2017 (9)
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography. Aguilar-Melchor, C.; Albrecht, M. R.; and Ricosset, T. In Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, pages 3--19, 2017.
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography [link]Paper   doi   bibtex
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. Albrecht, M. R.; Orsini, E.; Paterson, K. G.; Peer, G.; and Smart, N. P. In Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I, pages 29--46, 2017.
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [link]Paper   doi   bibtex
On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL. Albrecht, M. R. In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II, pages 103--129, 2017.
On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL [link]Paper   doi   bibtex
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL. Albrecht, M. R. IACR Cryptology ePrint Archive, 2017: 47. 2017.
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL [link]Paper   bibtex
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. Albrecht, M. R.; Orsini, E.; Paterson, K. G.; Peer, G.; and Smart, N. P. IACR Cryptology ePrint Archive, 2017: 354. 2017.
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [link]Paper   bibtex
Large Modulus Ring-LWE \textgreater= Module-LWE. Albrecht, M. R.; and Deo, A. IACR Cryptology ePrint Archive, 2017: 612. 2017.
Large Modulus Ring-LWE \textgreater= Module-LWE [link]Paper   bibtex
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Gollmann, D.; Miyaji, A.; and Kikuchi, H. , editor s. Volume 10355, of Lecture Notes in Computer Science. 2017.Springer.
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings [link]Paper   doi   bibtex   buy
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I. Foley, S. N.; Gollmann, D.; and Snekkenes, E. , editor s. Volume 10492, of Lecture Notes in Computer Science. 2017.Springer.
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I [link]Paper   doi   bibtex   buy
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II. Coron, J.; and Nielsen, J. B. , editor s. Volume 10211, of Lecture Notes in Computer Science. 2017.
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II [link]Paper   doi   bibtex   buy
  2016 (14)
Polly Cracker, revisited. Albrecht, M. R.; Faugère, J.; Farshim, P.; Herold, G.; and Perret, L. Des. Codes Cryptography, 79(2): 261--302. 2016.
Polly Cracker, revisited [link]Paper   doi   bibtex
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. Albrecht, M. R.; Grassi, L.; Rechberger, C.; Roy, A.; and Tiessen, T. In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, pages 191--219, 2016.
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [link]Paper   doi   bibtex
A Surfeit of SSH Cipher Suites. Albrecht, M. R.; Degabriele, J. P.; Hansen, T. B.; and Paterson, K. G. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pages 1480--1491, 2016.
A Surfeit of SSH Cipher Suites [link]Paper   doi   bibtex
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes. Albrecht, M. R.; Bai, S.; and Ducas, L. In Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I, pages 153--178, 2016.
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes [link]Paper   doi   bibtex
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. Albrecht, M. R.; and Paterson, K. G. In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, pages 622--643, 2016.
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS [link]Paper   doi   bibtex
Multilinear Maps from Obfuscation. Albrecht, M. R.; Farshim, P.; Hofheinz, D.; Larraia, E.; and Paterson, K. G. In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, pages 446--473, 2016.
Multilinear Maps from Obfuscation [link]Paper   doi   bibtex
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes. Albrecht, M. R.; Bai, S.; and Ducas, L. IACR Cryptology ePrint Archive, 2016: 127. 2016.
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes [link]Paper   bibtex
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. Albrecht, M. R.; Grassi, L.; Rechberger, C.; Roy, A.; and Tiessen, T. IACR Cryptology ePrint Archive, 2016: 492. 2016.
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [link]Paper   bibtex
Ciphers for MPC and FHE. Albrecht, M. R.; Rechberger, C.; Schneider, T.; Tiessen, T.; and Zohner, M. IACR Cryptology ePrint Archive, 2016: 687. 2016.
Ciphers for MPC and FHE [link]Paper   bibtex
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Cheon, J. H.; and Takagi, T. , editor s. Volume 10031, of Lecture Notes in Computer Science. 2016.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I [link]Paper   doi   bibtex   buy
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. Weippl, E. R.; Katzenbeisser, S.; Kruegel, C.; Myers, A. C.; and Halevi, S. , editor s. 2016.ACM.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 [link]Paper   bibtex   buy
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M.; and Katz, J. , editor s. Volume 9814, of Lecture Notes in Computer Science. 2016.Springer.
