Marc Joye

From MaRDI portal
Person:203447

Available identifiers

zbMath Open joye.marcMaRDI QIDQ203447

List of research outcomes





PublicationDate of PublicationType
TFHE public-key encryption revisited2024-11-12Paper
On-line/off-line DCR-based homomorphic encryption and applications2023-10-04Paper
Balanced non-adjacent forms2023-05-12Paper
Decentralized policy-hiding ABE with receiver privacy2022-08-25Paper
The eleventh power residue symbol2021-05-25Paper
New number-theoretic cryptographic primitives2021-05-03Paper
Protecting ECC against fault attacks: the ring extension method revisited2021-05-03Paper
Private Data Aggregation over Selected Subsets of Users2020-07-20Paper
Differential attacks on deterministic signatures2020-01-21Paper
Function-revealing encryption (definitions and constructions)2018-10-17Paper
Privacy-preserving ridge regression with only linearly-homomorphic encryption2018-08-10Paper
Efficient cryptosystems from \(2^k\)-th power residue symbols2017-05-22Paper
Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves2017-04-12Paper
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares2016-08-31Paper
Compactly Hiding Linear Spans2016-06-10Paper
Secure ElGamal-Type Cryptosystems Without Message Encoding2016-05-02Paper
Identity-Based Cryptosystems and Quadratic Residuosity2016-04-13Paper
Addition with Blinded Operands2016-03-10Paper
The distributions of individual bits in the output of multiplicative operations2015-11-18Paper
Born and raised distributively2015-09-03Paper
Group Signatures with Message-Dependent Opening in the Standard Model2014-03-28Paper
Toward Practical Group Encryption2014-01-24Paper
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data2013-11-12Paper
On Elliptic Curve Paillier Schemes2013-09-20Paper
Linearly Homomorphic Structure-Preserving Signatures and Their Applications2013-09-17Paper
Efficient Cryptosystems from 2 k -th Power Residue Symbols2013-05-31Paper
Partial Key Exposure on RSA with Private Exponents Larger Than N2012-06-29Paper
On Quisquater’s Multiplication Algorithm2012-06-08Paper
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation2011-06-29Paper
Notions and relations for RKA-secure permutation and function families2011-06-03Paper
How (not) to design strong-RSA signatures2011-04-08Paper
Binary Huff Curves2011-02-11Paper
Huff’s Model for Elliptic Curves2010-09-29Paper
Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves2010-08-17Paper
Coordinate Blinding over Large Prime Fields2010-08-17Paper
Efficient Arithmetic on Hessian Curves2010-05-28Paper
The Polynomial Composition Problem in (ℤ/nℤ)[X]2010-04-19Paper
GCD-Free Algorithms for Computing Modular Inverses2010-03-09Paper
https://portal.mardi4nfdi.de/entity/Q51879572010-03-09Paper
Information and Communications Security2010-02-23Paper
Chosen-Ciphertext Secure RSA-Type Cryptosystems2009-12-11Paper
Highly Regular m-Ary Powering Ladders2009-12-09Paper
On Cryptographic Schemes Based on Discrete Logarithms and Factoring2009-11-26Paper
Remarks on ``Analysis of one popular group signature scheme in Asiacrypt 20062009-10-12Paper
Cryptanalysis of a pay-as-you-watch system2009-07-09Paper
Exponent Recoding and Regular Exponentiation Algorithms2009-07-07Paper
On the TYS Signature Scheme2009-02-10Paper
An Efficient On-Line/Off-Line Signature Scheme without Random Oracles2009-01-09Paper
Authentication of sequences with the SL2 hash function: application to video sequences2008-12-21Paper
ID-based secret-key cryptography2008-12-21Paper
Highly Regular Right-to-Left Algorithms for Scalar Multiplication2008-09-16Paper
Fast Generation of Prime Numbers on Portable Devices: An Update2008-08-29Paper
On Second-Order Differential Power Analysis2008-08-29Paper
Fast Point Multiplication on Elliptic Curves without Precomputation2008-08-19Paper
Twisted Edwards Curves2008-06-13Paper
On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers2008-06-10Paper
A Practical and Tightly Secure Signature Scheme Without Hash Function2008-04-17Paper
RSA Moduli with a Predetermined Portion: Techniques and Applications2008-04-15Paper
Checking before output may not be enough against fault-based cryptanalysis2007-01-09Paper
Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity2007-01-09Paper
Optimal left-to-right binary signed-digit recoding2007-01-09Paper
Trading inversions for multiplications in elliptic curve cryptography2006-05-29Paper
https://portal.mardi4nfdi.de/entity/Q33749212006-03-01Paper
Elliptic curve cryptosystems in the presence of permanent and transient faults2005-08-17Paper
https://portal.mardi4nfdi.de/entity/Q30439502004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439532004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439242004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439512004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44720792004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44720612004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44266822003-09-16Paper
https://portal.mardi4nfdi.de/entity/Q44266832003-09-16Paper
https://portal.mardi4nfdi.de/entity/Q44257142003-09-11Paper
https://portal.mardi4nfdi.de/entity/Q44091212003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q47973912003-04-03Paper
https://portal.mardi4nfdi.de/entity/Q47978152003-03-09Paper
https://portal.mardi4nfdi.de/entity/Q47978132003-03-09Paper
https://portal.mardi4nfdi.de/entity/Q45362392002-11-28Paper
On Rabin-Type Signatures2002-11-25Paper
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)2002-11-12Paper
https://portal.mardi4nfdi.de/entity/Q27246102002-10-08Paper
https://portal.mardi4nfdi.de/entity/Q45368062002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q27244392002-07-22Paper
How to choose secret parameters for RSA-type cryptosystems over elliptic curves2002-06-10Paper
https://portal.mardi4nfdi.de/entity/Q49450392000-08-24Paper
https://portal.mardi4nfdi.de/entity/Q49450452000-08-24Paper
Chinese remaindering based cryptosystems in the presence of faults2000-01-05Paper
Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams1999-01-10Paper
https://portal.mardi4nfdi.de/entity/Q43736431998-07-03Paper
https://portal.mardi4nfdi.de/entity/Q43757171998-03-05Paper
https://portal.mardi4nfdi.de/entity/Q44005771997-01-01Paper

Research outcomes over time

This page was built for person: Marc Joye