2008 |
59 | | Gregory L. Heileman,
Marc Joye:
Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008
ACM 2008 |
58 | EE | Daniel J. Bernstein,
Peter Birkner,
Marc Joye,
Tanja Lange,
Christiane Peters:
Twisted Edwards Curves.
AFRICACRYPT 2008: 389-405 |
57 | EE | Marc Joye:
An Efficient On-Line/Off-Line Signature Scheme without Random Oracles.
CANS 2008: 98-107 |
56 | EE | Marc Joye:
On the Security of a Unified Countermeasure.
FDTC 2008: 87-91 |
55 | EE | Marc Joye:
RSA Moduli with a Predetermined Portion: Techniques and Applications.
ISPEC 2008: 116-130 |
54 | EE | Marc Joye:
Fast Point Multiplication on Elliptic Curves without Precomputation.
WAIFI 2008: 36-46 |
2007 |
53 | EE | Marc Joye:
Highly Regular Right-to-Left Algorithms for Scalar Multiplication.
CHES 2007: 135-147 |
52 | EE | Benoît Chevallier-Mames,
Marc Joye:
A Practical and Tightly Secure Signature Scheme Without Hash Function.
CT-RSA 2007: 339-356 |
51 | EE | Ayoub Massoudi,
Frédéric Lefèbvre,
Marc Joye:
Cryptanalysis of a Video Scrambling Based on Space Filling Curves.
ICME 2007: 1683-1686 |
50 | EE | Ermaliza Razali,
Raphael C.-W. Phan,
Marc Joye:
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers.
ProvSec 2007: 188-197 |
2006 |
49 | EE | Marc Joye,
Pascal Paillier:
Fast Generation of Prime Numbers on Portable Devices: An Update.
CHES 2006: 160-173 |
48 | EE | Marc Joye,
Hung-Mei Lin:
On the TYS Signature Scheme.
ICCSA (3) 2006: 338-344 |
47 | EE | Mathieu Ciet,
Marc Joye,
Kristin Lauter,
Peter L. Montgomery:
Trading Inversions for Multiplications in Elliptic Curve Cryptography.
Des. Codes Cryptography 39(2): 189-206 (2006) |
2005 |
46 | EE | Marc Joye,
Pascal Paillier,
Berry Schoenmakers:
On Second-Order Differential Power Analysis.
CHES 2005: 293-308 |
45 | EE | Marc Joye,
Francis Olivier:
Side-Channel Analysis.
Encyclopedia of Cryptography and Security 2005 |
44 | EE | Mathieu Ciet,
Marc Joye:
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults.
Des. Codes Cryptography 36(1): 33-43 (2005) |
2004 |
43 | | Marc Joye,
Jean-Jacques Quisquater:
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings
Springer 2004 |
42 | | Marc Joye:
Smart-Card Implementation of Elliptic Curve Cryptography and DPA-type Attacks.
CARDIS 2004: 115-126 |
41 | EE | Benoît Chevallier-Mames,
Mathieu Ciet,
Marc Joye:
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity.
IEEE Trans. Computers 53(6): 760-768 (2004) |
2003 |
40 | | Marc Joye:
Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings
Springer 2003 |
39 | EE | Olivier Billet,
Marc Joye:
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis.
AAECC 2003: 34-42 |
38 | EE | Eric Brier,
Marc Joye:
Fast Point Multiplication on Elliptic Curves through Isogenies.
AAECC 2003: 43-50 |
37 | EE | Benoît Chevallier-Mames,
Marc Joye,
Pascal Paillier:
Faster Double-Size Modular Multiplication from Euclidean Multipliers.
CHES 2003: 214-227 |
36 | EE | Marc Joye,
Pascal Paillier:
GCD-Free Algorithms for Computing Modular Inverses.
CHES 2003: 243-253 |
35 | EE | Mathieu Ciet,
Marc Joye:
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography.
ICICS 2003: 348-359 |
34 | EE | Marc Joye:
Cryptanalysis of a pay-as-you-watch system.
Inf. Process. Lett. 88(3): 119-120 (2003) |
2002 |
33 | EE | Marc Joye,
Karine Villegas:
A Protected Division Algorithm.
CARDIS 2002 |
32 | EE | Marc Joye,
Sung-Ming Yen:
The Montgomery Powering Ladder.
CHES 2002: 291-302 |
31 | EE | Jean-Sébastien Coron,
Marc Joye,
David Naccache,
Pascal Paillier:
Universal Padding Schemes for RSA.
CRYPTO 2002: 226-241 |
30 | EE | Marc Joye,
Jean-Jacques Quisquater,
Sung-Ming Yen,
Moti Yung:
Observability Analysis - Detecting When Improved Cryptosystems Fail.
CT-RSA 2002: 17-29 |
29 | EE | Jean-Sébastien Coron,
Helena Handschuh,
Marc Joye,
Pascal Paillier,
David Pointcheval,
Christophe Tymen:
GEM: A Generic Chosen-Ciphertext Secure Encryption Method.