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I [link]Paper   doi   bibtex   buy
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Fischlin, M.; and Coron, J. , editor s. Volume 9665, of Lecture Notes in Computer Science. 2016.Springer.
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I [link]Paper   doi   bibtex   buy
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I. Kushilevitz, E.; and Malkin, T. , editor s. Volume 9562, of Lecture Notes in Computer Science. 2016.Springer.
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I [link]Paper   doi   bibtex   buy
  2015 (10)
Algebraic algorithms for LWE problems. Albrecht, M. R.; Cid, C.; Faugère, J.; Fitzpatrick, R.; and Perret, L. ACM Comm. Computer Algebra, 49(2): 62. 2015.
Algebraic algorithms for LWE problems [link]Paper   doi   bibtex
On the complexity of the BKW algorithm on LWE. Albrecht, M. R.; Cid, C.; Faugère, J.; Fitzpatrick, R.; and Perret, L. Des. Codes Cryptography, 74(2): 325--354. 2015.
On the complexity of the BKW algorithm on LWE [link]Paper   doi   bibtex
On the concrete hardness of Learning with Errors. Albrecht, M. R.; Player, R.; and Scott, S. J. Mathematical Cryptology, 9(3): 169--203. 2015.
On the concrete hardness of Learning with Errors [link]Paper   bibtex
Implementing Candidate Graded Encoding Schemes from Ideal Lattices. Albrecht, M. R.; Cocis, C.; Laguillaumie, F.; and Langlois, A. In Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II, pages 752--775, 2015.
Implementing Candidate Graded Encoding Schemes from Ideal Lattices [link]Paper   doi   bibtex
Ciphers for MPC and FHE. Albrecht, M. R.; Rechberger, C.; Schneider, T.; Tiessen, T.; and Zohner, M. In Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, pages 430--454, 2015.
Ciphers for MPC and FHE [link]Paper   doi   bibtex
On the concrete hardness of Learning with Errors. Albrecht, M. R.; Player, R.; and Scott, S. IACR Cryptology ePrint Archive, 2015: 46. 2015.
On the concrete hardness of Learning with Errors [link]Paper   bibtex
Multilinear Maps from Obfuscation. Albrecht, M. R.; Farshim, P.; Hofheinz, D.; Larraia, E.; and Paterson, K. G. IACR Cryptology ePrint Archive, 2015: 780. 2015.
Multilinear Maps from Obfuscation [link]Paper   bibtex
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. Albrecht, M. R.; and Paterson, K. G. IACR Cryptology ePrint Archive, 2015: 1129. 2015.
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS [link]Paper   bibtex
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II. Iwata, T.; and Cheon, J. H. , editor s. Volume 9453, of Lecture Notes in Computer Science. 2015.Springer.
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II [link]Paper   doi   bibtex   buy
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I. Oswald, E.; and Fischlin, M. , editor s. Volume 9056, of Lecture Notes in Computer Science. 2015.Springer.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I [link]Paper   doi   bibtex   buy
  2014 (10)
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). Albrecht, M. R.; Driessen, B.; Kavun, E. B.; Leander, G.; Paar, C.; and Yalçin, T. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, pages 57--76, 2014.
Block Ciphers - Focus on the Linear Layer (feat. PRIDE) [link]Paper   doi   bibtex
Lazy Modulus Switching for the BKW Algorithm on LWE. Albrecht, M. R.; Faugère, J.; Fitzpatrick, R.; and Perret, L. In Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pages 429--445, 2014.
Lazy Modulus Switching for the BKW Algorithm on LWE [link]Paper   doi   bibtex
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. Albrecht, M. R.; Faugère, J.; Fitzpatrick, R.; Perret, L.; Todo, Y.; and Xagawa, K. In Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pages 446--464, 2014.
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions [link]Paper   doi   bibtex
Lazy Modulus Switching for the BKW Algorithm on LWE. Albrecht, M. R.; Faugère, J.; Fitzpatrick, R.; and Perret, L. IACR Cryptology ePrint Archive, 2014: 19. 2014.
