Publications and Communications
Peer-Reviewed Articles & Books
Books, Book Chapters, and Proceedings
Advances in Cryptology – EUROCRYPT 2024 Marc Joye and Gregor Leander, Eds., vol. 14651-14657 of Lecture Notes in Computer Science, Springer, 2024 [ Online version: Part I | Part II | Part III | Part IV | Part V | Part VI | Part VII ] |
|
Progress in Cryptology – AFRICACRYPT 2017 Marc Joye and Abderrahmane Nitaj, Eds., vol. 10239 of Lecture Notes in Computer Science, Springer, 2017 [ Online version ] |
|
Guide to Pairing-Based Cryptography Nadia El Mrabet and Marc Joye, Eds., Cryptography and Network Security Series, CRC Press, 2016 [ Online version ] |
|
Smart Card Research and Advanced Applications Marc Joye and Amir Moradi, Eds., vol. 8968 of Lecture Notes in Computer Science, Springer, 2015 [ Online version ] |
|
Fault Analysis in Cryptography Marc Joye and Michael Tunstall, Eds., Information Security and Cryptography, Springer, 2012 [ Online version ] |
|
Security Aspects in Information Technology Marc Joye, Debdeep Mukhopadhyay, and Michael Tunstall, Eds., vol. 7011 of Lecture Notes in Computer Science, Springer, 2011 [ Online version ] |
|
Pairing-Based Cryptography –
Pairing 2010 Marc Joye, Atsuko Miyaji, and Akira Otsuka, Eds., vol. 6487 of Lecture Notes in Computer Science, Springer, 2010 [ Online version ] |
|
Proceedings of the 10th ACM Workshop on Digital Rights
Management Hongxia Jin and Marc Joye, Eds., ACM Press, 2010 [ Online version ] |
|
Proceedings of the 7th International Workshop on Fault
Diagnosis and Tolerance in Cryptography Luca Breveglieri, Marc Joye, Israel Koren, David Naccache, and Ingrid Verbauwhede, Eds., IEEE Computer Society, 2010 [ Online version ] |
|
Basics of side-channel analysis Chapter 13, in Ç.K. Koç, Ed., Cryptographic Engineering, Springer, 2009 [ Online version ] |
|
Identity-Based Cryptography Marc Joye and Gregory Neven, Eds., vol. 2 of Cryptology and Information Security Series, IOS Press, 2009 [ Online version ] |
|
Proceedings of the 8th ACM Workshop on Digital Rights
Management Gregory Heileman and Marc Joye, Eds., ACM Press, 2008 [ Online version ] |
|
Defences against side-channel analysis Chapter V, in I. F. Blake, G. Seroussi, and N. P. Smart, Eds., Advances in Elliptic Curve Cryptography, vol. 317 of London Mathematical Society Lecture Note Series, Cambridge University Press, 2005 [ Online version ] |
|
Cryptographic Hardware and Embedded Systems –
CHES 2004 Marc Joye and Jean-Jacques Quisquater, Eds., vol. 3156 of Lecture Notes in Computer Science, Springer-Verlag, 2004 [ Online version ] |
|
Topics in Cryptology – CT-RSA 2003 Marc Joye, Ed., vol. 2612 of Lecture Notes in Computer Science, Springer-Verlag, 2003 [ Online version ] |
|
Notes and pointers for
cryptography research In C.-S. Laih, Ed., Information & Communication Security, STIC, 2002 |
Journal and Book Articles
- Differential fault analysis PDF
Marc Joye and Michael Tunstall
In S. Jajodia, P. Samarati, and M. Yung, Eds., Encyclopedia of Cryptography, Security and Privacy, 2023 - SoK: Fully homomorphic encryption over the [discretized] torus PDF
Marc Joye
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(4):661-692, 2022 - The eleventh power residue symbol PDF
Marc Joye, Oleksandra Lapiha, Ky Nguyen, and David Naccache
Journal of Mathematical Cryptology, 15(1):111-122, 2021
(Earlier version in MathCrypt 2019, Santa Barbara, CA, USA, August 18, 2019) - Protecting ECC against fault attacks: The ring extension method revisited PDF
Marc Joye
Journal of Mathematical Cryptology, 14(1):254-267, 2020 - New number-theoretic cryptographic primitives PDF
Éric Brier, Houda Ferradi, Marc Joye, and David Naccache
Journal of Mathematical Cryptology, 14(1):224-235, 2020 - Cryptanalysis of a privacy-preserving aggregation protocol PDF
Amit Datta and Marc Joye
IEEE Transactions on Dependable and Secure Computing, 14(6):693-694, 2017 - Efficient cryptosystems from 2k-th power residue symbols PDF
Fabrice Benhamouda, Javier Herranz, Marc Joye, and Benoît Libert
Journal of Cryptology, 30(2):519-549, 2017 - Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares PDF
Benoît Libert, Marc Joye, and Moti Yung
Theoretical Computer Science, 645:1-24, 2016 - Inversion-free arithmetic on elliptic curves through isomorphisms PDF
Raveen R. Goundar and Marc Joye
Journal of Cryptographic Engineering, 6(3):187-199, 2016 - Secure ElGamal-type cryptosystems without message encoding PDF
Marc Joye
In P. Y. A. Ryan, D. Naccache, and J.-J. Quisquater, Eds., The New Codebreakers (Kahn Festschrift), vol. 9100 of Lecture Notes in Computer Science, pp. 470-478, Springer, 2016 - A new framework for privacy-preserving aggregation of time-series data PDF
Fabrice Benhamouda, Marc Joye, and Benoît Libert
ACM Transactions on Information and System Security, 18(3), Article 10 (21 pages), 2016 - Linearly homomorphic structure-preserving signatures and their applications PDF
Benoît Libert, Thomas Peters, Marc Joye, and Moti Yung
Designs, Codes and Cryptography, 77(2):441-477, 2015 - The distributions of individual bits in the output of multiplicative operations PDF
Michael Tunstall and Marc Joye
Cryptography and Communications, 7(1):71-90, 2015 - On Quisquater's multiplication algorithm PDF
Marc Joye
In D. Naccache, Ed., Cryptography and Security: From Theory to Applications (Quisquater Festschrift), vol. 6805 of Lecture Notes in Computer Science, pages 3-7, Springer, 2012 - Scalar multiplication on Weierstraß elliptic curves from co-Z arithmetic PDF
Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, and Alexandre Venelli
Journal of Cryptographic Engineering, 1(2):161-176, 2011 - Notions and relations for RKA-secure permutation and function families PDF
Jongsung Kim, Jaechul Sung, Ermaliza Razali, Raphael Phan, and Marc Joye
Designs, Codes and Cryptography, 60(1):15-35, 2011 - How (not) to design strong-RSA signatures PDF
Marc Joye
Designs, Codes and Cryptography, 59(1/3):169-182, 2011
