2017 (9)
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography. Aguilar-Melchor, C.; Albrecht, M. R.; and Ricosset, T. In Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, pages 3--19, 2017.
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography [link]Paper   doi   bibtex
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. Albrecht, M. R.; Orsini, E.; Paterson, K. G.; Peer, G.; and Smart, N. P. In Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I, pages 29--46, 2017.
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [link]Paper   doi   bibtex
On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL. Albrecht, M. R. In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II, pages 103--129, 2017.
On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL [link]Paper   doi   bibtex
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL. Albrecht, M. R. IACR Cryptology ePrint Archive, 2017: 47. 2017.
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL [link]Paper   bibtex
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. Albrecht, M. R.; Orsini, E.; Paterson, K. G.; Peer, G.; and Smart, N. P. IACR Cryptology ePrint Archive, 2017: 354. 2017.
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [link]Paper   bibtex
Large Modulus Ring-LWE \textgreater= Module-LWE. Albrecht, M. R.; and Deo, A. IACR Cryptology ePrint Archive, 2017: 612. 2017.
Large Modulus Ring-LWE \textgreater= Module-LWE [link]Paper   bibtex
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Gollmann, D.; Miyaji, A.; and Kikuchi, H. , editor s. Volume 10355, of Lecture Notes in Computer Science. 2017.Springer.
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings [link]Paper   doi   bibtex   buy
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I. Foley, S. N.; Gollmann, D.; and Snekkenes, E. , editor s. Volume 10492, of Lecture Notes in Computer Science. 2017.Springer.
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I [link]Paper   doi   bibtex   buy
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II. Coron, J.; and Nielsen, J. B. , editor s. Volume 10211, of Lecture Notes in Computer Science. 2017.
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II [link]Paper   doi   bibtex   buy
  2016 (14)
Polly Cracker, revisited. Albrecht, M. R.; Faugère, J.; Farshim, P.; Herold, G.; and Perret, L. Des. Codes Cryptography, 79(2): 261--302. 2016.
Polly Cracker, revisited [link]Paper   doi   bibtex
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. Albrecht, M. R.; Grassi, L.; Rechberger, C.; Roy, A.; and Tiessen, T. In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, pages 191--219, 2016.
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [link]Paper   doi   bibtex
A Surfeit of SSH Cipher Suites. Albrecht, M. R.; Degabriele, J. P.; Hansen, T. B.; and Paterson, K. G. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pages 1480--1491, 2016.
A Surfeit of SSH Cipher Suites [link]Paper   doi   bibtex
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes. Albrecht, M. R.; Bai, S.; and Ducas, L. In Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I, pages 153--178, 2016.
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes [link]Paper   doi   bibtex
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. Albrecht, M. R.; and Paterson, K. G. In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, pages 622--643, 2016.
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS [link]Paper   doi   bibtex
Multilinear Maps from Obfuscation. Albrecht, M. R.; Farshim, P.; Hofheinz, D.; Larraia, E.; and Paterson, K. G. In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, pages 446--473, 2016.
Multilinear Maps from Obfuscation [link]Paper   doi   bibtex
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes. Albrecht, M. R.; Bai, S.; and Ducas, L. IACR Cryptology ePrint Archive, 2016: 127. 2016.
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes [link]Paper   bibtex
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. Albrecht, M. R.; Grassi, L.; Rechberger, C.; Roy, A.; and Tiessen, T. IACR Cryptology ePrint Archive, 2016: 492. 2016.
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [link]Paper   bibtex
Ciphers for MPC and FHE. Albrecht, M. R.; Rechberger, C.; Schneider, T.; Tiessen, T.; and Zohner, M. IACR Cryptology ePrint Archive, 2016: 687. 2016.
Ciphers for MPC and FHE [link]Paper   bibtex
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Cheon, J. H.; and Takagi, T. , editor s. Volume 10031, of Lecture Notes in Computer Science. 2016.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I [link]Paper   doi   bibtex   buy
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. Weippl, E. R.; Katzenbeisser, S.; Kruegel, C.; Myers, A. C.; and Halevi, S. , editor s. 2016.ACM.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 [link]Paper   bibtex   buy
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M.; and Katz, J. , editor s. Volume 9814, of Lecture Notes in Computer Science. 2016.Springer.
