His scientific interests lie mostly in Cryptography, Elliptic curve, Elliptic curve point multiplication, Elliptic Curve Digital Signature Algorithm and Elliptic curve cryptography. His Cryptography research is multidisciplinary, incorporating perspectives in Exponentiation and Key. His biological study spans a wide range of topics, including Simple, Abelian group, Scalar multiplication and Arithmetic.
In his study, which falls under the umbrella issue of Elliptic curve, Computational complexity theory and Parallel computing is strongly linked to Side channel attack. His research in Elliptic curve point multiplication intersects with topics in Discrete mathematics, Tripling-oriented Doche–Icart–Kohel curve, Counting points on elliptic curves and Hessian form of an elliptic curve. The various areas that he examines in his Elliptic Curve Digital Signature Algorithm study include Jacobian curve, Curve25519, Theoretical computer science and Algebra.
His primary areas of study are Cryptography, Theoretical computer science, Encryption, Elliptic curve and Computer security. He combines subjects such as Exponentiation, Arithmetic and Public-key cryptography with his study of Cryptography. As a part of the same scientific family, he mostly works in the field of Arithmetic, focusing on Smart card and, on occasion, Embedded system.
His Theoretical computer science study also includes
Marc Joye mainly focuses on Encryption, Theoretical computer science, Homomorphic encryption, Computer security and Public-key cryptography. His Theoretical computer science research incorporates elements of Cryptographic primitive, Verifiable secret sharing, Cryptosystem, Key and Plaintext-aware encryption. His Homomorphic encryption research includes themes of Cryptography, Artificial intelligence, Plaintext, Machine learning and Computation.
His work in the fields of Cryptography, such as Key generation, intersects with other areas such as Regression. In Computer security, he works on issues like Signature, which are connected to Mode, Adversary and Hardware security module. As part of one scientific family, Marc Joye deals mainly with the area of Semantic security, narrowing it down to issues related to the Arithmetic, and often Algorithm.
Marc Joye focuses on Theoretical computer science, Encryption, Homomorphic encryption, Cryptography and Plaintext. His work carried out in the field of Theoretical computer science brings together such families of science as Factorization, Matrix, Standard model and Plaintext-aware encryption. His Encryption research focuses on Linear subspace and how it relates to Linear span, Malleability, Adaptive chosen-ciphertext attack and Verifiable secret sharing.
His biological study deals with issues like Computation, which deal with fields such as Regularization, Linear regression and Homomorphism. Marc Joye incorporates Cryptography and Regression in his studies. His work in Plaintext covers topics such as Public-key cryptography which are related to areas like Adversary, Server, Key generation and Digital signature.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
Giuseppe Ateniese;Jan Camenisch;Marc Joye;Gene Tsudik.
international cryptology conference (2000)
Cryptographic Hardware and Embedded Systems - CHES 2004
Marc Joye;Jean-Jacques Quisquater.
The Montgomery Powering Ladder
Marc Joye;Sung-Ming Yen.
cryptographic hardware and embedded systems (2002)
Checking before output may not be enough against fault-based cryptanalysis
Sung-Ming Yen;M. Joye.
IEEE Transactions on Computers (2000)
Twisted Edwards curves
Daniel J. Bernstein;Peter Birkner;Marc Joye;Tanja Lange.
international conference on progress in cryptology (2008)
Weierstraß Elliptic Curves and Side-Channel Attacks
Eric Brier;Marc Joye.
public key cryptography (2002)
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records
V. Nikolaenko;U. Weinsberg;S. Ioannidis;M. Joye.
ieee symposium on security and privacy (2013)
Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
B. Chevallier-Mames;M. Ciet;M. Joye.
IEEE Transactions on Computers (2004)
Protections against Differential Analysis for Elliptic Curve Cryptography — An Algebraic Approach —
Marc Joye;Christophe Tymen.
cryptographic hardware and embedded systems (2001)
Privacy-preserving matrix factorization
Valeria Nikolaenko;Stratis Ioannidis;Udi Weinsberg;Marc Joye.
computer and communications security (2013)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: