BibTeX records: Marc Joye

download as .bib file

@inproceedings{DBLP:conf/ctrsa/Joye23,
  author       = {Marc Joye},
  editor       = {Mike Rosulek},
  title        = {On-Line/Off-Line DCR-Based Homomorphic Encryption and Applications},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the
                  {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13871},
  pages        = {115--131},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30872-7\_5},
  doi          = {10.1007/978-3-031-30872-7\_5},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Joye23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joye23,
  author       = {Marc Joye},
  title        = {On-Line/Off-Line DCR-based Homomorphic Encryption and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/048},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Joye23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joye23a,
  author       = {Marc Joye},
  title        = {{TFHE} Public-Key Encryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/603},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joye23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Joye22,
  author       = {Marc Joye},
  title        = {SoK: Fully Homomorphic Encryption over the [Discretized] Torus},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {661--692},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.661-692},
  doi          = {10.46586/TCHES.V2022.I4.661-692},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Joye22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Joye022,
  author       = {Marc Joye and
                  Michael Walter},
  editor       = {Michael Brenner and
                  Anamaria Costache and
                  Kurt Rohloff},
  title        = {Liberating {TFHE:} Programmable Bootstrapping with General Quotient
                  Polynomials},
  booktitle    = {Proceedings of the 10th Workshop on Encrypted Computing {\&} Applied
                  Homomorphic Cryptography, Los Angeles, CA, USA, 7 November 2022},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560827.3563376},
  doi          = {10.1145/3560827.3563376},
  timestamp    = {Tue, 08 Nov 2022 16:34:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Joye022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cesar/Joye22,
  author       = {Marc Joye},
  editor       = {Gurvan le Guernic},
  title        = {{FHE:} End-to-End Encryption for Everyone (keynote abstract)},
  booktitle    = {Proceedings of the 29th Computer {\&} Electronics Security Application
                  Rendezvous co-located with the 7th European Cyber Week {(ECW} 2022),
                  Rennes, France, November 15-16, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3329},
  pages        = {11},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {http://ceur-ws.org/Vol-3329/keynote-02.pdf},
  timestamp    = {Thu, 04 Jan 2024 17:07:13 +0100},
  biburl       = {https://dblp.org/rec/conf/cesar/Joye22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/JoyeP22,
  author       = {Marc Joye and
                  Pascal Paillier},
  editor       = {Shlomi Dolev and
                  Jonathan Katz and
                  Amnon Meisels},
  title        = {Blind Rotation in Fully Homomorphic Encryption with Extended Keys},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 6th International
                  Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13301},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07689-3\_1},
  doi          = {10.1007/978-3-031-07689-3\_1},
  timestamp    = {Fri, 24 Jun 2022 18:23:22 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/JoyeP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joye22,
  author       = {Marc Joye},
  title        = {On NTRU-{\(\nu\)}-um Modulo X\({}^{\mbox{N}}\) {\^{a}}{\^{}}' 1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1092},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1092},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joye22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joye022,
  author       = {Marc Joye and
                  Michael Walter},
  title        = {Liberating {TFHE:} Programmable Bootstrapping with General Quotient
                  Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1177},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joye022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JoyeLNN20,
  author       = {Marc Joye and
                  Oleksandra Lapiha and
                  Ky Nguyen and
                  David Naccache},
  title        = {The Eleventh Power Residue Symbol},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {111--122},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0077},
  doi          = {10.1515/JMC-2020-0077},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/JoyeLNN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Joye21,
  author       = {Marc Joye},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Balanced Non-adjacent Forms},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  pages        = {553--576},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4\_19},
  doi          = {10.1007/978-3-030-92078-4\_19},
  timestamp    = {Fri, 03 Dec 2021 17:36:40 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Joye21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/ChillottiJP21,
  author       = {Ilaria Chillotti and
                  Marc Joye and
                  Pascal Paillier},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Programmable Bootstrapping Enables Efficient Homomorphic Inference
                  of Deep Neural Networks},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_1},
  doi          = {10.1007/978-3-030-78086-9\_1},
  timestamp    = {Mon, 03 Jan 2022 22:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/ChillottiJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiJP21,
  author       = {Ilaria Chillotti and
                  Marc Joye and
                  Pascal Paillier},
  title        = {Programmable Bootstrapping Enables Efficient Homomorphic Inference
                  of Deep Neural Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/091},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierGJN21,
  author       = {Eric Brier and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Marc Joye and
                  David Naccache},
  title        = {Primary Elements in Cyclotomic Fields with Applications to Power Residue
                  Symbols, and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1106},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1106},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierGJN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joye21,
  author       = {Marc Joye},
  title        = {Balanced Non-Adjacent Forms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1161},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1161},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joye21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joye21a,
  author       = {Marc Joye},
  title        = {Guide to Fully Homomorphic Encryption over the [Discretized] Torus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1402},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1402},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Joye21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BrierFJN20,
  author       = {{\'{E}}ric Brier and
                  Houda Ferradi and
                  Marc Joye and
                  David Naccache},
  title        = {New number-theoretic cryptographic primitives},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {224--235},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0035},
  doi          = {10.1515/JMC-2019-0035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BrierFJN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Joye20,
  author       = {Marc Joye},
  title        = {Protecting {ECC} Against Fault Attacks: The Ring Extension Method
                  Revisited},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {254--267},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0030},
  doi          = {10.1515/JMC-2019-0030},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Joye20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DattaJF19,
  author       = {Amit Datta and
                  Marc Joye and
                  Nadia Fawaz},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Private Data Aggregation over Selected Subsets of Users},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {375--391},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_21},
  doi          = {10.1007/978-3-030-31578-8\_21},
  timestamp    = {Thu, 17 Mar 2022 14:41:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/DattaJF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JoyeP19,
  author       = {Marc Joye and
                  Fabien A. P. Petitcolas},
  editor       = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Guillermo Navarro{-}Arribas and
                  Alex Biryukov and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {{PINFER:} Privacy-Preserving Inference - Logistic Regression, Support
                  Vector Machines, and More, over Encrypted Data},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2019 International Workshops, {DPM} 2019 and {CBT} 2019,
                  Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11737},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31500-9\_1},
  doi          = {10.1007/978-3-030-31500-9\_1},
  timestamp    = {Mon, 05 Feb 2024 20:29:40 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/JoyeP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-01865,
  author       = {Marc Joye and
                  Fabien A. P. Petitcolas},
  title        = {{PINFER:} Privacy-Preserving Inference for Machine Learning},
  journal      = {CoRR},
  volume       = {abs/1910.01865},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.01865},
  eprinttype    = {arXiv},
