What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Marc Joye
Google Scholar
69
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes.
Olivier Bernard
Marc Joye
Nigel P. Smart
Michael Walter
2024
conf/ctrsa
TFHE Public-Key Encryption Revisited.
Marc Joye
2023
conf/ctrsa
On-Line/Off-Line DCR-Based Homomorphic Encryption and Applications.
Marc Joye
2022
journals/tches
SoK: Fully Homomorphic Encryption over the [Discretized] Torus.
Marc Joye
2022
conf/ccs
Liberating TFHE: Programmable Bootstrapping with General Quotient Polynomials.
Marc Joye
Michael Walter
2021
conf/asiacrypt
Balanced Non-adjacent Forms.
Marc Joye
2019
conf/esorics
PINFER: Privacy-Preserving Inference - Logistic Regression, Support Vector Machines, and More, over Encrypted Data.
Marc Joye
Fabien A. P. Petitcolas
2019
conf/cans
Private Data Aggregation over Selected Subsets of Users.
Amit Datta
Marc Joye
Nadia Fawaz
2018
conf/ccs
RSA Signatures Under Hardware Restrictions.
Marc Joye
Yan Michalevsky
2018
conf/acns
Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption.
Irene Giacomelli
Somesh Jha
Marc Joye
C. David Page
Kyonghwan Yoon
2018
conf/esorics
Decentralized Policy-Hiding ABE with Receiver Privacy.
Yan Michalevsky
Marc Joye
2018
conf/ctrsa
Differential Attacks on Deterministic Signatures.
Christopher Ambrose
Joppe W. Bos
Björn Fay
Marc Joye
Manfred Lochter
Bruce Murray
2017
journals/joc
Efficient Cryptosystems From 2<sup>k</sup>-th Power Residue Symbols.
Fabrice Benhamouda
Javier Herranz
Marc Joye
Benoît Libert
2017
conf/ctrsa
Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves.
Marc Joye
Benoît Libert
2016
conf/pkc
Identity-Based Cryptosystems and Quadratic Residuosity.
Marc Joye
2015
conf/pkc
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.
Benoît Libert
Marc Joye
Moti Yung
Thomas Peters
2015
conf/asiacrypt
Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
Benoît Libert
Thomas Peters
Marc Joye
Moti Yung
2014
conf/pkc
Traceable Group Encryption.
Benoît Libert
Moti Yung
Marc Joye
Thomas Peters
2014
conf/ctrsa
Group Signatures with Message-Dependent Opening in the Standard Model.
Benoît Libert
Marc Joye
2014
conf/eurocrypt
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
Benoît Libert
Thomas Peters
Marc Joye
Moti Yung
2014
conf/asiacrypt
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
Benoît Libert
Marc Joye
Moti Yung
Thomas Peters
2013
conf/ccs
Privacy-preserving matrix factorization.
Valeria Nikolaenko
Stratis Ioannidis
Udi Weinsberg
Marc Joye
Nina Taft
Dan Boneh
2013
conf/crypto
Linearly Homomorphic Structure-Preserving Signatures and Their Applications.
Benoît Libert
Thomas Peters
Marc Joye
Moti Yung
2013
conf/fc
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data.
Marc Joye
Benoît Libert
2013
conf/sp
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records.
Valeria Nikolaenko
Udi Weinsberg
Stratis Ioannidis
Marc Joye
Dan Boneh
Nina Taft
2013
conf/acns
Toward Practical Group Encryption.
Laila El Aimani
Marc Joye
2013
conf/fdtc
Elliptic Curve Cryptosystems in the Presence of Faults.
Marc Joye
2013
conf/eurocrypt
</sup>-th Power Residue Symbols.
Marc Joye
Benoît Libert
2012
conf/sp
A Method for Preventing "Skipping" Attacks.
Marc Joye
2011
conf/ctrsa
Binary Huff Curves.
Julien Devigne
Marc Joye
2011
conf/africacrypt
Coordinate Representation.
Michael Hutter
Marc Joye
Yannick Sierra
2010
conf/ches
Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract).
Raveen R. Goundar
Marc Joye
Atsuko Miyaji
2010
conf/ches
Coordinate Blinding over Large Prime Fields.
Michael Tunstall
Marc Joye
2010
conf/pkc
Efficient Arithmetic on Hessian Curves.
Reza Rezaeian Farashahi
Marc Joye
2009
conf/provsec
Chosen-Ciphertext Secure RSA-Type Cryptosystems.
Benoît Chevallier-Mames
Marc Joye
2009
conf/fdtc
Protecting RSA against Fault Attacks: The Embedding Method.
Marc Joye
2009
conf/africacrypt
Exponent Recoding and Regular Exponentiation Algorithms.
Marc Joye
Michael Tunstall
2009
conf/sacrypt
-Ary Powering Ladders.
Marc Joye
2009
conf/cans
On Cryptographic Schemes Based on Discrete Logarithms and Factoring.
Marc Joye
2008
conf/fdtc
On the Security of a Unified Countermeasure.
Marc Joye
2008
conf/africacrypt
Twisted Edwards Curves.
Daniel J. Bernstein
Peter Birkner
Marc Joye
Tanja Lange
Christiane Peters
2008
conf/cans
An Efficient On-Line/Off-Line Signature Scheme without Random Oracles.
Marc Joye
2007
conf/provsec
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers.
Ermaliza Razali
Raphael C.-W. Phan
Marc Joye
2007
conf/ches
Highly Regular Right-to-Left Algorithms for Scalar Multiplication.
Marc Joye
2007
conf/ctrsa
A Practical and Tightly Secure Signature Scheme Without Hash Function.
Benoît Chevallier-Mames
Marc Joye
2006
conf/ches
Fast Generation of Prime Numbers on Portable Devices: An Update.
Marc Joye
Pascal Paillier
2005
conf/ches
On Second-Order Differential Power Analysis.
Marc Joye
Pascal Paillier
Berry Schoenmakers
2003
conf/ches
Faster Double-Size Modular Multiplication from Euclidean Multipliers.
Benoît Chevallier-Mames
Marc Joye
Pascal Paillier
2003
conf/ches
GCD-Free Algorithms for Computing Modular Inverses.
Marc Joye
Pascal Paillier
2003
conf/icics
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography.
Mathieu Ciet
Marc Joye
2002
conf/crypto
Universal Padding Schemes for RSA.
Jean-Sébastien Coron
Marc Joye
David Naccache
Pascal Paillier
2002
conf/ches
The Montgomery Powering Ladder.
Marc Joye
Sung-Ming Yen
2002
conf/pkc
Weierstraß Elliptic Curves and Side-Channel Attacks.
Eric Brier
Marc Joye
2002
conf/pkc
New Minimal Modified Radix-r Representation with Applications to Smart Cards.
Marc Joye
Sung-Ming Yen
2002
conf/pkc
One-Way Cross-Trees and Their Applications.
Marc Joye
Sung-Ming Yen
2002
conf/pkc
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages.
Jean-Sébastien Coron
Helena Handschuh
Marc Joye
Pascal Paillier
David Pointcheval
Christophe Tymen
2002
conf/ctrsa
Observability Analysis - Detecting When Improved Cryptosystems Fail.
Marc Joye
Jean-Jacques Quisquater
Sung-Ming Yen
Moti Yung
2002
conf/ctrsa
GEM: A Generic Chosen-Ciphertext Secure Encryption Method.
Jean-Sébastien Coron
Helena Handschuh
Marc Joye
Pascal Paillier
David Pointcheval
Christophe Tymen
2001
conf/ches
Hessian Elliptic Curves and Side-Channel Attacks.
Marc Joye
Jean-Jacques Quisquater
2001
conf/ches
Universal Exponentiation Algorithm.
Christophe Clavier
Marc Joye
2001
conf/ches
Protections against Differential Analysis for Elliptic Curve Cryptography.
Marc Joye
Christophe Tymen
2001
conf/pkc
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography.
Marc Joye
Christophe Tymen
2001
conf/ctrsa
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC.
Marc Joye
Jean-Jacques Quisquater
Moti Yung
2000
conf/crypto
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
Giuseppe Ateniese
Jan Camenisch
Marc Joye
Gene Tsudik
2000
conf/ches
Efficient Generation of Prime Numbers.
Marc Joye
Pascal Paillier
Serge Vaudenay
2000
conf/eurocrypt
New Attacks on PKCS#1 v1.5 Encryption.
Jean-Sébastien Coron
Marc Joye
David Naccache
Pascal Paillier
1999
journals/joc
Chinese Remaindering Based Cryptosystems in the Presence of Faults.
Marc Joye
Arjen K. Lenstra
Jean-Jacques Quisquater
1997
conf/ccs
On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack.
Marc Joye
Jean-Jacques Quisquater
1997
conf/icics
A new and optimal chosen-message attack on RSA-type cryptosystems.
Daniel Bleichenbacher
Marc Joye
Jean-Jacques Quisquater
Coauthors
Amit Datta
(1)
Arjen K. Lenstra
(1)
Atsuko Miyaji
(1)
Benoît Chevallier-Mames
(3)
Benoît Libert
(11)
Berry Schoenmakers
(1)
Björn Fay
(1)
Bruce Murray
(1)
C. David Page
(1)
Christiane Peters
(1)
Christophe Clavier
(1)
Christophe Tymen
(4)
Christopher Ambrose
(1)
Dan Boneh
(2)
Daniel Bleichenbacher
(1)
Daniel J. Bernstein
(1)
David Naccache
(2)
David Pointcheval
(2)
Eric Brier
(1)
Ermaliza Razali
(1)
Fabien A. P. Petitcolas
(1)
Fabrice Benhamouda
(1)
Gene Tsudik
(1)
Giuseppe Ateniese
(1)
Helena Handschuh
(2)
Irene Giacomelli
(1)
Jan Camenisch
(1)
Javier Herranz
(1)
Jean-Jacques Quisquater
(6)
Jean-Sébastien Coron
(4)
Joppe W. Bos
(1)
Julien Devigne
(1)
Kyonghwan Yoon
(1)
Laila El Aimani
(1)
Manfred Lochter
(1)
Marc Joye
(69)
Mathieu Ciet
(1)
Michael Hutter
(1)
Michael Tunstall
(2)
Michael Walter
(2)
Moti Yung
(8)
Nadia Fawaz
(1)
Nigel P. Smart
(1)
Nina Taft
(2)
Olivier Bernard
(1)
Pascal Paillier
(9)
Peter Birkner
(1)
Raphaël C.-W. Phan
(1)
Raveen R. Goundar
(1)
Reza Rezaeian Farashahi
(1)
Serge Vaudenay
(1)
Somesh Jha
(1)
Stratis Ioannidis
(2)
Sung-Ming Yen
(4)
Tanja Lange
(1)
Thomas Peters
(6)
Udi Weinsberg
(2)
Valeria Nikolaenko
(2)
Yan Michalevsky
(2)
Yannick Sierra
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to