BibTeX records: Alexander May 0001

download as .bib file

@article{DBLP:journals/dcc/HeroldKM18,
  author    = {Gottfried Herold and
               Elena Kirshanova and
               Alexander May},
  title     = {On the asymptotic complexity of solving {LWE}},
  journal   = {Des. Codes Cryptography},
  volume    = {86},
  number    = {1},
  pages     = {55--83},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10623-016-0326-0},
  doi       = {10.1007/s10623-016-0326-0},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/HeroldKM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JagerK018,
  author    = {Tibor Jager and
               Saqib A. Kakvi and
               Alexander May},
  title     = {On the Security of the PKCS{\#}1 v1.5 Signature Scheme},
  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  pages     = {1195--1208},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018},
  url       = {https://doi.org/10.1145/3243734.3243798},
  doi       = {10.1145/3243734.3243798},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/JagerK018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EsserHK0S18,
  author    = {Andre Esser and
               Felix Heuer and
               Robert K{\"{u}}bler and
               Alexander May and
               Christian Sohler},
  title     = {Dissection-BKW},
  booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {II}},
  pages     = {638--666},
  year      = {2018},
  crossref  = {DBLP:conf/crypto/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-96881-0\_22},
  doi       = {10.1007/978-3-319-96881-0\_22},
  timestamp = {Mon, 13 Aug 2018 14:03:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/EsserHK0S18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BothM18,
  author    = {Leif Both and
               Alexander May},
  title     = {Decoding Linear Codes with High Error Rate and Its Impact for {LPN}
               Security},
  booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
               2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  pages     = {25--46},
  year      = {2018},
  crossref  = {DBLP:conf/pqcrypto/2018},
  url       = {https://doi.org/10.1007/978-3-319-79063-3\_2},
  doi       = {10.1007/978-3-319-79063-3\_2},
  timestamp = {Thu, 05 Apr 2018 12:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/BothM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tqc/HelmM18,
  author    = {Alexander Helm and
               Alexander May},
  title     = {Subset Sum Quantumly in 1.17\({}^{\mbox{n}}\)},
  booktitle = {13th Conference on the Theory of Quantum Computation, Communication
               and Cryptography, {TQC} 2018, July 16-18, 2018, Sydney, Australia},
  pages     = {5:1--5:15},
  year      = {2018},
  crossref  = {DBLP:conf/tqc/2018},
  url       = {https://doi.org/10.4230/LIPIcs.TQC.2018.5},
  doi       = {10.4230/LIPIcs.TQC.2018.5},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tqc/HelmM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EsserHKMS18,
  author    = {Andre Esser and
               Felix Heuer and
               Robert K{\"{u}}bler and
               Alexander May and
               Christian Sohler},
  title     = {Dissection-BKW},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {569},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/569},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/EsserHKMS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MayH18,
  author    = {Alexander May and
               Gottfried Herold},
  title     = {{LP} Solutions of Vectorial Integer Subset Sums - Cryptanalysis of
               Galbraith's Binary Matrix {LWE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {741},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/741},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MayH18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKM18,
  author    = {Tibor Jager and
               Saqib A. Kakvi and
               Alexander May},
  title     = {On the Security of the PKCS{\#}1 v1.5 Signature Scheme},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {855},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/855},
  timestamp = {Mon, 15 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JagerKM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BothM17,
  author    = {Leif Both and
               Alexander May},
  title     = {The Approximate k-List Problem},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {1},
  pages     = {380--397},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i1.380-397},
  doi       = {10.13154/tosc.v2017.i1.380-397},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tosc/BothM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Leander017,
  author    = {Gregor Leander and
               Alexander May},
  title     = {Grover Meets Simon - Quantumly Attacking the FX-construction},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  pages     = {161--178},
  year      = {2017},
