2008 | ||
---|---|---|
59 | Gregory L. Heileman, Marc Joye: Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008 ACM 2008 | |
58 | EE | Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters: Twisted Edwards Curves. AFRICACRYPT 2008: 389-405 |
57 | EE | Marc Joye: An Efficient On-Line/Off-Line Signature Scheme without Random Oracles. CANS 2008: 98-107 |
56 | EE | Marc Joye: On the Security of a Unified Countermeasure. FDTC 2008: 87-91 |
55 | EE | Marc Joye: RSA Moduli with a Predetermined Portion: Techniques and Applications. ISPEC 2008: 116-130 |
54 | EE | Marc Joye: Fast Point Multiplication on Elliptic Curves without Precomputation. WAIFI 2008: 36-46 |
2007 | ||
53 | EE | Marc Joye: Highly Regular Right-to-Left Algorithms for Scalar Multiplication. CHES 2007: 135-147 |
52 | EE | Benoît Chevallier-Mames, Marc Joye: A Practical and Tightly Secure Signature Scheme Without Hash Function. CT-RSA 2007: 339-356 |
51 | EE | Ayoub Massoudi, Frédéric Lefèbvre, Marc Joye: Cryptanalysis of a Video Scrambling Based on Space Filling Curves. ICME 2007: 1683-1686 |
50 | EE | Ermaliza Razali, Raphael C.-W. Phan, Marc Joye: On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. ProvSec 2007: 188-197 |
2006 | ||
49 | EE | Marc Joye, Pascal Paillier: Fast Generation of Prime Numbers on Portable Devices: An Update. CHES 2006: 160-173 |
48 | EE | Marc Joye, Hung-Mei Lin: On the TYS Signature Scheme. ICCSA (3) 2006: 338-344 |
47 | EE | Mathieu Ciet, Marc Joye, Kristin Lauter, Peter L. Montgomery: Trading Inversions for Multiplications in Elliptic Curve Cryptography. Des. Codes Cryptography 39(2): 189-206 (2006) |
2005 | ||
46 | EE | Marc Joye, Pascal Paillier, Berry Schoenmakers: On Second-Order Differential Power Analysis. CHES 2005: 293-308 |
45 | EE | Marc Joye, Francis Olivier: Side-Channel Analysis. Encyclopedia of Cryptography and Security 2005 |
44 | EE | Mathieu Ciet, Marc Joye: Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. Des. Codes Cryptography 36(1): 33-43 (2005) |
2004 | ||
43 | Marc Joye, Jean-Jacques Quisquater: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings Springer 2004 | |
42 | Marc Joye: Smart-Card Implementation of Elliptic Curve Cryptography and DPA-type Attacks. CARDIS 2004: 115-126 | |
41 | EE | Benoît Chevallier-Mames, Mathieu Ciet, Marc Joye: Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. IEEE Trans. Computers 53(6): 760-768 (2004) |
2003 | ||
40 | Marc Joye: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings Springer 2003 | |
39 | EE | Olivier Billet, Marc Joye: The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. AAECC 2003: 34-42 |
38 | EE | Eric Brier, Marc Joye: Fast Point Multiplication on Elliptic Curves through Isogenies. AAECC 2003: 43-50 |
37 | EE | Benoît Chevallier-Mames, Marc Joye, Pascal Paillier: Faster Double-Size Modular Multiplication from Euclidean Multipliers. CHES 2003: 214-227 |
36 | EE | Marc Joye, Pascal Paillier: GCD-Free Algorithms for Computing Modular Inverses. CHES 2003: 243-253 |
35 | EE | Mathieu Ciet, Marc Joye: (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. ICICS 2003: 348-359 |
34 | EE | Marc Joye: Cryptanalysis of a pay-as-you-watch system. Inf. Process. Lett. 88(3): 119-120 (2003) |
2002 | ||
33 | EE | Marc Joye, Karine Villegas: A Protected Division Algorithm. CARDIS 2002 |
32 | EE | Marc Joye, Sung-Ming Yen: The Montgomery Powering Ladder. CHES 2002: 291-302 |
31 | EE | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier: Universal Padding Schemes for RSA. CRYPTO 2002: 226-241 |
30 | EE | Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung: Observability Analysis - Detecting When Improved Cryptosystems Fail. CT-RSA 2002: 17-29 |
29 | EE | Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen: GEM: A Generic Chosen-Ciphertext Secure Encryption Method. CT-RSA 2002: 263-276 |