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I [link]Paper   doi   bibtex   buy
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Fischlin, M.; and Coron, J. , editor s. Volume 9665, of Lecture Notes in Computer Science. 2016.Springer.
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I [link]Paper   doi   bibtex   buy
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I. Kushilevitz, E.; and Malkin, T. , editor s. Volume 9562, of Lecture Notes in Computer Science. 2016.Springer.
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I [link]Paper   doi   bibtex   buy
  2015 (10)
Algebraic algorithms for LWE problems. Albrecht, M. R.; Cid, C.; Faugère, J.; Fitzpatrick, R.; and Perret, L. ACM Comm. Computer Algebra, 49(2): 62. 2015.
Algebraic algorithms for LWE problems [link]Paper   doi   bibtex
On the complexity of the BKW algorithm on LWE. Albrecht, M. R.; Cid, C.; Faugère, J.; Fitzpatrick, R.; and Perret, L. Des. Codes Cryptography, 74(2): 325--354. 2015.
On the complexity of the BKW algorithm on LWE [link]Paper   doi   bibtex
On the concrete hardness of Learning with Errors. Albrecht, M. R.; Player, R.; and Scott, S. J. Mathematical Cryptology, 9(3): 169--203. 2015.
On the concrete hardness of Learning with Errors [link]Paper   bibtex
Implementing Candidate Graded Encoding Schemes from Ideal Lattices. Albrecht, M. R.; Cocis, C.; Laguillaumie, F.; and Langlois, A. In Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II, pages 752--775, 2015.
Implementing Candidate Graded Encoding Schemes from Ideal Lattices [link]Paper   doi   bibtex
Ciphers for MPC and FHE. Albrecht, M. R.; Rechberger, C.; Schneider, T.; Tiessen, T.; and Zohner, M. In Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, pages 430--454, 2015.
Ciphers for MPC and FHE [link]Paper   doi   bibtex
On the concrete hardness of Learning with Errors. Albrecht, M. R.; Player, R.; and Scott, S. IACR Cryptology ePrint Archive, 2015: 46. 2015.
On the concrete hardness of Learning with Errors [link]Paper   bibtex
Multilinear Maps from Obfuscation. Albrecht, M. R.; Farshim, P.; Hofheinz, D.; Larraia, E.; and Paterson, K. G. IACR Cryptology ePrint Archive, 2015: 780. 2015.
Multilinear Maps from Obfuscation [link]Paper   bibtex
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. Albrecht, M. R.; and Paterson, K. G. IACR Cryptology ePrint Archive, 2015: 1129. 2015.
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS [link]Paper   bibtex
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II. Iwata, T.; and Cheon, J. H. , editor s. Volume 9453, of Lecture Notes in Computer Science. 2015.Springer.
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II [link]Paper   doi   bibtex   buy
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I. Oswald, E.; and Fischlin, M. , editor s. Volume 9056, of Lecture Notes in Computer Science. 2015.Springer.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I [link]Paper   doi   bibtex   buy
  2014 (10)
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). Albrecht, M. R.; Driessen, B.; Kavun, E. B.; Leander, G.; Paar, C.; and Yalçin, T. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, pages 57--76, 2014.
Block Ciphers - Focus on the Linear Layer (feat. PRIDE) [link]Paper   doi   bibtex
Lazy Modulus Switching for the BKW Algorithm on LWE. Albrecht, M. R.; Faugère, J.; Fitzpatrick, R.; and Perret, L. In Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pages 429--445, 2014.
Lazy Modulus Switching for the BKW Algorithm on LWE [link]Paper   doi   bibtex
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. Albrecht, M. R.; Faugère, J.; Fitzpatrick, R.; Perret, L.; Todo, Y.; and Xagawa, K. In Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pages 446--464, 2014.
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions [link]Paper   doi   bibtex
Lazy Modulus Switching for the BKW Algorithm on LWE. Albrecht, M. R.; Faugère, J.; Fitzpatrick, R.; and Perret, L. IACR Cryptology ePrint Archive, 2014: 19. 2014.
