Publikationen

20122011201020092008

2012

  • Anja Becker, Antoine Joux, Alexander May, Alexander Meurer
    Decoding Random Binary Linear Codes in 2^(n/20): How 1+1=0 Improves Information Set Decoding
    In Advances in Cryptology (Eurocrypt 2012), Lecture Notes in Computer Science, Springer-Verlag, 2012.

2011

  • Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf
    Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems
    Cryptographic Hardware and Embedded Systems (CHES 2011), Lecture Notes in Computer Science, Springer-Verlag, 2011.
    PDF
  • Enrico Thomae, Christopher Wolf
    Roots of Square: Cryptanalysis of Double-Layer Square and Square+
    Post-Quantum Cryptography (PQCrypto 2011), Lecture Notes in Computer Science, Springer-Verlag, 2011.
    PDF
  • En­ri­co Tho­mae, Chris­to­pher Wolf
    Theo­re­ti­cal Ana­ly­sis and Run Time Com­ple­xi­ty of Mu­tan­tXL
    In­ter­na­tio­nal Con­fe­rence Com­pu­ta­tio­nal and Ma­the­ma­ti­cal Me­thods in Sci­ence and En­gi­nee­ring (CMMSE 2011), 2011.
    PDF

2010

  • Maike Ritzenhofen
    On Efficiently Calculating Small Solutions of Systems of Polynomial Equations - Lattice-Based Methods and Applications to Cryptography
    Dissertation, Ruhr-University of Bochum, 2010
    Abstract click for download PDF
  • Mathias Herrmann, Alexander May
    Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA
    To appear: In Practice and Theory in Public Key Cryptography (PKC 2010), Lecture Notes in Computer Science, Springer-Verlag, 2010.
    Abstract, BibTex click for download PDF

2009

  • Alexander May, Maike Ritzenhofen
    Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint
    In Practice and Theory in Public Key Cryptography (PKC 2009), Lecture Notes in Computer Science, Springer-Verlag, 2009.
    Abstrakt, BibTex, click for download Download
  • Mathias Herrmann, Gregor Leander
    A Practical Key Recovery Attack on Basic TCHo
    In Practice and Theory in Public Key Cryptography (PKC 2009), Lecture Notes in Computer Science, Springer-Verlag, 2009.
    Abstract, BibTex, click for download Download

2008

  • Alexander May, Maike Ritzenhofen
    Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?
    In Practice and Theory in Public Key Cryptography (PKC 2008), Lecture Notes in Computer Science Volume 4939, pages 37-46, Springer-Verlag, 2008.
    Abstract, BibTex click for download