BibTeX records: Martin R. Albrecht

download as .bib file

@article{DBLP:journals/tches/AlbrechtHHPVW19,
  author    = {Martin R. Albrecht and
               Christian Hanser and
               Andrea H{\"{o}}ller and
               Thomas P{\"{o}}ppelmann and
               Fernando Virdia and
               Andreas Wallner},
  title     = {Implementing RLWE-based Schemes Using an {RSA} Co-Processor},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {169--208},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.169-208},
  doi       = {10.13154/tches.v2019.i1.169-208},
  timestamp = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AlbrechtHHPVW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AlbrechtHP19,
  author    = {Martin R. Albrecht and
               Torben Brandt Hansen and
               Kenneth G. Paterson},
  title     = {libInterMAC: Beyond Confidentiality and Integrity in Practice},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2019},
  number    = {1},
  pages     = {46--83},
  year      = {2019},
  url       = {https://doi.org/10.13154/tosc.v2019.i1.46-83},
  doi       = {10.13154/tosc.v2019.i1.46-83},
  timestamp = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tosc/AlbrechtHP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AlbrechtC0KLRS19,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Lorenzo Grassi and
               Dmitry Khovratovich and
               Reinhard L{\"{u}}ftenegger and
               Christian Rechberger and
               Markus Schofnegger},
  editor    = {Steven D. Galbraith and
               Shiho Moriai},
  title     = {Algebraic Cryptanalysis of STARK-Friendly Designs: Application to
               MARVELlous and MiMC},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11923},
  pages     = {371--397},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-34618-8\_13},
  doi       = {10.1007/978-3-030-34618-8\_13},
  timestamp = {Fri, 22 Nov 2019 13:53:07 +0100},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/AlbrechtC0KLRS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Albrecht0PRRR0S19,
  author    = {Martin R. Albrecht and
               Lorenzo Grassi and
               L{\'{e}}o Perrin and
               Sebastian Ramacher and
               Christian Rechberger and
               Dragos Rotaru and
               Arnab Roy and
               Markus Schofnegger},
  editor    = {Kazue Sako and
               Steve Schneider and
               Peter Y. A. Ryan},
  title     = {Feistel Structures for MPC, and More},
  booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
               in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11736},
  pages     = {151--171},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-29962-0\_8},
  doi       = {10.1007/978-3-030-29962-0\_8},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/Albrecht0PRRR0S19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlbrechtDHKPS19,
  author    = {Martin R. Albrecht and
               L{\'{e}}o Ducas and
               Gottfried Herold and
               Elena Kirshanova and
               Eamonn W. Postlethwaite and
               Marc Stevens},
  editor    = {Yuval Ishai and
               Vincent Rijmen},
  title     = {The General Sieve Kernel and New Records in Lattice Reduction},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11477},
  pages     = {717--746},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-17656-3\_25},
  doi       = {10.1007/978-3-030-17656-3\_25},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/AlbrechtDHKPS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AlbrechtCW19,
  author    = {Martin R. Albrecht and
               Benjamin R. Curtis and
               Thomas Wunderer},
  editor    = {Kenneth G. Paterson and
               Douglas Stebila},
  title     = {Exploring Trade-offs in Batch Bounded Distance Decoding},
  booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
               Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11959},
  pages     = {467--491},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-38471-5\_19},
  doi       = {10.1007/978-3-030-38471-5\_19},
  timestamp = {Tue, 14 Jan 2020 14:22:04 +0100},
  biburl    = {https://dblp.org/rec/conf/sacrypt/AlbrechtCW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDHKPS19,
  author    = {Martin R. Albrecht and
               L{\'{e}}o Ducas and
               Gottfried Herold and
               Elena Kirshanova and
               Eamonn W. Postlethwaite and
               Marc Stevens},
  title     = {The General Sieve Kernel and New Records in Lattice Reduction},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {89},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/089},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtDHKPS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtHP19,
  author    = {Martin R. Albrecht and
               Torben Brandt Hansen and
               Kenneth G. Paterson},
  title     = {libInterMAC: Beyond Confidentiality and Integrity in Practice},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {165},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/165},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtHP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtGPRRRRS19,
  author    = {Martin R. Albrecht and
               Lorenzo Grassi and
               L{\'{e}}o Perrin and
               Sebastian Ramacher and
               Christian Rechberger and
               Dragos Rotaru and
               Arnab Roy and
               Markus Schofnegger},
  title     = {Feistel Structures for MPC, and More},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {397},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/397},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtGPRRRRS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCGKLRS19,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Lorenzo Grassi and
