Martin R. Albrecht

From MaRDI portal
Person:285242

Available identifiers

zbMath Open albrecht.martin-rMaRDI QIDQ285242

List of research outcomes





PublicationDate of PublicationType
Crypto dark matter on the torus. Oblivious PRFs from shallow PRFs and TFHE2024-11-13Paper
SLAP: succinct lattice-based polynomial commitments from standard assumptions2024-11-13Paper
Batch signatures, revisited2024-11-12Paper
\textit{Caveat implementor!} Key recovery attacks on MEGA2023-12-08Paper
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)2023-06-28Paper
Estimating quantum speedups for lattice sieves2023-03-21Paper
Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)2022-11-09Paper
Homomorphic Encryption Standard2022-11-02Paper
Feistel structures for MPC, and more2022-08-25Paper
Tightly secure ring-LWE based key encapsulation with short ciphertexts2022-08-25Paper
Sampling from arbitrary centered discrete Gaussians for lattice-based cryptography2022-07-01Paper
Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance2022-04-22Paper
Subtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over lattices2022-04-22Paper
Lattice attacks on NTRU and LWE: a history of refinements2022-02-25Paper
Round-optimal verifiable oblivious pseudorandom functions from ideal lattices2021-12-21Paper
On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem2021-12-08Paper
The vacuity of the open source security testing methodology manual2021-07-06Paper
Component allocation in make-to-stock assembly systems2021-06-17Paper
Exploring trade-offs in batch bounded distance decoding2020-07-21Paper
Multilinear maps from obfuscation2020-06-15Paper
Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC2020-05-11Paper
The general sieve kernel and new records in lattice reduction2020-02-06Paper
Estimate all the \(\{\)LWE, NTRU\(\}\) schemes!2018-10-17Paper
Notes on GGH13 without the presence of ideals2018-04-20Paper
Large modulus ring-LWE \(\geq \) module-LWE2018-04-06Paper
Revisiting the expected cost of solving uSVP and applications to LWE2018-04-06Paper
Optimization of safety stocks in models with an order service level objective or constraint2018-02-06Paper
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL2017-06-13Paper
MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity2017-02-01Paper
A Subfield Lattice Attack on Overstretched NTRU Assumptions2016-11-30Paper
Coordinating decentralized linear programs by exchange of primal information2016-10-06Paper
Lucky microseconds: a timing attack on Amazon's s2n implementation of TLS2016-09-09Paper
Polly cracker, revisited2016-05-19Paper
Multilinear maps from obfuscation2016-03-23Paper
Implementing candidate graded encoding schemes from ideal lattices2016-03-23Paper
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers2015-12-04Paper
On the efficacy of solving LWE by reduction to unique-SVP2015-10-16Paper
On the concrete hardness of learning with errors2015-10-13Paper
Ciphers for MPC and FHE2015-09-30Paper
The M4RIE library for dense linear algebra over small fields with even characteristic2015-03-27Paper
On the complexity of the BKW algorithm on LWE2015-02-19Paper
Determining near optimal base-stock levels in two-stage general inventory systems2015-02-18Paper
Block ciphers -- focus on the linear layer (feat. PRIDE)2014-08-07Paper
Lazy modulus switching for the BKW algorithm on LWE2014-03-25Paper
Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions2014-03-25Paper
On the relation between the MXL family of algorithms and Gröbner basis algorithms2012-05-11Paper
Breaking an identity-based encryption scheme based on DHIES2011-12-16Paper
Polly cracker, revisited2011-12-02Paper
Efficient Dense Gaussian Elimination over the Finite Field with Two Elements2011-11-28Paper
Algebraic precomputations in differential and integral cryptanalysis2011-07-29Paper
On cipher-dependent related-key attacks in the ideal-cipher model2011-07-07Paper
Algebraic attacks on the Courtois toy cipher2011-06-17Paper
F4/52010-06-25Paper
Supply chain coordination mechanisms. New approaches for collaborative planning2009-11-26Paper
Algebraic Techniques in Differential Cryptanalysis2009-08-11Paper

Research outcomes over time

This page was built for person: Martin R. Albrecht