Martin R. Albrecht
Affiliations:- King's College London, UK
- Royal Holloway University of London, UK (PhD)
- Technical University of Denmark (DTU), Section for Mathematics, Copenhagen, Denmark
- Pierre and Marie Curie University, LIP6, Paris, France
According to our database1,
Martin R. Albrecht
authored at least 87 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on kcl.ac.uk
-
on twitter.com
-
on malb.io
-
on keybase.io
-
on github.com
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-ish and Thresholdisable.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong.
Proceedings of the 30th USENIX Security Symposium, 2021
2020
On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem.
IACR Cryptol. ePrint Arch., 2020
Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance.
IACR Cryptol. ePrint Arch., 2020
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)).
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Security Standardisation Research - 6th International Conference, 2020
Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k<sup>1/(2k)</sup> Time k<sup>k/8+o(k)</sup>.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC.
IACR Cryptol. ePrint Arch., 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity.
IACR Cryptol. ePrint Arch., 2016
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices.
IACR Cryptol. ePrint Arch., 2014
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
IACR Cryptol. ePrint Arch., 2013
2012
J. Symb. Comput., 2012
IACR Cryptol. ePrint Arch., 2012
The M4RIE library for dense linear algebra over small fields with even characteristic.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2012
2011
IACR Cryptol. ePrint Arch., 2011
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
CoRR, 2011
2010
Algorithmic algebraic techniques and their application to block cipher cryptanalysis.
PhD thesis, 2010
ACM Trans. Math. Softw., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
2008
2005
Proceedings of the Climbing and Walking Robots, 2005