  crossref  = {DBLP:conf/asiacrypt/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-70697-9\_6},
  doi       = {10.1007/978-3-319-70697-9\_6},
  timestamp = {Wed, 22 Nov 2017 13:46:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/Leander017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EsserKM17,
  author    = {Andre Esser and
               Robert K{\"{u}}bler and
               Alexander May},
  title     = {{LPN} Decoded},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {II}},
  pages     = {486--514},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-63715-0\_17},
  doi       = {10.1007/978-3-319-63715-0\_17},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/EsserKM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Herold017,
  author    = {Gottfried Herold and
               Alexander May},
  title     = {{LP} Solutions of Vectorial Integer Subset Sums - Cryptanalysis of
               Galbraith's Binary Matrix {LWE}},
  booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  pages     = {3--15},
  year      = {2017},
  crossref  = {DBLP:conf/pkc/2017-1},
  url       = {https://doi.org/10.1007/978-3-662-54365-8\_1},
  doi       = {10.1007/978-3-662-54365-8\_1},
  timestamp = {Thu, 23 Nov 2017 13:00:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/Herold017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EsserKM17,
  author    = {Andre Esser and
               Robert K{\"{u}}bler and
               Alexander May},
  title     = {{LPN} Decoded},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {78},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/078},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/EsserKM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BothM17,
  author    = {Leif Both and
               Alexander May},
  title     = {The Approximate k-List Problem},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {182},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/182},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BothM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeanderM17,
  author    = {Gregor Leander and
               Alexander May},
  title     = {Grover Meets Simon - Quantumly Attacking the FX-construction},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {427},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/427},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LeanderM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Both017,
  author    = {Leif Both and
               Alexander May},
  title     = {Decoding Linear Codes with High Error Rate and its Impact for {LPN}
               Security},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1139},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1139},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Both017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Kirshanova0W16,
  author    = {Elena Kirshanova and
               Alexander May and
               Friedrich Wiemer},
  title     = {Parallel Implementation of {BDD} Enumeration for {LWE}},
  booktitle = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  pages     = {580--591},
  year      = {2016},
  crossref  = {DBLP:conf/acns/2016},
  url       = {https://doi.org/10.1007/978-3-319-39555-5\_31},
  doi       = {10.1007/978-3-319-39555-5\_31},
  timestamp = {Fri, 02 Nov 2018 09:42:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/Kirshanova0W16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Fischlin0PR16,
  author    = {Marc Fischlin and
               Alexander May and
               David Pointcheval and
               Tal Rabin},
  title     = {Public-Key Cryptography (Dagstuhl Seminar 16371)},
  journal   = {Dagstuhl Reports},
  volume    = {6},
  number    = {9},
  pages     = {46--58},
  year      = {2016},
  url       = {https://doi.org/10.4230/DagRep.6.9.46},
  doi       = {10.4230/DagRep.6.9.46},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dagstuhl-reports/Fischlin0PR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kirshanova0W16,
  author    = {Elena Kirshanova and
               Alexander May and
               Friedrich Wiemer},
  title     = {Parallel Implementation of {BDD} enumeration for {LWE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {380},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/380},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Kirshanova0W16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/0001O15,
  author    = {Alexander May and
               Ilya Ozerov},
  title     = {On Computing Nearest Neighbors with Applications to Decoding of Binary
               Linear Codes},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  pages     = {203--228},
  year      = {2015},
  crossref  = {DBLP:conf/eurocrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-46800-5\_9},
  doi       = {10.1007/978-3-662-46800-5\_9},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/0001O15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeroldKM15,
  author    = {Gottfried Herold and