28 | EE | Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen: Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Public Key Cryptography 2002: 17-33 |
27 | EE | Eric Brier, Marc Joye: Weierstraß Elliptic Curves and Side-Channel Attacks. Public Key Cryptography 2002: 335-345 |
26 | EE | Marc Joye, Sung-Ming Yen: One-Way Cross-Trees and Their Applications. Public Key Cryptography 2002: 346-356 |
25 | EE | Marc Joye, Sung-Ming Yen: New Minimal Modified Radix-r Representation with Applications to Smart Cards. Public Key Cryptography 2002: 375-384 |
2001 | ||
24 | EE | Christophe Clavier, Marc Joye: Universal Exponentiation Algorithm. CHES 2001: 300-308 |
23 | EE | Marc Joye, Christophe Tymen: Protections against Differential Analysis for Elliptic Curve Cryptography. CHES 2001: 377-390 |
22 | EE | Marc Joye, Jean-Jacques Quisquater: Hessian Elliptic Curves and Side-Channel Attacks. CHES 2001: 402-410 |
21 | EE | Marc Joye, Jean-Jacques Quisquater, Moti Yung: On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. CT-RSA 2001: 208-222 |
20 | EE | Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng: Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMA Int. Conf. 2001: 114-127 |
19 | EE | Marc Joye, Jean-Jacques Quisquater: On Rabin-Type Signatures. IMA Int. Conf. 2001: 99-113 |
18 | EE | Marc Joye, Christophe Tymen: Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. Public Key Cryptography 2001: 353-364 |
17 | Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi: How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. Des. Codes Cryptography 23(3): 297-316 (2001) | |
2000 | ||
16 | EE | Marc Joye, Pascal Paillier, Serge Vaudenay: Efficient Generation of Prime Numbers. CHES 2000: 340-354 |
15 | EE | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270 |
14 | EE | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier: New Attacks on PKCS#1 v1.5 Encryption. EUROCRYPT 2000: 369-381 |
13 | EE | Marc Joye, Sung-Ming Yen: Optimal Left-to-Right Binary Signed-Digit Recoding. IEEE Trans. Computers 49(7): 740-748 (2000) |
12 | EE | Sung-Ming Yen, Marc Joye: Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. IEEE Trans. Computers 49(9): 967-970 (2000) |
1999 | ||
11 | EE | Marc Joye, Seungjoo Kim, Narn-Yih Lee: Cryptanalysis of Two Group Signature Schemes. ISW 1999: 271-275 |
10 | EE | Marc Joye, Narn-Yih Lee, Tzonelih Hwang: On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. ISW 1999: 47-51 |
9 | EE | Marc Joye, Arjen K. Lenstra, Jean-Jacques Quisquater: Chinese Remaindering Based Cryptosystems in the Presence of Faults. J. Cryptology 12(4): 241-245 (1999) |
1998 | ||
8 | Marc Joye, Jean-Jacques Quisquater: Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams. Des. Codes Cryptography 14(1): 53-56 (1998) | |
7 | Marc Joye, Sung-Ming Yen: ID-based Secret-Key Cryptography. Operating Systems Review 32(4): 33-39 (1998) | |
1997 | ||
6 | EE | Marc Joye, Jean-Jacques Quisquater: On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack. ACM Conference on Computer and Communications Security 1997: 135-141 |
5 | Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater: A new and optimal chosen-message attack on RSA-type cryptosystems. ICICS 1997: 302-313 | |
4 | Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng: RSA-type Signatures in the Presence of Transient Faults. IMA Int. Conf. 1997: 155-160 | |
3 | Jean-Jacques Quisquater, Benoit M. Macq, Marc Joye, N. Degand, A. Bernard: Practical Solution to Authentication of Images with a Secure Camera. Storage and Retrieval for Image and Video Databases (SPIE) 1997: 290-297 | |
2 | Jean-Jacques Quisquater, Marc Joye: Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences. Journal of Computer Security 5(3): 213-224 (1997) | |
1996 | ||
1 | Marc Joye, Jean-Jacques Quisquater: Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves. Security Protocols Workshop 1996: 93-100 |