Lazy Modulus Switching for the BKW Algorithm on LWE [link]Paper   bibtex
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version. Albrecht, M. R.; Driessen, B.; Kavun, E. B.; Leander, G.; Paar, C.; and Yalçin, T. IACR Cryptology ePrint Archive, 2014: 453. 2014.
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version [link]Paper   bibtex
Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices. Albrecht, M. R.; Cocis, C.; Laguillaumie, F.; and Langlois, A. IACR Cryptology ePrint Archive, 2014: 928. 2014.
Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices [link]Paper   bibtex
Algebraic Algorithms for LWE Problems. Albrecht, M. R.; Cid, C.; Faugère, J.; Fitzpatrick, R.; and Perret, L. IACR Cryptology ePrint Archive, 2014: 1018. 2014.
Algebraic Algorithms for LWE Problems [link]Paper   bibtex
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. A.; and Gennaro, R. , editor s. Volume 8616, of Lecture Notes in Computer Science. 2014.Springer.
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I [link]Paper   doi   bibtex   buy
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings. Krawczyk, H. , editor . Volume 8383, of Lecture Notes in Computer Science. 2014.Springer.
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings [link]Paper   doi   bibtex   buy
Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers. Lee, H.; and Han, D. , editor s. Volume 8565, of Lecture Notes in Computer Science. 2014.Springer.
Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers [link]Paper   doi   bibtex   buy
  2013 (4)
On the Efficacy of Solving LWE by Reduction to Unique-SVP. Albrecht, M. R.; Fitzpatrick, R.; and Göpfert, F. In Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers, pages 293--310, 2013.
On the Efficacy of Solving LWE by Reduction to Unique-SVP [link]Paper   doi   bibtex
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. Albrecht, M. R.; Faugère, J.; Fitzpatrick, R.; and Perret, L. IACR Cryptology ePrint Archive, 2013: 470. 2013.
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions [link]Paper   bibtex
On the Efficacy of Solving LWE by Reduction to Unique-SVP. Albrecht, M. R.; Fitzpatrick, R.; and Göpfert, F. IACR Cryptology ePrint Archive, 2013: 602. 2013.
On the Efficacy of Solving LWE by Reduction to Unique-SVP [link]Paper   bibtex
Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Knudsen, L. R.; and Wu, H. , editor s. Volume 7707, of Lecture Notes in Computer Science. 2013.Springer.
Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers [link]Paper   doi   bibtex   buy
  2012 (7)
On the relation between the MXL family of algorithms and Gröbner basis algorithms. Albrecht, M. R.; Cid, C.; Faugère, J.; and Perret, L. J. Symb. Comput., 47(8): 926--941. 2012.
On the relation between the MXL family of algorithms and Gröbner basis algorithms [link]Paper   doi   bibtex
The M4RIE library for dense linear algebra over small fields with even characteristic. Albrecht, M. R. In International Symposium on Symbolic and Algebraic Computation, ISSAC'12, Grenoble, France - July 22 - 25, 2012, pages 28--34, 2012.
The M4RIE library for dense linear algebra over small fields with even characteristic [link]Paper   doi   bibtex
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. Albrecht, M. R.; and Leander, G. In Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers, pages 1--15, 2012.
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers [link]Paper   doi   bibtex
Polly Cracker, Revisited. Albrecht, M. R.; Farshim, P.; Faugère, J.; Herold, G.; and Perret, L. Electronic Colloquium on Computational Complexity (ECCC), 19: 165. 2012.
Polly Cracker, Revisited [link]Paper   bibtex
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. Albrecht, M. R.; and Leander, G. IACR Cryptology ePrint Archive, 2012: 401. 2012.
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers [link]Paper   bibtex
On the Complexity of the BKW Algorithm on LWE. Albrecht, M. R.; Cid, C.; Faugère, J.; Fitzpatrick, R.; and Perret, L. IACR Cryptology ePrint Archive, 2012: 636. 2012.
On the Complexity of the BKW Algorithm on LWE [link]Paper   bibtex
International Symposium on Symbolic and Algebraic Computation, ISSAC'12, Grenoble, France - July 22 - 25, 2012. van der Hoeven, J.; and van Hoeij, M. , editor s. 2012.ACM.