  eprint       = {1910.01865},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-01865.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierFJN19,
  author       = {Eric Brier and
                  Houda Ferradi and
                  Marc Joye and
                  David Naccache},
  title        = {New Number-Theoretic Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierFJN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joye19,
  author       = {Marc Joye},
  title        = {Protecting {ECC} Against Fault Attacks: The Ring Extension Method
                  Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/495},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joye19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeLNN19,
  author       = {Marc Joye and
                  Oleksandra Lapiha and
                  Ky Nguyen and
                  David Naccache},
  title        = {The Eleventh Power Residue Symbol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {870},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/870},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeLNN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joye19a,
  author       = {Marc Joye},
  title        = {Evaluating Octic Residue Symbols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1196},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joye19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GiacomelliJJPY18,
  author       = {Irene Giacomelli and
                  Somesh Jha and
                  Marc Joye and
                  C. David Page and
                  Kyonghwan Yoon},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Privacy-Preserving Ridge Regression with only Linearly-Homomorphic
                  Encryption},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {243--261},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_13},
  doi          = {10.1007/978-3-319-93387-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GiacomelliJJPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JoyeM18,
  author       = {Marc Joye and
                  Yan Michalevsky},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Daniel E. Holcomb and
                  Jorge Guajardo},
  title        = {{RSA} Signatures Under Hardware Restrictions},
  booktitle    = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware
                  Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {51--54},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3266444.3266451},
  doi          = {10.1145/3266444.3266451},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JoyeM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AmbroseBFJLM18,
  author       = {Christopher Ambrose and
                  Joppe W. Bos and
                  Bj{\"{o}}rn Fay and
                  Marc Joye and
                  Manfred Lochter and
                  Bruce Murray},
  editor       = {Nigel P. Smart},
  title        = {Differential Attacks on Deterministic Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_18},
  doi          = {10.1007/978-3-319-76953-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AmbroseBFJLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JoyeS18,
  author       = {Marc Joye and
                  Fariborz Salehi},
  editor       = {Florian Kerschbaum and
                  Stefano Paraboschi},
  title        = {Private yet Efficient Decision Tree Evaluation},
  booktitle    = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10980},
  pages        = {243--259},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95729-6\_16},
  doi          = {10.1007/978-3-319-95729-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JoyeS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MichalevskyJ18,
  author       = {Yan Michalevsky and
                  Marc Joye},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Decentralized Policy-Hiding {ABE} with Receiver Privacy},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {548--567},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_27},
  doi          = {10.1007/978-3-319-98989-1\_27},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MichalevskyJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/JoyeP18,
  author       = {Marc Joye and
                  Alain Passel{\`{e}}gue},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Function-Revealing Encryption - Definitions and Constructions},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {527--543},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_28},
  doi          = {10.1007/978-3-319-98113-0\_28},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/JoyeP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-00125,
  author       = {Fabrice Benhamouda and
                  Marc Joye},
  title        = {How to Profile Privacy-Conscious Users in Recommender Systems},
  journal      = {CoRR},
  volume       = {abs/1812.00125},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.00125},
  eprinttype    = {arXiv},
  eprint       = {1812.00125},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-00125.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MichalevskyJ18,
  author       = {Yan Michalevsky and
                  Marc Joye},
  title        = {Decentralized Policy-Hiding Attribute-Based Encryption with Receiver
                  Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/753},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MichalevskyJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeM18,
  author       = {Marc Joye and
                  Yan Michalevsky},
  title        = {{RSA} Signatures Under Hardware Restrictions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {878},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/878},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BenhamoudaHJL17,
  author       = {Fabrice Benhamouda and
                  Javier Herranz and
                  Marc Joye and
                  Beno{\^{\i}}t Libert},
  title        = {Efficient Cryptosystems From 2\({}^{\mbox{k}}\)-th Power Residue Symbols},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {2},
  pages        = {519--549},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9229-5},
  doi          = {10.1007/S00145-016-9229-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BenhamoudaHJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Joye17,
  author       = {Marc Joye},
  title        = {Cryptanalysis of a Privacy-Preserving Aggregation Protocol},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {693--694},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2016.2519889},
  doi          = {10.1109/TDSC.2016.2519889},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Joye17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JoyeL17,
  author       = {Marc Joye and
                  Beno{\^{\i}}t Libert},
  editor       = {Helena Handschuh},
  title        = {Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_2},
  doi          = {10.1007/978-3-319-52153-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JoyeL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2017,
  editor       = {Marc Joye and
                  Abderrahmane Nitaj},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference
                  on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10239},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57339-7},
  doi          = {10.1007/978-3-319-57339-7},
  isbn         = {978-3-319-57338-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joye17,
  author       = {Marc Joye},
  title        = {Privacy-Preserving Ridge Regression Without Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {732},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/732},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joye17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbroseBFJLM17,
  author       = {Christopher Ambrose and
                  Joppe W. Bos and
                  Bj{\"{o}}rn Fay and
                  Marc Joye and
                  Manfred Lochter and
                  Bruce Murray},
  title        = {Differential Attacks on Deterministic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {975},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/975},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmbroseBFJLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiacomelliJJPY17,
  author       = {Irene Giacomelli and
                  Somesh Jha and
                  Marc Joye and
                  C. David Page and
                  Kyonghwan Yoon},
  title        = {Privacy-Preserving Ridge Regression with only Linearly-Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {979},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/979},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiacomelliJJPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GoundarJ16,
  author       = {Raveen R. Goundar and
                  Marc Joye},
  title        = {Inversion-free arithmetic on elliptic curves through isomorphisms},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {187--199},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0131-8},
  doi          = {10.1007/S13389-016-0131-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GoundarJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LibertJY16,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung},
  title        = {Born and raised distributively: Fully distributed non-interactive
                  adaptively-secure threshold signatures with short shares},
  journal      = {Theor. Comput. Sci.},
  volume       = {645},
  pages        = {1--24},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.tcs.2016.02.031},
  doi          = {10.1016/J.TCS.2016.02.031},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LibertJY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BenhamoudaJL16,
  author       = {Fabrice Benhamouda and
                  Marc Joye and
                  Beno{\^{\i}}t Libert},
