Martin Albrecht
#186,172
Most Influential Person Now
Martin Albrecht's AcademicInfluence.com Rankings
Martin Albrechtcomputer-science Degrees
Computer Science
#12094
World Rank
#12882
Historical Rank
Database
#9156
World Rank
#9627
Historical Rank

Download Badge
Computer Science
Martin Albrecht's Degrees
- PhD Computer Science Royal Holloway, University of London
- Masters Information Security Royal Holloway, University of London
Similar Degrees You Can Earn
Why Is Martin Albrecht Influential?
(Suggest an Edit or Addition)Martin Albrecht's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- On the concrete hardness of Learning with Errors (2015) (570)
- Ciphers for MPC and FHE (2015) (283)
- A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes (2016) (206)
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity (2016) (181)
- Block Ciphers - Focus on the Linear Layer (feat. PRIDE) (2014) (178)
- On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL (2017) (138)
- Estimate all the {LWE, NTRU} schemes! (2018) (128)
- The General Sieve Kernel and New Records in Lattice Reduction (2019) (115)
- Plaintext Recovery Attacks against SSH (2009) (113)
- Algebraic Techniques in Differential Cryptanalysis (2009) (111)
- On the complexity of the BKW algorithm on LWE (2012) (101)
- Revisiting the Expected Cost of Solving uSVP and Applications to LWE (2017) (95)
- On the Efficacy of Solving LWE by Reduction to Unique-SVP (2013) (89)
- Attacking cryptographic schemes based on "perturbation polynomials" (2009) (89)
- Feistel Structures for MPC, and More (2019) (68)
- Homomorphic Encryption Standard (2019) (66)
- NewHope Algorithm Specifications and Supporting Documentation (2017) (63)
- Large Modulus Ring-LWE ≥ Module-LWE (2017) (61)
- Lazy Modulus Switching for the BKW Algorithm on LWE (2014) (59)
- Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS (2016) (54)
- Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC (2019) (52)
- Algebraic algorithms for LWE problems (2015) (50)
- Cold Boot Key Recovery by Solving Polynomial Systems with Noise (2011) (49)
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers (2012) (49)
- Algorithm 898: Efficient multiplication of dense matrices over GF(2) (2008) (38)
- Polly Cracker, revisited (2011) (38)
- Implementing RLWE-based Schemes Using an RSA Co-Processor (2018) (36)
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model (2011) (35)
- Cold Boot Attacks on Ring and Module LWE Keys Under the NTT (2018) (32)
- Implementing Candidate Graded Encoding Schemes from Ideal Lattices (2015) (27)
- On the relation between the MXL family of algorithms and Gröbner basis algorithms (2012) (26)
- Multilinear Maps from Obfuscation (2016) (25)
- A Surfeit of SSH Cipher Suites (2016) (23)
- Algebraic Attacks on the Courtois Toy Cipher (2008) (22)
- Efficient Multiplication of Dense Matrices over GF(2) (2008) (20)
- Estimating Quantum Speedups for Lattice Sieves (2020) (19)
- Algorithmic algebraic techniques and their application to block cipher cryptanalysis (2010) (18)
- Algebraic Algorithms for LWE (2015) (18)
- Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts (2017) (16)
- Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)) (2020) (15)
- Algebraic Precomputations in Differential and Integral Cryptanalysis (2010) (14)
- Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices (2019) (14)
- Efficient Dense Gaussian Elimination over the Finite Field with Two Elements (2011) (14)
- Lattice Attacks on NTRU and LWE: A History of Refinements (2021) (13)
- The M4RIE library for dense linear algebra over small fields with even characteristic (2011) (13)
- On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem (2020) (13)
- Prime and Prejudice: Primality Testing Under Adversarial Conditions (2018) (12)
- Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography (2017) (11)
- Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions (2014) (11)
- On the complexity of the Arora-Ge Algorithm against LWE (2012) (11)
- Mesh Messaging in Large-scale Protests: Breaking Bridgefy (2021) (10)
- Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices (2021) (9)
- Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable (2022) (9)
- On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms (2011) (9)
- The Vacuity of the Open Source Security Testing Methodology Manual (2020) (8)
- A Generator for LWE and Ring-LWE Instances (2013) (8)
- Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance (2020) (8)
- Efficient Decomposition of Dense Matrices over GF(2) (2010) (7)
- D.STVL.7 - Algebraic cryptanalysis of symmetric primitives (2008) (7)
- Breaking an Identity-Based Encryption Scheme Based on DHIES (2011) (5)
- Four Attacks and a Proof for Telegram (2022) (5)
- Factoring 512-bit RSA Moduli for Fun ( and a Profit of $ 9 , 000 ) (2015) (4)
- Exploring Trade-offs in Batch Bounded Distance Decoding (2019) (4)
- Algebraic Precomputations in Differential Cryptanalysis (2010) (4)
- Quantum speedups for lattice sieves are tenuous at best (2019) (4)
- Learning with Errors on RSA Co-Processors (2018) (4)
- Practically-exploitable Cryptographic Vulnerabilities in Matrix (2022) (3)
- Algebraic Cryptanalysis of Symmetric Primitives (2008) (3)
- Notes on GGH13 Without the Presence of Ideals (2017) (3)
- Variational quantum solutions to the Shortest Vector Problem (2022) (2)
- Faugère-Lachartre Parallel Gaussian Elimination for Gröbner Bases Computations Over Finite Fields (2012) (2)
- Feistel Structures for MPC , and More Extended Version (2019) (1)
- On the complexity of the BKW algorithm on LWE (2013) (1)
- The M4RI & M4RIE libraries for linear algebra over F2 and small extensions (2011) (1)
- Faster Enumeration-based Lattice Reduction: Root Hermite Factor k in Time k o(k) (2020) (1)
- Breaking Bridgefy, again: Adopting libsignal is not enough (2022) (1)
- Matrix Multiplication over F2 in the M4RI library (2008) (0)
- Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices (2014) (0)
- On GGH 13 Without The Presence Of Ideals (2017) (0)
- Predicting BKZ Z-Shapes on q-ary Lattices (2022) (0)
- libInterMAC: Beyond Confidentiality and Integrity in Practice (2019) (0)
- Polly Cracker, revisited (2015) (0)
- NewHope Round 2 Cover Sheet (2019) (0)
- Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE (2023) (0)
- Multilinear Maps from Obfuscation (2020) (0)
- Caveat Implementor! Key Recovery Attacks on MEGA (2023) (0)
- Quantum Augmented Dual Attack (2022) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Martin Albrecht?
Martin Albrecht is affiliated with the following schools: