Marc Joye
Marc Joye
Zama
Geverifieerd e-mailadres voor zama.ai
Titel
Geciteerd door
Geciteerd door
Jaar
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Annual International Cryptology Conference, 255-270, 2000
11672000
The Montgomery powering ladder
M Joye, SM Yen
International workshop on cryptographic hardware and embedded systems, 291-302, 2002
5162002
Twisted edwards curves
DJ Bernstein, P Birkner, M Joye, T Lange, C Peters
International Conference on Cryptology in Africa, 389-405, 2008
4002008
Weierstraß elliptic curves and side-channel attacks
E Brier, M Joye
International workshop on public key cryptography, 335-345, 2002
3932002
Checking before output may not be enough against fault-based cryptanalysis
SM Yen, M Joye
IEEE Transactions on computers 49 (9), 967-970, 2000
3662000
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
B Chevallier-Mames, M Ciet, M Joye
IEEE Transactions on computers 53 (6), 760-768, 2004
3112004
Protections against differential analysis for elliptic curve cryptography—an algebraic approach—
M Joye, C Tymen
International Workshop on Cryptographic Hardware and Embedded Systems, 377-390, 2001
2822001
Privacy-preserving ridge regression on hundreds of millions of records
V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, D Boneh, N Taft
2013 IEEE Symposium on Security and Privacy, 334-348, 2013
2572013
Hessian elliptic curves and side-channel attacks
M Joye, JJ Quisquater
International Workshop on Cryptographic Hardware and Embedded Systems, 402-410, 2001
2512001
Chinese remaindering based cryptosystems in the presence of faults
M Joye, AK Lenstra, JJ Quisquater
Journal of cryptology 12 (4), 241-245, 1999
2151999
Trading inversions for multiplications in elliptic curve cryptography
M Ciet, M Joye, K Lauter, PL Montgomery
Designs, codes and cryptography 39 (2), 189-206, 2006
2102006
Privacy-preserving matrix factorization
V Nikolaenko, S Ioannidis, U Weinsberg, M Joye, N Taft, D Boneh
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2022013
Elliptic curve cryptosystems in the presence of permanent and transient faults
M Ciet, M Joye
Designs, codes and cryptography 36 (1), 33-43, 2005
2022005
Optimal left-to-right binary signed-digit recoding
M Joye, SM Yen
IEEE Transactions on Computers 49 (7), 740-748, 2000
2002000
Universal Exponentiation Algorithm A First Step towards Provable SPA-Resistance
C Clavier, M Joye
International Workshop on Cryptographic Hardware and Embedded Systems, 300-308, 2001
1802001
On second-order differential power analysis
M Joye, P Paillier, B Schoenmakers
International Workshop on Cryptographic Hardware and Embedded Systems, 293-308, 2005
1772005
Fault analysis in cryptography
M Joye, M Tunstall
Springer, 2012
1672012
The Jacobi model of an elliptic curve and side-channel analysis
O Billet, M Joye
International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2003
1442003
Highly regular right-to-left algorithms for scalar multiplication
M Joye
International Workshop on Cryptographic Hardware and Embedded Systems, 135-147, 2007
1252007
Software implementation of pairings
M Joye, G Neven
Identity-Based Cryptography 2, 188, 2009
1032009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20