  title        = {A New Framework for Privacy-Preserving Aggregation of Time-Series
                  Data},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {10:1--10:21},
  year         = {2016},
  url          = {https://doi.org/10.1145/2873069},
  doi          = {10.1145/2873069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BenhamoudaJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Joye16,
  author       = {Marc Joye},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Secure ElGamal-Type Cryptosystems Without Message Encoding},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {470--478},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_29},
  doi          = {10.1007/978-3-662-49301-4\_29},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Joye16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Joye16,
  author       = {Marc Joye},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Identity-Based Cryptosystems and Quadratic Residuosity},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {225--254},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_9},
  doi          = {10.1007/978-3-662-49384-7\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Joye16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeP16,
  author       = {Marc Joye and
                  Alain Passel{\`{e}}gue},
  title        = {Practical Trade-Offs for Multi-Input Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/TunstallJ15,
  author       = {Michael Tunstall and
                  Marc Joye},
  title        = {The distributions of individual bits in the output of multiplicative
                  operations},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {71--90},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0110-9},
  doi          = {10.1007/S12095-014-0110-9},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/TunstallJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LibertPJY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Linearly homomorphic structure-preserving signatures and their applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {441--477},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0079-1},
  doi          = {10.1007/S10623-015-0079-1},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LibertPJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LibertPJY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound
                  {QA-NIZK} Proofs and Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {681--707},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_28},
  doi          = {10.1007/978-3-662-48797-6\_28},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LibertPJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertJYP15,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung and
                  Thomas Peters},
  editor       = {Jonathan Katz},
  title        = {Secure Efficient History-Hiding Append-Only Signatures in the Standard
                  Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {450--473},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_20},
  doi          = {10.1007/978-3-662-46447-2\_20},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertJYP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Joye15,
  author       = {Marc Joye},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {A Key-private Cryptosystem from the Quadratic Residuosity},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {398--404},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005569703980404},
  doi          = {10.5220/0005569703980404},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Joye15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/2014,
  editor       = {Marc Joye and
                  Amir Moradi},
  title        = {Smart Card Research and Advanced Applications - 13th International
                  Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8968},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16763-3},
  doi          = {10.1007/978-3-319-16763-3},
  isbn         = {978-3-319-16762-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPJY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound
                  {QA-NIZK} Proofs and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LibertJYP14,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung and
                  Thomas Peters},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Concise Multi-challenge CCA-Secure Encryption and Signatures with
                  Almost Tight Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_1},
  doi          = {10.1007/978-3-662-45608-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LibertJYP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/KarroumiRJ14,
  author       = {Mohamed Karroumi and
                  Benjamin Richard and
                  Marc Joye},
  editor       = {Emmanuel Prouff},
  title        = {Addition with Blinded Operands},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_4},
  doi          = {10.1007/978-3-319-10175-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/KarroumiRJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LibertJ14,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye},
  editor       = {Josh Benaloh},
  title        = {Group Signatures with Message-Dependent Opening in the Standard Model},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {286--306},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_15},
  doi          = {10.1007/978-3-319-04852-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LibertJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LibertPJY14,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive
                  {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {514--532},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_29},
  doi          = {10.1007/978-3-642-55220-5\_29},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LibertPJY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertYJP14,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung and
                  Marc Joye and
                  Thomas Peters},
  editor       = {Hugo Krawczyk},
  title        = {Traceable Group Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {592--610},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_34},
  doi          = {10.1007/978-3-642-54631-0\_34},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertYJP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/LibertJY13,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Shlomi Dolev},
  title        = {Born and raised distributively: fully distributed non-interactive
                  adaptively-secure threshold signatures with short shares},
  booktitle    = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '14,
                  Paris, France, July 15-18, 2014},
  pages        = {303--312},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611462.2611498},
  doi          = {10.1145/2611462.2611498},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/LibertJY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertJYP14,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung and
                  Thomas Peters},
  title        = {Concise Multi-Challenge CCA-Secure Encryption and Signatures with
                  Almost Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/743},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertJYP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AimaniJ13,
  author       = {Laila El Aimani and
                  Marc Joye},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Toward Practical Group Encryption},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {237--252},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_15},
  doi          = {10.1007/978-3-642-38980-1\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AimaniJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cai/Joye13,
  author       = {Marc Joye},
  editor       = {Traian Muntean and
                  Dimitrios Poulakis and
                  Robert Rolland},
  title        = {On Elliptic Curve Paillier Schemes},
  booktitle    = {Algebraic Informatics - 5th International Conference, {CAI} 2013,
                  Porquerolles, France, September 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8080},
  pages        = {6},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40663-8\_3},
  doi          = {10.1007/978-3-642-40663-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cai/Joye13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NikolaenkoIWJTB13,
  author       = {Valeria Nikolaenko and
                  Stratis Ioannidis and
                  Udi Weinsberg and
                  Marc Joye and
                  Nina Taft and
                  Dan Boneh},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Privacy-preserving matrix factorization},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {801--812},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516751},
  doi          = {10.1145/2508859.2516751},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NikolaenkoIWJTB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertPJY13,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {289--307},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_17},
  doi          = {10.1007/978-3-642-40084-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertPJY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JoyeL13,
  author       = {Marc Joye and
                  Beno{\^{\i}}t Libert},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Efficient Cryptosystems from 2\({}^{\mbox{ \emph{k} }}\)-th Power
                  Residue Symbols},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {76--92},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_5},
  doi          = {10.1007/978-3-642-38348-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JoyeL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JoyeL13,
  author       = {Marc Joye and
                  Beno{\^{\i}}t Libert},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series
                  Data},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {111--125},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_10},
  doi          = {10.1007/978-3-642-39884-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JoyeL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/Joye13,
  author       = {Marc Joye},
  editor       = {Wieland Fischer and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Elliptic Curve Cryptosystems in the Presence of Faults},
  booktitle    = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los
                  Alamitos, CA, USA, August 20, 2013},
  pages        = {73},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FDTC.2013.10},
  doi          = {10.1109/FDTC.2013.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/Joye13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NikolaenkoWIJBT13,
  author       = {Valeria Nikolaenko and
                  Udi Weinsberg and
                  Stratis Ioannidis and
                  Marc Joye and
                  Dan Boneh and
                  Nina Taft},
  title        = {Privacy-Preserving Ridge Regression on Hundreds of Millions of Records},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {334--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.30},
  doi          = {10.1109/SP.2013.30},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NikolaenkoWIJBT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPJY13,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPJY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeL13,
  author       = {Marc Joye and
                  Beno{\^{\i}}t Libert},
  title        = {Efficient Cryptosystems From 2\({}^{\mbox{k}}\)-th Power Residue Symbols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPJY13a,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive
                  {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/691},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPJY13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Joye12,
  author       = {Marc Joye},
  editor       = {David Naccache},
  title        = {On Quisquater's Multiplication Algorithm},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {3--7},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_2},
  doi          = {10.1007/978-3-642-28368-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Joye12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JoyeL12,
  author       = {Marc Joye and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {Partial Key Exposure on {RSA} with Private Exponents Larger Than {N}},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {369--380},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_25},
  doi          = {10.1007/978-3-642-29101-2\_25},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/JoyeL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Joye12,
  author       = {Marc Joye},
  title        = {A Method for Preventing "Skipping" Attacks},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {12--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.14},
  doi          = {10.1109/SPW.2012.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Joye12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/364229655,
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7},
  doi          = {10.1007/978-3-642-29656-7},
  isbn         = {978-3-642-29655-0},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/364229655.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AimaniJ12,
  author       = {Laila El Aimani and
                  Marc Joye},
  title        = {Toward Practical Group Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AimaniJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Joye11,
  author       = {Marc Joye},
  title        = {How (Not) to design strong-RSA signatures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {59},
  number       = {1-3},
  pages        = {169--182},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10623-010-9453-1},
  doi          = {10.1007/S10623-010-9453-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Joye11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimSRPJ11,
  author       = {Jongsung Kim and
                  Jaechul Sung and
                  Ermaliza Razali and
                  Raphael C.{-}W. Phan and
                  Marc Joye},
  title        = {Notions and relations for RKA-secure permutation and function families},
  journal      = {Des. Codes Cryptogr.},
  volume       = {60},
  number       = {1},
  pages        = {15--35},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10623-010-9414-8},
  doi          = {10.1007/S10623-010-9414-8},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/KimSRPJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GoundarJMRV11,
  author       = {Raveen R. Goundar and
                  Marc Joye and
                  Atsuko Miyaji and
                  Matthieu Rivain and
                  Alexandre Venelli},
  title        = {Scalar multiplication on Weierstra{\ss} elliptic curves from Co-\emph{Z}
                  arithmetic},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {161--176},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0012-0},
  doi          = {10.1007/S13389-011-0012-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GoundarJMRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/HutterJS11,
  author       = {Michael Hutter and
                  Marc Joye and
                  Yannick Sierra},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Memory-Constrained Implementations of Elliptic Curve Cryptography
                  in Co-\emph{Z} Coordinate Representation},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {170--187},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_11},
  doi          = {10.1007/978-3-642-21969-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/HutterJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/JoyeK11,
  author       = {Marc Joye and
                  Mohamed Karroumi},
  editor       = {Emmanuel Prouff},
  title        = {Memory-Efficient Fault Countermeasures},
  booktitle    = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2011, Leuven, Belgium, September
                  14-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7079},
  pages        = {84--101},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27257-8\_6},
  doi          = {10.1007/978-3-642-27257-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/JoyeK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DevigneJ11,
  author       = {Julien Devigne and
                  Marc Joye},
  editor       = {Aggelos Kiayias},
  title        = {Binary Huff Curves},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {340--355},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_22},
  doi          = {10.1007/978-3-642-19074-2\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DevigneJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JoyeL11,
  author       = {Marc Joye and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Yan Chen and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Traitor tracing schemes for protected software implementations},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 21, 2011},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046631.2046636},
  doi          = {10.1145/2046631.2046636},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/JoyeL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infosechicomnet/2011,
  editor       = {Marc Joye and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {Security Aspects in Information Technology - First International Conference,
                  InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7011},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24586-2},
  doi          = {10.1007/978-3-642-24586-2},
  isbn         = {978-3-642-24585-5},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosechicomnet/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/JoyeO11,
  author       = {Marc Joye and
                  Francis Olivier},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Side-Channel Analysis},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1198--1204},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_516},
  doi          = {10.1007/978-1-4419-5906-5\_516},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/JoyeO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/JoyeTV10,
  author       = {Marc Joye and
                  Mehdi Tibouchi and
                  Damien Vergnaud},
  editor       = {Guillaume Hanrot and
                  Fran{\c{c}}ois Morain and
                  Emmanuel Thom{\'{e}}},
  title        = {Huff's Model for Elliptic Curves},
  booktitle    = {Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy,
                  France, July 19-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6197},
  pages        = {234--250},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14518-6\_20},
  doi          = {10.1007/978-3-642-14518-6\_20},
  timestamp    = {Thu, 14 Oct 2021 10:35:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/JoyeTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/JoyeNP10,
  author       = {Marc Joye and
                  David Naccache and
                  St{\'{e}}phanie Porte},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {The Polynomial Composition Problem in (Z/\emph{n}Z)[\emph{X}]},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_1},
  doi          = {10.1007/978-3-642-12510-2\_1},
  timestamp    = {Sat, 30 May 2020 20:05:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/JoyeNP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoundarJM10,
  author       = {Raveen R. Goundar and
                  Marc Joye and
                  Atsuko Miyaji},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Co-\emph{Z} Addition Formul{\ae} and Binary Ladders on Elliptic Curves
