Martin R. Albrecht

Affiliations:
  • King's College London, UK
  • Royal Holloway University of London, UK (PhD)
  • Technical University of Denmark (DTU), Section for Mathematics, Copenhagen, Denmark
  • Pierre and Marie Curie University, LIP6, Paris, France


According to our database1, Martin R. Albrecht authored at least 94 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally.
IACR Cryptol. ePrint Arch., 2025

A Gaussian Leftover Hash Lemma for Modules over Number Fields.
IACR Cryptol. ePrint Arch., 2025

On the Virtues of Information Security in the UK Climate Movement.
Proceedings of the 34th USENIX Security Symposium, 2025

Analysis of the Telegram Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Formal Analysis of Multi-device Group Messaging in WhatsApp.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Hollow LWE: A New Spin - Unbounded Updatable Encryption from LWE and PCE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Post-quantum Online/Offline Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025

2024
Analyzing Cryptography in the Wild: A Retrospective.
IEEE Secur. Priv., 2024

Analysing Cryptography in the Wild - A Retrospective.
IACR Cryptol. ePrint Arch., 2024

Scaling Lattice Sieves across Multiple Machines.
IACR Commun. Cryptol., 2024

Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix' Core.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Share with Care: Breaking E2EE in Nextcloud.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Crypto Dark Matter on the Torus - Oblivious PRFs from Shallow PRFs and TFHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Batch Signatures, Revisited.
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024

Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-Ish and Thresholdisable.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Variational quantum solutions to the Shortest Vector Problem.
Quantum, March, 2023

Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System.
IACR Cryptol. ePrint Arch., 2023

Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE.
IACR Cryptol. ePrint Arch., 2023

Practically-exploitable Cryptographic Vulnerabilities in Matrix.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Caveat Implementor! Key Recovery Attacks on MEGA.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Quantum Augmented Dual Attack.
IACR Cryptol. ePrint Arch., 2022

Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable.
IACR Cryptol. ePrint Arch., 2022

Breaking Bridgefy, again: Adopting libsignal is not enough.
Proceedings of the 31st USENIX Security Symposium, 2022

Four Attacks and a Proof for Telegram.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Lattice Attacks on NTRU and LWE: A History of Refinements.
IACR Cryptol. ePrint Arch., 2021

Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong.
Proceedings of the 30th USENIX Security Symposium, 2021

Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Mesh Messaging in Large-Scale Protests: Breaking Bridgefy.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Subtractive Sets over Cyclotomic Rings - Limits of Schnorr-Like Arguments over Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Lattice Reduction with Approximate Enumeration Oracles - Practical Algorithms and Concrete Performance.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Multilinear Maps from Obfuscation.
J. Cryptol., 2020

Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)).
IACR Cryptol. ePrint Arch., 2020

The Vacuity of the Open Source Security Testing Methodology Manual.
Proceedings of the Security Standardisation Research - 6th International Conference, 2020

Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k<sup>1/(2k)</sup> Time k<sup>k/8+o(k)</sup>.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Estimating Quantum Speedups for Lattice Sieves.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Implementing RLWE-based Schemes Using an RSA Co-Processor.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

libInterMAC: Beyond Confidentiality and Integrity in Practice.
IACR Cryptol. ePrint Arch., 2019

Quantum speedups for lattice sieves are tenuous at best.
IACR Cryptol. ePrint Arch., 2019

Homomorphic Encryption Standard.
IACR Cryptol. ePrint Arch., 2019

Exploring Trade-offs in Batch Bounded Distance Decoding.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

The General Sieve Kernel and New Records in Lattice Reduction.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Feistel Structures for MPC, and More.
Proceedings of the Computer Security - ESORICS 2019, 2019

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Learning with Errors on RSA Co-Processors.
IACR Cryptol. ePrint Arch., 2018

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.
IACR Cryptol. ePrint Arch., 2018

Estimate All the {LWE, NTRU} Schemes!
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Prime and Prejudice: Primality Testing Under Adversarial Conditions.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Notes On GGH13 Without The Presence Of Ideals.
IACR Cryptol. ePrint Arch., 2017

Notes on GGH13 Without the Presence of Ideals.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts.
Proceedings of the Computer Security - ESORICS 2017, 2017

Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Large Modulus Ring-LWE ≥ Module-LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Multilinear Maps from Obfuscation.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

A Surfeit of SSH Cipher Suites.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
On the concrete hardness of Learning with Errors.
IACR Cryptol. ePrint Arch., 2015

Ciphers for MPC and FHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Implementing Candidate Graded Encoding Schemes from Ideal Lattices.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version.
IACR Cryptol. ePrint Arch., 2014

Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices.
IACR Cryptol. ePrint Arch., 2014

Algebraic Algorithms for LWE Problems.
IACR Cryptol. ePrint Arch., 2014

Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Lazy Modulus Switching for the BKW Algorithm on LWE.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Block Ciphers - Focus on the Linear Layer (feat. PRIDE).
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
IACR Cryptol. ePrint Arch., 2013

On the Efficacy of Solving LWE by Reduction to Unique-SVP.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2012
On the relation between the MXL family of algorithms and Gröbner basis algorithms.
J. Symb. Comput., 2012

On the Complexity of the BKW Algorithm on LWE.
IACR Cryptol. ePrint Arch., 2012

Polly Cracker, Revisited.
Electron. Colloquium Comput. Complex., 2012

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

The M4RIE library for dense linear algebra over small fields with even characteristic.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2012

2011
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms.
IACR Cryptol. ePrint Arch., 2011

Efficient Dense Gaussian Elimination over the Finite Field with Two Elements
CoRR, 2011

Breaking an Identity-Based Encryption Scheme Based on DHIES.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Polly Cracker, Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Cold Boot Key Recovery by Solving Polynomial Systems with Noise.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Algorithmic algebraic techniques and their application to block cipher cryptanalysis.
PhD thesis, 2010

Algorithm 898: Efficient multiplication of dense matrices over GF(2).
ACM Trans. Math. Softw., 2010

Efficient Decomposition of Dense Matrices over GF(2)
CoRR, 2010

Algebraic Precomputations in Differential and Integral Cryptanalysis.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Plaintext Recovery Attacks against SSH.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Algebraic Techniques in Differential Cryptanalysis.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Attacking cryptographic schemes based on "perturbation polynomials".
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Algebraic Attacks on the Courtois Toy Cipher.
Cryptologia, 2008

Efficient Multiplication of Dense Matrices over GF(2)
CoRR, 2008

2005
AIMEE: A Four-Legged Robot for RoboCup Rescue.
Proceedings of the Climbing and Walking Robots, 2005


  Loading...