               Elena Kirshanova and
               Alexander May},
  title     = {On the Asymptotic Complexity of Solving {LWE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1222},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1222},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HeroldKM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MayO14,
  author    = {Alexander May and
               Ilya Ozerov},
  title     = {A Generic Algorithm for Small Weight Discrete Logarithms in Composite
               Groups},
  booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
               Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  pages     = {278--289},
  year      = {2014},
  crossref  = {DBLP:conf/sacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-319-13051-4\_17},
  doi       = {10.1007/978-3-319-13051-4\_17},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/MayO14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KakviKM12,
  author    = {Saqib A. Kakvi and
               Eike Kiltz and
               Alexander May},
  title     = {Certifying {RSA}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {404--414},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4\_25},
  doi       = {10.1007/978-3-642-34961-4\_25},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/KakviKM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BeckerJMM12,
  author    = {Anja Becker and
               Antoine Joux and
               Alexander May and
               Alexander Meurer},
  title     = {Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves
               Information Set Decoding},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  pages     = {520--536},
  year      = {2012},
  crossref  = {DBLP:conf/eurocrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4\_31},
  doi       = {10.1007/978-3-642-29011-4\_31},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/BeckerJMM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerJMM12,
  author    = {Anja Becker and
               Antoine Joux and
               Alexander May and
               Alexander Meurer},
  title     = {Decoding Random Binary Linear Codes in 2\({}^{\mbox{n/20}}\): How
               1+1=0 Improves Information Set Decoding},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {26},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/026},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BeckerJMM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MayMT11,
  author    = {Alexander May and
               Alexander Meurer and
               Enrico Thomae},
  title     = {Decoding Random Linear Codes in {\textdollar}{\textbackslash}tilde\{{\textbackslash}mathcal\{O\}\}(2{\^{}}\{0.054n\}){\textdollar}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  pages     = {107--124},
  year      = {2011},
  crossref  = {DBLP:conf/asiacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0\_6},
  doi       = {10.1007/978-3-642-25385-0\_6},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/MayMT11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LoftusMSV11,
  author    = {Jake Loftus and
               Alexander May and
               Nigel P. Smart and
               Frederik Vercauteren},
  title     = {On CCA-Secure Somewhat Homomorphic Encryption},
  booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  pages     = {55--72},
  year      = {2011},
  crossref  = {DBLP:conf/sacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-28496-0\_4},
  doi       = {10.1007/978-3-642-28496-0\_4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/LoftusMSV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/FischlinLMM11,
  author    = {Marc Fischlin and
               Anna Lysyanskaya and
               Ueli Maurer and
               Alexander May},
  title     = {Public-Key Cryptography (Dagstuhl Seminar 11391)},
  journal   = {Dagstuhl Reports},
  volume    = {1},
  number    = {9},
  pages     = {76--94},
  year      = {2011},
  url       = {https://doi.org/10.4230/DagRep.1.9.76},
  doi       = {10.4230/DagRep.1.9.76},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dagstuhl-reports/FischlinLMM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HeneckaMM10,
  author    = {Wilko Henecka and
               Alexander May and
               Alexander Meurer},
  title     = {Correcting Errors in {RSA} Private Keys},
  booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  pages     = {351--369},
  year      = {2010},
  crossref  = {DBLP:conf/crypto/2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7\_19},
  doi       = {10.1007/978-3-642-14623-7\_19},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/HeneckaMM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HerrmannM10,
  author    = {Mathias Herrmann and
               Alexander May},
  title     = {Maximizing Small Root Bounds by Linearization and Applications to
               Small Secret Exponent {RSA}},
  booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference
               on Practice and Theory in Public Key Cryptography, Paris, France,
               May 26-28, 2010. Proceedings},
  pages     = {53--69},
  year      = {2010},
  crossref  = {DBLP:conf/pkc/2010},
  url       = {https://doi.org/10.1007/978-3-642-13013-7\_4},
  doi       = {10.1007/978-3-642-13013-7\_4},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/HerrmannM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/May10,
  author    = {Alexander May},
  title     = {Using LLL-Reduction for Solving {RSA} and Factorization Problems},
  booktitle = {The {LLL} Algorithm - Survey and Applications},
  pages     = {315--348},
  year      = {2010},
  crossref  = {DBLP:series/isc/364202294},
  url       = {https://doi.org/10.1007/978-3-642-02295-1\_10},
  doi       = {10.1007/978-3-642-02295-1\_10},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/series/isc/May10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LoftusMSV10,
  author    = {Jake Loftus and
               Alexander May and
               Nigel P. Smart and
               Frederik Vercauteren},
  title     = {On CCA-Secure Fully Homomorphic Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {560},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/560},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LoftusMSV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HerrmannM09,
  author    = {Mathias Herrmann and
               Alexander May},
  title     = {Attacking Power Generators Using Unravelled Linearization: When Do
               We Output Too Much?},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  pages     = {487--504},
  year      = {2009},
  crossref  = {DBLP:conf/asiacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7\_29},
  doi       = {10.1007/978-3-642-10366-7\_29},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/HerrmannM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MayR09,
  author    = {Alexander May and
               Maike Ritzenhofen},
  title     = {Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit
               Hint},
  booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  pages     = {1--14},
  year      = {2009},
  crossref  = {DBLP:conf/pkc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1\_1},
  doi       = {10.1007/978-3-642-00468-1\_1},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/MayR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HerrmannM08,
  author    = {Mathias Herrmann and
               Alexander May},
  title     = {Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  pages     = {406--424},
  year      = {2008},
  crossref  = {DBLP:conf/asiacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7\_25},
  doi       = {10.1007/978-3-540-89255-7\_25},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/HerrmannM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MayR08,
  author    = {Alexander May and
               Maike Ritzenhofen},
  title     = {Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted
               Messages Does Eve Need to Know?},
  booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
               on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
               March 9-12, 2008. Proceedings},
  pages     = {37--46},
  year      = {2008},
  crossref  = {DBLP:conf/pkc/2008},
  url       = {https://doi.org/10.1007/978-3-540-78440-1\_3},
  doi       = {10.1007/978-3-540-78440-1\_3},
  timestamp = {Wed, 14 Nov 2018 10:56:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/MayR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CoronM07,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Alexander May},
  title     = {Deterministic Polynomial-Time Equivalence of Computing the {RSA} Secret
               Key and Factoring},
  journal   = {J. Cryptology},
  volume    = {20},
  number    = {1},
  pages     = {39--50},
  year      = {2007},
  url       = {https://doi.org/10.1007/s00145-006-0433-6},
  doi       = {10.1007/s00145-006-0433-6},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/joc/CoronM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JochemszM07,
  author    = {Ellen Jochemsz and
               Alexander May},
  title     = {A Polynomial Time Attack on {RSA} with Private CRT-Exponents Smaller
               Than \emph{N} \({}^{\mbox{0.073}}\)},
  booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
               Proceedings},
  pages     = {395--411},
  year      = {2007},
  crossref  = {DBLP:conf/crypto/2007},
  url       = {https://doi.org/10.1007/978-3-540-74143-5\_22},
  doi       = {10.1007/978-3-540-74143-5\_22},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/JochemszM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/HerrmannM07,
  author    = {Mathias Herrmann and
               Alexander May},
  title     = {On Factoring Arbitrary Integers with Known Bits},
  booktitle = {{INFORMATIK} 2007: Informatik trifft Logistik. Band 2. Beitr{\"{a}}ge
               der 37. Jahrestagung der Gesellschaft f{\"{u}}r Informatik e.V.