                  - (Extended Abstract)},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {65--79},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_5},
  doi          = {10.1007/978-3-642-15031-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GoundarJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TunstallJ10,
  author       = {Michael Tunstall and
                  Marc Joye},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Coordinate Blinding over Large Prime Fields},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {443--455},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_30},
  doi          = {10.1007/978-3-642-15031-9\_30},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/TunstallJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FarashahiJ10,
  author       = {Reza Rezaeian Farashahi and
                  Marc Joye},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Efficient Arithmetic on Hessian Curves},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {243--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_15},
  doi          = {10.1007/978-3-642-13013-7\_15},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FarashahiJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2010,
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1866870},
  isbn         = {978-1-4503-0091-9},
  timestamp    = {Wed, 28 Mar 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2010,
  editor       = {Luca Breveglieri and
                  Marc Joye and
                  Israel Koren and
                  David Naccache and
                  Ingrid Verbauwhede},
  title        = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2010, Santa Barbara, California, USA, 21 August 2010},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5575321/proceeding},
  isbn         = {978-0-7695-4169-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2010,
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1},
  doi          = {10.1007/978-3-642-17455-1},
  isbn         = {978-3-642-17454-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoundarJM10,
  author       = {Raveen R. Goundar and
                  Marc Joye and
                  Atsuko Miyaji},
  title        = {Co-Z Addition Formulae and Binary Ladders on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoundarJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeTV10,
  author       = {Marc Joye and
                  Mehdi Tibouchi and
                  Damien Vergnaud},
  title        = {Huff's Model for Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AtenieseCJT09,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Marc Joye and
                  Gene Tsudik},
  title        = {Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt
                  2006},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {320--322},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028030},
  doi          = {10.1504/IJACT.2009.028030},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/AtenieseCJT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/JoyeT09,
  author       = {Marc Joye and
                  Michael Tunstall},
  editor       = {Bart Preneel},
  title        = {Exponent Recoding and Regular Exponentiation Algorithms},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {334--349},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_21},
  doi          = {10.1007/978-3-642-02384-2\_21},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/JoyeT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Joye09,
  author       = {Marc Joye},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {On Cryptographic Schemes Based on Discrete Logarithms and Factoring},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {41--52},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_3},
  doi          = {10.1007/978-3-642-10433-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/Joye09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/AlessioJ09,
  author       = {Davide Alessio and
                  Marc Joye},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {A simple construction for public-key encryption with revocable anonymity:
                  the honest-sender case},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {11--16},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655051},
  doi          = {10.1145/1655048.1655051},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/AlessioJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/Joye09,
  author       = {Marc Joye},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Elisabeth Oswald and
                  Jean{-}Pierre Seifert},
  title        = {Protecting {RSA} against Fault Attacks: The Embedding Method},
  booktitle    = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  pages        = {41--45},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FDTC.2009.32},
  doi          = {10.1109/FDTC.2009.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/Joye09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Chevallier-MamesJ09,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Marc Joye},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Chosen-Ciphertext Secure RSA-Type Cryptosystems},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_5},
  doi          = {10.1007/978-3-642-04642-1\_5},
  timestamp    = {Sun, 02 Jun 2019 21:26:38 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Chevallier-MamesJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Joye09,
  author       = {Marc Joye},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Highly Regular \emph{m}-Ary Powering Ladders},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {350--363},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_22},
  doi          = {10.1007/978-3-642-05445-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Joye09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Joye09,
  author       = {Marc Joye},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Basics of Side-Channel Analysis},
  booktitle    = {Cryptographic Engineering},
  pages        = {365--380},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_13},
  doi          = {10.1007/978-0-387-71817-0\_13},
  timestamp    = {Tue, 26 Jun 2018 16:12:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Joye09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:series/ciss/2009-2,
  editor       = {Marc Joye and
                  Gregory Neven},
  title        = {Identity-Based Cryptography},
  series       = {Cryptology and Information Security Series},
  volume       = {2},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {http://ebooks.iospress.nl/volume/identity-based-cryptography},
  isbn         = {978-1-58603-947-9},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ciss/2009-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesJ09,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Marc Joye},
  title        = {Chosen-Ciphertext Secure RSA-type Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BernsteinBJLP08,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Marc Joye and
                  Tanja Lange and
                  Christiane Peters},
  editor       = {Serge Vaudenay},
  title        = {Twisted Edwards Curves},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {389--405},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_26},
  doi          = {10.1007/978-3-540-68164-9\_26},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BernsteinBJLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/DurandJK08,
  author       = {Alain Durand and
                  Marc Joye and
                  Mohamed Karroumi},
  title        = {Laundering and Repackaging of Multimedia Content in Content Distribution
                  Systems},
  booktitle    = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008},
  pages        = {1344--1351},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/APSCC.2008.129},
  doi          = {10.1109/APSCC.2008.129},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/DurandJK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Joye08,
  author       = {Marc Joye},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {An Efficient On-Line/Off-Line Signature Scheme without Random Oracles},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {98--107},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_7},
  doi          = {10.1007/978-3-540-89641-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/Joye08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/Joye08,
  author       = {Marc Joye},
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {On the Security of a Unified Countermeasure},
  booktitle    = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008},
  pages        = {87--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FDTC.2008.8},
  doi          = {10.1109/FDTC.2008.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/Joye08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Joye08,
  author       = {Marc Joye},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {{RSA} Moduli with a Predetermined Portion: Techniques and Applications},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {116--130},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_9},
  doi          = {10.1007/978-3-540-79104-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Joye08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/Joye08,
  author       = {Marc Joye},
  editor       = {Joachim von zur Gathen and
                  Jos{\'{e}} Luis Ima{\~{n}}a and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Fast Point Multiplication on Elliptic Curves without Precomputation},
  booktitle    = {Arithmetic of Finite Fields, 2nd International Workshop, {WAIFI} 2008,
                  Siena, Italy, July 6-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5130},
  pages        = {36--46},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69499-1\_4},