               Dmitry Khovratovich and
               Reinhard L{\"{u}}ftenegger and
               Christian Rechberger and
               Markus Schofnegger},
  title     = {Algebraic Cryptanalysis of STARK-Friendly Designs: Application to
               MARVELlous and MiMC},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {419},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/419},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtCGKLRS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCCDGGHH19,
  author    = {Martin R. Albrecht and
               Melissa Chase and
               Hao Chen and
               Jintai Ding and
               Shafi Goldwasser and
               Sergey Gorbunov and
               Shai Halevi and
               Jeffrey Hoffstein and
               Kim Laine and
               Kristin E. Lauter and
               Satya Lokam and
               Daniele Micciancio and
               Dustin Moody and
               Travis Morrison and
               Amit Sahai and
               Vinod Vaikuntanathan},
  title     = {Homomorphic Encryption Standard},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {939},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/939},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtCCDGGHH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCW19,
  author    = {Martin R. Albrecht and
               Benjamin R. Curtis and
               Thomas Wunderer},
  title     = {Exploring Trade-offs in Batch Bounded Distance Decoding},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {1122},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1122},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtCW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtGPS19,
  author    = {Martin R. Albrecht and
               Vlad Gheorghiu and
               Eamonn W. Postlethwaite and
               John M. Schanck},
  title     = {Quantum speedups for lattice sieves are tenuous at best},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {1161},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1161},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtGPS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDDS19,
  author    = {Martin R. Albrecht and
               Alex Davidson and
               Amit Deo and
               Nigel P. Smart},
  title     = {Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal
               Lattices},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {1271},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1271},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtDDS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlbrechtDP18,
  author    = {Martin R. Albrecht and
               Amit Deo and
               Kenneth G. Paterson},
  title     = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {173--213},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.173-213},
  doi       = {10.13154/tches.v2018.i3.173-213},
  timestamp = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AlbrechtDP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlbrechtMPS18,
  author    = {Martin R. Albrecht and
               Jake Massimo and
               Kenneth G. Paterson and
               Juraj Somorovsky},
  editor    = {David Lie and
               Mohammad Mannan and
               Michael Backes and
               XiaoFeng Wang},
  title     = {Prime and Prejudice: Primality Testing Under Adversarial Conditions},
  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  pages     = {281--298},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3243734.3243787},
  doi       = {10.1145/3243734.3243787},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/AlbrechtMPS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AlbrechtCDDPPVW18,
  author    = {Martin R. Albrecht and
               Benjamin R. Curtis and
               Amit Deo and
               Alex Davidson and
               Rachel Player and
               Eamonn W. Postlethwaite and
               Fernando Virdia and
               Thomas Wunderer},
  editor    = {Dario Catalano and
               Roberto De Prisco},
  title     = {Estimate All the \{LWE, NTRU\} Schemes!},
  booktitle = {Security and Cryptography for Networks - 11th International Conference,
               {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11035},
  pages     = {351--367},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-98113-0\_19},
  doi       = {10.1007/978-3-319-98113-0\_19},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/AlbrechtCDDPPVW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCDDPPVW18,
  author    = {Martin R. Albrecht and
               Benjamin R. Curtis and
               Amit Deo and
               Alex Davidson and
               Rachel Player and
               Eamonn W. Postlethwaite and
               Fernando Virdia and
               Thomas Wunderer},
  title     = {Estimate all the \{LWE, NTRU\} schemes!},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {331},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/331},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtCDDPPVW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtHHPVW18,
  author    = {Martin R. Albrecht and
               Christian Hanser and
               Andrea H{\"{o}}ller and
               Thomas P{\"{o}}ppelmann and
               Fernando Virdia and
               Andreas Wallner},
  title     = {Learning with Errors on {RSA} Co-Processors},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {425},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/425},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtHHPVW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDP18,
