Alexander Horst

Results: 17



#Item
1

Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY

Add to Reading List

Source URL: www5.rz.rub.de

Language: English - Date: 2011-12-05 07:34:34
    2

    LPN Decoded Andre Esser, Robert K¨ ubler, and Alexander May Horst G¨ ortz Institute for IT Security Ruhr University Bochum, Germany

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2017-06-14 05:27:30
      3Cryptography / Permutations / Combinatorics / Trapdoor function / NC / RSA / Optimal asymmetric encryption padding / Permutation / Parity of a permutation / Factorial / Integer factorization

      Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

      Add to Reading List

      Source URL: www.cits.rub.de

      Language: English - Date: 2014-11-18 10:03:56
      4Abstract algebra / Algebra / Mathematics / Group theory / Discrete logarithm / Index calculus algorithm / PohligHellman algorithm / Baby-step giant-step / Limit of a function

      A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

      Add to Reading List

      Source URL: www.cits.rub.de

      Language: English - Date: 2014-11-18 10:03:56
      5Cryptography / Integer factorization algorithms / Computational hardness assumptions / E-commerce / RSA / Quadratic sieve / Lattice / Integer factorization

      Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger

      Add to Reading List

      Source URL: www.cits.rub.de

      Language: English - Date: 2015-08-28 10:30:32
      6Cryptography / Post-quantum cryptography / Learning with errors / Machine learning / Lattice / Ideal lattice cryptography

      Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics

      Add to Reading List

      Source URL: www.cits.rub.de

      Language: English - Date: 2016-06-24 05:04:33
      7Coding theory / Error detection and correction / Numerical analysis / Finite fields / Search algorithms / Linear code / Nearest neighbor search / Algorithm / Linear algebra / Hamming distance / List decoding / Decoding methods

      On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

      Add to Reading List

      Source URL: www.cits.rub.de

      Language: English - Date: 2015-02-05 05:37:41
      8

      Horst Görtz Institute for IT-Security Assessment of Hiding the Higher-Order --what are the achievements versus overheads?-Amir Moradi, Alexander Wild September 16, 2015

      Add to Reading List

      Source URL: www.cryptoexperts.com

      Language: English - Date: 2015-11-13 04:48:41
        9

        Correcting Errors in RSA Private Keys Wilko Henecka, Alexander May? , Alexander Meurer?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany Faculty of Mathematics

        Add to Reading List

        Source URL: www.cits.ruhr-uni-bochum.de

        Language: English - Date: 2015-08-28 18:54:35
          UPDATE