International Symposium on Symbolic and Algebraic Computation, ISSAC'12, Grenoble, France - July 22 - 25, 2012 [link]Paper   bibtex   buy
  2011 (15)
Cold Boot Key Recovery by Solving Polynomial Systems with Noise. Albrecht, M. R.; and Cid, C. In Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings, pages 57--72, 2011.
Cold Boot Key Recovery by Solving Polynomial Systems with Noise [link]Paper   doi   bibtex
Polly Cracker, Revisited. Albrecht, M. R.; Farshim, P.; Faugère, J.; and Perret, L. In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, pages 179--196, 2011.
Polly Cracker, Revisited [link]Paper   doi   bibtex
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. Albrecht, M. R.; Farshim, P.; Paterson, K. G.; and Watson, G. J. In Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers, pages 128--145, 2011.
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model [link]Paper   doi   bibtex
Breaking an Identity-Based Encryption Scheme Based on DHIES. Albrecht, M. R.; and Paterson, K. G. In Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings, pages 344--355, 2011.
Breaking an Identity-Based Encryption Scheme Based on DHIES [link]Paper   doi   bibtex
Efficient Dense Gaussian Elimination over the Finite Field with Two Elements. Albrecht, M. R.; Bard, G. V.; and Pernet, C. CoRR, abs/1111.6549. 2011.
Efficient Dense Gaussian Elimination over the Finite Field with Two Elements [link]Paper   bibtex
The M4RIE library for dense linear algebra over small fields with even characteristic. Albrecht, M. R. CoRR, abs/1111.6900. 2011.
The M4RIE library for dense linear algebra over small fields with even characteristic [link]Paper   bibtex
Cold Boot Key Recovery by Solving Polynomial Systems with Noise. Albrecht, M. R.; and Cid, C. IACR Cryptology ePrint Archive, 2011: 38. 2011.
Cold Boot Key Recovery by Solving Polynomial Systems with Noise [link]Paper   bibtex
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms. Albrecht, M. R.; Cid, C.; Faugère, J.; and Perret, L. IACR Cryptology ePrint Archive, 2011: 164. 2011.
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms [link]Paper   bibtex
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. Albrecht, M. R.; Farshim, P.; Paterson, K. G.; and Watson, G. J. IACR Cryptology ePrint Archive, 2011: 213. 2011.
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model [link]Paper   bibtex
Polly Cracker, Revisited. Albrecht, M. R.; Farshim, P.; Faugère, J.; and Perret, L. IACR Cryptology ePrint Archive, 2011: 289. 2011.
Polly Cracker, Revisited [link]Paper   bibtex
Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Lopez, J.; and Tsudik, G. , editor s. Volume 6715, of Lecture Notes in Computer Science. 2011.
Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings [link]Paper   doi   bibtex   buy
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. Lee, D. H.; and Wang, X. , editor s. Volume 7073, of Lecture Notes in Computer Science. 2011.Springer.
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings [link]Paper   doi   bibtex   buy
Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers. Joux, A. , editor . Volume 6733, of Lecture Notes in Computer Science. 2011.Springer.
Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [link]Paper   doi   bibtex   buy
Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings. Chen, L. , editor . Volume 7089, of Lecture Notes in Computer Science. 2011.Springer.
Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings [link]Paper   doi   bibtex   buy
Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Lai, X.; Yung, M.; and Lin, D. , editor s. Volume 6584, of Lecture Notes in Computer Science. 2011.Springer.
Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers [link]Paper   doi   bibtex   buy
  2010 (5)
Algorithmic algebraic techniques and their application to block cipher cryptanalysis. Albrecht, M. R. Ph.D. Thesis, Royal Holloway, University of London, Egham, UK, 2010.
Algorithmic algebraic techniques and their application to block cipher cryptanalysis [link]Paper   bibtex
Algorithm 898: Efficient multiplication of dense matrices over GF(2). Albrecht, M. R.; Bard, G. V.; and Hart, W. ACM Trans. Math. Softw., 37(1): 9:1--9:14. 2010.
