Skip to main content

previous disabled Page of 6
and
  1. No Access

    Chapter and Conference Paper

    TFHE Public-Key Encryption Revisited

    Fully homomorphic encryption allows directly processing encrypted data without having to decrypt it. The result of the computation is encrypted, typically under the same key. This unique feature offers a stron...

    Marc Joye in Topics in Cryptology – CT-RSA 2024 (2024)

  2. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part II

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  3. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  4. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part V

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  5. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  6. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VI

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  7. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  8. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VII

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  9. No Access

    Living Reference Work Entry In depth

    Differential Fault Analysis

    Marc Joye, Michael Tunstall in Encyclopedia of Cryptography, Security and Privacy

  10. No Access

    Chapter and Conference Paper

    On-Line/Off-Line DCR-Based Homomorphic Encryption and Applications

    On-line/off-line encryption schemes enable the fast encryption of a message from a pre-computed coupon. The paradigm was put forward in the case of digital signatures.

    Marc Joye in Topics in Cryptology – CT-RSA 2023 (2023)

  11. No Access

    Chapter and Conference Paper

    Blind Rotation in Fully Homomorphic Encryption with Extended Keys

    Most solutions for fully homomorphic encryption rely on hard lattice problems. Accordingly, the resulting ciphertexts must contain a certain level of noise to guarantee the security of the encryption. Running ...

    Marc Joye, Pascal Paillier in Cyber Security, Cryptology, and Machine Learning (2022)

  12. No Access

    Chapter and Conference Paper

    Programmable Bootstrap** Enables Efficient Homomorphic Inference of Deep Neural Networks

    In many cases, machine learning and privacy are perceived to be at odds. Privacy concerns are especially relevant when the involved data are sensitive. This paper deals with the privacy-preserving inference of...

    Ilaria Chillotti, Marc Joye, Pascal Paillier in Cyber Security Cryptography and Machine Le… (2021)

  13. No Access

    Chapter and Conference Paper

    Balanced Non-adjacent Forms

    Integers can be decomposed in multiple ways. The choice of a recoding technique is generally dictated by performance considerations. The usual metric for optimizing the decomposition is the Hamming weight. In ...

    Marc Joye in Advances in Cryptology – ASIACRYPT 2021 (2021)

  14. No Access

    Chapter and Conference Paper

    PINFER: Privacy-Preserving Inference

    The foreseen growing role of outsourced machine learning services is raising concerns about the privacy of user data. This paper proposes a variety of protocols for privacy-preserving regression and classific...

    Marc Joye, Fabien Petitcolas in Data Privacy Management, Cryptocurrencies … (2019)

  15. No Access

    Chapter and Conference Paper

    Private Data Aggregation over Selected Subsets of Users

    Aggregator-oblivious ( \(\mathsf {AO}\) ) encryption allows the computation of aggregate statistics over sens...

    Amit Datta, Marc Joye, Nadia Fawaz in Cryptology and Network Security (2019)

  16. Chapter and Conference Paper

    Decentralized Policy-Hiding ABE with Receiver Privacy

    Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and policy hidi...

    Yan Michalevsky, Marc Joye in Computer Security (2018)

  17. No Access

    Chapter and Conference Paper

    Function-Revealing Encryption

    Multi-input functional encryption is a paradigm that allows an authorized user to compute a certain function—and nothing more—over multiple plaintexts given only their encryption. The particular case of two-in...

    Marc Joye, Alain Passelègue in Security and Cryptography for Networks (2018)

  18. Chapter and Conference Paper

    Private yet Efficient Decision Tree Evaluation

    Decision trees are a popular method for a variety of machine learning tasks. A typical application scenario involves a client providing a vector of features and a service provider (server) running a trained de...

    Marc Joye, Fariborz Salehi in Data and Applications Security and Privacy XXXII (2018)

  19. Chapter and Conference Paper

    Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption

    Linear regression with 2-norm regularization (i.e., ridge regression) is an important statistical technique that models the relationship between some explanatory values and an outcome value using a linear functio...

    Irene Giacomelli, Somesh Jha, Marc Joye in Applied Cryptography and Network Security (2018)

  20. No Access

    Chapter and Conference Paper

    Differential Attacks on Deterministic Signatures

    Deterministic signature schemes are becoming more popular, as illustrated by the deterministic variant of ECDSA and the popular EdDSA scheme, since eliminating the need for high-quality randomness might have s...

    Christopher Ambrose, Joppe W. Bos, Björn Fay in Topics in Cryptology – CT-RSA 2018 (2018)

previous disabled Page of 6