  doi          = {10.1007/978-3-540-69499-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/Joye08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2008,
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-290-0},
  timestamp    = {Tue, 11 Nov 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBJLP08,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Marc Joye and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Twisted Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBJLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/JoyeMR07,
  author       = {Marc Joye and
                  Pascal Manet and
                  Jean{-}Baptiste Rigaud},
  title        = {Strengthening hardware {AES} implementations against fault attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {106--110},
  year         = {2007},
  url          = {https://doi.org/10.1049/iet-ifs:20060163},
  doi          = {10.1049/IET-IFS:20060163},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/JoyeMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Joye07,
  author       = {Marc Joye},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Highly Regular Right-to-Left Algorithms for Scalar Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {135--147},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_10},
  doi          = {10.1007/978-3-540-74735-2\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Joye07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Chevallier-MamesJ07,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Marc Joye},
  editor       = {Masayuki Abe},
  title        = {A Practical and Tightly Secure Signature Scheme Without Hash Function},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {339--356},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_22},
  doi          = {10.1007/11967668\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Chevallier-MamesJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/MassoudiLJ07,
  author       = {Ayoub Massoudi and
                  Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and
                  Marc Joye},
  title        = {Cryptanalysis of a Video Scrambling Based on Space Filling Curves},
  booktitle    = {Proceedings of the 2007 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China},
  pages        = {1683--1686},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICME.2007.4284992},
  doi          = {10.1109/ICME.2007.4284992},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/MassoudiLJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/RazaliPJ07,
  author       = {Ermaliza Razali and
                  Raphael C.{-}W. Phan and
                  Marc Joye},
  editor       = {Willy Susilo and
                  Joseph K. Liu and
                  Yi Mu},
  title        = {On the Notions of {PRP} - {RKA} , {KR} and {KR} - {RKA} for Block
                  Ciphers},
  booktitle    = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
                  Australia, November 1-2, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4784},
  pages        = {188--197},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75670-5\_13},
  doi          = {10.1007/978-3-540-75670-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/RazaliPJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JoyeT07,
  author       = {Marc Joye and
                  Michael Tunstall},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Securing OpenSSL against Micro-Architectural Attacks},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {189--196},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JoyeT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CietJLM06,
  author       = {Mathieu Ciet and
                  Marc Joye and
                  Kristin E. Lauter and
                  Peter L. Montgomery},
  title        = {Trading Inversions for Multiplications in Elliptic Curve Cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {39},
  number       = {2},
  pages        = {189--206},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-3299-y},
  doi          = {10.1007/S10623-005-3299-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CietJLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeP06,
  author       = {Marc Joye and
                  Pascal Paillier},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Fast Generation of Prime Numbers on Portable Devices: An Update},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_13},
  doi          = {10.1007/11894063\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyeP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/JoyeL06,
  author       = {Marc Joye and
                  Hung{-}Mei Lin},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {On the {TYS} Signature Scheme},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3982},
  pages        = {338--344},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751595\_37},
  doi          = {10.1007/11751595\_37},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/JoyeL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCJT06,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Marc Joye and
                  Gene Tsudik},
  title        = {Remarks on "Analysis of One Popular Group Signature Scheme"
                  in Asiacrypt 2006},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseCJT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CietJ05,
  author       = {Mathieu Ciet and
                  Marc Joye},
  title        = {Elliptic Curve Cryptosystems in the Presence of Permanent and Transient
                  Faults},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {1},
  pages        = {33--43},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-1160-8},
  doi          = {10.1007/S10623-003-1160-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CietJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePS05,
  author       = {Marc Joye and
                  Pascal Paillier and
                  Berry Schoenmakers},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {On Second-Order Differential Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_22},
  doi          = {10.1007/11545262\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyePS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/JoyeO05,
  author       = {Marc Joye and
                  Francis Olivier},
  editor       = {Henk C. A. van Tilborg},
  title        = {Side-Channel Analysis},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_394},
  doi          = {10.1007/0-387-23483-7\_394},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/JoyeO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Chevallier-MamesCJ04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Mathieu Ciet and
                  Marc Joye},
  title        = {Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel
                  Atomicity},
  journal      = {{IEEE} Trans. Computers},
  volume       = {53},
  number       = {6},
  pages        = {760--768},
  year         = {2004},
  url          = {https://doi.org/10.1109/TC.2004.13},
  doi          = {10.1109/TC.2004.13},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Chevallier-MamesCJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Joye04,
  author       = {Marc Joye},
  editor       = {Jean{-}Jacques Quisquater and
                  Pierre Paradinas and
                  Yves Deswarte and
                  Anas Abou El Kalam},
  title        = {Smart-Card Implementation of Elliptic Curve Cryptography and DPA-type
                  Attacks},
  booktitle    = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World
                  Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International
                  Conference on Smart Card Research and Advanced Applications (CARDIS),
                  22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {153},
  pages        = {115--125},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8147-2\_8},
  doi          = {10.1007/1-4020-8147-2\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Joye04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2004,
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b99451},
  doi          = {10.1007/B99451},
  isbn         = {3-540-22666-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeNP04,
  author       = {Marc Joye and
                  David Naccache and
                  St{\'{e}}phanie Porte},
  title        = {The Polynomial Composition Problem in (Z/nZ)[X]},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Joye03,
  author       = {Marc Joye},
  title        = {Cryptanalysis of a pay-as-you-watch system},
  journal      = {Inf. Process. Lett.},
  volume       = {88},
  number       = {3},
  pages        = {119--120},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0020-0190(03)00360-0},
  doi          = {10.1016/S0020-0190(03)00360-0},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Joye03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/BilletJ03,
  author       = {Olivier Billet and
                  Marc Joye},
  editor       = {Marc P. C. Fossorier and
                  Tom H{\o}holdt and
                  Alain Poli},
  title        = {The Jacobi Model of an Elliptic Curve and Side-Channel Analysis},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  15th International Symposium, AAECC-15, Toulouse, France, May 12-16,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2643},
  pages        = {34--42},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44828-4\_5},
  doi          = {10.1007/3-540-44828-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/BilletJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/BrierJ03,
  author       = {Eric Brier and
                  Marc Joye},
  editor       = {Marc P. C. Fossorier and
                  Tom H{\o}holdt and
                  Alain Poli},
  title        = {Fast Point Multiplication on Elliptic Curves through Isogenies},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  15th International Symposium, AAECC-15, Toulouse, France, May 12-16,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2643},