Lazy Modulus Switching for the BKW Algorithm on LWE [link]Paper   bibtex
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version. Albrecht, M. R.; Driessen, B.; Kavun, E. B.; Leander, G.; Paar, C.; and Yalçin, T. IACR Cryptology ePrint Archive, 2014: 453. 2014.
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version [link]Paper   bibtex
Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices. Albrecht, M. R.; Cocis, C.; Laguillaumie, F.; and Langlois, A. IACR Cryptology ePrint Archive, 2014: 928. 2014.
Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices [link]Paper   bibtex
Algebraic Algorithms for LWE Problems. Albrecht, M. R.; Cid, C.; Faugère, J.; Fitzpatrick, R.; and Perret, L. IACR Cryptology ePrint Archive, 2014: 1018. 2014.
Algebraic Algorithms for LWE Problems [link]Paper   bibtex
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. A.; and Gennaro, R. , editor s. Volume 8616, of Lecture Notes in Computer Science. 2014.Springer.
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I [link]Paper   doi   bibtex   buy
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings. Krawczyk, H. , editor . Volume 8383, of Lecture Notes in Computer Science. 2014.Springer.
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings [link]Paper   doi   bibtex   buy
Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers. Lee, H.; and Han, D. , editor s. Volume 8565, of Lecture Notes in Computer Science. 2014.Springer.
Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers [link]Paper   doi   bibtex   buy
  2013 (4)
On the Efficacy of Solving LWE by Reduction to Unique-SVP. Albrecht, M. R.; Fitzpatrick, R.; and Göpfert, F. In Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers, pages 293--310, 2013.
On the Efficacy of Solving LWE by Reduction to Unique-SVP [link]Paper   doi   bibtex
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. Albrecht, M. R.; Faugère, J.; Fitzpatrick, R.; and Perret, L. IACR Cryptology ePrint Archive, 2013: 470. 2013.
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions [link]Paper   bibtex
On the Efficacy of Solving LWE by Reduction to Unique-SVP. Albrecht, M. R.; Fitzpatrick, R.; and Göpfert, F. IACR Cryptology ePrint Archive, 2013: 602. 2013.
On the Efficacy of Solving LWE by Reduction to Unique-SVP [link]Paper   bibtex
Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Knudsen, L. R.; and Wu, H. , editor s. Volume 7707, of Lecture Notes in Computer Science. 2013.Springer.
Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers [link]Paper   doi   bibtex   buy
  2012 (7)
On the relation between the MXL family of algorithms and Gröbner basis algorithms. Albrecht, M. R.; Cid, C.; Faugère, J.; and Perret, L. J. Symb. Comput., 47(8): 926--941. 2012.
On the relation between the MXL family of algorithms and Gröbner basis algorithms [link]Paper   doi   bibtex
The M4RIE library for dense linear algebra over small fields with even characteristic. Albrecht, M. R. In International Symposium on Symbolic and Algebraic Computation, ISSAC'12, Grenoble, France - July 22 - 25, 2012, pages 28--34, 2012.
The M4RIE library for dense linear algebra over small fields with even characteristic [link]Paper   doi   bibtex
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. Albrecht, M. R.; and Leander, G. In Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers, pages 1--15, 2012.
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers [link]Paper   doi   bibtex
Polly Cracker, Revisited. Albrecht, M. R.; Farshim, P.; Faugère, J.; Herold, G.; and Perret, L. Electronic Colloquium on Computational Complexity (ECCC), 19: 165. 2012.
Polly Cracker, Revisited [link]Paper   bibtex
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. Albrecht, M. R.; and Leander, G. IACR Cryptology ePrint Archive, 2012: 401. 2012.
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers [link]Paper   bibtex
On the Complexity of the BKW Algorithm on LWE. Albrecht, M. R.; Cid, C.; Faugère, J.; Fitzpatrick, R.; and Perret, L. IACR Cryptology ePrint Archive, 2012: 636. 2012.
On the Complexity of the BKW Algorithm on LWE [link]Paper   bibtex
International Symposium on Symbolic and Algebraic Computation, ISSAC'12, Grenoble, France - July 22 - 25, 2012. van der Hoeven, J.; and van Hoeij, M. , editor s. 2012.ACM.
International Symposium on Symbolic and Algebraic Computation, ISSAC'12, Grenoble, France - July 22 - 25, 2012 [link]Paper   bibtex   buy
  2011 (15)
Cold Boot Key Recovery by Solving Polynomial Systems with Noise. Albrecht, M. R.; and Cid, C. In Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings, pages 57--72, 2011.
Cold Boot Key Recovery by Solving Polynomial Systems with Noise [link]Paper   doi   bibtex
Polly Cracker, Revisited. Albrecht, M. R.; Farshim, P.; Faugère, J.; and Perret, L. In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, pages 179--196, 2011.
Polly Cracker, Revisited [link]Paper   doi   bibtex
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. Albrecht, M. R.; Farshim, P.; Paterson, K. G.; and Watson, G. J. In Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers, pages 128--145, 2011.
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model [link]Paper   doi   bibtex
Breaking an Identity-Based Encryption Scheme Based on DHIES. Albrecht, M. R.; and Paterson, K. G. In Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings, pages 344--355, 2011.
Breaking an Identity-Based Encryption Scheme Based on DHIES [link]Paper   doi   bibtex
Efficient Dense Gaussian Elimination over the Finite Field with Two Elements. Albrecht, M. R.; Bard, G. V.; and Pernet, C. CoRR, abs/1111.6549. 2011.
Efficient Dense Gaussian Elimination over the Finite Field with Two Elements [link]Paper   bibtex
The M4RIE library for dense linear algebra over small fields with even characteristic. Albrecht, M. R. CoRR, abs/1111.6900. 2011.
The M4RIE library for dense linear algebra over small fields with even characteristic [link]Paper   bibtex
Cold Boot Key Recovery by Solving Polynomial Systems with Noise. Albrecht, M. R.; and Cid, C. IACR Cryptology ePrint Archive, 2011: 38. 2011.
Cold Boot Key Recovery by Solving Polynomial Systems with Noise [link]Paper   bibtex
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms. Albrecht, M. R.; Cid, C.; Faugère, J.; and Perret, L. IACR Cryptology ePrint Archive, 2011: 164. 2011.
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms [link]Paper   bibtex
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. Albrecht, M. R.; Farshim, P.; Paterson, K. G.; and Watson, G. J. IACR Cryptology ePrint Archive, 2011: 213. 2011.
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model [link]Paper   bibtex
Polly Cracker, Revisited. Albrecht, M. R.; Farshim, P.; Faugère, J.; and Perret, L. IACR Cryptology ePrint Archive, 2011: 289. 2011.
Polly Cracker, Revisited [link]Paper   bibtex
Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Lopez, J.; and Tsudik, G. , editor s. Volume 6715, of Lecture Notes in Computer Science. 2011.
Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings [link]Paper   doi   bibtex   buy
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. Lee, D. H.; and Wang, X. , editor s. Volume 7073, of Lecture Notes in Computer Science. 2011.Springer.
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings [link]Paper   doi   bibtex   buy
Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers. Joux, A. , editor . Volume 6733, of Lecture Notes in Computer Science. 2011.Springer.
Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [link]Paper   doi   bibtex   buy
Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings. Chen, L. , editor . Volume 7089, of Lecture Notes in Computer Science. 2011.Springer.
Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings [link]Paper   doi   bibtex   buy
Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Lai, X.; Yung, M.; and Lin, D. , editor s. Volume 6584, of Lecture Notes in Computer Science. 2011.Springer.
Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers [link]Paper   doi   bibtex   buy
  2010 (4)
Algorithm 898: Efficient multiplication of dense matrices over GF(2). Albrecht, M. R.; Bard, G. V.; and Hart, W. ACM Trans. Math. Softw., 37(1): 9:1--9:14. 2010.
Algorithm 898: Efficient multiplication of dense matrices over GF(2) [link]Paper   doi   bibtex
Algebraic Precomputations in Differential and Integral Cryptanalysis. Albrecht, M. R.; Cid, C.; Dullien, T.; Faugère, J.; and Perret, L. In Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, pages 387--403, 2010.
Algebraic Precomputations in Differential and Integral Cryptanalysis [link]Paper   doi   bibtex
Efficient Decomposition of Dense Matrices over GF(2). Albrecht, M. R.; and Pernet, C. CoRR, abs/1006.1744. 2010.
Efficient Decomposition of Dense Matrices over GF(2) [link]Paper   bibtex
Breaking An Identity-Based Encryption Scheme based on DHIES. Albrecht, M. R.; and Paterson, K. G. IACR Cryptology ePrint Archive, 2010: 637. 2010.
Breaking An Identity-Based Encryption Scheme based on DHIES [link]Paper   bibtex
  2009 (7)
Attacking cryptographic schemes based on "perturbation polynomials". Albrecht, M. R.; Gentry, C.; Halevi, S.; and Katz, J. In Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pages 1--10, 2009.
Attacking cryptographic schemes based on "perturbation polynomials" [link]Paper   doi   bibtex
Algebraic Techniques in Differential Cryptanalysis. Albrecht, M. R.; and Cid, C. In Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pages 193--208, 2009.
Algebraic Techniques in Differential Cryptanalysis [link]Paper   doi   bibtex
Plaintext Recovery Attacks against SSH. Albrecht, M. R.; Paterson, K. G.; and Watson, G. J. In 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May 2009, Oakland, California, USA, pages 16--26, 2009.
Plaintext Recovery Attacks against SSH [link]Paper   doi   bibtex
Attacking Cryptographic Schemes Based on "Perturbation Polynomials". Albrecht, M. R.; Gentry, C.; Halevi, S.; and Katz, J. IACR Cryptology ePrint Archive, 2009: 98. 2009.
Attacking Cryptographic Schemes Based on "Perturbation Polynomials" [link]Paper   bibtex
Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Al-Shaer, E.; Jha, S.; and Keromytis, A. D. , editor s. 2009.ACM.
bibtex   buy
Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers. Dunkelman, O. , editor . Volume 5665, of Lecture Notes in Computer Science. 2009.Springer.
Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers [link]Paper   doi   bibtex   buy
30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May 2009, Oakland, California, USA. 2009.IEEE Computer Society.
30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May 2009, Oakland, California, USA [link]Paper   bibtex   buy
  2008 (3)
Algebraic Attacks on the Courtois Toy Cipher. Albrecht, M. R. Cryptologia, 32(3): 220--276. 2008.
Algebraic Attacks on the Courtois Toy Cipher [link]Paper   doi   bibtex
Efficient Multiplication of Dense Matrices over GF(2). Albrecht, M. R.; Bard, G. V.; and Hart, W. CoRR, abs/0811.1714. 2008.
Efficient Multiplication of Dense Matrices over GF(2) [link]Paper   bibtex
Algebraic Techniques in Differential Cryptanalysis. Albrecht, M. R.; and Cid, C. IACR Cryptology ePrint Archive, 2008: 177. 2008.
Algebraic Techniques in Differential Cryptanalysis [link]Paper   bibtex
  2006 (1)
Climbing and Walking Robots - Proceedings of the 8th International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, CLAWAR 2005, London, UK, September 13-15, 2005. Tokhi, M. O.; Virk, G. S.; and Hossain, M. A. , editor s. 2006.Springer.
Climbing and Walking Robots - Proceedings of the 8th International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, CLAWAR 2005, London, UK, September 13-15, 2005 [link]Paper   doi   bibtex   buy
  2005 (1)
AIMEE: A Four-Legged Robot for RoboCup Rescue. Albrecht, M. R.; Backhaus, T.; Planthaber, S.; Stöpler, H.; Spenneberg, D.; and Kirchner, F. In Climbing and Walking Robots - Proceedings of the 8th International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, CLAWAR 2005, London, UK, September 13-15, 2005, pages 1003--1010, 2005.
AIMEE: A Four-Legged Robot for RoboCup Rescue [link]Paper   doi   bibtex