Matthias Ernst , Ellen Jochemsz , Alexander May , Benne de Weger
theory and application of cryptographic techniques 371 -386
Leif Both , Alexander May
IACR Cryptology ePrint Archive 2017 25 -46
Johannes Blömer , Alexander May
Advances in Cryptology - CRYPTO 2003 27 -43
Alexander May
The LLL Algorithm 315 -348
Mathias Herrmann , Alexander May
international conference on the theory and application of cryptology and information security 487 -504
Wilko Henecka , Alexander May , Alexander Meurer
international cryptology conference 351 -369
Gregor Leander , Alexander May
international conference on the theory and application of cryptology and information security 10625 161 -178
Mathias Herrmann , Alexander May
international conference on the theory and application of cryptology and information security 406 -424
Alexander Helm , Laura Kocksch , Alexander May , Estrid Sørensen
Datenschutz Und Datensicherheit - Dud 43 ( 11) 713 -718
Alexander May
Advances in Cryptology — CRYPTO 2002 242 -256
Alexander May , Maike Ritzenhofen
Public Key Cryptography – PKC 2008 37 -46
Johannes Blömer , Alexander May
selected areas in cryptography 325 -341
Jean-Sebastien Coron , Alexander May
Journal of Cryptology 20 ( 1) 39 -50
Johannes Buchmann , Alexander May , Ulrich Vollmer
Communications of The ACM 49 ( 9) 50 -55
Daniel Bleichenbacher , Alexander May
Public Key Cryptography - PKC 2006 1 -13
Mathias Herrmann , Alexander May
public key cryptography 53 -69
Alexander May
Information Technology 62 181 -187
Alexander May , Joseph H. Silverman
Lecture Notes in Computer Science 2146 110 -125
Ellen Jochemsz , Alexander May
Advances in Cryptology - CRYPTO 2007 395 -411
Andre Esser , Robert Kübler , Alexander May
Smpte Journal 486 -514