  pages        = {43--50},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44828-4\_6},
  doi          = {10.1007/3-540-44828-4\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/BrierJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesJP03,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Marc Joye and
                  Pascal Paillier},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Faster Double-Size Modular Multiplication from Euclidean Multipliers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {214--227},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10931455\_18},
  doi          = {10.1007/10931455\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Chevallier-MamesJP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeP03,
  author       = {Marc Joye and
                  Pascal Paillier},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {GCD-Free Algorithms for Computing Modular Inverses},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {243--253},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_20},
  doi          = {10.1007/978-3-540-45238-6\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyeP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CietJ03,
  author       = {Mathieu Ciet and
                  Marc Joye},
  editor       = {Sihan Qing and
                  Dieter Gollmann and
                  Jianying Zhou},
  title        = {(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography},
  booktitle    = {Information and Communications Security, 5th International Conference,
                  {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2836},
  pages        = {348--359},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39927-8\_32},
  doi          = {10.1007/978-3-540-39927-8\_32},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/CietJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2003,
  editor       = {Marc Joye},
  title        = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X},
  doi          = {10.1007/3-540-36563-X},
  isbn         = {3-540-00847-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CietJ03,
  author       = {Mathieu Ciet and
                  Marc Joye},
  title        = {Elliptic Curve Cryptosystems in the Presence of Permanent and Transient
                  Faults},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CietJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesCJ03,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Mathieu Ciet and
                  Marc Joye},
  title        = {Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel
                  Atomicity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesCJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CietJLM03,
  author       = {Mathieu Ciet and
                  Marc Joye and
                  Kristin E. Lauter and
                  Peter L. Montgomery},
  title        = {Trading Inversions for Multiplications in Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CietJLM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/JoyeV02,
  author       = {Marc Joye and
                  Karine Villegas},
  editor       = {Peter Honeyman},
  title        = {A Protected Division Algorithm},
  booktitle    = {Proceedings of the Fifth Smart Card Research and Advanced Application
                  Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/cardis02/joye.html},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/JoyeV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeY02,
  author       = {Marc Joye and
                  Sung{-}Ming Yen},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {The Montgomery Powering Ladder},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {291--302},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_22},
  doi          = {10.1007/3-540-36400-5\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyeY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronJNP02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Marc Joye and
                  David Naccache and
                  Pascal Paillier},
  editor       = {Moti Yung},
  title        = {Universal Padding Schemes for {RSA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {226--241},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_15},
  doi          = {10.1007/3-540-45708-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronJNP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JoyeQYY02,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Sung{-}Ming Yen and
                  Moti Yung},
  editor       = {Bart Preneel},
  title        = {Observability Analysis - Detecting When Improved Cryptosystems Fail},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {17--29},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_2},
  doi          = {10.1007/3-540-45760-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JoyeQYY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  editor       = {Bart Preneel},
  title        = {{GEM:} {A} Generic Chosen-Ciphertext Secure Encryption Method},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {263--276},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_18},
  doi          = {10.1007/3-540-45760-7\_18},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_2},
  doi          = {10.1007/3-540-45664-3\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrierJ02,
  author       = {Eric Brier and
                  Marc Joye},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Weierstra{\ss} Elliptic Curves and Side-Channel Attacks},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {335--345},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_24},
  doi          = {10.1007/3-540-45664-3\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrierJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JoyeY02,
  author       = {Marc Joye and
                  Sung{-}Ming Yen},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {One-Way Cross-Trees and Their Applications},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {346--356},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_25},
  doi          = {10.1007/3-540-45664-3\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JoyeY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JoyeY02a,
  author       = {Marc Joye and
                  Sung{-}Ming Yen},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {New Minimal Modified Radix-r Representation with Applications to Smart
                  Cards},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {375--384},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_27},
  doi          = {10.1007/3-540-45664-3\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JoyeY02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  title        = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJNP02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Marc Joye and
                  David Naccache and
                  Pascal Paillier},
  title        = {Universal Padding Schemes for {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJNP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilletJ02,
  author       = {Olivier Billet and
                  Marc Joye},
  title        = {The Jacobi Model of an Elliptic Curve and Side-Channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilletJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JoyeQT01,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Tsuyoshi Takagi},
  title        = {How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic
                  Curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {23},
  number       = {3},
  pages        = {297--316},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JoyeQT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ClavierJ01,
  author       = {Christophe Clavier and
                  Marc Joye},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Universal Exponentiation Algorithm},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {300--308},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_25},
  doi          = {10.1007/3-540-44709-1\_25},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ClavierJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeT01,
  author       = {Marc Joye and
                  Christophe Tymen},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Protections against Differential Analysis for Elliptic Curve Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {377--390},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_31},
  doi          = {10.1007/3-540-44709-1\_31},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/JoyeT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeQ01,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Hessian Elliptic Curves and Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {402--410},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_33},
  doi          = {10.1007/3-540-44709-1\_33},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/JoyeQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JoyeQY01,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {David Naccache},
  title        = {On the Power of Misbehaving Adversaries and Security Analysis of the
                  Original {EPOC}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {208--222},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_16},
  doi          = {10.1007/3-540-45353-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JoyeQY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/JoyeQ01,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {Bahram Honary},
  title        = {On Rabin-Type Signatures},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {99--113},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_10},
  doi          = {10.1007/3-540-45325-3\_10},
  timestamp    = {Wed, 18 Mar 2020 16:01:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/JoyeQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KimCJLMWZ01,