  author    = {Martin R. Albrecht and
               Amit Deo and
               Kenneth G. Paterson},
  title     = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {672},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/672},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtDP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtMPS18,
  author    = {Martin R. Albrecht and
               Jake Massimo and
               Kenneth G. Paterson and
               Juraj Somorovsky},
  title     = {Prime and Prejudice: Primality Testing Under Adversarial Conditions},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {749},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/749},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtMPS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Aguilar-Melchor17,
  author    = {Carlos Aguilar Melchor and
               Martin R. Albrecht and
               Thomas Ricosset},
  editor    = {Dieter Gollmann and
               Atsuko Miyaji and
               Hiroaki Kikuchi},
  title     = {Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based
               Cryptography},
  booktitle = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10355},
  pages     = {3--19},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1\_1},
  doi       = {10.1007/978-3-319-61204-1\_1},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/Aguilar-Melchor17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AlbrechtD17,
  author    = {Martin R. Albrecht and
               Amit Deo},
  editor    = {Tsuyoshi Takagi and
               Thomas Peyrin},
  title     = {Large Modulus Ring-LWE {\(\geq\)} Module-LWE},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10624},
  pages     = {267--296},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70694-8\_10},
  doi       = {10.1007/978-3-319-70694-8\_10},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/AlbrechtD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AlbrechtGVW17,
  author    = {Martin R. Albrecht and
               Florian G{\"{o}}pfert and
               Fernando Virdia and
               Thomas Wunderer},
  editor    = {Tsuyoshi Takagi and
               Thomas Peyrin},
  title     = {Revisiting the Expected Cost of Solving uSVP and Applications to {LWE}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10624},
  pages     = {297--322},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70694-8\_11},
  doi       = {10.1007/978-3-319-70694-8\_11},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/AlbrechtGVW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlbrechtOPPS17,
  author    = {Martin R. Albrecht and
               Emmanuela Orsini and
               Kenneth G. Paterson and
               Guy Peer and
               Nigel P. Smart},
  editor    = {Simon N. Foley and
               Dieter Gollmann and
               Einar Snekkenes},
  title     = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts},
  booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10492},
  pages     = {29--46},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-66402-6\_4},
  doi       = {10.1007/978-3-319-66402-6\_4},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/AlbrechtOPPS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Albrecht17,
  author    = {Martin R. Albrecht},
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {On Dual Lattice Attacks Against Small-Secret {LWE} and Parameter Choices
               in HElib and {SEAL}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10211},
  pages     = {103--129},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56614-6\_4},
  doi       = {10.1007/978-3-319-56614-6\_4},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/Albrecht17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/AlbrechtDL17,
  author    = {Martin R. Albrecht and
               Alex Davidson and
               Enrique Larraia},
  editor    = {M{\'{a}}ire O'Neill},
  title     = {Notes on {GGH13} Without the Presence of Ideals},
  booktitle = {Cryptography and Coding - 16th {IMA} International Conference, {IMACC}
               2017, Oxford, UK, December 12-14, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10655},
  pages     = {135--158},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-71045-7\_8},
  doi       = {10.1007/978-3-319-71045-7\_8},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/conf/ima/AlbrechtDL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Albrecht17,
  author    = {Martin R. Albrecht},
  title     = {On dual lattice attacks against small-secret {LWE} and parameter choices
               in HElib and {SEAL}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {47},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/047},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Albrecht17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtOPPS17,
  author    = {Martin R. Albrecht and
               Emmanuela Orsini and
               Kenneth G. Paterson and
               Guy Peer and
               Nigel P. Smart},
  title     = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {354},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/354},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtOPPS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtD17,
  author    = {Martin R. Albrecht and
               Amit Deo},
  title     = {Large Modulus Ring-LWE {\textgreater}= Module-LWE},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {612},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/612},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtGVW17,
  author    = {Martin R. Albrecht and
               Florian G{\"{o}}pfert and
               Fernando Virdia and
               Thomas Wunderer},
