关注
Marc Joye
Marc Joye
Zama
在 zama.ai 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
13012000
The Montgomery powering ladder
M Joye, SM Yen
International workshop on cryptographic hardware and embedded systems, 291-302, 2002
7012002
Twisted edwards curves
DJ Bernstein, P Birkner, M Joye, T Lange, C Peters
Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008
6692008
Privacy-preserving ridge regression on hundreds of millions of records
V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, D Boneh, N Taft
2013 IEEE symposium on security and privacy, 334-348, 2013
6152013
Checking before output may not be enough against fault-based cryptanalysis
SM Yen, M Joye
IEEE Transactions on computers 49 (9), 967-970, 2000
4982000
Weierstraß elliptic curves and side-channel attacks
E Brier, M Joye
International workshop on public key cryptography, 335-345, 2002
4812002
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
B Chevallier-Mames, M Ciet, M Joye
IEEE Transactions on computers 53 (6), 760-768, 2004
3782004
Privacy-preserving matrix factorization
V Nikolaenko, S Ioannidis, U Weinsberg, M Joye, N Taft, D Boneh
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3672013
Protections against differential analysis for elliptic curve cryptography—an algebraic approach—
M Joye, C Tymen
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
3122001
Hessian elliptic curves and side-channel attacks
M Joye, JJ Quisquater
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
2972001
Fault analysis in cryptography
M Joye, M Tunstall
Springer, 2012
2632012
Trading inversions for multiplications in elliptic curve cryptography
M Ciet, M Joye, K Lauter, PL Montgomery
Designs, codes and cryptography 39, 189-206, 2006
2452006
Elliptic curve cryptosystems in the presence of permanent and transient faults
M Ciet, M Joye
Designs, codes and cryptography 36 (1), 33-43, 2005
2442005
Optimal left-to-right binary signed-digit recoding
M Joye, SM Yen
IEEE Transactions on Computers 49 (7), 740-748, 2000
2252000
Chinese remaindering based cryptosystems in the presence of faults
M Joye, AK Lenstra, JJ Quisquater
Journal of cryptology 12, 241-245, 1999
2161999
On second-order differential power analysis
M Joye, P Paillier, B Schoenmakers
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
2082005
Universal Exponentiation Algorithm A First Step towards Provable SPA-Resistance
C Clavier, M Joye
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
2072001
Programmable bootstrapping enables efficient homomorphic inference of deep neural networks
I Chillotti, M Joye, P Paillier
Cyber Security Cryptography and Machine Learning: 5th International …, 2021
1822021
The Jacobi model of an elliptic curve and side-channel analysis
O Billet, M Joye
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 15th …, 2003
1772003
A scalable scheme for privacy-preserving aggregation of time-series data
M Joye, B Libert
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
1712013
系统目前无法执行此操作,请稍后再试。
文章 1–20