(Earlier version in A. Kholosha, E. Rosnes, and M. Parker, Eds., International Workshop on Coding and Cryptography (WCC 2009), Preproceedings, pp. 142-157, 2009) - Remarks on "Analysis of one popular group signature scheme" in Asiacrypt 2006 PDF
Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik
International Journal of Applied Cryptography, 1(4):320-322, 2009 - Strengthening hardware AES implementations against fault attacks PDF
Marc Joye, Pascal Manet, and Jean-Baptiste Rigaud
IET Information Security, 1(3):106-110, 2007 - Side-channel attacks against OpenSSL
Marc Joye and Çetin K. Koç
The Security Newsletter, 5:5-6, Spring 2007 - Handbook of elliptic and hyperelliptic curve cryptography
Marc Joye
In R.E. O'Malley, Jr., Ed., Book reviews, SIAM Review, 48(3):615-616, 2006 - Trading inversions for multiplications in elliptic curve cryptography PDF
Mathieu Ciet, Marc Joye, Kristin Lauter, and Peter L. Montgomery
Designs, Codes and Cryptography, 39(2):189-206, 2006 - Side-channel analysis PDF
Marc Joye and Francis Olivier
In H. van Tilborg, Ed., Encyclopedia of Cryptography and Security, pages 571-576, Kluwer Academic Publishers, 2005
(Also in H. C. A. van Tilborg and S. Jajodia, Eds., Encyclopedia of Cryptography and Security, Part 19, pages 1198-1204, Springer, 2nd edition, 2011; DOI:10.1007/978-1-4419-5906-5_516) - Elliptic curve cryptosystems in the presence of permanent and transient faults PDF
Mathieu Ciet and Marc Joye
Designs, Codes and Cryptography, 36(1):33-43, 2005 - Unified point addition formulæ for elliptic curve cryptosystems
Éric Brier, Isabelle Déchène, and Marc Joye
In N. Nedjah and L. de Macedo, Eds., Embedded Cryptographic Hardware: Methodologies & Architectures, pages 247-256, Nova Science Publishers, 2004 - Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity PDF
Benoît Chevallier-Mames, Mathieu Ciet, and Marc Joye
IEEE Transactions on Computers, 53(6):760-768, 2004 - Cryptanalysis of a pay-as-you-watch system PDF
Marc Joye
Information Processing Letters, 88(3):119-120, 2003 - Elliptic curves and side-channel analysis PDF
Marc Joye
ST Journal of System Research, 4(1):17-21, 2003 - Protecting RSA against fault attacks
Olivier Benoit and Marc Joye
Smart Times, 4(2), 2002 - Recovering lost efficiency of exponentiation algorithms on smart cards PDF
Marc Joye
Electronics Letters, 38(19):1095-1097, 2002 - How to choose secret parameters for RSA and its extensions to elliptic curves PDF
Marc Joye, Jean-Jacques Quisquater, and Tsuyoshi Takagi
Designs, Codes and Cryptography, 23(3):297-316, 2001
(Earlier version in D.J. Guan, Ed., Conference on Information Security, pp. 355-367, Kaoshung, Taiwan, May 1998) - Checking before output may not be enough against fault-based cryptanalysis PDF
Sung-Ming Yen and Marc Joye
IEEE Transactions on Computers, 49(9):967-970, 2000 - Optimal left-to-right binary signed-digit exponent recoding PDF
Marc Joye and Sung-Ming Yen
IEEE Transactions on Computers, 49(7):740-748, 2000 - Chinese remaindering cryptosystems in the presence of faults PDF
Marc Joye, Arjen K. Lenstra, and Jean-Jacques Quisquater
Journal of Cryptology, 12(4):241-245, 1999 - ID-based secret-key cryptography PDF
Marc Joye and Sung-Ming Yen
ACM Operating Systems Review, 32(4):33-39, 1998 - Improved authenticated multiple-key agreement protocol PDF
Sung-Ming Yen and Marc Joye
Electronics Letters, 34(18):1738-1739, 1998 - Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams PDF
Marc Joye and Jean-Jacques Quisquater
Designs, Codes and Cryptography, 14(1):53-56, 1998 - Cryptanalysis of RSA-type cryptosystems: A visit PDF
Marc Joye and Jean-Jacques Quisquater
Network Threats, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 38:21-31, 1998 - Cryptosystem of Chua and Ling PDF
Marc Joye and Jean-Jacques Quisquater
Electronics Letters, 33(23):1938, 1997 - Normalisation in diminished-radix modulus transformation PDF
Jean-François Dhem, Marc Joye, and Jean-Jacques Quisquater
Electronics Letters, 33(23):1931, 1997 - Authentication of sequences with the SL2 hash function: Application to video sequences PDF
Jean-Jacques Quisquater and Marc Joye
Journal of Computer Security, 5(3):213-223, 1997 - Efficient computation of full Lucas sequences PDF
Marc Joye and Jean-Jacques Quisquater
Electronics Letters, 32(6):537-538, 1996
Proceedings Articles
- TFHE public-key encryption revisited
Marc Joye
In E. Oswald, Ed., Topics in Cryptology – CT-RSA 2024, vol. 14643 of Lecture Notes in Computer Science, pp. 277-291, Springer, 2024 - On-line/off-line DCR-based homomorphic encryption and applications PDF
Marc Joye
In M. Rosulek, Ed., Topics in Cryptology – CT-RSA 2023, vol. 13871 of Lecture Notes in Computer Science, pp. 115-131, Springer, 2023 - On NTRU-ν-um modulo XN-1 PDF
Marc Joye
In 2nd Annual FHE.org Conference (FHE.org 2023), Tokyo, Japan, March 26, 2023 - Liberating TFHE: Programmable bootstrapping with general quotient polynomials PDF
Marc Joye and Michael Walter
In M. Brenner, A. Costache, and K. Rohloff, Eds., Proc. of 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC 2022), pp. 1-11, ACM Press, 2022
(Full version available as Cryptology ePrint Archive, Report 2022/1177) - Fast computation of the octic residue symbol PDF
Marc Joye
In 3rd International Conference on Number-Theoretic Methods in Cryptology (NutMiC 2022), Poznan, Poland, August 29-31, 2022 - Blind rotation in fully homomorphic encryption with extended keys PDF
Marc Joye and Pascal Paillier
In S. Dolev et al., Eds., Cyber Security Cryptography and Machine Learning (CSCML 2022), vol. 13301 of Lecture Notes in Computer Science, pp. 1-18, Springer, 2022 - Balanced non-adjacent forms PDF
In M. Tibouchi and H. Wang, Eds., Advances in Cryptology – ASIACRYPT 2021, Part III, vol. 13092 of Lecture Notes in Computer Science, pp. 553-576, Springer, 2021 - Programmable bootstrapping enables efficient homomorphic inference of deep neural networks PDF
Ilaria Chillotti, Marc Joye, and Pascal Paillier