  title     = {Revisiting the Expected Cost of Solving uSVP and Applications to {LWE}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {815},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/815},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtGVW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDLP17,
  author    = {Martin R. Albrecht and
               Alex Davidson and
               Enrique Larraia and
               Alice Pellet{-}Mary},
  title     = {Notes On {GGH13} Without The Presence Of Ideals},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {906},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/906},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtDLP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlbrechtFFHP16,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Pooya Farshim and
               Gottfried Herold and
               Ludovic Perret},
  title     = {Polly Cracker, revisited},
  journal   = {Des. Codes Cryptogr.},
  volume    = {79},
  number    = {2},
  pages     = {261--302},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10623-015-0048-8},
  doi       = {10.1007/s10623-015-0048-8},
  timestamp = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dcc/AlbrechtFFHP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Albrecht0R0T16,
  author    = {Martin R. Albrecht and
               Lorenzo Grassi and
               Christian Rechberger and
               Arnab Roy and
               Tyge Tiessen},
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {MiMC: Efficient Encryption and Cryptographic Hashing with Minimal
               Multiplicative Complexity},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10031},
  pages     = {191--219},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53887-6\_7},
  doi       = {10.1007/978-3-662-53887-6\_7},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/Albrecht0R0T16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlbrechtDHP16,
  author    = {Martin R. Albrecht and
               Jean Paul Degabriele and
               Torben Brandt Hansen and
               Kenneth G. Paterson},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {A Surfeit of {SSH} Cipher Suites},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1480--1491},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2976749.2978364},
  doi       = {10.1145/2976749.2978364},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/AlbrechtDHP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtBD16,
  author    = {Martin R. Albrecht and
               Shi Bai and
               L{\'{e}}o Ducas},
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {A Subfield Lattice Attack on Overstretched {NTRU} Assumptions - Cryptanalysis
               of Some {FHE} and Graded Encoding Schemes},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9814},
  pages     = {153--178},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53018-4\_6},
  doi       = {10.1007/978-3-662-53018-4\_6},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/AlbrechtBD16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlbrechtP16,
  author    = {Martin R. Albrecht and
               Kenneth G. Paterson},
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation
               of {TLS}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9665},
  pages     = {622--643},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49890-3\_24},
  doi       = {10.1007/978-3-662-49890-3\_24},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/AlbrechtP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AlbrechtFHLP16,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Dennis Hofheinz and
               Enrique Larraia and
               Kenneth G. Paterson},
  editor    = {Eyal Kushilevitz and
               Tal Malkin},
  title     = {Multilinear Maps from Obfuscation},
  booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9562},
  pages     = {446--473},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49096-9\_19},
  doi       = {10.1007/978-3-662-49096-9\_19},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/tcc/AlbrechtFHLP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtBD16,
  author    = {Martin R. Albrecht and
               Shi Bai and
               L{\'{e}}o Ducas},
  title     = {A subfield lattice attack on overstretched {NTRU} assumptions: Cryptanalysis
               of some {FHE} and Graded Encoding Schemes},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {127},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/127},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtBD16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtGRRT16,
  author    = {Martin R. Albrecht and
               Lorenzo Grassi and
               Christian Rechberger and
               Arnab Roy and
               Tyge Tiessen},
  title     = {MiMC: Efficient Encryption and Cryptographic Hashing with Minimal
               Multiplicative Complexity},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {492},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/492},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtGRRT16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtRSTZ16,
  author    = {Martin R. Albrecht and
               Christian Rechberger and
               Thomas Schneider and
               Tyge Tiessen and
               Michael Zohner},
  title     = {Ciphers for {MPC} and {FHE}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {687},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/687},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtRSTZ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cca/AlbrechtCFFP15,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {Algebraic algorithms for {LWE} problems},
  journal   = {{ACM} Commun. Comput. Algebra},
  volume    = {49},
  number    = {2},
  pages     = {62},
