Martin R. Albrecht

From MaRDI portal
Revision as of 13:17, 10 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Martin R. Albrecht to Martin R. Albrecht: Duplicate)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:285242

Available identifiers

zbMath Open albrecht.martin-rMaRDI QIDQ285242

List of research outcomes





PublicationDate of PublicationType
Crypto dark matter on the torus. Oblivious PRFs from shallow PRFs and TFHE2024-11-13Paper
SLAP: succinct lattice-based polynomial commitments from standard assumptions2024-11-13Paper
Batch signatures, revisited2024-11-12Paper
\textit{Caveat implementor!} Key recovery attacks on MEGA2023-12-08Paper
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)2023-06-28Paper
Estimating quantum speedups for lattice sieves2023-03-21Paper
Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)2022-11-09Paper
Homomorphic Encryption Standard2022-11-02Paper
Tightly secure ring-LWE based key encapsulation with short ciphertexts2022-08-25Paper
Feistel structures for MPC, and more2022-08-25Paper
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography2022-07-01Paper
Subtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over lattices2022-04-22Paper
Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance2022-04-22Paper
Lattice Attacks on NTRU and LWE: A History of Refinements2022-02-25Paper
Round-optimal verifiable oblivious pseudorandom functions from ideal lattices2021-12-21Paper
On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem2021-12-08Paper
The vacuity of the open source security testing methodology manual2021-07-06Paper
Component allocation in make-to-stock assembly systems2021-06-17Paper
Exploring trade-offs in batch bounded distance decoding2020-07-21Paper
Multilinear maps from obfuscation2020-06-15Paper
Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC2020-05-11Paper
The general sieve kernel and new records in lattice reduction2020-02-06Paper
Estimate all the {LWE, NTRU} schemes!2018-10-17Paper
Notes on GGH13 without the presence of ideals2018-04-20Paper
Large modulus ring-LWE \(\geq \) module-LWE2018-04-06Paper
Revisiting the expected cost of solving uSVP and applications to LWE2018-04-06Paper
Optimization of safety stocks in models with an order service level objective or constraint2018-02-06Paper
On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL2017-06-13Paper
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity2017-02-01Paper
A Subfield Lattice Attack on Overstretched NTRU Assumptions2016-11-30Paper
Coordinating decentralized linear programs by exchange of primal information2016-10-06Paper
Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS2016-09-09Paper
Polly cracker, revisited2016-05-19Paper
Implementing Candidate Graded Encoding Schemes from Ideal Lattices2016-03-23Paper
Multilinear Maps from Obfuscation2016-03-23Paper
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers2015-12-04Paper
On the Efficacy of Solving LWE by Reduction to Unique-SVP2015-10-16Paper
On the concrete hardness of learning with errors2015-10-13Paper
Ciphers for MPC and FHE2015-09-30Paper
The M4RIE library for dense linear algebra over small fields with even characteristic2015-03-27Paper
On the complexity of the BKW algorithm on LWE2015-02-19Paper
Determining near optimal base-stock levels in two-stage general inventory systems2015-02-18Paper
Block Ciphers – Focus on the Linear Layer (feat. PRIDE)2014-08-07Paper
Lazy Modulus Switching for the BKW Algorithm on LWE2014-03-25Paper
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions2014-03-25Paper
On the relation between the MXL family of algorithms and Gröbner basis algorithms2012-05-11Paper
Breaking an Identity-Based Encryption Scheme Based on DHIES2011-12-16Paper
Polly Cracker, Revisited2011-12-02Paper
Efficient Dense Gaussian Elimination over the Finite Field with Two Elements2011-11-28Paper
Algebraic Precomputations in Differential and Integral Cryptanalysis2011-07-29Paper
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model2011-07-07Paper
Algebraic Attacks on the Courtois Toy Cipher2011-06-17Paper
F4/52010-06-25Paper
Supply chain coordination mechanisms. New approaches for collaborative planning2009-11-26Paper
Algebraic Techniques in Differential Cryptanalysis2009-08-11Paper

Research outcomes over time

This page was built for person: Martin R. Albrecht