               (GI), 24.-27. September 2007 in Bremen, Deutschland},
  pages     = {195--199},
  year      = {2007},
  crossref  = {DBLP:conf/gi/2007-2},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings110/article1718.html},
  timestamp = {Tue, 15 Mar 2016 16:45:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/gi/HerrmannM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerrmannM07,
  author    = {Mathias Herrmann and
               Alexander May},
  title     = {On Factoring Arbitrary Integers with Known Bits},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {374},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/374},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HerrmannM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BuchmannMV06,
  author    = {Johannes A. Buchmann and
               Alexander May and
               Ulrich Vollmer},
  title     = {Perspectives for cryptographic long-term security},
  journal   = {Commun. {ACM}},
  volume    = {49},
  number    = {9},
  pages     = {50--55},
  year      = {2006},
  url       = {https://doi.org/10.1145/1151030.1151055},
  doi       = {10.1145/1151030.1151055},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/BuchmannMV06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JochemszM06,
  author    = {Ellen Jochemsz and
               Alexander May},
  title     = {A Strategy for Finding Roots of Multivariate Polynomials with New
               Applications in Attacking {RSA} Variants},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Shanghai, China, December 3-7, 2006, Proceedings},
  pages     = {267--282},
  year      = {2006},
  crossref  = {DBLP:conf/asiacrypt/2006},
  url       = {https://doi.org/10.1007/11935230\_18},
  doi       = {10.1007/11935230\_18},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/JochemszM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BleichenbacherM06,
  author    = {Daniel Bleichenbacher and
               Alexander May},
  title     = {New Attacks on {RSA} with Small Secret CRT-Exponents},
  booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference
               on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
               April 24-26, 2006, Proceedings},
  pages     = {1--13},
  year      = {2006},
  crossref  = {DBLP:conf/pkc/2006},
  url       = {https://doi.org/10.1007/11745853\_1},
  doi       = {10.1007/11745853\_1},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BleichenbacherM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlomerM05,
  author    = {Johannes Bl{\"{o}}mer and
               Alexander May},
  title     = {A Tool Kit for Finding Small Roots of Bivariate Polynomials over the
               Integers},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Aarhus, Denmark, May 22-26, 2005, Proceedings},
  pages     = {251--267},
  year      = {2005},
  crossref  = {DBLP:conf/eurocrypt/2005},
  url       = {https://doi.org/10.1007/11426639\_15},
  doi       = {10.1007/11426639\_15},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/BlomerM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ErnstJMW05,
  author    = {Matthias Ernst and
               Ellen Jochemsz and
               Alexander May and
               Benne de Weger},
  title     = {Partial Key Exposure Attacks on {RSA} up to Full Size Exponents},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Aarhus, Denmark, May 22-26, 2005, Proceedings},
  pages     = {371--386},
  year      = {2005},
  crossref  = {DBLP:conf/eurocrypt/2005},
  url       = {https://doi.org/10.1007/11426639\_22},
  doi       = {10.1007/11426639\_22},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/ErnstJMW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/May04,
  author    = {Alexander May},
  title     = {Computing the {RSA} Secret Key Is Deterministic Polynomial Time Equivalent
               to Factoring},
  booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
               CryptologyConference, Santa Barbara, California, USA, August 15-19,
               2004, Proceedings},
  pages     = {213--219},
  year      = {2004},
  crossref  = {DBLP:conf/crypto/2004},
  url       = {https://doi.org/10.1007/978-3-540-28628-8\_13},
  doi       = {10.1007/978-3-540-28628-8\_13},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/May04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BlomerM04,
  author    = {Johannes Bl{\"{o}}mer and
               Alexander May},
  title     = {A Generalized Wiener Attack on {RSA}},
  booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
               Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
               2004},
  pages     = {1--13},
  year      = {2004},
  crossref  = {DBLP:conf/pkc/2004},
  url       = {https://doi.org/10.1007/978-3-540-24632-9\_1},
  doi       = {10.1007/978-3-540-24632-9\_1},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BlomerM04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/May04,
  author    = {Alexander May},
  title     = {Secret Exponent Attacks on RSA-type Schemes with Moduli N= p\({}^{\mbox{r}}\)q},
  booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
               Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
               2004},
  pages     = {218--230},
  year      = {2004},
  crossref  = {DBLP:conf/pkc/2004},
  url       = {https://doi.org/10.1007/978-3-540-24632-9\_16},
