A practical and provably secure coalition-resistant group signature scheme G Ateniese, J Camenisch, M Joye, G Tsudik Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000 | 1301 | 2000 |
The Montgomery powering ladder M Joye, SM Yen International workshop on cryptographic hardware and embedded systems, 291-302, 2002 | 702 | 2002 |
Twisted edwards curves DJ Bernstein, P Birkner, M Joye, T Lange, C Peters Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008 | 669 | 2008 |
Privacy-preserving ridge regression on hundreds of millions of records V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, D Boneh, N Taft 2013 IEEE symposium on security and privacy, 334-348, 2013 | 617 | 2013 |
Checking before output may not be enough against fault-based cryptanalysis SM Yen, M Joye IEEE Transactions on computers 49 (9), 967-970, 2000 | 498 | 2000 |
Weierstraß elliptic curves and side-channel attacks E Brier, M Joye International workshop on public key cryptography, 335-345, 2002 | 481 | 2002 |
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity B Chevallier-Mames, M Ciet, M Joye IEEE Transactions on computers 53 (6), 760-768, 2004 | 379 | 2004 |
Privacy-preserving matrix factorization V Nikolaenko, S Ioannidis, U Weinsberg, M Joye, N Taft, D Boneh Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 367 | 2013 |
Protections against differential analysis for elliptic curve cryptography—an algebraic approach— M Joye, C Tymen Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001 | 312 | 2001 |
Hessian elliptic curves and side-channel attacks M Joye, JJ Quisquater Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001 | 297 | 2001 |
Fault analysis in cryptography M Joye, M Tunstall Springer, 2012 | 263 | 2012 |
Trading inversions for multiplications in elliptic curve cryptography M Ciet, M Joye, K Lauter, PL Montgomery Designs, codes and cryptography 39, 189-206, 2006 | 245 | 2006 |
Elliptic curve cryptosystems in the presence of permanent and transient faults M Ciet, M Joye Designs, codes and cryptography 36 (1), 33-43, 2005 | 244 | 2005 |
Optimal left-to-right binary signed-digit recoding M Joye, SM Yen IEEE Transactions on Computers 49 (7), 740-748, 2000 | 225 | 2000 |
Chinese remaindering based cryptosystems in the presence of faults M Joye, AK Lenstra, JJ Quisquater Journal of cryptology 12, 241-245, 1999 | 216 | 1999 |
On second-order differential power analysis M Joye, P Paillier, B Schoenmakers Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005 | 208 | 2005 |
Universal Exponentiation Algorithm A First Step towards Provable SPA-Resistance C Clavier, M Joye Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001 | 207 | 2001 |
Programmable bootstrapping enables efficient homomorphic inference of deep neural networks I Chillotti, M Joye, P Paillier Cyber Security Cryptography and Machine Learning: 5th International …, 2021 | 182 | 2021 |
The Jacobi model of an elliptic curve and side-channel analysis O Billet, M Joye Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 15th …, 2003 | 177 | 2003 |
A scalable scheme for privacy-preserving aggregation of time-series data M Joye, B Libert Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 171 | 2013 |