Martin R. Albrecht

From MaRDI portal
(Redirected from Person:285242)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Crypto dark matter on the torus. Oblivious PRFs from shallow PRFs and TFHE2024-11-13Paper
SLAP: succinct lattice-based polynomial commitments from standard assumptions2024-11-13Paper
Batch signatures, revisited2024-11-12Paper
\textit{Caveat implementor!} Key recovery attacks on MEGA
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Estimating quantum speedups for lattice sieves2023-03-21Paper
Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)2022-11-09Paper
Homomorphic Encryption Standard
Protecting Privacy through Homomorphic Encryption
2022-11-02Paper
Feistel structures for MPC, and more2022-08-25Paper
Tightly secure ring-LWE based key encapsulation with short ciphertexts2022-08-25Paper
Sampling from arbitrary centered discrete Gaussians for lattice-based cryptography
Applied Cryptography and Network Security
2022-07-01Paper
Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance2022-04-22Paper
Subtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over lattices2022-04-22Paper
Lattice attacks on NTRU and LWE: a history of refinements2022-02-25Paper
Round-optimal verifiable oblivious pseudorandom functions from ideal lattices2021-12-21Paper
On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem2021-12-08Paper
The vacuity of the open source security testing methodology manual
(available as arXiv preprint)
2021-07-06Paper
Component allocation in make-to-stock assembly systems
SN Operations Research Forum
2021-06-17Paper
Exploring trade-offs in batch bounded distance decoding2020-07-21Paper
Multilinear maps from obfuscation
Journal of Cryptology
2020-06-15Paper
Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC2020-05-11Paper
The general sieve kernel and new records in lattice reduction2020-02-06Paper
Estimate all the \(\{\)LWE, NTRU\(\}\) schemes!2018-10-17Paper
Notes on GGH13 without the presence of ideals2018-04-20Paper
Large modulus ring-LWE \(\geq \) module-LWE2018-04-06Paper
Revisiting the expected cost of solving uSVP and applications to LWE2018-04-06Paper
Optimization of safety stocks in models with an order service level objective or constraint
European Journal of Operational Research
2018-02-06Paper
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
Lecture Notes in Computer Science
2017-06-13Paper
MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
A Subfield Lattice Attack on Overstretched NTRU Assumptions
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Coordinating decentralized linear programs by exchange of primal information
European Journal of Operational Research
2016-10-06Paper
Lucky microseconds: a timing attack on Amazon's s2n implementation of TLS
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Polly cracker, revisited
Designs, Codes and Cryptography
2016-05-19Paper
Multilinear maps from obfuscation
Theory of Cryptography
2016-03-23Paper
Implementing candidate graded encoding schemes from ideal lattices
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
Selected Areas in Cryptography
2015-12-04Paper
On the efficacy of solving LWE by reduction to unique-SVP
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
On the concrete hardness of learning with errors
Journal of Mathematical Cryptology
2015-10-13Paper
Ciphers for MPC and FHE
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
The M4RIE library for dense linear algebra over small fields with even characteristic
Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation
2015-03-27Paper
On the complexity of the BKW algorithm on LWE
Designs, Codes and Cryptography
2015-02-19Paper
Determining near optimal base-stock levels in two-stage general inventory systems
European Journal of Operational Research
2015-02-18Paper
Block ciphers -- focus on the linear layer (feat. PRIDE)
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Lazy modulus switching for the BKW algorithm on LWE
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions
Public-Key Cryptography – PKC 2014
2014-03-25Paper
On the relation between the MXL family of algorithms and Gröbner basis algorithms
Journal of Symbolic Computation
2012-05-11Paper
Breaking an identity-based encryption scheme based on DHIES
Cryptography and Coding
2011-12-16Paper
Polly cracker, revisited
Lecture Notes in Computer Science
2011-12-02Paper
Efficient Dense Gaussian Elimination over the Finite Field with Two Elements2011-11-28Paper
Algebraic precomputations in differential and integral cryptanalysis
Information Security and Cryptology
2011-07-29Paper
On cipher-dependent related-key attacks in the ideal-cipher model
Fast Software Encryption
2011-07-07Paper
Algebraic attacks on the Courtois toy cipher
Cryptologia
2011-06-17Paper
F4/52010-06-25Paper
Supply chain coordination mechanisms. New approaches for collaborative planning
Lecture Notes in Economics and Mathematical Systems
2009-11-26Paper
Algebraic Techniques in Differential Cryptanalysis
Fast Software Encryption
2009-08-11Paper


Research outcomes over time


This page was built for person: Martin R. Albrecht