Algorithm 898: Efficient multiplication of dense matrices over GF(2) [link]Paper   doi   bibtex
Algebraic Precomputations in Differential and Integral Cryptanalysis. Albrecht, M. R.; Cid, C.; Dullien, T.; Faugère, J.; and Perret, L. In Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, pages 387--403, 2010.
Algebraic Precomputations in Differential and Integral Cryptanalysis [link]Paper   doi   bibtex
Efficient Decomposition of Dense Matrices over GF(2). Albrecht, M. R.; and Pernet, C. CoRR, abs/1006.1744. 2010.
Efficient Decomposition of Dense Matrices over GF(2) [link]Paper   bibtex
Breaking An Identity-Based Encryption Scheme based on DHIES. Albrecht, M. R.; and Paterson, K. G. IACR Cryptology ePrint Archive, 2010: 637. 2010.
Breaking An Identity-Based Encryption Scheme based on DHIES [link]Paper   bibtex
  2009 (7)
Attacking cryptographic schemes based on "perturbation polynomials". Albrecht, M. R.; Gentry, C.; Halevi, S.; and Katz, J. In Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pages 1--10, 2009.
Attacking cryptographic schemes based on "perturbation polynomials" [link]Paper   doi   bibtex
Algebraic Techniques in Differential Cryptanalysis. Albrecht, M. R.; and Cid, C. In Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pages 193--208, 2009.
Algebraic Techniques in Differential Cryptanalysis [link]Paper   doi   bibtex
Plaintext Recovery Attacks against SSH. Albrecht, M. R.; Paterson, K. G.; and Watson, G. J. In 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May 2009, Oakland, California, USA, pages 16--26, 2009.
Plaintext Recovery Attacks against SSH [link]Paper   doi   bibtex
Attacking Cryptographic Schemes Based on "Perturbation Polynomials". Albrecht, M. R.; Gentry, C.; Halevi, S.; and Katz, J. IACR Cryptology ePrint Archive, 2009: 98. 2009.
Attacking Cryptographic Schemes Based on "Perturbation Polynomials" [link]Paper   bibtex
Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Al-Shaer, E.; Jha, S.; and Keromytis, A. D. , editor s. 2009.ACM.
bibtex   buy
Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers. Dunkelman, O. , editor . Volume 5665, of Lecture Notes in Computer Science. 2009.Springer.
Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers [link]Paper   doi   bibtex   buy
30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May 2009, Oakland, California, USA. 2009.IEEE Computer Society.
30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May 2009, Oakland, California, USA [link]Paper   bibtex   buy
  2008 (3)
Algebraic Attacks on the Courtois Toy Cipher. Albrecht, M. R. Cryptologia, 32(3): 220--276. 2008.
Algebraic Attacks on the Courtois Toy Cipher [link]Paper   doi   bibtex
Efficient Multiplication of Dense Matrices over GF(2). Albrecht, M. R.; Bard, G. V.; and Hart, W. CoRR, abs/0811.1714. 2008.
Efficient Multiplication of Dense Matrices over GF(2) [link]Paper   bibtex
Algebraic Techniques in Differential Cryptanalysis. Albrecht, M. R.; and Cid, C. IACR Cryptology ePrint Archive, 2008: 177. 2008.
Algebraic Techniques in Differential Cryptanalysis [link]Paper   bibtex
  2006 (1)
Climbing and Walking Robots - Proceedings of the 8th International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, CLAWAR 2005, London, UK, September 13-15, 2005. Tokhi, M. O.; Virk, G. S.; and Hossain, M. A. , editor s. 2006.Springer.
Climbing and Walking Robots - Proceedings of the 8th International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, CLAWAR 2005, London, UK, September 13-15, 2005 [link]Paper   doi   bibtex   buy
  2005 (1)
AIMEE: A Four-Legged Robot for RoboCup Rescue. Albrecht, M. R.; Backhaus, T.; Planthaber, S.; Stöpler, H.; Spenneberg, D.; and Kirchner, F. In Climbing and Walking Robots - Proceedings of the 8th International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, CLAWAR 2005, London, UK, September 13-15, 2005, pages 1003--1010, 2005.
AIMEE: A Four-Legged Robot for RoboCup Rescue [link]Paper   doi   bibtex