  doi       = {10.1007/978-3-540-24632-9\_16},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/May04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronM04,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Alexander May},
  title     = {Deterministic Polynomial Time Equivalence of Computing the {RSA} Secret
               Key and Factoring},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {208},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/208},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CoronM04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/May2003,
  author    = {Alexander May},
  title     = {New {RSA} vulnerabilities using lattice reduction methods},
  school    = {University of Paderborn},
  year      = {2003},
  url       = {http://ubdata.uni-paderborn.de/ediss/17/2003/may/disserta.pdf},
  urn       = {urn:nbn:de:hbz:466-20030101205},
  timestamp = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/phd/de/May2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlomerM03,
  author    = {Johannes Bl{\"{o}}mer and
               Alexander May},
  title     = {New Partial Key Exposure Attacks on {RSA}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  pages     = {27--43},
  year      = {2003},
  crossref  = {DBLP:conf/crypto/2003},
  url       = {https://doi.org/10.1007/978-3-540-45146-4\_2},
  doi       = {10.1007/978-3-540-45146-4\_2},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BlomerM03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/May02,
  author    = {Alexander May},
  title     = {Cryptanalysis of Unbalanced {RSA} with Small CRT-Exponent},
  booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  pages     = {242--256},
  year      = {2002},
  crossref  = {DBLP:conf/crypto/2002},
  url       = {https://doi.org/10.1007/3-540-45708-9\_16},
  doi       = {10.1007/3-540-45708-9\_16},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/May02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/calc/BlomerM01,
  author    = {Johannes Bl{\"{o}}mer and
               Alexander May},
  title     = {Low Secret Exponent {RSA} Revisited},
  booktitle = {Cryptography and Lattices, International Conference, CaLC 2001, Providence,
               RI, USA, March 29-30, 2001, Revised Papers},
  pages     = {4--19},
  year      = {2001},
  crossref  = {DBLP:conf/calc/2001},
  url       = {https://doi.org/10.1007/3-540-44670-2\_2},
  doi       = {10.1007/3-540-44670-2\_2},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/calc/BlomerM01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/calc/MayS01,
  author    = {Alexander May and
               Joseph H. Silverman},
  title     = {Dimension Reduction Methods for Convolution Modular Lattices},
  booktitle = {Cryptography and Lattices, International Conference, CaLC 2001, Providence,
               RI, USA, March 29-30, 2001, Revised Papers},
  pages     = {110--125},
  year      = {2001},
  crossref  = {DBLP:conf/calc/2001},
  url       = {https://doi.org/10.1007/3-540-44670-2\_10},
  doi       = {10.1007/3-540-44670-2\_10},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/calc/MayS01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BlomerM01,
  author    = {Johannes Bl{\"{o}}mer and
               Alexander May},
  title     = {Key Revocation with Interval Cover Families},
  booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop,
               {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  pages     = {325--341},
  year      = {2001},
  crossref  = {DBLP:conf/sacrypt/2001},
  url       = {https://doi.org/10.1007/3-540-45537-X\_26},
  doi       = {10.1007/3-540-45537-X\_26},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/BlomerM01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018,
  editor    = {David Lie and
               Mohammad Mannan and
               Michael Backes and
               XiaoFeng Wang},
  title     = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3243734},
  isbn      = {978-1-4503-5693-0},
  timestamp = {Wed, 31 Oct 2018 17:23:34 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2018-2,
  editor    = {Hovav Shacham and
               Alexandra Boldyreva},
  title     = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10992},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-96881-0},
  doi       = {10.1007/978-3-319-96881-0},
  isbn      = {978-3-319-96880-3},
  timestamp = {Mon, 13 Aug 2018 14:03:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2018,
  editor    = {Tanja Lange and
               Rainer Steinwandt},
  title     = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
               2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10786},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-79063-3},
  doi       = {10.1007/978-3-319-79063-3},
  isbn      = {978-3-319-79062-6},
  timestamp = {Thu, 05 Apr 2018 12:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tqc/2018,
  editor    = {Stacey Jeffery},
  title     = {13th Conference on the Theory of Quantum Computation, Communication
               and Cryptography, {TQC} 2018, July 16-18, 2018, Sydney, Australia},
  series    = {LIPIcs},
  volume    = {111},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2018},
  url       = {http://www.dagstuhl.de/dagpub/978-3-95977-080-4},
  isbn      = {978-3-95977-080-4},