  year      = {2015},
  url       = {https://doi.org/10.1145/2815111.2815158},
  doi       = {10.1145/2815111.2815158},
  timestamp = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cca/AlbrechtCFFP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlbrechtCFFP15,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {On the complexity of the {BKW} algorithm on {LWE}},
  journal   = {Des. Codes Cryptogr.},
  volume    = {74},
  number    = {2},
  pages     = {325--354},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-013-9864-x},
  doi       = {10.1007/s10623-013-9864-x},
  timestamp = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dcc/AlbrechtCFFP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AlbrechtPS15,
  author    = {Martin R. Albrecht and
               Rachel Player and
               Sam Scott},
  title     = {On the concrete hardness of Learning with Errors},
  journal   = {J. Mathematical Cryptology},
  volume    = {9},
  number    = {3},
  pages     = {169--203},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0016/jmc-2015-0016.xml},
  timestamp = {Thu, 22 Oct 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jmc/AlbrechtPS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AlbrechtCLL15,
  author    = {Martin R. Albrecht and
               Catalin Cocis and
               Fabien Laguillaumie and
               Adeline Langlois},
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Implementing Candidate Graded Encoding Schemes from Ideal Lattices},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  pages     = {752--775},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48800-3\_31},
  doi       = {10.1007/978-3-662-48800-3\_31},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/AlbrechtCLL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlbrechtR0TZ15,
  author    = {Martin R. Albrecht and
               Christian Rechberger and
               Thomas Schneider and
               Tyge Tiessen and
               Michael Zohner},
  editor    = {Elisabeth Oswald and
               Marc Fischlin},
  title     = {Ciphers for {MPC} and {FHE}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9056},
  pages     = {430--454},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46800-5\_17},
  doi       = {10.1007/978-3-662-46800-5\_17},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/AlbrechtR0TZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtPS15,
  author    = {Martin R. Albrecht and
               Rachel Player and
               Sam Scott},
  title     = {On the concrete hardness of Learning with Errors},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {46},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/046},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtPS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFHLP15,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Dennis Hofheinz and
               Enrique Larraia and
               Kenneth G. Paterson},
  title     = {Multilinear Maps from Obfuscation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {780},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/780},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtFHLP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtP15,
  author    = {Martin R. Albrecht and
               Kenneth G. Paterson},
  title     = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation
               of {TLS}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {1129},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1129},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtDKLPY14,
  author    = {Martin R. Albrecht and
               Benedikt Driessen and
               Elif Bilge Kavun and
               Gregor Leander and
               Christof Paar and
               Tolga Yal{\c{c}}in},
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Block Ciphers - Focus on the Linear Layer (feat. {PRIDE)}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  pages     = {57--76},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44371-2\_4},
  doi       = {10.1007/978-3-662-44371-2\_4},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/AlbrechtDKLPY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlbrechtFFP14,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  editor    = {Hugo Krawczyk},
  title     = {Lazy Modulus Switching for the {BKW} Algorithm on {LWE}},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8383},
  pages     = {429--445},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0\_25},
  doi       = {10.1007/978-3-642-54631-0\_25},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/AlbrechtFFP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlbrechtFFPTX14,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret and
               Yosuke Todo and
               Keita Xagawa},
  editor    = {Hugo Krawczyk},
  title     = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on
               New Multivariate Quadratic Assumptions},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8383},
  pages     = {446--464},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0\_26},
  doi       = {10.1007/978-3-642-54631-0\_26},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/AlbrechtFFPTX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFFP14,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {Lazy Modulus Switching for the {BKW} Algorithm on {LWE}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2014},
  pages     = {19},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/019},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtFFP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDKLPY14,
  author    = {Martin R. Albrecht and
               Benedikt Driessen and
               Elif Bilge Kavun and
               Gregor Leander and
