Michael Naehrig

According to our database1, Michael Naehrig authored at least 49 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
The DROP Protocol: Dispute Resolution via Observation in Public for Verifiable, In-Person Voting.
IACR Cryptol. ePrint Arch., 2025

FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism.
IACR Commun. Cryptol., 2025

REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections.
Proceedings of the Electronic Voting - 10th International Joint Conference, 2025

2024
ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections.
Proceedings of the 33rd USENIX Security Symposium, 2024

On Cycles of Pairing-Friendly Abelian Varieties.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Cryptographic Smooth Neighbors.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Finding twin smooth integers by solving Pell equations.
CoRR, 2022

2021
Sieving for Twin Smooth Integers with Solutions to the Prouhet-Tarry-Escott Problem.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Improved Classical Cryptanalysis of SIKE in Practice.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Implementing Grover Oracles for Quantum Key Search on AES and LowMC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem.
IACR Cryptol. ePrint Arch., 2019

Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2017
Manual for Using Homomorphic Encryption for Bioinformatics.
Proc. IEEE, 2017

Sieving for shortest vectors in ideal lattices: a practical perspective.
Int. J. Appl. Cryptogr., 2017

Cryptographic Pairings.
IACR Cryptol. ePrint Arch., 2017

Efficient Compression of SIDH Public Keys.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Selecting elliptic curves for cryptography: an efficiency and security analysis.
J. Cryptogr. Eng., 2016

Sharper Ring-LWE Signatures.
IACR Cryptol. ePrint Arch., 2016

CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy.
Proceedings of the 33nd International Conference on Machine Learning, 2016

Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Privately Evaluating Decision Trees and Random Forests.
IACR Cryptol. ePrint Arch., 2015

Geppetto: Versatile Verifiable Computation.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Subgroup Security in Pairing-Based Cryptography.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

Accelerating Homomorphic Evaluation on Reconfigurable Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2014
Private predictive analysis on encrypted medical data.
J. Biomed. Informatics, 2014

Crypto-Nets: Neural Networks over Encrypted Data.
CoRR, 2014

Private Computation on Encrypted Genomic Data.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Elliptic Curve Cryptography in Practice.
Proceedings of the Financial Cryptography and Data Security, 2014

A Comparison of the Homomorphic Encryption Schemes FV and YASHE.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Exponentiating in Pairing Groups.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

PandA: Pairings and Arithmetic.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

2012
Affine Pairings on ARM.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

ML Confidential: Machine Learning on Encrypted Data.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

2011
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Can homomorphic encryption be practical?
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
A Family of Implementation-Friendly BN Elliptic Curves.
IACR Cryptol. ePrint Arch., 2010

Faster Pairing Computations on Curves with High-Degree Twists.
Proceedings of the Public Key Cryptography, 2010

An Analysis of Affine Coordinates for Pairing Computation.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

New Software Speed Records for Cryptographic Pairings.
Proceedings of the Progress in Cryptology, 2010

2009
Faster Computation of the Tate Pairing.
IACR Cryptol. ePrint Arch., 2009

2008
A CM construction for curves of genus 2 with p-rank 1.
IACR Cryptol. ePrint Arch., 2008

On Compressible Pairings and Their Computation.
Proceedings of the Progress in Cryptology, 2008

2005
Pairing-Friendly Elliptic Curves of Prime Order.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005


  Loading...