The following pages link to Martin R. Albrecht (Q285242):
Displaying 50 items.
- Polly cracker, revisited (Q285245) (← links)
- (Q320087) (redirect page) (← links)
- Coordinating decentralized linear programs by exchange of primal information (Q320089) (← links)
- On the relation between the MXL family of algorithms and Gröbner basis algorithms (Q414624) (← links)
- On the concrete hardness of learning with errors (Q745110) (← links)
- Exploring trade-offs in batch bounded distance decoding (Q778944) (← links)
- Supply chain coordination mechanisms. New approaches for collaborative planning (Q1040898) (← links)
- Optimization of safety stocks in models with an order service level objective or constraint (Q1694831) (← links)
- Notes on GGH13 without the presence of ideals (Q1744852) (← links)
- Estimate all the {LWE, NTRU} schemes! (Q1796806) (← links)
- Component allocation in make-to-stock assembly systems (Q2033404) (← links)
- The vacuity of the open source security testing methodology manual (Q2039991) (← links)
- On bounded distance decoding with predicate: breaking the ``lattice barrier'' for the hidden number problem (Q2056699) (← links)
- Round-optimal verifiable oblivious pseudorandom functions from ideal lattices (Q2061957) (← links)
- Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\) (Q2096521) (← links)
- Subtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over lattices (Q2128574) (← links)
- Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance (Q2128583) (← links)
- Tightly secure ring-LWE based key encapsulation with short ciphertexts (Q2167708) (← links)
- Feistel structures for MPC, and more (Q2167775) (← links)
- Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC (Q2178862) (← links)
- Multilinear maps from obfuscation (Q2188963) (← links)
- Determining near optimal base-stock levels in two-stage general inventory systems (Q2255950) (← links)
- On the complexity of the BKW algorithm on LWE (Q2256097) (← links)
- The general sieve kernel and new records in lattice reduction (Q2292890) (← links)
- Large modulus ring-LWE \(\geq \) module-LWE (Q2412876) (← links)
- Revisiting the expected cost of solving uSVP and applications to LWE (Q2412877) (← links)
- Estimating quantum speedups for lattice sieves (Q2692396) (← links)
- Implementing Candidate Graded Encoding Schemes from Ideal Lattices (Q2795999) (← links)
- Multilinear Maps from Obfuscation (Q2796137) (← links)
- Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS (Q2820499) (← links)
- A Subfield Lattice Attack on Overstretched NTRU Assumptions (Q2835586) (← links)
- Block Ciphers – Focus on the Linear Layer (feat. PRIDE) (Q2874496) (← links)
- Ciphers for MPC and FHE (Q2948338) (← links)
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity (Q2958119) (← links)
- Algebraic Attacks on the Courtois Toy Cipher (Q3007784) (← links)
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model (Q3013081) (← links)
- Algebraic Precomputations in Differential and Integral Cryptanalysis (Q3019942) (← links)
- Polly Cracker, Revisited (Q3102185) (← links)
- Breaking an Identity-Based Encryption Scheme Based on DHIES (Q3104705) (← links)
- On the Efficacy of Solving LWE by Reduction to Unique-SVP (Q3193270) (← links)
- Algebraic Techniques in Differential Cryptanalysis (Q3391571) (← links)
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers (Q3455483) (← links)
- Lattice Attacks on NTRU and LWE: A History of Refinements (Q5034404) (← links)
- Homomorphic Encryption Standard (Q5044564) (← links)
- Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography (Q5086199) (← links)
- The M4RIE library for dense linear algebra over small fields with even characteristic (Q5244513) (← links)
- Lazy Modulus Switching for the BKW Algorithm on LWE (Q5402986) (← links)
- Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions (Q5402987) (← links)
- On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL (Q5738971) (← links)
- Batch signatures, revisited (Q6636110) (← links)