Partial key exposure attacks on RSA up to full size exponents

Matthias Ernst , Ellen Jochemsz , Alexander May , Benne de Weger
theory and application of cryptographic techniques 371 -386

98
2005
Decoding Linear Codes with High Error Rate and Its Impact for LPN Security

Leif Both , Alexander May
IACR Cryptology ePrint Archive 2017 25 -46

14
2018
New Partial Key Exposure Attacks on RSA

Johannes Blömer , Alexander May
Advances in Cryptology - CRYPTO 2003 27 -43

114
2003
143
2009
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?

Mathias Herrmann , Alexander May
international conference on the theory and application of cryptology and information security 487 -504

38
2009
Correcting errors in RSA private keys

Wilko Henecka , Alexander May , Alexander Meurer
international cryptology conference 351 -369

38
2010
Grover Meets Simon – Quantumly Attacking the FX-construction

Gregor Leander , Alexander May
international conference on the theory and application of cryptology and information security 10625 161 -178

34
2017
Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits

Mathias Herrmann , Alexander May
international conference on the theory and application of cryptology and information security 406 -424

105
2008
Die Entwicklung und Umsetzung von IT-Sicherheitsstandards als sozialer Aushandlungsprozess

Alexander Helm , Laura Kocksch , Alexander May , Estrid Sørensen
Datenschutz Und Datensicherheit - Dud 43 ( 11) 713 -718

2019
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent

Alexander May
Advances in Cryptology — CRYPTO 2002 242 -256

44
2002
Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?

Alexander May , Maike Ritzenhofen
Public Key Cryptography – PKC 2008 37 -46

8
2008
Key Revocation with Interval Cover Families

Johannes Blömer , Alexander May
selected areas in cryptography 325 -341

3
2001
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring

Jean-Sebastien Coron , Alexander May
Journal of Cryptology 20 ( 1) 39 -50

62
2007
Perspectives for cryptographic long-term security

Johannes Buchmann , Alexander May , Ulrich Vollmer
Communications of The ACM 49 ( 9) 50 -55

43
2006
New Attacks on RSA with Small Secret CRT-Exponents

Daniel Bleichenbacher , Alexander May
Public Key Cryptography - PKC 2006 1 -13

57
2006
Maximizing small root bounds by linearization and applications to small secret exponent RSA

Mathias Herrmann , Alexander May
public key cryptography 53 -69

82
2010
Solving subset sum with small space – Handling cryptanalytic Big Data

Alexander May
Information Technology 62 181 -187

2020
Dimension Reduction Methods for Convolution Modular Lattices

Alexander May , Joseph H. Silverman
Lecture Notes in Computer Science 2146 110 -125

62
2001
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073

Ellen Jochemsz , Alexander May
Advances in Cryptology - CRYPTO 2007 395 -411

59
2007
LPN decoded

Andre Esser , Robert Kübler , Alexander May
Smpte Journal 486 -514

55
2017