What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Martin R. Albrecht
Google Scholar
56
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ctrsa
Post-quantum Online/Offline Signatures.
Martin R. Albrecht
Nicolas Gama
James Howe
Anand Kumar Narayanan
2025
conf/eurocrypt
Formal Analysis of Multi-device Group Messaging in WhatsApp.
Martin R. Albrecht
Benjamin Dowling
Daniel Jones
2025
conf/eurocrypt
Analysis of the Telegram Key Exchange.
Martin R. Albrecht
Lenka Mareková
Kenneth G. Paterson
Eyal Ronen
Igors Stepanovs
2025
conf/eurocrypt
Hollow LWE: A New Spin - Unbounded Updatable Encryption from LWE and PCE.
Martin R. Albrecht
Benjamin Bencina
Russell W. F. Lai
2024
journals/cic
Scaling Lattice Sieves across Multiple Machines.
Martin R. Albrecht
Joe Rowell
2024
conf/sp
Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix' Core.
Martin R. Albrecht
Benjamin Dowling
Daniel Jones
2024
conf/eurosp
Share with Care: Breaking E2EE in Nextcloud.
Martin R. Albrecht
Matilda Backendal
Daniele Coppola
Kenneth G. Paterson
2024
conf/ctrsa
Batch Signatures, Revisited.
Carlos Aguilar Melchor
Martin R. Albrecht
Thomas Bailleux
Nina Bindel
James Howe
Andreas Hülsing
David Joseph
Marc Manzano
2024
conf/eurocrypt
Crypto Dark Matter on the Torus - Oblivious PRFs from Shallow PRFs and TFHE.
Martin R. Albrecht
Alex Davidson
Amit Deo
Daniel Gardham
2024
conf/eurocrypt
SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions.
Martin R. Albrecht
Giacomo Fenzi
Oleksandra Lapiha
Ngoc Khanh Nguyen
2024
conf/asiacrypt
Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-Ish and Thresholdisable.
Martin R. Albrecht
Kamil Doruk Gür
2023
conf/sp
Practically-exploitable Cryptographic Vulnerabilities in Matrix.
Martin R. Albrecht
Sofía Celi
Benjamin Dowling
Daniel Jones
2023
conf/eurocrypt
Caveat Implementor! Key Recovery Attacks on MEGA.
Martin R. Albrecht
Miro Haller
Lenka Mareková
Kenneth G. Paterson
2022
conf/uss
Breaking Bridgefy, again: Adopting libsignal is not enough.
Martin R. Albrecht
Raphael Eikenberg
Kenneth G. Paterson
2022
conf/crypto
Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable - (Extended Abstract).
Martin R. Albrecht
Valerio Cini
Russell W. F. Lai
Giulio Malavolta
Sri Aravinda Krishnan Thyagarajan
2022
conf/sp
Four Attacks and a Proof for Telegram.
Martin R. Albrecht
Lenka Mareková
Kenneth G. Paterson
Igors Stepanovs
2021
conf/uss
Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong.
Martin R. Albrecht
Jorge Blasco
Rikke Bjerg Jensen
Lenka Mareková
2021
conf/crypto
Lattice Reduction with Approximate Enumeration Oracles - Practical Algorithms and Concrete Performance.
Martin R. Albrecht
Shi Bai
Jianwei Li
Joe Rowell
2021
conf/crypto
Subtractive Sets over Cyclotomic Rings - Limits of Schnorr-Like Arguments over Lattices.
Martin R. Albrecht
Russell W. F. Lai
2021
conf/pkc
Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices.
Martin R. Albrecht
Alex Davidson
Amit Deo
Nigel P. Smart
2021
conf/ctrsa
Mesh Messaging in Large-Scale Protests: Breaking Bridgefy.
Martin R. Albrecht
Jorge Blasco
Rikke Bjerg Jensen
Lenka Mareková
2021
conf/eurocrypt
On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem.
Martin R. Albrecht
Nadia Heninger
2020
journals/joc
Multilinear Maps from Obfuscation.
Martin R. Albrecht
Pooya Farshim
Shuai Han
Dennis Hofheinz
Enrique Larraia
Kenneth G. Paterson
2020
conf/crypto
Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k<sup>1/(2k)</sup> Time k<sup>k/8+o(k)</sup>.
Martin R. Albrecht
Shi Bai
Pierre-Alain Fouque
Paul Kirchner
Damien Stehlé
Weiqiang Wen
2020
conf/asiacrypt
Estimating Quantum Speedups for Lattice Sieves.