In S. Dolev et al., Eds., Cyber Security Cryptography and Machine Learning (CSCML 2021), vol. 12716 of Lecture Notes in Computer Science, pp. 1-19, Springer, 2021 - CONCRETE: Concrete Operates oN Ciphertexts Rapidly by Extending TfhE PDF
Ilaria Chillotti, Marc Joye, Damien Ligier, Jean-Baptiste Orfila, and Samuel Tap
In M. Brenner and T. Lepoint, Eds., Proc. of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC 2020), pp. 57-63, Leibniz Universität IT Services, 2020 - New challenges for fully homomorphic encryption PDF
Ilaria Chillotti, Marc Joye, and Pascal Paillier
In Privacy Preserving Machine Learning, NeurIPS 2020 Workshop, December 11, 2020 - Privacy... please! PDF
Fari Assaderaghi and Marc Joye
In E. Simion and R. Géraud-Stewart, Eds., Innovative Security Solutions for Information Technology and Communications (SecITC 2019), vol. 12001 of Lecture Notes in Computer Science, pp. xviii-xx, Springer, 2020 - Private data aggregation over selected subsets of users PDF
Amit Datta, Marc Joye, and Nadia Fawaz
In Y. Mu, R. H. Deng, and X. Huang, Eds., Cryptology and Network Security (CANS 2019), vol. 11829 of Lecture Notes in Computer Science, pp. 375-391, 2019 - Pinfer: Privacy-preserving inference PDF
Marc Joye and Fabien Petitcolas
In C. Pérez-Solà et al., Eds., Data Privacy Management, Cryptocurrencies and Blockchain Technology, vol. 11737 of Lecture Notes in Computer Science, pp. 3-21, Springer, 2019 - Fully distributed non-interactive adaptively-secure threshold signature scheme with short shares: Efficiency considerations and implementation PDF
Benoît Libert, Marc Joye, Moti Yung, and Fabrice Mouhartem
In NIST Threshold Cryptography Workshop 2019, Gaithersburg, MD, USA, March 11-12, 2019 - How to profile privacy-conscious users in recommender systems PDF
Fabrice Benhamouda and Marc Joye
In Privacy Preserving Machine Learning, NeurIPS 2018 Workshop, Montreal, Canada, December 8, 2018 - RSA signatures under hardware restrictions PDF
Marc Joye and Yan Michalevsky
In J. Guajardo and D. Holcomb, Eds., 2nd Workshop on Attacks and Solutions in Hardware Security (ASHES 2018), pp. 51-54, ACM Press, 2018 - Decentralized policy-hiding ABE with receiver privacy PDF
Yan Michalevsky and Marc Joye
In J. López, J. Zhou, and M. Soriano, Eds., Computer Security – ESORICS 2018, Part II, vol. 11099 of Lecture Notes in Computer Science, pp. 548-567, Springer, 2018 - Function-revealing encryption PDF
Marc Joye and Alain Passelègue
In D. Catalano and R. De Prisco, Eds., Security and Cryptography for Networks (SCN 2018), vol. 11035 of Lecture Notes in Computer Science, pp. 527-542, Springer, 2018
(Full version available as Cryptology ePrint Archive, Report 2016/622) - Private yet efficient decision tree evaluation PDF
Marc Joye and Fariborz Salehi
In F. Kerschbaum and S. Paraboschi, Eds., Data and Applications Security and Privacy XXXII (DBSec 2018), vol. 10980 of Lecture Notes in Computer Science, pp. 243-259, Springer, 2018 - Privacy-preserving ridge regression with only linearly-homomorphic encryption PDF
Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, and Kyonghwan Yoon
In B. Preneel and F. Vercauteren, Eds., Applied Cryptography and Network Security (ACNS 2018), vol. 10892 of Lecture Notes in Computer Science, pp. 243-261, Springer, 2018
(Full version available as Cryptology ePrint Archive, Report 2017/979) - Differential attacks on deterministic signatures PDF
Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, and Bruce Murray
In N. P. Smart, Ed., Topics in Cryptology – CT-RSA 2018, vol. 10808 of Lecture Notes in Computer Science, pp. 339-353, Springer, 2018 - Privacy and security: Key requirements for sustainable IoT growth PDF
Fari Assaderaghi, Gowri Chindalore, Brima Ibrahim, Hans de Jong, Marc Joye, Sami Nassar, Wolfgang Steinbauer, Mathias Wagner, and Thomas Wille
In 2017 IEEE Symposium on VLSI Technology, pp. T8-T13, IEEE, 2017 - Encoding-free ElGamal-type encryption schemes on elliptic curves PDF
Marc Joye and Benoît Libert
In H. Handschuh, Ed., Topics in Cryptology – CT-RSA 2017, vol. 10159 of Lecture Notes in Computer Science, pp. 19-35, Springer, 2017 - Identity-based cryptosystems and quadratic residuosity PDF
Marc Joye
In C.-M. Chen, K.-M. Chung, G. Persiano, and B.-Y. Yang, Eds., Public Key Cryptography – PKC 2016, Part I, vol. 9614 of Lecture Notes in Computer Science, pp. 225-254, Springer, 2016 - Compactly hiding linear spans: Tightly secure constant-size simulation-sound QA-NIZK proofs and applications PDF
Benoît Libert, Thomas Peters, Marc Joye, and Moti Yung
In T. Iwata and J. H. Cheon, Eds., Advances in Cryptology – ASIACRYPT 2015, Part I, vol. 9452 of Lecture Notes in Computer Science, pp. 681-707, Springer, 2015
(Full version available as Cryptology ePrint Archive, Report 2015/242) - A key-private cryptosystem from the quadratic residuosity PDF
Marc Joye
In M. S. Obaidat, P. Lorenz, and P. Samarati, Eds., 12th International Conference on Security and Cryptography (SECRYPT 2015), pp. 398-404, ScitePress, 2015 - Secure efficient history-hiding append-only signatures in the standard model PDF
Benoît Libert, Marc Joye, Moti Yung, and Thomas Peters
In J. Katz, Ed., Public Key Cryptography – PKC 2015, vol. 9020 of Lecture Notes in Computer Science, pp. 450-473, Springer, 2015 - Recent advances in ID-based encryption PDF
Marc Joye
In W. Meier and D. Mukhopadhyay, Eds., Progress in Cryptology – INDOCRYPT 2014, vol. 8885 of Lecture Notes in Computer Science, p. XXI, Springer, 2014 - Concise multi-challenge CCA-secure encryption and signatures with almost tight security PDF
Benoît Libert, Marc Joye, Moti Yung, and Thomas Peters
In P. Sarkar and T. Iwata, Eds., Advances in Cryptology – ASIACRYPT 2014, Part II, vol. 8874 of Lecture Notes in Computer Science, pp. 1-21, Springer, 2014
(Full version available as Cryptology ePrint Archive, Report 2014/743) - Addition with blinded operands PDF
Mohamed Karroumi, Benjamin Richard, and Marc Joye
In E. Prouff, Ed., Constructive Side-Channel Analysis and Secure Design (COSADE 2014), vol. 8622 of Lecture Notes in Computer Science, pp. 41-55, Springer, 2014 - Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares PDF
Benoît Libert, Marc Joye, and Moti Yung
In S. Dolev, Ed., 2014 ACM Symposium on Principles of Distributed Computing (PODC 2014), pp. 303-312, ACM Press, 2014 - Non-malleability from malleability: Simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures PDF
Benoît Libert, Thomas Peters, Marc Joye, and Moti Yung
In P. Q. Nguyen and E. Oswald, Eds., Advances in Cryptology – EUROCRYPT 2014, vol. 8441 of Lecture Notes in Computer Science, pp. 514-532, Springer, 2014
(Full version available as Cryptology ePrint Archive, Report 2013/691) - Traceable group encryption PDF
Benoît Libert, Moti Yung, Marc Joye, and Thomas Peters
In H. Krawczyk, Ed., Public Key Cryptography – PKC 2014, vol. 8383 of Lecture Notes in Computer Science, pp. 592-610, Springer, 2014 - Group signatures with message-dependent opening in the standard model PDF
Benoît Libert and Marc Joye
In J. Benaloh, Ed., Topics in Cryptology – CT-RSA 2014, vol. 8366 of Lecture Notes in Computer Science, pp. 286-306, Springer, 2014 - Privacy-preserving matrix factorization PDF
Valeria Nikolaenko, Stratis Ioannidis, Udi Weinsberg, Marc Joye, Nina Taft, and Dan Boneh
In A.-R. Sadeghi, V. D. Gligor, and M. Yung, Eds., 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), pp. 801-812, ACM Press, 2013 - On Paillier elliptic curve cryptosystems PDF
Marc Joye
In T. Muntean, D. Poulakis, and R. Rolland, Eds., Algebraic Informatics (CAI 2013), vol. 8080 of Lecture Notes in Computer Science, p. 6, Springer, 2013 - Elliptic curve cryptosystems in the presence of faults PDF
Marc Joye
In W. Fischer and J.-M. Schmidt, Eds., Fault Diagnosis and Tolerance in Cryptography (FDTC 2013), p. 73, IEEE Computer Society, 2013 - Linearly homomorphic structure-preserving signatures and their applications PDF
Benoît Libert, Thomas Peters, Marc Joye, and Moti Yung
In R. Canetti and J. A. Garay, Eds., Advances in Cryptology – CRYPTO 2013, Part II, vol. 8043 of Lecture Notes in Computer Science, pp. 289-307, Springer, 2013
(Full version in Designs, Codes and Cryptography, 77(2):441-477, 2015) - Toward practical group encryption
PDF
Laila El Aimani and Marc Joye
In M. Jacobson et al., Eds., Applied Cryptography and Network Security (ACNS 2013), vol. 7954 of Lecture Notes in Computer Science, pp. 237-252, Springer, 2013
(Full version available as Cryptology ePrint Archive, Report 2012/155) - Efficient cryptosystems from 2k-th power residue symbols PDF
Marc Joye and Benoît Libert
In T. Johansson and P. Nguyen, Eds., Advances in Cryptology – EUROCRYPT 2013, vol. 7881 of Lecture Notes in Computer Science, pp. 76-92, Springer, 2013
(Full version available as Cryptology ePrint Archive, Report 2013/435) - Privacy-preserving ridge regression on hundreds of millions of records PDF
Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, and Nina Taft
In 2013 IEEE Symposium on Security and Privacy (S&P 2013), pp. 334-348, IEEE Computer Society, 2013 - A scalable scheme for privacy-preserving aggregation of time-series data PDF
Marc Joye and Benoît Libert
In A.-R. Sadeghi, Ed., Financial Cryptography and Data Security (FC 2013), vol. 7879 of Lecture Notes in Computer Science, pp. 111-125, Springer, 2013 - Unified addition formulæ for hyperelliptic curve cryptosystems PDF
Oumar Diao and Marc Joye
In Proc. of the 3rd Workshop on Mathematical Cryptology (WMC 2012) and 3rd International Conference on Symbolic Computation and Cryptography (SCC 2012), pp. 45-50, Castro Urdiales, Spain, July 2012 - A method for preventing “skipping” attacks PDF
Marc Joye
In International Workshop on Trustworthy Embedded Devices (TrustED 2012), IEEE Symposium on Security and Privacy Workshops, pp. 12-15, IEEE Computer Society, 2012 - Partial key exposure on RSA with private exponents larger than N PDF
Marc Joye and Tancrède Lepoint
In M. D. Ryan, B. Smyth, and G. Wang, Eds., Information Security Practice and Experience (ISPEC 2012), vol. 7232 of Lecture Notes in Computer Science, pp. 369-380, Springer, 2012 - GQ2 vs. ECC: A comparative study of two efficient authentication technologies PDF
Louis C. Guillou and Marc Joye
In J. Luoluo, Ed., 2012 International Conference on Affective Computing and Intelligent Interaction (ICACII 2012), vol. 10 of Lecture Notes in Information Technology, pp. 289-294, IERI, 2012 - Memory-efficient fault countermeasures PDF
Marc Joye and Mohamed Karroumi
In E. Prouff, Ed., Smart Card Research and Advanced Applications (CARDIS 2011), vol. 7079 of Lecture Notes in Computer Science, pp. 84-101, Springer, 2011 - Traitor tracing schemes for protected software implementations PDF
Marc Joye and Tancrède Lepoint
In S. Katzenbeisser and A.-R. Sadeghi, Eds., 11th ACM Workshop on Digital Rights Management (ACM DRM 2011), pp. 15-21, ACM Press, 2011 - Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation PDF
Michael Hutter, Marc Joye, and Yannick Sierra
In A. Nitaj and D. Pointcheval, Eds., Progress in Cryptology – AFRICACRYPT 2011, vol. 6737 of Lecture Notes in Computer Science, pp. 170-187, Springer, 2011 - Binary Huff curves PDF
Julien Devigne and Marc Joye
In A. Kiayias, Ed., Topics in Cryptology – CT-RSA 2011, vol. 6558 of Lecture Notes in Computer Science, pp. 340-355, Springer, 2011 - Coordinate blinding over large prime fields PDF
Michael Tunstall and Marc Joye
In S. Mangard and F.-X. Standaert, Eds., Cryptographic Hardware and Embedded Systems – CHES 2010, vol. 6225 of Lecture Notes in Computer Science, pp. 443-455, Springer, 2010 - Co-Z addition formulæ and binary ladders PDF
Raveen R. Goundar, Marc Joye, and Atsuko Miyaji
In S. Mangard and F.-X. Standaert, Eds., Cryptographic Hardware and Embedded Systems – CHES 2010, vol. 6225 of Lecture Notes in Computer Science, pp. 65-79, Springer, 2010
(Full version available as Cryptology ePrint Archive, Report 2010/309) - Huff's model for elliptic curves PDF
Marc Joye, Mehdi Tibouchi, and Damien Vergnaud
In G. Hanrot, F. Morain, and E. Thomé, Eds., Algorithmic Number Theory (ANTS-IX), vol. 6197 of Lecture Notes in Computer Science, pp. 234-250, Springer, 2010 - Efficient arithmetic on Hessian curves PDF
Reza R. Farashahi and Marc Joye
In P. Q. Nguyen and D. Pointcheval, Eds., Public Key Cryptography – PKC 2010, vol. 6056 of Lecture Notes in Computer Science, pp. 243-260, Springer, 2010 - The polynomial composition problem in Z/nZ[X] PDF
Marc Joye, David Naccache, and Stéphanie Porte
In D. Gollmann, J.-L. Lanet, and J. Iguchi-Cartigny, Eds., Smart Card Research and Advanced Applications (CARDIS 2010), vol. 6035 of Lecture Notes in Computer Science, pp. 1-12, Springer, 2010 - On cryptographic schemes based on discrete logarithms and factoring PDF
Marc Joye
In J. A. Garay, A. Miyaji, and A. Otsuka, Eds., Cryptology and Network Security (CANS 2009), vol. 5888 of Lecture Notes in Computer Science, pp. 41-52, Springer, 2009 - A simple construction for public-key encryption with revocable anonymity: The honest-sender case PDF
Davide Alessio and Marc Joye
In H. Jin and G. Heileman, Eds., 9th ACM Workshop on Digital Rights Management (ACM-DRM 2009), pp. 11-16, ACM Press, 2009 - Highly regular m-ary powering ladders PDF
Marc Joye
In M. J. Jacobson Jr., V. Rijmen, and R. Safavi-Naini, Eds., Selected Areas in Cryptography (SAC 2009), vol. 5867 of Lecture Notes in Computer Science, pp. 350-363, Springer, 2009 - Chosen-ciphertext secure RSA-type cryptosystems PDF
Benoît Chevallier-Mames and Marc Joye
In J. Pieprzyk and F. Zhang, Eds., Provable Security (ProvSec 2009), vol. 5848 of Lecture Notes in Computer Science, pp. 32-46, Springer, 2009
(Full version available as Cryptology ePrint Archive, Report 2009/377) - Protecting RSA against faults: The embedding method PDF
Marc Joye
In L. Breveglieri et al., Eds., Fault Diagnosis and Tolerance in Cryptography (FDTC 2009), pp. 41-45, IEEE Computer Society, 2009 - Exponent recoding and regular exponentiation algorithms PDF
Marc Joye and Michael Tunstall
In B. Preneel, Ed., Progress in Cryptology – AFRICACRYPT 2009, vol. 5580 of Lecture Notes in Computer Science, pp. 334-349, Springer, 2009 - Laundering and repackaging of multimedia content in content distribution systems PDF
Alain Durand, Marc Joye, and Mohamed Karroumi
In C.-C. Chang, J.-F. Tsai, S.-J. Wang, and C.-C. Lin, Eds., 1st International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS 2008), Proceedings of APSCC 2008, pp. 1344-1351, IEEE Computer Society, 2008 - An efficient on-line/off-line signature scheme without random oracles PDF
Marc Joye
In M. K. Franklin, L. C. K. Hui, and D. S. Wong, Eds., Cryptology and Network Security (CANS 2008), vol. 5339 of Lecture Notes in Computer Science, pp. 98-107, Springer, 2008 - On the security of a unified countermeasure PDF
Marc Joye
In L. Breveglieri et al., Eds., Fault Diagnosis and Tolerance in Cryptography (FDTC 2008), pp. 87-91, IEEE Computer Society, 2008 - Fast point multiplication on elliptic curves without precomputation PDF
Marc Joye
In J. von zur Gathen, J. L. Imaña, and Ç. K. Koç, Eds., Arithmetic of Finite Fields (WAIFI 2008), vol. 5130 of Lecture Notes in Computer Science, pp. 36-46, Springer, 2008 - Twisted Edwards curves PDF
Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, and Christiane Peters
In S. Vaudenay, Ed.,Progress in Cryptology – AFRICACRYPT 2008, vol. 5023 of Lecture Notes in Computer Science, pp. 389-405, Springer, 2008 - RSA moduli with a predetermined portion: Techniques and applications PDF
Marc Joye
In L. Chen, Y. Mu, and W. Susilo, Eds., Information Security Practice and Experience (ISPEC 2008), vol. 4991 of Lecture Notes in Computer Science, pp. 116-130, Springer, 2008 - Secure design of RSA-based cryptosystems PDF
Marc Joye
In T.-W. Kuo and S. Cruz-Lara, Eds., 4th Taiwanese-French Conference on Information Technology (TFIT 2008), pp. 322-327, Taipei, Taiwan, March 3-5, 2008 - On white-box cryptography PDF
Marc Joye
In A. Elçi, S. B. Ors, and B. Preneel, Eds., Security of Information and Networks, pp. 7-12, Trafford Publishing, 2008 - On the notions of PRP-RKA, KR and KR-RKA for block ciphers PDF
Ermaliza Razali, Raphael Phan, and Marc Joye
In W. Susilo, J. K. Liu, and Y. Mu, Eds., Provable Security (ProvSec 2007), vol. 4784 of Lecture Notes in Computer Science, pp. 188-197, Springer, 2007 - Highly regular right-to-left algorithms for scalar multiplication PDF
Marc Joye
In P. Paillier and I. Verbauwhede, Eds., Cryptographic Hardware and Embedded Systems – CHES 2007, vol. 4727 of Lecture Notes in Computer Science, pp. 135-147, Springer, 2007 - Securing OpenSSL against micro-architectural attacks PDF
Marc Joye and Michael Tunstall
In M. Malek, E. Fernández-Medina, and J. Hernando, Eds., 2nd International Conference on Security and Cryptography (SECRYPT 2007), pp. 189-196, ScitePress, 2007 - Cryptanalysis of a video scrambling technique based on space filling curves PDF
Ayoub Massoudi, Frédéric Lefèbvre, and Marc Joye
In X. Zhuang and W. Gao, Eds., 2007 International Conference on Multimedia & Expo (ICME 2007), pp. 1683-1686, IEEE Press, 2007 - A practical and tightly secure signature scheme without hash function PDF
Benoît Chevallier-Mames and Marc Joye
In M. Abe, Ed., Topics in Cryptology – CT-RSA 2007, vol. 4377 of Lecture Notes in Computer Science, pp. 339-356, Springer, 2007 - Fast generation of prime numbers on portable devices: An update PDF
Marc Joye and Pascal Paillier
In L. Goubin and M. Matsui, Eds., Cryptographic Hardware and Embedded Systems – CHES 2006, vol. 4249 of Lecture Notes in Computer Science, pp. 160-173, Springer, 2006 - On the TYS signature scheme PDF
Marc Joye and Hung-Mei Lin
In M. Gavrilova et al., Eds., Computational Science and Its Applications – ICCSA 2006, vol. 3982 of Lecture Notes in Computer Science, pp. 338-344, Springer, 2006 - Practical fault countermeasures for Chinese remaindering based cryptosystems PDF
Mathieu Ciet and Marc Joye
In L. Breveglieri and I. Koren, Eds., 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2005), pp. 124-131, Edinburgh, UK, September 2005 - On second-order DPA-type attacks PDF
Marc Joye, Pascal Paillier, and Berry Schoenmakers
In J. R. Rao and B. Sunar, Eds., Cryptographic Hardware and Embedded Systems – CHES 2005, vol. 3659 of Lecture Notes in Computer Science, pp. 293-308, Springer, 2005 - An overview of cryptographic techniques based on identity and implementation on smart cards PDF
Marc Joye
In Identech 2005, Marseille, France, June 2005 - Encryption schemes: From Ancient Egypt to identity-based encryption
Marc Joye
In 2nd Taiwanese-French Conference in Information Technologies, Tainan, Taiwan, March 2005 - Smart-card implementation of elliptic curve cryptography and DPA-type attacks PDF
Marc Joye
In J.-J. Quisquater, P. Paradinas, Y. Deswartes, and A. Abou El Kalam, Eds., Smart Card Research and Advanced Applications VI (CARDIS 2004), vol. 153 of IFIP International Federation for Information Processing, pp. 115-125, Kluwer Academic Publishers, 2004 - (Virtually) free randomization techniques for elliptic curve cryptography PDF
Mathieu Ciet and Marc Joye
In S. Qing, D. Gollmann, and J. Zhou, Eds., Information and Communications Security (ICICS 2003), vol. 2836 of Lecture Notes in Computer Science, pp. 348-359, Springer-Verlag, 2003 - GCD-free algorithms for computing modular inverses PDF
Marc Joye and Pascal Paillier
In C. D. Walter, Ç .K. Koç, and C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHES 2003, vol. 2779 of Lecture Notes in Computer Science, pp. 243-253, Springer-Verlag, 2003 - Faster double-size modular multiplication from Euclidean multipliers PDF
Benoît Chevallier-Mames, Marc Joye, and Pascal Paillier
In C. D. Walter, Ç. K. Koç, and C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHES 2003, vol. 2779 of Lecture Notes in Computer Science, pp. 214-227, Springer-Verlag, 2003 - Fast point multiplication on elliptic curves through isogenies PDF
Éric Brier and Marc Joye
In M. Fossorier, T. Høholdt, and A. Poli, Eds., Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, vol. 2643 of Lecture Notes in Computer Science, pp. 43-50, Springer-Verlag, 2003 - The Jacobi model of an elliptic curve and side-channel analysis PDF
Olivier Billet and Marc Joye
In M. Fossorier, T. Høholdt, and A. Poli, Eds., Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, vol. 2643 of Lecture Notes in Computer Science, pp. 34-42, Springer-Verlag, 2003 - A protected division algorithm PDF
Marc Joye and Karine Villegas
In P. Honeyman, Ed., Smart Card Research and Advanced Applications (CARDIS 2002), pp. 69-74, Usenix Association, 2002 - A better use of smart cards in PKIs PDF
Nathalie Feyt and Marc Joye
In Gemplus Developer Conference, Singapore, November 2002 - Off-line/on-line generation of RSA keys with smart cards PDF
Nathalie Feyt, Marc Joye, David Naccache, and Pascal Paillier
In S.-P. Shieh, Ed., 2nd International Workshop for Asian Public Key Infrastructures (IWAP 2002), pp. 153-158, Taipei, Taiwan, October 2002 - How to use RSA; or how to improve the efficiency of RSA without loosing its security PDF
Marc Joye and Pascal Paillier
In ISSE 2002, Paris, France, October 2002 - The Montgomery powering ladder PDF
Marc Joye and Sung-Ming Yen
In B. S. Kaliski Jr, Ç. K. Koç, and C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHES 2002, vol. 2523 of Lecture Notes in Computer Science, pp. 291-302, Springer-Verlag, 2003 - Universal padding schemes for RSA PDF
Jean-Sébastien Coron, Marc Joye, David Naccache, and Pascal Paillier
In M. Yung, Ed., Advances in Cryptology – CRYPTO 2002, vol. 2442 of Lecture Notes in Computer Science, pp. 226-241, Springer-Verlag, 2002 - New minimal modified radix-r representation with applications to smart cards PDF
Marc Joye and Sung-Ming Yen
In D. Naccache and P. Paillier, Eds., Public Key Cryptography, vol. 2274 of Lecture Notes in Computer Science, pp. 375-384, Springer-Verlag, 2002 - One-way cross-trees and their applications PDF
Marc Joye and Sung-Ming Yen
In D. Naccache and P. Paillier, Eds., Public Key Cryptography, vol. 2274 of Lecture Notes in Computer Science, pp. 346-356, Springer-Verlag, 2002
(Earlier version in T. L. Hwang and A. K. Lenstra, Eds., Workshop on Cryptology and Information Security, 1998 International Computer Symposium, pp. 23-28, Tainan, Taiwan, December 1998) - Weierstraß elliptic curves and side-channel attacks PDF
Éric Brier and Marc Joye
In D. Naccache and P. Paillier, Eds., Public Key Cryptography, vol. 2274 of Lecture Notes in Computer Science, pp. 335-345, Springer-Verlag, 2002 - Optimal chosen-ciphertext secure encryption of arbitrary-length messages PDF
Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, and Christophe Tymen
In D. Naccache and P. Paillier, Eds., Public Key Cryptography, vol. 2274 of Lecture Notes in Computer Science, pp. 17-33, Springer-Verlag, 2002
(Full version available as Cryptology ePrint Archive, Report 2002/011) - GEM: A generic chosen-ciphertext secure encryption method PDF
Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, and Christophe Tymen
In B. Preneel, Ed., Topics in Cryptology – CT-RSA 2002, vol. 2271 of Lecture Notes in Computer Science, pp. 263-276, Springer-Verlag, 2002 - Observability analysis: Detecting when improved cryptosystems fail PDF
Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, and Moti Yung
In B. Preneel, Ed., Topics in Cryptology – CT-RSA 2002, vol. 2271 of Lecture Notes in Computer Science, pp. 17-29, Springer-Verlag, 2002 - Strong adaptive chosen-ciphertext attack with memory dump (or: The importance of the order of decryption and validation) PDF
Seungjoo Kim, Junghee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, and Yuliang Zheng
In B. Honary, Ed., Cryptography and Coding, vol. 2260 of Lecture Notes in Computer Science, pp. 114-127, Springer-Verlag, 2001 - On Rabin-type signatures PDF
Marc Joye and Jean-Jacques Quisquater
In B. Honary, Ed., Cryptography and Coding, vol. 2260 of Lecture Notes in Computer Science, pp. 99-113, Springer-Verlag, 2001 - Secure evaluation of modular functions PDF
Marc Joye, Pascal Paillier, and Sung-Ming Yen
In R. J. Hwang and C. K. Wu, Eds., 2001 International Workshop on Cryptology and Network Security, pp. 227-229, Taipei, Taiwan, September 2001 - Constructive methods for the generation of prime numbers PDF
Marc Joye and Pascal Paillier
In S. Murphy, Ed., 2nd NESSIE Workshop, Egham, UK, September 2001 - Universal exponentiation algorithm: A first step towards provable SPA-resistance PDF
Christophe Clavier and Marc Joye
In Ç. K. Koç, D. Naccache, and C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHES 2001, vol. 2162 of Lecture Notes in Computer Science, pp. 300-308, Springer-Verlag, 2001 - Protections against differential analysis for elliptic curve cryptography: An algebraic approach PDF
Marc Joye and Christophe Tymen
In Ç. K. Koç, D. Naccache, and C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHES 2001, vol. 2162 of Lecture Notes in Computer Science, pp. 377-390, Springer-Verlag, 2001 - Hessian elliptic curves and side-channel attacks PDF
Marc Joye and Jean-Jacques Quisquater
In Ç. K. Koç, D. Naccache, and C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHES 2001, vol. 2162 of Lecture Notes in Computer Science, pp. 402-410, Springer-Verlag, 2001 - On the power of misbehaving adversaries and security analysis of the original EPOC PDF
Marc Joye, Jean-Jacques Quisquater, and Moti Yung
In D. Naccache, Ed., Topics in Cryptology – CT-RSA 2001, vol. 2020 of Lecture Notes in Computer Science, pp. 208-222, Springer-Verlag, 2001 - Compact encoding of non-adjacent forms with applications to elliptic curve cryptography PDF
Marc Joye and Christophe Tymen
In K. Kim, Ed., Public Key Cryptography, vol. 1992 of Lecture Notes in Computer Science, pp. 353-364, Springer-Verlag, 2001 - Efficient generation of prime numbers PDF
Marc Joye, Pascal Paillier, and Serge Vaudenay
In Ç. K. Koç and C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHES 2000, vol. 1965 of Lecture Notes in Computer Science, pp. 340-354, Springer-Verlag, 2000 - A practical and provably secure coalition-resistant group signature scheme PDF
Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik
In M. Bellare, Ed., Advances in Cryptology – CRYPTO 2000, vol. 1880 of Lecture Notes in Computer Science, pp. 255-270, Springer-Verlag, 2000 - New attacks on PKCS#1 v1.5 encryption PDF
Jean-Sébastien Coron, Marc Joye, David Naccache, and Pascal Paillier
In B. Preneel, Ed., Advances in Cryptology – EUROCRYPT 2000, vol. 1807 of Lecture Notes in Computer Science, pp. 369-381, Springer-Verlag, 2000 - On the security of the Lee-Chang group signature scheme and its derivatives PDF
Marc Joye, Narn-Yih Lee, and Tzonelih Hwang
In M. Mambo and Y. Zheng, Eds., Information Security, vol. 1729 of Lecture Notes in Computer Science, pp. 47-51, Springer-Verlag, 1999 - Cryptanalysis of two group signature schemes PDF
Marc Joye, Seungjoo Kim, and Narn-Yih Lee
In M. Mambo and Y. Zheng, Eds., Information Security, vol. 1729 of Lecture Notes in Computer Science, pp. 271-275, Springer-Verlag, 1999 - On the difficulty of coalition-resistance in group signature schemesPDF
Giuseppe Ateniese, Marc Joye, and Gene Tsudik
In G. Persiano, Ed., 2nd Workshop on Security in Communication Networks (SCN '99), Almafi, Italy, September 1999 - Security paradoxes: How improving a cryptosystem may weaken it
Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, and Moti Yung
In Conference on Information Security, pp. 27-32, Taichung, Taiwan, May 1999 - Cheating in split-knowledge RSA parameter generation PDF
Marc Joye and Richard Pinch
In D. Augot and C. Carlet, Eds., Workshop on Coding and Cryptography, pp. 157-163, Paris, France, January 1999 - RSA-type signatures in the presence of transient faults PDF
Marc Joye, Jean-Jacques Quisquater, Feng Bao, and Robert H. Deng
In M. Darnell, Ed., Cryptography and Coding, vol. 1355 of Lecture Notes in Computer Science, pp. 155-160, Springer-Verlag, 1997 - A new and optimal chosen-message attack on RSA-type cryptosystems PDF
Daniel Bleichenbacher, Marc Joye, and Jean-Jacques Quisquater
In Y. Han, T. Okamoto, and S. Qing, Eds., Information and Communications Security, vol. 1334 of Lecture Notes in Computer Science, pp. 302-313, Springer-Verlag, 1997 - Cautionary note for protocols designers: Security proof is not enough PDF
Aurore Gillet, Marc Joye, and Jean-Jacques Quisquater
In H. Orman and C. Meadows, Eds., DIMACS Workshop on Design and Formal Verification of Security Protocols, New-York, USA, September 1997 - On the importance of securing your bins: The garbage-man-in-the-middle attack PDF
Marc Joye and Jean-Jacques Quisquater
In T. Matsumoto, Ed., 4th ACM Conference on Computer and Communications Security, pp. 135-141, ACM Press, 1997 - Protocol failures for RSA-type cryptosystems using Lucas sequences and elliptic curves PDF
Marc Joye and Jean-Jacques Quisquater
In M. Lomas, Ed., Security Protocols, vol. 1189 of Lecture Notes in Computer Science, pp. 93-100, Springer-Verlag, 1997 - Practical solution to authentication of images with a secure camera PDF
Jean-Jacques Quisquater, Benoît Macq, Marc Joye, Nicolas Degand, and Alexis Bernard
In I. K. Sethi and R. C. Jain, Eds., Storage and Retrieval for Image and Video Databases V, vol. 3022 of Proc. SPIE, pp. 290-297, SPIE, 1997
Technical Reports
- On NTRU-ν-um modulo XN-1 PDF
Marc Joye
Cryptology ePrint Archive, Report 2022/1092, August 2022 - Primary elements in cyclotomic fields with applications to power residue symbols, and more PDF
Éric Brier, Rémi Géraud-Stewart, Marc Joye, and David Naccache
Cryptology ePrint Archive, Report 2021/1106, August 2021 - On the security of trapdoor subgroups of ZN* PDF
Marc Joye
Technical Report, Appendix of Cryptology ePrint Archive, Report 2016/500, May 2016 - Privacy-preserving ridge regression without garbled circuits PDF
Marc Joye
Technical Report, Technicolor, Los Altos, September 2015
(Also available as Cryptology ePrint Archive, Report 2017/732) - Complete addition formulæ for elliptic curves PDF
Marc Joye
Technical Report, Technicolor, Rennes, October 2008 - eBATS–Benchmarking of asymmetric systems
PDF
Daniel J. Bernstein, Marc Joye (Ed.), and Tanja Lange
Report D.VAM.13, ECRYPT, revision 1.0, February 2007 - Open problems in implementation and application
PDF
Roberto Avanzi, Lejla Batina, Gerhard Frey, Pierrick Gaudry, Marc Joye, Tanja Lange (Ed.), Kerstin Lemke, Elisabeth Oswald, Christof Paar, Dan Page, Christine Priplata, Nigel Smart, Colin Stahlke, and Ingrid Verbauwhede
Report D.VAM.6, ECRYPT, revision 1.4, March 2006 - Performance benchmarks
PDF
Roberto Avanzi, Lejla Batina, Benoît Chevallier-Mames, Nicolas Courtois, Claus Diem, Rob Granger, Johann Großschädl, Marc Joye (Ed.), Tanja Lange, Nele Mentens, Roger Oyono, Dan Page, Jan Pelzl, Andy Rupp, Stefan Tillich
Report D.VAM.1, ECRYPT, revision 1.1, August 2005 - New applications of digital signatures
Marc Joye and Sung-Ming Yen
Final Report (NSC88-2213-E-032-003 and NSC88-2811-E-032-0001), National Science Council of the Republic of China, Taiwan, July 1999 - Overall study and countermeasure developments of the
hardware-oriented cryptanalysis
Marc Joye and Sung-Ming Yen
Final Report (NSC87-2213-E-032-012 and NSC87-2811-E-032-0001), National Science Council of the Republic of China, Taiwan, August 1998 - An improved cryptographic checksum algorithm based on stream
ciphers
Sung-Ming Yen, Marc Joye, and Pao-Yu Ku
Technical Report TR-98-1, Tamkang LCIS, Tamsui, February 1998 - Faulty RSA encryption
Postscript PDF
Marc Joye and Jean-Jacques Quisquater
Technical Report CG-1997/8, UCL Crypto Group, Louvain-la-Neuve, July 1997 - Takagi/Naito's algorithm revisited
Postscript PDF
Marc Joye, François Koeune, and Jean-Jacques Quisquater
Technical Report CG-1997/3, UCL Crypto Group, Louvain-la-Neuve, March 1997 - Comment jouer à pile ou face sur Internet sans
tricher
Postscript PDF
Jean-Marc Boucqueau, Jean-François Delaigle, Jean-François Dhem, Marc Joye, François Koeune, Henri Massias, Patrick Mestré, and Jean-Jacques Quisquater
Technical Report CG-1997/2, UCL Crypto Group, Louvain-la-Neuve, March 1997
Theses
Habilitation Thesis
- Ingénierie cryptographique: Aspects
sécuritaires et algorithmiques
PDF
Habilitation à Diriger des Recherches (HDR), U. Toulouse 2, September 2003 (302 pages)Advisor: J.-M. Couveignes
Jury: J. Stern (Chair), B. Coulette, Y. Deswartes, M. Girault (referee), A. Joux, R. Molva, F. Morain, C. Paar (referee), J.-J. Quisquater, S. Vaudenay, and M. Yung (referee)
PhD. Thesis
- Security analysis of RSA-type
cryptosystems
PostScript PDF
PhD. thesis in Cryptography, UCL, October 1997 (118 pages)Committee: J.-J. Quisquater (Supervisor), F. Borceux, J.-M. Couveignes, and A. Magnus
Jury: P. Sobieski (Chair), F. Borceux, J.-M. Couveignes, A. Magnus, D. Naccache, J.-J. Quisquater, and J. Stern
Master's Theses
- Arithmétique algorithmique : Application au
crypto-système à clé publique
RSA
Mémoire de fin d'études d'Ingénieur Civil en Mathématiques Appliquées, UCL, Janvier 1994 (74 pages)Promoteurs: J.-J. Quisquater et A. Magnus
- Introduction élémentaire à la
théorie des courbes elliptiques
PDF
Mémoire de DEA en Mathématiques, UCL, Juin 1995 (77 pages)Promoteurs: J.-J. Quisquater et F. Borceux
My Co-Authors
- A–F
- Davide Alessio
- Christopher Ambrose
- Fari Assaderaghi
- Giuseppe Ateniese
- Roberto Avanzi
- Feng Bao
- Lejla Batina
- Fabrice Benhamouda
- Olivier Benoit
- Alexis Bernard
- Olivier Bernard
- Daniel J. Bernstein
- Olivier Billet
- Peter Birkner
- Daniel Bleichenbacher
- Dan Boneh
- Joppe W. Bos
- Jean-Marc Boucqueau
- Éric Brier
- Jan Camenisch
- Junghee Cheon
- Benoît Chevallier-Mames
- Ilaria Chillotti
- Gowri Chindalore
- Mathieu Ciet
- Christophe Clavier
- Kelong Cong
- Jean-Sébastien Coron
- Nicolas Courtois
- Benjamin Curtis
- Morten Dahl
- Clément Danjou
- Amit Datta
- Mayeul de Bellabre
- Isabelle Déchène
- Nicolas Degand
- Hans de Jong
- Jean-François Delaigle
- Daniel Demmler
- Robert H. Deng
- Amit Deo
- Julien Devigne
- Jean-François Dhem
- Oumar Diao
- Claus Diem
- Alain Durand
- Laila El Aimani
- Reza R. Farashahi
- Nadia Fawaz
- Björn Fay
- Houda Ferradi
- Nathalie Feyt
- Tore Frederiksen
- Gerhard Frey
- G–N
- Pierrick Gaudry
- Irene Giacomelli
- Aurore Gillet
- Raveen R. Goundar
- Robert Granger
- Johann Großschädl
- Louis C. Guillou
- Helena Handschuh
- Gregory Heileman
- Javier Herranz
- Michael Hutter
- Tzonelih Hwang
- Brima Ibrahim
- Stratis Ioannidis
- Petar Ivanov
- Somesh Jha
- Hongxia Jin
- Mohamed Karroumi
- Jongsung Kim
- Seungjoo Kim
- Çetin K. Koç
- François Koeune
- Pao-Yu Ku
- Tanja Lange
- Oleksandra Lapiha
- Kristin Lauter
- Gregor Leander
- Narn-Yih Lee
- Frédéric Lefèbvre
- Kerstin Lemke
- Arjen K. Lenstra
- Tancrède Lepoint
- Benoît Libert
- Damien Ligier
- Seongan Lim
- Hung-Mei Lin
- Manfred Lochter
- Benoît Macq
- Masahiro Mambo
- Pascal Manet
- Henri Massias
- Ayoub Massoudi
- Nele Mentens
- Patrick Mestré
- Yan Michalevsky
- Atsuko Miyaji
- Peter L. Montgomery
- Amir Moradi
- Fabrice Mouhartem
- Debdeep Mukhopadhyay
- Bruce Murray
- David Naccache
- Sami Nassar
- Gregory Neven
- Ky Nguyen
- Valeria Nikolaenko
- O–Z
- Francis Olivier
- Jean-Baptiste Orfila
- Elisabeth Oswald
- Roger Oyono
- Christof Paar
- Daniel Page
- C. David Page
- Pascal Paillier
- Alain Passelègue
- Jan Pelzl
- Christiane Peters
- Thomas Peters
- Fabien Petitcolas
- Raphael Phan
- Richard Pinch
- David Pointcheval
- Stéphanie Porte
- Christine Priplata
- Jean-Jacques Quisquater
- Ermaliza Razali
- Benjamin Richard
- Jean-Baptiste Rigaud
- Matthieu Rivain
- Dragos Rotaru
- Andy Rupp
- Fariborz Salehi
- Berry Schoenmakers
- Yannick Sierra
- Nigel Smart
- Colin Stahlke
- Wolfgang Steinbauer
- Jaechul Sung
- Nina Taft
- Tsuyoshi Takagi
- Titouan Tanguy
- Samuel Tap
- Mehdi Tibouchi
- Stefan Tillich
- Louis Tremblay Thibault
- Gene Tsudik
- Michael Tunstall
- Christophe Tymen
- Serge Vaudenay
- Alexandre Venelli
- Ingrid Verbauwhede
- Damien Vergnaud
- Karine Villegas
- Mathias Wagner
- Michael Walter
- Udi Weinsberg
- Thomas Wille
- Dongho Won
- Sung-Ming Yen
- Kyonghwan Yoon
- Moti Yung
- Yuliang Zheng