https://doi.org/10.1109/TC.2004.13}, doi = {10.1109/TC.2004.13}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Chevallier-MamesCJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/Joye04, author = {Marc Joye}, editor = {Jean{-}Jacques Quisquater and Pierre Paradinas and Yves Deswarte and Anas Abou El Kalam}, title = {Smart-Card Implementation of Elliptic Curve Cryptography and DPA-type Attacks}, booktitle = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {153}, pages = {115--125}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8147-2\_8}, doi = {10.1007/1-4020-8147-2\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/Joye04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2004, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b99451}, doi = {10.1007/B99451}, isbn = {3-540-22666-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeNP04, author = {Marc Joye and David Naccache and St{\'{e}}phanie Porte}, title = {The Polynomial Composition Problem in (Z/nZ)[X]}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2004}, url = {http://eprint.iacr.org/2004/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Joye03, author = {Marc Joye}, title = {Cryptanalysis of a pay-as-you-watch system}, journal = {Inf. Process. Lett.}, volume = {88}, number = {3}, pages = {119--120}, year = {2003}, url = {https://doi.org/10.1016/S0020-0190(03)00360-0}, doi = {10.1016/S0020-0190(03)00360-0}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Joye03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/BilletJ03, author = {Olivier Billet and Marc Joye}, editor = {Marc P. C. Fossorier and Tom H{\o}holdt and Alain Poli}, title = {The Jacobi Model of an Elliptic Curve and Side-Channel Analysis}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 15th International Symposium, AAECC-15, Toulouse, France, May 12-16, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2643}, pages = {34--42}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44828-4\_5}, doi = {10.1007/3-540-44828-4\_5}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/BilletJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/BrierJ03, author = {Eric Brier and Marc Joye}, editor = {Marc P. C. Fossorier and Tom H{\o}holdt and Alain Poli}, title = {Fast Point Multiplication on Elliptic Curves through Isogenies}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 15th International Symposium, AAECC-15, Toulouse, France, May 12-16, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2643}, pages = {43--50}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44828-4\_6}, doi = {10.1007/3-540-44828-4\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/BrierJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Chevallier-MamesJP03, author = {Beno{\^{\i}}t Chevallier{-}Mames and Marc Joye and Pascal Paillier}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Faster Double-Size Modular Multiplication from Euclidean Multipliers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {214--227}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10931455\_18}, doi = {10.1007/10931455\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Chevallier-MamesJP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyeP03, author = {Marc Joye and Pascal Paillier}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {GCD-Free Algorithms for Computing Modular Inverses}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {243--253}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_20}, doi = {10.1007/978-3-540-45238-6\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyeP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CietJ03, author = {Mathieu Ciet and Marc Joye}, editor = {Sihan Qing and Dieter Gollmann and Jianying Zhou}, title = {(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography}, booktitle = {Information and Communications Security, 5th International Conference, {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2836}, pages = {348--359}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39927-8\_32}, doi = {10.1007/978-3-540-39927-8\_32}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/CietJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2003, editor = {Marc Joye}, title = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X}, doi = {10.1007/3-540-36563-X}, isbn = {3-540-00847-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CietJ03, author = {Mathieu Ciet and Marc Joye}, title = {Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2003}, url = {http://eprint.iacr.org/2003/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CietJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chevallier-MamesCJ03, author = {Beno{\^{\i}}t Chevallier{-}Mames and Mathieu Ciet and Marc Joye}, title = {Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2003}, url = {http://eprint.iacr.org/2003/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chevallier-MamesCJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CietJLM03, author = {Mathieu Ciet and Marc Joye and Kristin E. Lauter and Peter L. Montgomery}, title = {Trading Inversions for Multiplications in Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2003}, url = {http://eprint.iacr.org/2003/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CietJLM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/JoyeV02, author = {Marc Joye and Karine Villegas}, editor = {Peter Honeyman}, title = {A Protected Division Algorithm}, booktitle = {Proceedings of the Fifth Smart Card Research and Advanced Application Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/cardis02/joye.html}, timestamp = {Wed, 04 Jul 2018 13:06:35 +0200}, biburl = {https://dblp.org/rec/conf/cardis/JoyeV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyeY02, author = {Marc Joye and Sung{-}Ming Yen}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {The Montgomery Powering Ladder}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {291--302}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_22}, doi = {10.1007/3-540-36400-5\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyeY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronJNP02, author = {Jean{-}S{\'{e}}bastien Coron and Marc Joye and David Naccache and Pascal Paillier}, editor = {Moti Yung}, title = {Universal Padding Schemes for {RSA}}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {226--241}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_15}, doi = {10.1007/3-540-45708-9\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronJNP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JoyeQYY02, author = {Marc Joye and Jean{-}Jacques Quisquater and Sung{-}Ming Yen and Moti Yung}, editor = {Bart Preneel}, title = {Observability Analysis - Detecting When Improved Cryptosystems Fail}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {17--29}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_2}, doi = {10.1007/3-540-45760-7\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JoyeQYY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, editor = {Bart Preneel}, title = {{GEM:} {A} Generic Chosen-Ciphertext Secure Encryption Method}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {263--276}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_18}, doi = {10.1007/3-540-45760-7\_18}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, editor = {David Naccache and Pascal Paillier}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {17--33}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_2}, doi = {10.1007/3-540-45664-3\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrierJ02, author = {Eric Brier and Marc Joye}, editor = {David Naccache and Pascal Paillier}, title = {Weierstra{\ss} Elliptic Curves and Side-Channel Attacks}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {335--345}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_24}, doi = {10.1007/3-540-45664-3\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrierJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JoyeY02, author = {Marc Joye and Sung{-}Ming Yen}, editor = {David Naccache and Pascal Paillier}, title = {One-Way Cross-Trees and Their Applications}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {346--356}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_25}, doi = {10.1007/3-540-45664-3\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JoyeY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JoyeY02a, author = {Marc Joye and Sung{-}Ming Yen}, editor = {David Naccache and Pascal Paillier}, title = {New Minimal Modified Radix-r Representation with Applications to Smart Cards}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {375--384}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_27}, doi = {10.1007/3-540-45664-3\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JoyeY02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2002}, url = {http://eprint.iacr.org/2002/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJNP02, author = {Jean{-}S{\'{e}}bastien Coron and Marc Joye and David Naccache and Pascal Paillier}, title = {Universal Padding Schemes for {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2002}, url = {http://eprint.iacr.org/2002/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJNP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilletJ02, author = {Olivier Billet and Marc Joye}, title = {The Jacobi Model of an Elliptic Curve and Side-Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2002}, url = {http://eprint.iacr.org/2002/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilletJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JoyeQT01, author = {Marc Joye and Jean{-}Jacques Quisquater and Tsuyoshi Takagi}, title = {How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves}, journal = {Des. Codes Cryptogr.}, volume = {23}, number = {3}, pages = {297--316}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JoyeQT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ClavierJ01, author = {Christophe Clavier and Marc Joye}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Universal Exponentiation Algorithm}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {300--308}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_25}, doi = {10.1007/3-540-44709-1\_25}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ClavierJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyeT01, author = {Marc Joye and Christophe Tymen}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Protections against Differential Analysis for Elliptic Curve Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {377--390}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_31}, doi = {10.1007/3-540-44709-1\_31}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/JoyeT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyeQ01, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Hessian Elliptic Curves and Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {402--410}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_33}, doi = {10.1007/3-540-44709-1\_33}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/JoyeQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JoyeQY01, author = {Marc Joye and Jean{-}Jacques Quisquater and Moti Yung}, editor = {David Naccache}, title = {On the Power of Misbehaving Adversaries and Security Analysis of the Original {EPOC}}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {208--222}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_16}, doi = {10.1007/3-540-45353-9\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JoyeQY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/JoyeQ01, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {Bahram Honary}, title = {On Rabin-Type Signatures}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {99--113}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_10}, doi = {10.1007/3-540-45325-3\_10}, timestamp = {Wed, 18 Mar 2020 16:01:01 +0100}, biburl = {https://dblp.org/rec/conf/ima/JoyeQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KimCJLMWZ01, author = {Seungjoo Kim and Jung Hee Cheon and Marc Joye and Seongan Lim and Masahiro Mambo and Dongho Won and Yuliang Zheng}, editor = {Bahram Honary}, title = {Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {114--127}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_11}, doi = {10.1007/3-540-45325-3\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/KimCJLMWZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JoyeT01, author = {Marc Joye and Christophe Tymen}, editor = {Kwangjo Kim}, title = {Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {353--364}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_26}, doi = {10.1007/3-540-44586-2\_26}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JoyeT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/JoyeY00, author = {Marc Joye and Sung{-}Ming Yen}, title = {Optimal Left-to-Right Binary Signed-Digit Recoding}, journal = {{IEEE} Trans. Computers}, volume = {49}, number = {7}, pages = {740--748}, year = {2000}, url = {https://doi.org/10.1109/12.863044}, doi = {10.1109/12.863044}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/JoyeY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/YenJ00, author = {Sung{-}Ming Yen and Marc Joye}, title = {Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis}, journal = {{IEEE} Trans. Computers}, volume = {49}, number = {9}, pages = {967--970}, year = {2000}, url = {https://doi.org/10.1109/12.869328}, doi = {10.1109/12.869328}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/YenJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyePV00, author = {Marc Joye and Pascal Paillier and Serge Vaudenay}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Efficient Generation of Prime Numbers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {340--354}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_27}, doi = {10.1007/3-540-44499-8\_27}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyePV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AtenieseCJT00, author = {Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik}, editor = {Mihir Bellare}, title = {A Practical and Provably Secure Coalition-Resistant Group Signature Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {255--270}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_16}, doi = {10.1007/3-540-44598-6\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AtenieseCJT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CoronJNP00, author = {Jean{-}S{\'{e}}bastien Coron and Marc Joye and David Naccache and Pascal Paillier}, editor = {Bart Preneel}, title = {New Attacks on PKCS{\#}1 v1.5 Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {369--381}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_25}, doi = {10.1007/3-540-45539-6\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CoronJNP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JoyeLQ99, author = {Marc Joye and Arjen K. Lenstra and Jean{-}Jacques Quisquater}, title = {Chinese Remaindering Based Cryptosystems in the Presence of Faults}, journal = {J. Cryptol.}, volume = {12}, number = {4}, pages = {241--245}, year = {1999}, url = {https://doi.org/10.1007/s001459900055}, doi = {10.1007/S001459900055}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JoyeLQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JoyeLH99, author = {Marc Joye and Narn{-}Yih Lee and Tzonelih Hwang}, editor = {Masahiro Mambo and Yuliang Zheng}, title = {On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives}, booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, pages = {47--51}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X\_5}, doi = {10.1007/3-540-47790-X\_5}, timestamp = {Thu, 02 Dec 2021 11:46:17 +0100}, biburl = {https://dblp.org/rec/conf/isw/JoyeLH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JoyeKL99, author = {Marc Joye and Seungjoo Kim and Narn{-}Yih Lee}, editor = {Masahiro Mambo and Yuliang Zheng}, title = {Cryptanalysis of Two Group Signature Schemes}, booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, pages = {271--275}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X\_23}, doi = {10.1007/3-540-47790-X\_23}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/JoyeKL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JoyeQ98, author = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Reducing the Elliptic Curve Cryptosystem of Meyer-M{\"{u}}uller to the Cryptosystem of Rabin-Williams}, journal = {Des. Codes Cryptogr.}, volume = {14}, number = {1}, pages = {53--56}, year = {1998}, url = {https://doi.org/10.1023/A:1008256404676}, doi = {10.1023/A:1008256404676}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JoyeQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/JoyeY98, author = {Marc Joye and Sung{-}Ming Yen}, title = {ID-based Secret-Key Cryptography}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {4}, pages = {33--39}, year = {1998}, url = {https://doi.org/10.1145/302350.302359}, doi = {10.1145/302350.302359}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/JoyeY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/QuisquaterJ97, author = {Jean{-}Jacques Quisquater and Marc Joye}, title = {Authentication of Sequences with the {SL2} Hash Function: Application to Video Sequences}, journal = {J. Comput. Secur.}, volume = {5}, number = {3}, pages = {213--224}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5303}, doi = {10.3233/JCS-1997-5303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/QuisquaterJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JoyeQ97, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {Richard Graveman and Philippe A. Janson and Clifford Neuman and Li Gong}, title = {On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack}, booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997}, pages = {135--141}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266420.266449}, doi = {10.1145/266420.266449}, timestamp = {Tue, 10 Nov 2020 20:00:22 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JoyeQ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BleichenbacherJQ97, author = {Daniel Bleichenbacher and Marc Joye and Jean{-}Jacques Quisquater}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {A new and optimal chosen-message attack on RSA-type cryptosystems}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {302--313}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028486}, doi = {10.1007/BFB0028486}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/BleichenbacherJQ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/JoyeQBD97, author = {Marc Joye and Jean{-}Jacques Quisquater and Feng Bao and Robert H. Deng}, editor = {Michael Darnell}, title = {RSA-type Signatures in the Presence of Transient Faults}, booktitle = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester, UK, December 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1355}, pages = {155--160}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0024460}, doi = {10.1007/BFB0024460}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/JoyeQBD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spieSR/QuisquaterMJDB97, author = {Jean{-}Jacques Quisquater and Beno{\^{\i}}t Macq and Marc Joye and N. Degand and A. Bernard}, editor = {Ishwar K. Sethi and Ramesh C. Jain}, title = {Practical Solution to Authentication of Images with a Secure Camera}, booktitle = {Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, February 8-14, 1997}, series = {{SPIE} Proceedings}, volume = {3022}, pages = {290--297}, publisher = {{SPIE}}, year = {1997}, url = {https://doi.org/10.1117/12.263417}, doi = {10.1117/12.263417}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spieSR/QuisquaterMJDB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/JoyeQ96, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {Rebecca N. Wright and Peter G. Neumann}, title = {Cryptanalysis of RSA-type cryptosystems: {A} visit}, booktitle = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4, 1996}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {38}, pages = {21--31}, publisher = {{DIMACS/AMS}}, year = {1996}, url = {https://doi.org/10.1090/dimacs/038/03}, doi = {10.1090/DIMACS/038/03}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/JoyeQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JoyeQ96, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {T. Mark A. Lomas}, title = {Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {93--100}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_8}, doi = {10.1007/3-540-62494-5\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/JoyeQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.