dblp.uni-trier.dewww.uni-trier.de

Marc Joye Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
62EEMarc Joye, Michael Tunstall: Exponent Recoding and Regular Exponentiation Algorithms. AFRICACRYPT 2009: 334-349
61EEGiuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006. IJACT 1(4): 320-322 (2009)
2008
60 Gregory L. Heileman, Marc Joye: Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008 ACM 2008
59EEDaniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters: Twisted Edwards Curves. AFRICACRYPT 2008: 389-405
58EEMarc Joye: An Efficient On-Line/Off-Line Signature Scheme without Random Oracles. CANS 2008: 98-107
57EEMarc Joye: On the Security of a Unified Countermeasure. FDTC 2008: 87-91
56EEMarc Joye: RSA Moduli with a Predetermined Portion: Techniques and Applications. ISPEC 2008: 116-130
55EEMarc Joye: Fast Point Multiplication on Elliptic Curves without Precomputation. WAIFI 2008: 36-46
2007
54EEMarc Joye: Highly Regular Right-to-Left Algorithms for Scalar Multiplication. CHES 2007: 135-147
53EEBenoît Chevallier-Mames, Marc Joye: A Practical and Tightly Secure Signature Scheme Without Hash Function. CT-RSA 2007: 339-356
52EEAyoub Massoudi, Frédéric Lefèbvre, Marc Joye: Cryptanalysis of a Video Scrambling Based on Space Filling Curves. ICME 2007: 1683-1686
51EEErmaliza Razali, Raphael C.-W. Phan, Marc Joye: On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. ProvSec 2007: 188-197
50 Marc Joye, Michael Tunstall: Securing OpenSSL against Micro-Architectural Attacks. SECRYPT 2007: 189-196
2006
49EEMarc Joye, Pascal Paillier: Fast Generation of Prime Numbers on Portable Devices: An Update. CHES 2006: 160-173
48EEMarc Joye, Hung-Mei Lin: On the TYS Signature Scheme. ICCSA (3) 2006: 338-344
47EEMathieu Ciet, Marc Joye, Kristin Lauter, Peter L. Montgomery: Trading Inversions for Multiplications in Elliptic Curve Cryptography. Des. Codes Cryptography 39(2): 189-206 (2006)
2005
46EEMarc Joye, Pascal Paillier, Berry Schoenmakers: On Second-Order Differential Power Analysis. CHES 2005: 293-308
45EEMarc Joye, Francis Olivier: Side-Channel Analysis. Encyclopedia of Cryptography and Security 2005
44EEMathieu Ciet, Marc Joye: Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. Des. Codes Cryptography 36(1): 33-43 (2005)
2004
43 Marc Joye, Jean-Jacques Quisquater: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings Springer 2004
42 Marc Joye: Smart-Card Implementation of Elliptic Curve Cryptography and DPA-type Attacks. CARDIS 2004: 115-126
41EEBenoît Chevallier-Mames, Mathieu Ciet, Marc Joye: Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. IEEE Trans. Computers 53(6): 760-768 (2004)
2003
40 Marc Joye: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings Springer 2003
39EEOlivier Billet, Marc Joye: The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. AAECC 2003: 34-42
38EEEric Brier, Marc Joye: Fast Point Multiplication on Elliptic Curves through Isogenies. AAECC 2003: 43-50
37EEBenoît Chevallier-Mames, Marc Joye, Pascal Paillier: Faster Double-Size Modular Multiplication from Euclidean Multipliers. CHES 2003: 214-227
36EEMarc Joye, Pascal Paillier: GCD-Free Algorithms for Computing Modular Inverses. CHES 2003: 243-253
35EEMathieu Ciet, Marc Joye: (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. ICICS 2003: 348-359
34EEMarc Joye: Cryptanalysis of a pay-as-you-watch system. Inf. Process. Lett. 88(3): 119-120 (2003)
2002
33EEMarc Joye, Karine Villegas: A Protected Division Algorithm. CARDIS 2002
32EEMarc Joye, Sung-Ming Yen: The Montgomery Powering Ladder. CHES 2002: 291-302
31EEJean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier: Universal Padding Schemes for RSA. CRYPTO 2002: 226-241
30EEMarc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung: Observability Analysis - Detecting When Improved Cryptosystems Fail. CT-RSA 2002: 17-29
29EEJean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen: GEM: A Generic Chosen-Ciphertext Secure Encryption Method. CT-RSA 2002: 263-276
28EEJean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen: Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Public Key Cryptography 2002: 17-33
27EEEric Brier, Marc Joye: Weierstraß Elliptic Curves and Side-Channel Attacks. Public Key Cryptography 2002: 335-345
26EEMarc Joye, Sung-Ming Yen: One-Way Cross-Trees and Their Applications. Public Key Cryptography 2002: 346-356
25EEMarc Joye, Sung-Ming Yen: New Minimal Modified Radix-r Representation with Applications to Smart Cards. Public Key Cryptography 2002: 375-384
2001
24EEChristophe Clavier, Marc Joye: Universal Exponentiation Algorithm. CHES 2001: 300-308
23EEMarc Joye, Christophe Tymen: Protections against Differential Analysis for Elliptic Curve Cryptography. CHES 2001: 377-390
22EEMarc Joye, Jean-Jacques Quisquater: Hessian Elliptic Curves and Side-Channel Attacks. CHES 2001: 402-410
21EEMarc Joye, Jean-Jacques Quisquater, Moti Yung: On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. CT-RSA 2001: 208-222
20EESeungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng: Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMA Int. Conf. 2001: 114-127
19EEMarc Joye, Jean-Jacques Quisquater: On Rabin-Type Signatures. IMA Int. Conf. 2001: 99-113
18EEMarc Joye, Christophe Tymen: Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. Public Key Cryptography 2001: 353-364
17 Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi: How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. Des. Codes Cryptography 23(3): 297-316 (2001)
2000
16EEMarc Joye, Pascal Paillier, Serge Vaudenay: Efficient Generation of Prime Numbers. CHES 2000: 340-354
15EEGiuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270
14EEJean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier: New Attacks on PKCS#1 v1.5 Encryption. EUROCRYPT 2000: 369-381
13EEMarc Joye, Sung-Ming Yen: Optimal Left-to-Right Binary Signed-Digit Recoding. IEEE Trans. Computers 49(7): 740-748 (2000)
12EESung-Ming Yen, Marc Joye: Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. IEEE Trans. Computers 49(9): 967-970 (2000)
1999
11EEMarc Joye, Seungjoo Kim, Narn-Yih Lee: Cryptanalysis of Two Group Signature Schemes. ISW 1999: 271-275
10EEMarc Joye, Narn-Yih Lee, Tzonelih Hwang: On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. ISW 1999: 47-51
9EEMarc Joye, Arjen K. Lenstra, Jean-Jacques Quisquater: Chinese Remaindering Based Cryptosystems in the Presence of Faults. J. Cryptology 12(4): 241-245 (1999)
1998
8 Marc Joye, Jean-Jacques Quisquater: Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams. Des. Codes Cryptography 14(1): 53-56 (1998)
7 Marc Joye, Sung-Ming Yen: ID-based Secret-Key Cryptography. Operating Systems Review 32(4): 33-39 (1998)
1997
6EEMarc Joye, Jean-Jacques Quisquater: On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack. ACM Conference on Computer and Communications Security 1997: 135-141
5 Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater: A new and optimal chosen-message attack on RSA-type cryptosystems. ICICS 1997: 302-313
4 Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng: RSA-type Signatures in the Presence of Transient Faults. IMA Int. Conf. 1997: 155-160
3 Jean-Jacques Quisquater, Benoit M. Macq, Marc Joye, N. Degand, A. Bernard: Practical Solution to Authentication of Images with a Secure Camera. Storage and Retrieval for Image and Video Databases (SPIE) 1997: 290-297
2 Jean-Jacques Quisquater, Marc Joye: Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences. Journal of Computer Security 5(3): 213-224 (1997)
1996
1 Marc Joye, Jean-Jacques Quisquater: Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves. Security Protocols Workshop 1996: 93-100

Coauthor Index

1Giuseppe Ateniese [15] [61]
2Feng Bao [4]
3A. Bernard [3]
4Daniel J. Bernstein [59]
5Olivier Billet [39]
6Peter Birkner [59]
7Daniel Bleichenbacher [5]
8Eric Brier [27] [38]
9Jan Camenisch [15] [61]
10Jung Hee Cheon [20]
11Benoît Chevallier-Mames [37] [41] [53]
12Mathieu Ciet [35] [41] [44] [47]
13Christophe Clavier [24]
14Jean-Sébastien Coron [14] [28] [29] [31]
15N. Degand [3]
16Robert H. Deng (Robert Huijie Deng) [4]
17Helena Handschuh [28] [29]
18Gregory L. Heileman [60]
19Tzonelih Hwang [10]
20Seungjoo Kim [11] [20]
21Tanja Lange [59]
22Kristin Lauter (Kristin E. Lauter) [47]
23Narn-Yih Lee [10] [11]
24Frédéric Lefèbvre [52]
25Arjen K. Lenstra [9]
26Seongan Lim [20]
27Hung-Mei Lin [48]
28Benoit M. Macq (Benoît Macq) [3]
29Masahiro Mambo [20]
30Ayoub Massoudi [52]
31Peter L. Montgomery [47]
32David Naccache [14] [31]
33Francis Olivier [45]
34Pascal Paillier [14] [16] [28] [29] [31] [36] [37] [46] [49]
35Christiane Peters [59]
36Raphael Chung-Wei Phan (Raphael C.-W. Phan) [51]
37David Pointcheval [28] [29]
38Jean-Jacques Quisquater [1] [2] [3] [4] [5] [6] [8] [9] [17] [19] [21] [22] [30] [43]
39Ermaliza Razali [51]
40Berry Schoenmakers [46]
41Tsuyoshi Takagi [17]
42Gene Tsudik [15] [61]
43Michael Tunstall [50] [62]
44Christophe Tymen [18] [23] [28] [29]
45Serge Vaudenay [16]
46Karine Villegas [33]
47Dongho Won [20]
48Sung-Ming Yen [7] [12] [13] [25] [26] [30] [32]
49Moti Yung (Mordechai M. Yung) [21] [30]
50Yuliang Zheng [20]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)