               Christof Paar and
               Tolga Yal{\c{c}}in},
  title     = {Block Ciphers - Focus On The Linear Layer (feat. {PRIDE):} Full Version},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2014},
  pages     = {453},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/453},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtDKLPY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCLL14,
  author    = {Martin R. Albrecht and
               Catalin Cocis and
               Fabien Laguillaumie and
               Adeline Langlois},
  title     = {Improved Parameters and an Implementation of Graded Encoding Schemes
               from Ideal Lattices},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2014},
  pages     = {928},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/928},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtCLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCFFP14,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {Algebraic Algorithms for {LWE} Problems},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2014},
  pages     = {1018},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/1018},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtCFFP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AlbrechtFG13,
  author    = {Martin R. Albrecht and
               Robert Fitzpatrick and
               Florian G{\"{o}}pfert},
  editor    = {Hyang{-}Sook Lee and
               Dong{-}Guk Han},
  title     = {On the Efficacy of Solving {LWE} by Reduction to Unique-SVP},
  booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International
               Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8565},
  pages     = {293--310},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-12160-4\_18},
  doi       = {10.1007/978-3-319-12160-4\_18},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/icisc/AlbrechtFG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFFP13,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on
               New Multivariate Quadratic Assumptions},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2013},
  pages     = {470},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/470},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtFFP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFo13,
  author    = {Martin R. Albrecht and
               Robert Fitzpatrick and
               Florian G{\"{o}}pfert},
  title     = {On the Efficacy of Solving {LWE} by Reduction to Unique-SVP},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2013},
  pages     = {602},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/602},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtFo13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/AlbrechtCFP12,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret},
  title     = {On the relation between the {MXL} family of algorithms and Gr{\"{o}}bner
               basis algorithms},
  journal   = {J. Symb. Comput.},
  volume    = {47},
  number    = {8},
  pages     = {926--941},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.jsc.2012.01.002},
  doi       = {10.1016/j.jsc.2012.01.002},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jsc/AlbrechtCFP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/Albrecht12,
  author    = {Martin R. Albrecht},
  editor    = {Joris van der Hoeven and
               Mark van Hoeij},
  title     = {The {M4RIE} library for dense linear algebra over small fields with
               even characteristic},
  booktitle = {International Symposium on Symbolic and Algebraic Computation, ISSAC'12,
               Grenoble, France - July 22 - 25, 2012},
  pages     = {28--34},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2442829.2442838},
  doi       = {10.1145/2442829.2442838},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/issac/Albrecht12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AlbrechtL12,
  author    = {Martin R. Albrecht and
               Gregor Leander},
  editor    = {Lars R. Knudsen and
               Huapeng Wu},
  title     = {An All-In-One Approach to Differential Cryptanalysis for Small Block
               Ciphers},
  booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7707},
  pages     = {1--15},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35999-6\_1},
  doi       = {10.1007/978-3-642-35999-6\_1},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sacrypt/AlbrechtL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/AlbrechtFFHP12,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Jean{-}Charles Faug{\`{e}}re and
               Gottfried Herold and
               Ludovic Perret},
  title     = {Polly Cracker, Revisited},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {19},
  pages     = {165},
  year      = {2012},
  url       = {http://eccc.hpi-web.de/report/2012/165},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/eccc/AlbrechtFFHP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtL12,
  author    = {Martin R. Albrecht and
               Gregor Leander},
  title     = {An All-In-One Approach to Differential Cryptanalysis for Small Block
               Ciphers},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2012},
  pages     = {401},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/401},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCFFP12,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {On the Complexity of the {BKW} Algorithm on {LWE}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2012},
  pages     = {636},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/636},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtCFFP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AlbrechtC11,
  author    = {Martin R. Albrecht and
               Carlos Cid},
  editor    = {Javier L{\'{o}}pez and
               Gene Tsudik},
  title     = {Cold Boot Key Recovery by Solving Polynomial Systems with Noise},
  booktitle = {Applied Cryptography and Network Security - 9th International Conference,
               {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6715},
  pages     = {57--72},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21554-4\_4},
  doi       = {10.1007/978-3-642-21554-4\_4},
  timestamp = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/AlbrechtC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AlbrechtFFP11,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret},
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {Polly Cracker, Revisited},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  pages     = {179--196},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0\_10},
  doi       = {10.1007/978-3-642-25385-0\_10},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/AlbrechtFFP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AlbrechtFPW11,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Kenneth G. Paterson and
               Gaven J. Watson},
  editor    = {Antoine Joux},
  title     = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6733},
  pages     = {128--145},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9\_8},
  doi       = {10.1007/978-3-642-21702-9\_8},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/fse/AlbrechtFPW11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/AlbrechtP11,
  author    = {Martin R. Albrecht and
               Kenneth G. Paterson},
  editor    = {Liqun Chen},
  title     = {Breaking an Identity-Based Encryption Scheme Based on {DHIES}},
  booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
               2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7089},
  pages     = {344--355},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25516-8\_21},
  doi       = {10.1007/978-3-642-25516-8\_21},
  timestamp = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl    = {https://dblp.org/rec/conf/ima/AlbrechtP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-6549,
  author    = {Martin R. Albrecht and
               Gregory V. Bard and
               Cl{\'{e}}ment Pernet},
  title     = {Efficient Dense Gaussian Elimination over the Finite Field with Two
               Elements},
  journal   = {CoRR},
  volume    = {abs/1111.6549},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.6549},
  archivePrefix = {arXiv},
  eprint    = {1111.6549},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1111-6549.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-6900,
  author    = {Martin R. Albrecht},
  title     = {The {M4RIE} library for dense linear algebra over small fields with
               even characteristic},
  journal   = {CoRR},
  volume    = {abs/1111.6900},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.6900},
  archivePrefix = {arXiv},
  eprint    = {1111.6900},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1111-6900.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtC11,
  author    = {Martin R. Albrecht and
               Carlos Cid},
  title     = {Cold Boot Key Recovery by Solving Polynomial Systems with Noise},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2011},
  pages     = {38},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/038},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCFP11,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret},
  title     = {On the Relation Between the Mutant Strategy and the Normal Selection
               Strategy in Gr{\"{o}}bner Basis Algorithms},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2011},
  pages     = {164},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/164},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtCFP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFPW11,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Kenneth G. Paterson and
               Gaven J. Watson},
  title     = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2011},
  pages     = {213},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/213},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtFPW11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFFP11,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret},
  title     = {Polly Cracker, Revisited},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2011},
  pages     = {289},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/289},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtFFP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Albrecht10,
  author    = {Martin R. Albrecht},
  title     = {Algorithmic algebraic techniques and their application to block cipher
               cryptanalysis},
  school    = {Royal Holloway, University of London, Egham, {UK}},
  year      = {2010},
  url       = {http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529770},
  timestamp = {Tue, 17 Oct 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/phd/ethos/Albrecht10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toms/AlbrechtBH10,
  author    = {Martin R. Albrecht and
               Gregory V. Bard and
               William Hart},
  title     = {Algorithm 898: Efficient multiplication of dense matrices over {GF(2)}},
  journal   = {{ACM} Trans. Math. Softw.},
  volume    = {37},
  number    = {1},
  pages     = {9:1--9:14},
  year      = {2010},
  url       = {https://doi.org/10.1145/1644001.1644010},
  doi       = {10.1145/1644001.1644010},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/toms/AlbrechtBH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/AlbrechtCDFP10,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Thomas Dullien and
               Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret},
  editor    = {Xuejia Lai and
               Moti Yung and
               Dongdai Lin},
  title     = {Algebraic Precomputations in Differential and Integral Cryptanalysis},
  booktitle = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6584},
  pages     = {387--403},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-21518-6\_27},
  doi       = {10.1007/978-3-642-21518-6\_27},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/cisc/AlbrechtCDFP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1006-1744,
  author    = {Martin R. Albrecht and
               Cl{\'{e}}ment Pernet},
  title     = {Efficient Decomposition of Dense Matrices over {GF(2)}},
  journal   = {CoRR},
  volume    = {abs/1006.1744},
  year      = {2010},
  url       = {http://arxiv.org/abs/1006.1744},
  archivePrefix = {arXiv},
  eprint    = {1006.1744},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1006-1744.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtP10,
  author    = {Martin R. Albrecht and
               Kenneth G. Paterson},
  title     = {Breaking An Identity-Based Encryption Scheme based on {DHIES}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2010},
  pages     = {637},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/637},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlbrechtGHK09,
  author    = {Martin R. Albrecht and
               Craig Gentry and
               Shai Halevi and
               Jonathan Katz},
  editor    = {Ehab Al{-}Shaer and
               Somesh Jha and
               Angelos D. Keromytis},
  title     = {Attacking cryptographic schemes based on "perturbation polynomials"},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {1--10},
  publisher = {{ACM}},
  year      = {2009},
  url       = {https://doi.org/10.1145/1653662.1653664},
  doi       = {10.1145/1653662.1653664},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/AlbrechtGHK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AlbrechtC09,
  author    = {Martin R. Albrecht and
               Carlos Cid},
  editor    = {Orr Dunkelman},
  title     = {Algebraic Techniques in Differential Cryptanalysis},
  booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
               Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5665},
  pages     = {193--208},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03317-9\_12},
  doi       = {10.1007/978-3-642-03317-9\_12},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/fse/AlbrechtC09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlbrechtPW09,
  author    = {Martin R. Albrecht and
               Kenneth G. Paterson and
               Gaven J. Watson},
  title     = {Plaintext Recovery Attacks against {SSH}},
  booktitle = {30th {IEEE} Symposium on Security and Privacy (S{\&}P 2009), 17-20
               May 2009, Oakland, California, {USA}},
  pages     = {16--26},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://doi.org/10.1109/SP.2009.5},
  doi       = {10.1109/SP.2009.5},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/AlbrechtPW09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtGHK09,
  author    = {Martin R. Albrecht and
               Craig Gentry and
               Shai Halevi and
               Jonathan Katz},
  title     = {Attacking Cryptographic Schemes Based on "Perturbation Polynomials"},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2009},
  pages     = {98},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/098},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtGHK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Albrecht08,
  author    = {Martin R. Albrecht},
  title     = {Algebraic Attacks on the Courtois Toy Cipher},
  journal   = {Cryptologia},
  volume    = {32},
  number    = {3},
  pages     = {220--276},
  year      = {2008},
  url       = {https://doi.org/10.1080/01611190802058139},
  doi       = {10.1080/01611190802058139},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/cryptologia/Albrecht08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0811-1714,
  author    = {Martin R. Albrecht and
               Gregory V. Bard and
               William Hart},
  title     = {Efficient Multiplication of Dense Matrices over {GF(2)}},
  journal   = {CoRR},
  volume    = {abs/0811.1714},
  year      = {2008},
  url       = {http://arxiv.org/abs/0811.1714},
  archivePrefix = {arXiv},
  eprint    = {0811.1714},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-0811-1714.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtC08,
  author    = {Martin R. Albrecht and
               Carlos Cid},
  title     = {Algebraic Techniques in Differential Cryptanalysis},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2008},
  pages     = {177},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/177},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbrechtC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/clawar/AlbrechtBPSSK05,
  author    = {Martin R. Albrecht and
               Till Backhaus and
               Steffen Planthaber and
               Henning St{\"{o}}pler and
               Dirk Spenneberg and
               Frank Kirchner},
  editor    = {Mohammad Osman Tokhi and
               Gurvinder S. Virk and
               M. Alamgir Hossain},
  title     = {{AIMEE:} {A} Four-Legged Robot for RoboCup Rescue},
  booktitle = {Climbing and Walking Robots - Proceedings of the 8th International
               Conference on Climbing and Walking Robots and the Support Technologies
               for Mobile Machines, {CLAWAR} 2005, London, UK, September 13-15, 2005},
  pages     = {1003--1010},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/3-540-26415-9\_120},
  doi       = {10.1007/3-540-26415-9\_120},
  timestamp = {Wed, 24 May 2017 08:28:38 +0200},
  biburl    = {https://dblp.org/rec/conf/clawar/AlbrechtBPSSK05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics