Alexander May

From MaRDI portal
Person:826242

Available identifiers

zbMath Open may.alexanderMaRDI QIDQ826242

List of research outcomes





PublicationDate of PublicationType
Too many hints -- when LLL breaks LWE2024-09-13Paper
How to enumerate LWE keys as narrow as in \textsc{Kyber}/\textsc{Dilithium}2024-06-05Paper
New NTRU Records with Improved Lattice Bases2024-04-26Paper
Low memory attacks on small key CSIDH2023-11-10Paper
Decoding McEliece with a hint -- secret Goppa key parts reveal everything2023-07-25Paper
Breaking Goppa-based McEliece with hints2023-07-17Paper
How to backdoor (classic) McEliece and how to guard against backdoors2023-07-07Paper
Partial key exposure attacks on BIKE, Rainbow and NTRU2023-06-30Paper
Partial key exposure attack on short secret exponent CRT-RSA2023-05-12Paper
Subset Sum Quantumly in 1.17 n .2023-04-26Paper
The Power of Few Qubits and Collisions – Subset Sum Below Grover’s Bound2022-10-13Paper
Approximate divisor multiples -- factoring with only a third of the secret CRT-exponents2022-08-30Paper
McEliece needs a break -- solving McEliece-1284 and quasi-cyclic-2918 with modern ISD2022-08-30Paper
How to find ternary LWE keys using locality sensitive hashing2022-06-29Paper
Towards quantum large-scale password guessing on real-world distributions2022-06-29Paper
How to meet ternary LWE keys2022-04-22Paper
Quantum key search for ternary LWE2022-03-22Paper
Lattice-based integer factorisation: an introduction to Coppersmith's method2022-02-25Paper
Noisy Simon period finding2021-12-20Paper
Low weight discrete logarithm and subset sum in \(2^{0.65n}\) with polynomial memory2021-12-01Paper
Can we beat the square root bound for ECDLP over \(\mathbb{F}_p^2\) via representation?2021-05-03Paper
Improved low-memory subset sum and LPN algorithms via multiple collisions2020-05-06Paper
Dissection-BKW2018-09-26Paper
Decoding linear codes with high error rate and its impact for LPN security2018-06-22Paper
Grover meets Simon -- quantumly attacking the FX-construction2018-03-08Paper
On the asymptotic complexity of solving LWE2018-01-26Paper
LPN decoded2017-11-15Paper
LP solutions of vectorial integer subset sums -- cryptanalysis of Galbraith's binary matrix LWE2017-06-13Paper
Parallel implementation of \textsf{BDD} enumeration for \textsf{LWE}2016-10-04Paper
A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups2016-04-13Paper
On computing nearest neighbors with applications to decoding of binary linear codes2015-09-30Paper
Certifying RSA2013-03-19Paper
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding2012-06-29Paper
On CCA-Secure Somewhat Homomorphic Encryption2012-06-08Paper
Decoding random linear codes in \(\tilde{\mathcal{O}}(2^{0.054n})\)2011-12-02Paper
Correcting errors in RSA private keys2010-08-24Paper
Maximizing small root bounds by linearization and applications to small secret exponent RSA2010-05-28Paper
Using LLL-reduction for solving RSA and factorization problems2010-03-05Paper
Attacking power generators using unravelled linearization: when do we output too much?2009-12-15Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint2009-03-24Paper
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.0732009-03-10Paper
Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits2009-02-10Paper
Partial Key Exposure Attacks on RSA up to Full Size Exponents2008-05-06Paper
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers2008-05-06Paper
A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants2008-04-24Paper
Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?2008-03-05Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Deterministic polynomial-time equivalence of computing the RSA secret key and factoring2007-05-24Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q47364452004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44091222003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q47872032003-01-09Paper
https://portal.mardi4nfdi.de/entity/Q47871952003-01-09Paper

Research outcomes over time

This page was built for person: Alexander May