Marc Joye
Orcid: 0000-0003-4433-2333
According to our database1,
Marc Joye
authored at least 143 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022
2021
IACR Cryptol. ePrint Arch., 2021
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks.
IACR Cryptol. ePrint Arch., 2021
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More.
IACR Cryptol. ePrint Arch., 2021
2020
J. Math. Cryptol., 2020
2019
PINFER: Privacy-Preserving Inference - Logistic Regression, Support Vector Machines, and More, over Encrypted Data.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Computer Security, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
J. Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
2016
ACM Trans. Inf. Syst. Secur., 2016
Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares.
Theor. Comput. Sci., 2016
J. Cryptogr. Eng., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the New Codebreakers, 2016
2015
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
Cryptogr. Commun., 2015
Proceedings of the SECRYPT 2015, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
2014
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
2013
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Algebraic Informatics - 5th International Conference, 2013
2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
J. Cryptogr. Eng., 2011
Des. Codes Cryptogr., 2011
Proceedings of the 11th ACM Workshop on Digital Rights Management, 2011
Proceedings of the Smart Card Research and Advanced Applications, 2011
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-<i>Z</i> Coordinate Representation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Co-<i>Z</i> Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
2009
Int. J. Appl. Cryptogr., 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
A simple construction for public-key encryption with revocable anonymity: the honest-sender case.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the Arithmetic of Finite Fields, 2nd International Workshop, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
IET Inf. Secur., 2007
Securing OpenSSL against Micro-Architectural Attacks.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the Provable Security, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2006
Des. Codes Cryptogr., 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Des. Codes Cryptogr., 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity.
IEEE Trans. Computers, 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Proceedings of the Applied Algebra, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
2001
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves.
Des. Codes Cryptogr., 2001
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography.
Proceedings of the Public Key Cryptography, 2001
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Topics in Cryptology, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
2000
IEEE Trans. Computers, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
1999
J. Cryptol., 1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the Information Security, Second International Workshop, 1999
1998
Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams.
Des. Codes Cryptogr., 1998
1997
Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences.
J. Comput. Secur., 1997
Proceedings of the Storage and Retrieval for Image and Video Databases V, 1997
Proceedings of the Cryptography and Coding, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the CCS '97, 1997
1996
Proceedings of the Security Protocols, 1996
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996