  timestamp = {Mon, 16 Jul 2018 15:34:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tqc/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2017-2,
  editor    = {Tsuyoshi Takagi and
               Thomas Peyrin},
  title     = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10625},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70697-9},
  doi       = {10.1007/978-3-319-70697-9},
  isbn      = {978-3-319-70696-2},
  timestamp = {Wed, 22 Nov 2017 13:46:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-2,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10402},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63715-0},
  doi       = {10.1007/978-3-319-63715-0},
  isbn      = {978-3-319-63714-3},
  timestamp = {Mon, 14 Aug 2017 14:37:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2017-1,
  editor    = {Serge Fehr},
  title     = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10174},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54365-8},
  doi       = {10.1007/978-3-662-54365-8},
  isbn      = {978-3-662-54364-1},
  timestamp = {Thu, 23 Nov 2017 13:00:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2016,
  editor    = {Mark Manulis and
               Ahmad{-}Reza Sadeghi and
               Steve Schneider},
  title     = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9696},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-39555-5},
  doi       = {10.1007/978-3-319-39555-5},
  isbn      = {978-3-319-39554-8},
  timestamp = {Fri, 02 Nov 2018 09:42:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2015-1,
  editor    = {Elisabeth Oswald and
               Marc Fischlin},
  title     = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9056},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46800-5},
  doi       = {10.1007/978-3-662-46800-5},
  isbn      = {978-3-662-46799-2},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2014,
  editor    = {Antoine Joux and
               Amr M. Youssef},
  title     = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
               Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8781},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13051-4},
  doi       = {10.1007/978-3-319-13051-4},
  isbn      = {978-3-319-13050-7},
  timestamp = {Sun, 21 May 2017 00:19:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2012,
  editor    = {Xiaoyun Wang and
               Kazue Sako},
  title     = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7658},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4},
  doi       = {10.1007/978-3-642-34961-4},
  isbn      = {978-3-642-34960-7},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2012,
  editor    = {David Pointcheval and
               Thomas Johansson},
  title     = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7237},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4},
  doi       = {10.1007/978-3-642-29011-4},
  isbn      = {978-3-642-29010-7},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2011,
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0},
  doi       = {10.1007/978-3-642-25385-0},
  isbn      = {978-3-642-25384-3},
  timestamp = {Wed, 10 Jan 2018 08:32:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2011,
  editor    = {Ali Miri and
               Serge Vaudenay},
  title     = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7118},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28496-0},
  doi       = {10.1007/978-3-642-28496-0},
  isbn      = {978-3-642-28495-3},
  timestamp = {Sun, 21 May 2017 00:19:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor    = {Tal Rabin},
  title     = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7},
  doi       = {10.1007/978-3-642-14623-7},
  isbn      = {978-3-642-14622-0},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2010,
  editor    = {Phong Q. Nguyen and
               David Pointcheval},
  title     = {Public Key Cryptography - {PKC} 2010, 13th International Conference
               on Practice and Theory in Public Key Cryptography, Paris, France,
               May 26-28, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6056},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13013-7},
  doi       = {10.1007/978-3-642-13013-7},
  isbn      = {978-3-642-13012-0},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/364202294,
  editor    = {Phong Q. Nguyen and
               Brigitte Vall{\'{e}}e},
  title     = {The {LLL} Algorithm - Survey and Applications},
  series    = {Information Security and Cryptography},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-02295-1},
  doi       = {10.1007/978-3-642-02295-1},
  isbn      = {978-3-642-02294-4},
  timestamp = {Tue, 16 May 2017 14:24:21 +0200},
  biburl    = {https://dblp.org/rec/bib/series/isc/364202294},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2009,
  editor    = {Mitsuru Matsui},
  title     = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5912},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7},
  doi       = {10.1007/978-3-642-10366-7},
  isbn      = {978-3-642-10365-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2009,
  editor    = {Stanislaw Jarecki and
               Gene Tsudik},
  title     = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5443},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1},
  doi       = {10.1007/978-3-642-00468-1},
  isbn      = {978-3-642-00467-4},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2008,