CT-RSA 2002: 263-276 |
28 | EE | Jean-Sébastien Coron,
Helena Handschuh,
Marc Joye,
Pascal Paillier,
David Pointcheval,
Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages.
Public Key Cryptography 2002: 17-33 |
27 | EE | Eric Brier,
Marc Joye:
Weierstraß Elliptic Curves and Side-Channel Attacks.
Public Key Cryptography 2002: 335-345 |
26 | EE | Marc Joye,
Sung-Ming Yen:
One-Way Cross-Trees and Their Applications.
Public Key Cryptography 2002: 346-356 |
25 | EE | Marc Joye,
Sung-Ming Yen:
New Minimal Modified Radix-r Representation with Applications to Smart Cards.
Public Key Cryptography 2002: 375-384 |
2001 |
24 | EE | Christophe Clavier,
Marc Joye:
Universal Exponentiation Algorithm.
CHES 2001: 300-308 |
23 | EE | Marc Joye,
Christophe Tymen:
Protections against Differential Analysis for Elliptic Curve Cryptography.
CHES 2001: 377-390 |
22 | EE | Marc Joye,
Jean-Jacques Quisquater:
Hessian Elliptic Curves and Side-Channel Attacks.
CHES 2001: 402-410 |
21 | EE | Marc Joye,
Jean-Jacques Quisquater,
Moti Yung:
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC.
CT-RSA 2001: 208-222 |
20 | EE | Seungjoo Kim,
Jung Hee Cheon,
Marc Joye,
Seongan Lim,
Masahiro Mambo,
Dongho Won,
Yuliang Zheng:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
IMA Int. Conf. 2001: 114-127 |
19 | EE | Marc Joye,
Jean-Jacques Quisquater:
On Rabin-Type Signatures.
IMA Int. Conf. 2001: 99-113 |
18 | EE | Marc Joye,
Christophe Tymen:
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography.
Public Key Cryptography 2001: 353-364 |
17 | | Marc Joye,
Jean-Jacques Quisquater,
Tsuyoshi Takagi:
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves.
Des. Codes Cryptography 23(3): 297-316 (2001) |
2000 |
16 | EE | Marc Joye,
Pascal Paillier,
Serge Vaudenay:
Efficient Generation of Prime Numbers.
CHES 2000: 340-354 |
15 | EE | Giuseppe Ateniese,
Jan Camenisch,
Marc Joye,
Gene Tsudik:
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
CRYPTO 2000: 255-270 |
14 | EE | Jean-Sébastien Coron,
Marc Joye,
David Naccache,
Pascal Paillier:
New Attacks on PKCS#1 v1.5 Encryption.
EUROCRYPT 2000: 369-381 |
13 | EE | Marc Joye,
Sung-Ming Yen:
Optimal Left-to-Right Binary Signed-Digit Recoding.
IEEE Trans. Computers 49(7): 740-748 (2000) |
12 | EE | Sung-Ming Yen,
Marc Joye:
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis.
IEEE Trans. Computers 49(9): 967-970 (2000) |
1999 |
11 | EE | Marc Joye,
Seungjoo Kim,
Narn-Yih Lee:
Cryptanalysis of Two Group Signature Schemes.
ISW 1999: 271-275 |
10 | EE | Marc Joye,
Narn-Yih Lee,
Tzonelih Hwang:
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.
ISW 1999: 47-51 |
9 | EE | Marc Joye,
Arjen K. Lenstra,
Jean-Jacques Quisquater:
Chinese Remaindering Based Cryptosystems in the Presence of Faults.
J. Cryptology 12(4): 241-245 (1999) |
1998 |
8 | | Marc Joye,
Jean-Jacques Quisquater:
Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams.
Des. Codes Cryptography 14(1): 53-56 (1998) |
7 | | Marc Joye,
Sung-Ming Yen:
ID-based Secret-Key Cryptography.
Operating Systems Review 32(4): 33-39 (1998) |
1997 |
6 | EE | Marc Joye,
Jean-Jacques Quisquater:
On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack.
ACM Conference on Computer and Communications Security 1997: 135-141 |
5 | | Daniel Bleichenbacher,
Marc Joye,
Jean-Jacques Quisquater:
A new and optimal chosen-message attack on RSA-type cryptosystems.
ICICS 1997: 302-313 |
4 | | Marc Joye,
Jean-Jacques Quisquater,
Feng Bao,
Robert H. Deng:
RSA-type Signatures in the Presence of Transient Faults.
IMA Int. Conf. 1997: 155-160 |
3 | | Jean-Jacques Quisquater,
Benoit M. Macq,
Marc Joye,
N. Degand,
A. Bernard:
Practical Solution to Authentication of Images with a Secure Camera.
Storage and Retrieval for Image and Video Databases (SPIE) 1997: 290-297 |
2 | | Jean-Jacques Quisquater,
Marc Joye:
Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences.
Journal of Computer Security 5(3): 213-224 (1997) |
1996 |
1 | | Marc Joye,
Jean-Jacques Quisquater:
Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves.
Security Protocols Workshop 1996: 93-100 |