Thomas Wunderer

According to our database1, Thomas Wunderer authored at least 15 papers between 2015 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack.
J. Math. Cryptol., 2019

Exploring Trade-offs in Batch Bounded Distance Decoding.
IACR Cryptol. ePrint Arch., 2019

2018
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
PhD thesis, 2018

Estimate all the {LWE, NTRU} schemes!
IACR Cryptol. ePrint Arch., 2018

Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE.
Proceedings of the Information Security Practice and Experience, 2018

Parallelizing the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
Proceedings of the 2018 IEEE International Conference on Computational Science and Engineering, 2018

Exploring the Performance Envelope of the LLL Algorithm.
Proceedings of the 2018 IEEE International Conference on Computational Science and Engineering, 2018

2017
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p<sup>α</sup> q<sup>β</sup>.
IACR Cryptol. ePrint Arch., 2017

A Quantum Attack on LWE with Arbitrary Error Distribution.
IACR Cryptol. ePrint Arch., 2017

Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
IACR Cryptol. ePrint Arch., 2017

A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^\alpha q^\beta p α q β.
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017

2016
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
IACR Cryptol. ePrint Arch., 2016

On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
IACR Cryptol. ePrint Arch., 2016

2015
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
IACR Cryptol. ePrint Arch., 2015


  Loading...