  editor    = {Josef Pieprzyk},
  title     = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5350},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7},
  doi       = {10.1007/978-3-540-89255-7},
  isbn      = {978-3-540-89254-0},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2008,
  editor    = {Ronald Cramer},
  title     = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
               on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
               March 9-12, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4939},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-78440-1},
  doi       = {10.1007/978-3-540-78440-1},
  isbn      = {978-3-540-78439-5},
  timestamp = {Wed, 14 Nov 2018 10:56:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2007,
  editor    = {Alfred Menezes},
  title     = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4622},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74143-5},
  doi       = {10.1007/978-3-540-74143-5},
  isbn      = {978-3-540-74142-8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gi/2007-2,
  editor    = {Rainer Koschke and
               Otthein Herzog and
               Karl{-}Heinz R{\"{o}}diger and
               Marc Ronthaler},
  title     = {{INFORMATIK} 2007: Informatik trifft Logistik. Band 2. Beitr{\"{a}}ge
               der 37. Jahrestagung der Gesellschaft f{\"{u}}r Informatik e.V.
               (GI), 24.-27. September 2007 in Bremen, Deutschland},
  series    = {{LNI}},
  volume    = {110},
  publisher = {{GI}},
  year      = {2007},
  isbn      = {978-3-88579-204-8},
  timestamp = {Tue, 15 Mar 2016 16:45:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/gi/2007-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2006,
  editor    = {Xuejia Lai and
               Kefei Chen},
  title     = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Shanghai, China, December 3-7, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4284},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11935230},
  doi       = {10.1007/11935230},
  isbn      = {3-540-49475-8},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2006,
  editor    = {Moti Yung and
               Yevgeniy Dodis and
               Aggelos Kiayias and
               Tal Malkin},
  title     = {Public Key Cryptography - {PKC} 2006, 9th International Conference
               on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
               April 24-26, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3958},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11745853},
  doi       = {10.1007/11745853},
  isbn      = {3-540-33851-9},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2005,
  editor    = {Ronald Cramer},
  title     = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3494},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b136415},
  doi       = {10.1007/b136415},
  isbn      = {3-540-25910-4},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2004,
  editor    = {Matthew K. Franklin},
  title     = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
               CryptologyConference, Santa Barbara, California, USA, August 15-19,
               2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3152},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b99099},
  doi       = {10.1007/b99099},
  isbn      = {3-540-22668-0},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2004,
  editor    = {Feng Bao and
               Robert H. Deng and
               Jianying Zhou},
  title     = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
               Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
               2004},
  series    = {Lecture Notes in Computer Science},
  volume    = {2947},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b95631},
  doi       = {10.1007/b95631},
  isbn      = {3-540-21018-0},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2003,
  editor    = {Dan Boneh},
  title     = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2729},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b11817},
  doi       = {10.1007/b11817},
  isbn      = {3-540-40674-3},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2002,
  editor    = {Moti Yung},
  title     = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2442},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45708-9},
  doi       = {10.1007/3-540-45708-9},
  isbn      = {3-540-44050-X},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/calc/2001,
  editor    = {Joseph H. Silverman},
  title     = {Cryptography and Lattices, International Conference, CaLC 2001, Providence,
               RI, USA, March 29-30, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2146},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44670-2},
  doi       = {10.1007/3-540-44670-2},
  isbn      = {3-540-42488-1},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/calc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2001,
  editor    = {Serge Vaudenay and
               Amr M. Youssef},
  title     = {Selected Areas in Cryptography, 8th Annual International Workshop,
               {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2259},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45537-X},
  doi       = {10.1007/3-540-45537-X},
  isbn      = {3-540-43066-0},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier