Alexander May
Orcid: 0000-0001-5965-5675Affiliations:
- Ruhr University Bochum, Horst Görtz Institute, Germany
- TU Darmstadt, Department of Computer Science, Germany (former)
- University of Paderborn, Department of computer Science, Germany (former)
According to our database1,
Alexander May
authored at least 84 papers
between 2001 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on cits.rub.de
On csauthors.net:
Bibliography
2025
CoRR, September, 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
2023
Dlog is Practically as Hard (or Easy) as DH - Solving Dlogs via DH Oracles on EC Standards.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
McEliece Needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Can we Beat the Square Root Bound for ECDLP over 𝔽<sub>p<sup>2</sup></sub> via Representation?
J. Math. Cryptol., 2020
it Inf. Technol., 2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Low Weight Discrete Logarithm and Subset Sum in 2<sup>0.65n</sup> with Polynomial Memory.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
2019
Low Weight Discrete Logarithms and Subset Sum in 2<sup>0.65n</sup> with Polynomial Memory.
IACR Cryptol. ePrint Arch., 2019
Can we Beat the Square Root Bound for ECDLP over F<sub>p<sup>2</sup></sub> via Representations?
IACR Cryptol. ePrint Arch., 2019
Die Entwicklung und Umsetzung von IT-Sicherheitsstandards als sozialer Aushandlungsprozess.
Datenschutz und Datensicherheit, 2019
CoRR, 2019
Quantum Period Finding with a Single Output Qubit - Factoring n-bit RSA with n/2 Qubits.
CoRR, 2019
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019
2018
Proceedings of the 13th Conference on the Theory of Quantum Computation, 2018
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
2012
Decoding Random Binary Linear Codes in 2<sup>n/20</sup>: How 1+1=0 Improves Information Set Decoding.
IACR Cryptol. ePrint Arch., 2012
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the LLL Algorithm - Survey and Applications, 2010
Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Advances in Cryptology, 2010
2009
Proceedings of the Public Key Cryptography, 2009
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
Proceedings of the Advances in Cryptology, 2009
2008
Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?
Proceedings of the Public Key Cryptography, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than <i>N</i> <sup>0.073</sup>.
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the Public Key Cryptography, 2006
A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants.
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Public Key Cryptography, 2004
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring.
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Advances in Cryptology, 2003
2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Cryptography and Lattices, International Conference, 2001
Proceedings of the Cryptography and Lattices, International Conference, 2001