A practical and provably secure coalition-resistant group signature scheme G Ateniese, J Camenisch, M Joye, G Tsudik Annual international cryptology conference, 255-270, 2000 | 1214 | 2000 |
The Montgomery powering ladder M Joye, SM Yen International workshop on cryptographic hardware and embedded systems, 291-302, 2002 | 569 | 2002 |
Twisted edwards curves DJ Bernstein, P Birkner, M Joye, T Lange, C Peters International Conference on Cryptology in Africa, 389-405, 2008 | 443 | 2008 |
Weierstraß elliptic curves and side-channel attacks E Brier, M Joye International Workshop on Public Key Cryptography, 335-345, 2002 | 419 | 2002 |
Checking before output may not be enough against fault-based cryptanalysis SM Yen, M Joye IEEE Transactions on computers 49 (9), 967-970, 2000 | 406 | 2000 |
Privacy-preserving ridge regression on hundreds of millions of records V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, D Boneh, N Taft 2013 IEEE Symposium on Security and Privacy, 334-348, 2013 | 346 | 2013 |
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity B Chevallier-Mames, M Ciet, M Joye IEEE Transactions on computers 53 (6), 760-768, 2004 | 328 | 2004 |
Protections against differential analysis for elliptic curve cryptography—an algebraic approach— M Joye, C Tymen international workshop on cryptographic hardware and embedded systems, 377-390, 2001 | 289 | 2001 |
Hessian elliptic curves and side-channel attacks M Joye, JJ Quisquater International workshop on cryptographic hardware and embedded systems, 402-410, 2001 | 259 | 2001 |
Privacy-preserving matrix factorization V Nikolaenko, S Ioannidis, U Weinsberg, M Joye, N Taft, D Boneh Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 241 | 2013 |
Trading inversions for multiplications in elliptic curve cryptography M Ciet, M Joye, K Lauter, PL Montgomery Designs, codes and cryptography 39 (2), 189-206, 2006 | 224 | 2006 |
Chinese remaindering based cryptosystems in the presence of faults M Joye, AK Lenstra, JJ Quisquater Journal of cryptology 12 (4), 241-245, 1999 | 221 | 1999 |
Elliptic curve cryptosystems in the presence of permanent and transient faults M Ciet, M Joye Designs, codes and cryptography 36 (1), 33-43, 2005 | 220 | 2005 |
Optimal left-to-right binary signed-digit recoding M Joye, SM Yen IEEE Transactions on Computers 49 (7), 740-748, 2000 | 207 | 2000 |
Fault analysis in cryptography M Joye, M Tunstall Springer, 2012 | 190 | 2012 |
On second-order differential power analysis M Joye, P Paillier, B Schoenmakers International workshop on cryptographic hardware and embedded systems, 293-308, 2005 | 186 | 2005 |
Universal Exponentiation Algorithm A First Step towards Provable SPA-Resistance C Clavier, M Joye International Workshop on Cryptographic Hardware and Embedded Systems, 300-308, 2001 | 183 | 2001 |
The Jacobi model of an elliptic curve and side-channel analysis O Billet, M Joye International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2003 | 144 | 2003 |
Highly regular right-to-left algorithms for scalar multiplication M Joye International Workshop on Cryptographic Hardware and Embedded Systems, 135-147, 2007 | 136 | 2007 |
A new framework for privacy-preserving aggregation of time-series data F Benhamouda, M Joye, B Libert ACM Transactions on Information and System Security (TISSEC) 18 (3), 1-21, 2016 | 115* | 2016 |