Martin R. Albrecht
Vlad Gheorghiu
Eamonn W. Postlethwaite
John M. Schanck
2019
journals/tches
Implementing RLWE-based Schemes Using an RSA Co-Processor.
Martin R. Albrecht
Christian Hanser
Andrea Höller
Thomas Pöppelmann
Fernando Virdia
Andreas Wallner
2019
journals/tosc
libInterMAC: Beyond Confidentiality and Integrity in Practice.
Martin R. Albrecht
Torben Brandt Hansen
Kenneth G. Paterson
2019
conf/esorics
Feistel Structures for MPC, and More.
Martin R. Albrecht
Lorenzo Grassi
Léo Perrin
Sebastian Ramacher
Christian Rechberger
Dragos Rotaru
Arnab Roy
Markus Schofnegger
2019
conf/eurocrypt
The General Sieve Kernel and New Records in Lattice Reduction.
Martin R. Albrecht
Léo Ducas
Gottfried Herold
Elena Kirshanova
Eamonn W. Postlethwaite
Marc Stevens
2019
conf/asiacrypt
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC.
Martin R. Albrecht
Carlos Cid
Lorenzo Grassi
Dmitry Khovratovich
Reinhard Lüftenegger
Christian Rechberger
Markus Schofnegger
2019
conf/sacrypt
Exploring Trade-offs in Batch Bounded Distance Decoding.
Martin R. Albrecht
Benjamin R. Curtis
Thomas Wunderer
2018
journals/tches
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.
Martin R. Albrecht
Amit Deo
Kenneth G. Paterson
2018
conf/ccs
Prime and Prejudice: Primality Testing Under Adversarial Conditions.
Martin R. Albrecht
Jake Massimo
Kenneth G. Paterson
Juraj Somorovsky
2017
conf/acns
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography.
Carlos Aguilar Melchor
Martin R. Albrecht
Thomas Ricosset
2017
conf/esorics
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts.
Martin R. Albrecht
Emmanuela Orsini
Kenneth G. Paterson
Guy Peer
Nigel P. Smart
2017
conf/eurocrypt
On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL.
Martin R. Albrecht
2017
conf/asiacrypt
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
Martin R. Albrecht
Florian Göpfert
Fernando Virdia
Thomas Wunderer
2017
conf/asiacrypt
Large Modulus Ring-LWE ≥ Module-LWE.
Martin R. Albrecht
Amit Deo
2016
conf/ccs
A Surfeit of SSH Cipher Suites.
Martin R. Albrecht
Jean Paul Degabriele
Torben Brandt Hansen
Kenneth G. Paterson
2016
conf/crypto
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
Martin R. Albrecht
Shi Bai
Léo Ducas
2016
conf/eurocrypt
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS.
Martin R. Albrecht
Kenneth G. Paterson
2016
conf/asiacrypt
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity.
Martin R. Albrecht
Lorenzo Grassi
Christian Rechberger
Arnab Roy
Tyge Tiessen
2016
conf/tcc
Multilinear Maps from Obfuscation.
Martin R. Albrecht
Pooya Farshim
Dennis Hofheinz
Enrique Larraia
Kenneth G. Paterson
2015
conf/eurocrypt
Ciphers for MPC and FHE.
Martin R. Albrecht
Christian Rechberger
Thomas Schneider
Tyge Tiessen
Michael Zohner
2015
conf/asiacrypt
Implementing Candidate Graded Encoding Schemes from Ideal Lattices.
Martin R. Albrecht
Catalin Cocis
Fabien Laguillaumie
Adeline Langlois
2014
conf/crypto
Block Ciphers - Focus on the Linear Layer (feat. PRIDE).
Martin R. Albrecht
Benedikt Driessen
Elif Bilge Kavun
Gregor Leander
Christof Paar
Tolga Yalçin
2014
conf/pkc
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
Martin R. Albrecht
Jean-Charles Faugère
Robert Fitzpatrick
Ludovic Perret
Yosuke Todo
Keita Xagawa
2014
conf/pkc
Lazy Modulus Switching for the BKW Algorithm on LWE.
Martin R. Albrecht
Jean-Charles Faugère
Robert Fitzpatrick
Ludovic Perret
2013
conf/icisc
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
Martin R. Albrecht
Robert Fitzpatrick
Florian Göpfert
2012
conf/sacrypt
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers.
Martin R. Albrecht
Gregor Leander
2011
conf/fse
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model.
Martin R. Albrecht
Pooya Farshim
Kenneth G. Paterson
Gaven J. Watson
2011
conf/acns
Cold Boot Key Recovery by Solving Polynomial Systems with Noise.
Martin R. Albrecht
Carlos Cid
2011
conf/asiacrypt
Polly Cracker, Revisited.
Martin R. Albrecht
Pooya Farshim
Jean-Charles Faugère
Ludovic Perret
2009
conf/fse
Algebraic Techniques in Differential Cryptanalysis.
Martin R. Albrecht
Carlos Cid
2009
conf/ccs
Attacking cryptographic schemes based on "perturbation polynomials".
Martin R. Albrecht
Craig Gentry
Shai Halevi
Jonathan Katz
2009
conf/sp
Plaintext Recovery Attacks against SSH.
Martin R. Albrecht
Kenneth G. Paterson
Gaven J. Watson
Coauthors
Adeline Langlois
(1)
Alex Davidson
(2)
Amit Deo
(4)
Anand Kumar Narayanan
(1)
Andrea Höller
(1)
Andreas Hülsing
(1)
Andreas Wallner
(1)
Arnab Roy
(2)
Benedikt Driessen
(1)
Benjamin Bencina
(1)
Benjamin Dowling
(3)
Benjamin R. Curtis
(1)
Carlos Aguilar Melchor
(2)
Carlos Cid
(3)
Catalin Cocis
(1)
Christian Hanser
(1)
Christian Rechberger
(4)
Christof Paar
(1)
Craig Gentry
(1)
Damien Stehlé
(1)
Daniel Gardham
(1)
Daniel Jones
(3)
Daniele Coppola
(1)
David Joseph
(1)
Dennis Hofheinz
(2)
Dmitry Khovratovich
(1)
Dragos Rotaru
(1)
Eamonn W. Postlethwaite
(2)
Elena Kirshanova
(1)
Elif Bilge Kavun
(1)
Emmanuela Orsini
(1)
Enrique Larraia
(2)
Eyal Ronen
(1)
Fabien Laguillaumie
(1)
Fernando Virdia
(2)
Florian Göpfert
(2)
Gaven J. Watson
(2)
Giacomo Fenzi
(1)
Giulio Malavolta
(1)
Gottfried Herold
(1)
Gregor Leander
(2)
Guy Peer
(1)
Igors Stepanovs
(2)
Jake Massimo
(1)
James Howe
(2)
Jean Paul Degabriele
(1)
Jean-Charles Faugère
(3)
Jianwei Li
(1)
Joe Rowell
(2)
John M. Schanck
(1)
Jonathan Katz
(1)
Jorge Blasco
(2)
Juraj Somorovsky
(1)
Kamil Doruk Gür
(1)
Keita Xagawa
(1)
Kenneth G. Paterson
(15)
Lenka Mareková
(5)
Léo Ducas
(2)
Léo Perrin
(1)
Lorenzo Grassi
(3)
Ludovic Perret
(3)
Marc Manzano
(1)
Marc Stevens
(1)
Markus Schofnegger
(2)
Martin R. Albrecht
(56)
Matilda Backendal
(1)
Michael Zohner
(1)
Miro Haller
(1)
Nadia Heninger
(1)
Ngoc Khanh Nguyen
(1)
Nicolas Gama
(1)
Nigel P. Smart
(2)
Nina Bindel
(1)
Oleksandra Lapiha
(1)
Paul Kirchner
(1)
Pierre-Alain Fouque
(1)
Pooya Farshim
(4)
Raphael Eikenberg
(1)
Reinhard Lüftenegger
(1)
Rikke Bjerg Jensen
(2)
Robert Fitzpatrick
(3)
Russell W. F. Lai
(3)
Sebastian Ramacher
(1)
Shai Halevi
(1)
Shi Bai
(3)
Shuai Han
(1)
Sofía Celi
(1)
Sri Aravinda Krishnan Thyagarajan
(1)
Thomas Bailleux
(1)
Thomas Pöppelmann
(1)
Thomas Ricosset
(1)
Thomas Schneider
(1)
Thomas Wunderer
(2)
Tolga Yalçin
(1)
Torben Brandt Hansen
(2)
Tyge Tiessen
(2)
Valerio Cini
(1)
Vlad Gheorghiu
(1)
Weiqiang Wen
(1)
Yosuke Todo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to