  author       = {Seungjoo Kim and
                  Jung Hee Cheon and
                  Marc Joye and
                  Seongan Lim and
                  Masahiro Mambo and
                  Dongho Won and
                  Yuliang Zheng},
  editor       = {Bahram Honary},
  title        = {Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The
                  Importance of the Order of Decryption and Validation)},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {114--127},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_11},
  doi          = {10.1007/3-540-45325-3\_11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/KimCJLMWZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JoyeT01,
  author       = {Marc Joye and
                  Christophe Tymen},
  editor       = {Kwangjo Kim},
  title        = {Compact Encoding of Non-adjacent Forms with Applications to Elliptic
                  Curve Cryptography},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {353--364},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_26},
  doi          = {10.1007/3-540-44586-2\_26},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JoyeT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/JoyeY00,
  author       = {Marc Joye and
                  Sung{-}Ming Yen},
  title        = {Optimal Left-to-Right Binary Signed-Digit Recoding},
  journal      = {{IEEE} Trans. Computers},
  volume       = {49},
  number       = {7},
  pages        = {740--748},
  year         = {2000},
  url          = {https://doi.org/10.1109/12.863044},
  doi          = {10.1109/12.863044},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/JoyeY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/YenJ00,
  author       = {Sung{-}Ming Yen and
                  Marc Joye},
  title        = {Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis},
  journal      = {{IEEE} Trans. Computers},
  volume       = {49},
  number       = {9},
  pages        = {967--970},
  year         = {2000},
  url          = {https://doi.org/10.1109/12.869328},
  doi          = {10.1109/12.869328},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/YenJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePV00,
  author       = {Marc Joye and
                  Pascal Paillier and
                  Serge Vaudenay},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Efficient Generation of Prime Numbers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {340--354},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_27},
  doi          = {10.1007/3-540-44499-8\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyePV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AtenieseCJT00,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Marc Joye and
                  Gene Tsudik},
  editor       = {Mihir Bellare},
  title        = {A Practical and Provably Secure Coalition-Resistant Group Signature
                  Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {255--270},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_16},
  doi          = {10.1007/3-540-44598-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AtenieseCJT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CoronJNP00,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Marc Joye and
                  David Naccache and
                  Pascal Paillier},
  editor       = {Bart Preneel},
  title        = {New Attacks on PKCS{\#}1 v1.5 Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {369--381},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_25},
  doi          = {10.1007/3-540-45539-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CoronJNP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JoyeLQ99,
  author       = {Marc Joye and
                  Arjen K. Lenstra and
                  Jean{-}Jacques Quisquater},
  title        = {Chinese Remaindering Based Cryptosystems in the Presence of Faults},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {241--245},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900055},
  doi          = {10.1007/S001459900055},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JoyeLQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JoyeLH99,
  author       = {Marc Joye and
                  Narn{-}Yih Lee and
                  Tzonelih Hwang},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {47--51},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_5},
  doi          = {10.1007/3-540-47790-X\_5},
  timestamp    = {Thu, 02 Dec 2021 11:46:17 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/JoyeLH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JoyeKL99,
  author       = {Marc Joye and
                  Seungjoo Kim and
                  Narn{-}Yih Lee},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {Cryptanalysis of Two Group Signature Schemes},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {271--275},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_23},
  doi          = {10.1007/3-540-47790-X\_23},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JoyeKL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JoyeQ98,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Reducing the Elliptic Curve Cryptosystem of Meyer-M{\"{u}}uller
                  to the Cryptosystem of Rabin-Williams},
  journal      = {Des. Codes Cryptogr.},
  volume       = {14},
  number       = {1},
  pages        = {53--56},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008256404676},
  doi          = {10.1023/A:1008256404676},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JoyeQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/JoyeY98,
  author       = {Marc Joye and
                  Sung{-}Ming Yen},
  title        = {ID-based Secret-Key Cryptography},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {4},
  pages        = {33--39},
  year         = {1998},
  url          = {https://doi.org/10.1145/302350.302359},
  doi          = {10.1145/302350.302359},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/JoyeY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/QuisquaterJ97,
  author       = {Jean{-}Jacques Quisquater and
                  Marc Joye},
  title        = {Authentication of Sequences with the {SL2} Hash Function: Application
                  to Video Sequences},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {213--224},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5303},
  doi          = {10.3233/JCS-1997-5303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/QuisquaterJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JoyeQ97,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {On the Importance of Securing Your Bins: The Garbage-man-in-the-middle
                  Attack},
  booktitle    = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  pages        = {135--141},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266420.266449},
  doi          = {10.1145/266420.266449},
  timestamp    = {Tue, 10 Nov 2020 20:00:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JoyeQ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BleichenbacherJQ97,
  author       = {Daniel Bleichenbacher and
                  Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {A new and optimal chosen-message attack on RSA-type cryptosystems},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {302--313},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028486},
  doi          = {10.1007/BFB0028486},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/BleichenbacherJQ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/JoyeQBD97,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Michael Darnell},
  title        = {RSA-type Signatures in the Presence of Transient Faults},
  booktitle    = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1355},
  pages        = {155--160},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0024460},
  doi          = {10.1007/BFB0024460},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/JoyeQBD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spieSR/QuisquaterMJDB97,
  author       = {Jean{-}Jacques Quisquater and
                  Beno{\^{\i}}t Macq and
                  Marc Joye and
                  N. Degand and
                  A. Bernard},
  editor       = {Ishwar K. Sethi and
                  Ramesh C. Jain},
  title        = {Practical Solution to Authentication of Images with a Secure Camera},
  booktitle    = {Storage and Retrieval for Image and Video Databases V, San Jose, CA,
                  USA, February 8-14, 1997},
  series       = {{SPIE} Proceedings},
  volume       = {3022},
  pages        = {290--297},
  publisher    = {{SPIE}},
  year         = {1997},
  url          = {https://doi.org/10.1117/12.263417},
  doi          = {10.1117/12.263417},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spieSR/QuisquaterMJDB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/JoyeQ96,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {Rebecca N. Wright and
                  Peter G. Neumann},
  title        = {Cryptanalysis of RSA-type cryptosystems: {A} visit},
  booktitle    = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4,
                  1996},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {38},
  pages        = {21--31},
  publisher    = {{DIMACS/AMS}},
  year         = {1996},
  url          = {https://doi.org/10.1090/dimacs/038/03},
  doi          = {10.1090/DIMACS/038/03},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/JoyeQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JoyeQ96,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {T. Mark A. Lomas},
  title        = {Protocol Failures for RSA-Like Functions Using Lucas Sequences and
                  Elliptic Curves},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {93--100},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_8},
  doi          = {10.1007/3-540-62494-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JoyeQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics