The following pages link to Marc Joye (Q203447):
Displaying 42 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Notions and relations for RKA-secure permutation and function families (Q540472) (← links)
- Remarks on ``Analysis of one popular group signature scheme'' in Asiacrypt 2006 (Q843367) (← links)
- The distributions of individual bits in the output of multiplicative operations (Q892279) (← links)
- Cryptanalysis of a pay-as-you-watch system (Q1028995) (← links)
- Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams (Q1379660) (← links)
- Privacy-preserving ridge regression with only linearly-homomorphic encryption (Q1656040) (← links)
- Function-revealing encryption (definitions and constructions) (Q1796817) (← links)
- Chinese remaindering based cryptosystems in the presence of faults (Q1819121) (← links)
- New number-theoretic cryptographic primitives (Q2023304) (← links)
- Protecting ECC against fault attacks: the ring extension method revisited (Q2023307) (← links)
- The eleventh power residue symbol (Q2027273) (← links)
- Decentralized policy-hiding ABE with receiver privacy (Q2167764) (← links)
- Differential attacks on deterministic signatures (Q2287530) (← links)
- Efficient cryptosystems from \(2^k\)-th power residue symbols (Q2397448) (← links)
- How (not) to design strong-RSA signatures (Q2430687) (← links)
- Elliptic curve cryptosystems in the presence of permanent and transient faults (Q2486874) (← links)
- Trading inversions for multiplications in elliptic curve cryptography (Q2491297) (← links)
- (Q2724439) (← links)
- (Q2724610) (← links)
- Addition with Blinded Operands (Q2794566) (← links)
- Identity-Based Cryptosystems and Quadratic Residuosity (Q2798777) (← links)
- Secure ElGamal-Type Cryptosystems Without Message Encoding (Q2803659) (← links)
- On Elliptic Curve Paillier Schemes (Q2849999) (← links)
- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data (Q2861911) (← links)
- Toward Practical Group Encryption (Q2873652) (← links)
- On Quisquater’s Multiplication Algorithm (Q2889746) (← links)
- Partial Key Exposure on RSA with Private Exponents Larger Than N (Q2894380) (← links)
- Born and raised distributively (Q2943629) (← links)
- Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves (Q2975793) (← links)
- Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation (Q3011912) (← links)
- (Q3043924) (← links)
- (Q3043950) (← links)
- (Q3043951) (← links)
- (Q3043953) (← links)
- Binary Huff Curves (Q3073716) (← links)
- Private Data Aggregation over Selected Subsets of Users (Q3297633) (← links)
- (Q3374921) (← links)
- Information and Communications Security (Q3407793) (← links)
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity (Q3417024) (← links)
- Optimal left-to-right binary signed-digit recoding (Q3417025) (← links)
- Checking before output may not be enough against fault-based cryptanalysis (Q3417029) (← links)