Pre-Prints
Please find below a list of our pre-prints. For a list of peer-reviewed publications click here.
- Haitham S. Al-Sinani, Chris J. Mitchell: AI-Enhanced Ethical Hacking: A Linux-Focused Experiment. In CoRR 2024.
- Chris J. Mitchell, Peter R. Wild: Orientable and negative orientable sequences. In CoRR 2024.
- Gowri R. Chandran, Thomas Schneider, Maximilian Stillger, Christian Weinert: Concretely Efficient Private Set Union via Circuit-based PSI. In IACR Cryptol. ePrint Arch. 2024.
- Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert: On Algebraic Homomorphic Encryption and its Applications to Doubly-Efficient PIR. In IACR Cryptol. ePrint Arch. 2024.
- Hilal Asi, Fabian Boemer, Nicholas Genise, Muhammad Haris Mughees, Tabitha Ogilvie, Rehan Rishi, Guy N. Rothblum, Kunal Talwar, Karl Tarbe, Ruiyu Zhu, Marco Zuliani: Scalable Private Search with Wally. In CoRR 2024.
- Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, Radu Titiu: Designs for practical SHE schemes based on Ring-LWR. In IACR Cryptol. ePrint Arch. 2024.
- Martin R. Albrecht, Joe Rowell: Scaling Lattice Sieves across Multiple Machines. In IACR Cryptol. ePrint Arch. 2024.
- Jean-Philippe Bossuat, Rosario Cammarota, Jung Hee Cheon, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee, Bahattin Yildiz: Security Guidelines for Implementing Homomorphic Encryption. In IACR Cryptol. ePrint Arch. 2024.
- Chris J. Mitchell: Integrity-protecting block cipher modes - Untangling a tangled web. In CoRR 2024.
- Colin Putman, Keith M. Martin: Selective Delegation of Attributes in Mercurial Signature Credentials. In IACR Cryptol. ePrint Arch. 2023.
- Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert: Towards Practical Doubly-Efficient Private Information Retrieval. In IACR Cryptol. ePrint Arch. 2023.
- Sofía Celi, Shai Levin, Joe Rowell: CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness. In IACR Cryptol. ePrint Arch. 2023.
- Benjamin Bencina, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Miha Stopar, Charlotte Weitkämper: Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves. In IACR Cryptol. ePrint Arch. 2023.
- Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, Ngoc Khanh Nguyen: SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions. In IACR Cryptol. ePrint Arch. 2023.
- Amaury Pouly, Yixin Shen: Provable Dual Attacks on Learning with Errors. In IACR Cryptol. ePrint Arch. 2023.
- Michael Brand, Gaëtan Pradel: Practical Privacy-Preserving Machine Learning using Fully Homomorphic Encryption. In IACR Cryptol. ePrint Arch. 2023.
- Hiroki Okada, Rachel Player, Simon Pohmann: Homomorphic polynomial evaluation using Galois structure and applications to BFV bootstrapping. In IACR Cryptol. ePrint Arch. 2023.
- Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, Joe Rowell: DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More. In IACR Cryptol. ePrint Arch. 2023.
- Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs: Four Attacks and a Proof for Telegram. In IACR Cryptol. ePrint Arch. 2023.
- Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia: SoK: Delay-based Cryptography. In IACR Cryptol. ePrint Arch. 2023.
- Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia: Applications of Timed-release Encryption with Implicit Authentication. In IACR Cryptol. ePrint Arch. 2023.
- Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai: ScionFL: Efficient and Robust Secure Quantized Aggregation. In IACR Cryptol. ePrint Arch. 2023.
- Laura Hetz, Thomas Schneider, Christian Weinert: Scaling Mobile Private Contact Discovery to Billions of Users. In IACR Cryptol. ePrint Arch. 2023.
- Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren: Weak instances of class group action based cryptography via self-pairings. In IACR Cryptol. ePrint Arch. 2023.
- Tabitha Ogilvie: Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption. In IACR Cryptol. ePrint Arch. 2023.
- Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson: Caveat Implementor! Key Recovery Attacks on MEGA. In IACR Cryptol. ePrint Arch. 2023.
- Joël Alwen, Marta Mularczyk, Yiannis Tselekounis: Fork-Resilient Continuous Group Key Agreement. In IACR Cryptol. ePrint Arch. 2023.
- Anamaria Costache, Lea Nürnberger, Rachel Player: Optimizations and Trade-offs for HElib. In IACR Cryptol. ePrint Arch. 2023.
- Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame: HyFL: A Hybrid Approach For Private Federated Learning. In CoRR 2023.
- Martin Brain, Carlos Cid, Rachel Player, Wrenna Robson: Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation. In IACR Cryptol. ePrint Arch. 2023.
- Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia: On the Incoercibility of Digital Signatures. In IACR Cryptol. ePrint Arch. 2023.
- Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski: SCALLOP: scaling the CSI-FiSh. In IACR Cryptol. ePrint Arch. 2023.
- Kevin Carrier, Yixin Shen, Jean-Pierre Tillich: Faster Dual Lattice Attacks by Using Coding Theory. In IACR Cryptol. ePrint Arch. 2022.
- Marcel Armour, Elizabeth A. Quaglia: Subverting Deniability. In IACR Cryptol. ePrint Arch. 2022.
- Zoltán Ádám Mann, Christian Weinert, Daphnee Chabal, Joppe W. Bos: Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead. In IACR Cryptol. ePrint Arch. 2022.
- Xavier Bultel, Ashley Fraser, Elizabeth A. Quaglia: Improving the Efficiency of Report and Trace Ring Signatures. In IACR Cryptol. ePrint Arch. 2022.
- Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai: ScionFL: Secure Quantized Aggregation for Federated Learning. In CoRR 2022.
- Martin R. Albrecht, Valerio Cini, Russell W. F. Lai, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan: Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable. In IACR Cryptol. ePrint Arch. 2022.
- Gareth T. Davies, Jeroen Pijnenburg: PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords. In IACR Cryptol. ePrint Arch. 2022.
- Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider: Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations. In IACR Cryptol. ePrint Arch. 2022.
- Martin R. Albrecht, Yixin Shen: Quantum Augmented Dual Attack. In IACR Cryptol. ePrint Arch. 2022.
- Marcel Armour, Bertram Poettering: Algorithm Substitution Attacks against Receivers. In IACR Cryptol. ePrint Arch. 2022.
- Martin R. Albrecht, Yixin Shen: Quantum Augmented Dual Attack. In CoRR 2022.
- Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig: Failing to hash into supersingular isogeny graphs. In IACR Cryptol. ePrint Arch. 2022.
- Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig: Failing to hash into supersingular isogeny graphs. In CoRR 2022.
- Daniel Gardham, Mark Manulis: Revocable Hierarchical Attribute-based Signatures from Lattices. In IACR Cryptol. ePrint Arch. 2022.
- Martin R. Albrecht, Milos Prokop, Yixin Shen, Petros Wallden: Variational quantum solutions to the Shortest Vector Problem. In IACR Cryptol. ePrint Arch. 2022.
- Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, Rachel Player: On the precision loss in approximate homomorphic encryption. In IACR Cryptol. ePrint Arch. 2022.
- Nick Frymann, Daniel Gardham, Mark Manulis: Unlinkable Delegation of WebAuthn Credentials. In IACR Cryptol. ePrint Arch. 2022.
- Martin R. Albrecht, Milos Prokop, Yixin Shen, Petros Wallden: Variational quantum solutions to the Shortest Vector Problem. In CoRR 2022.
- Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan: A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs. In IACR Cryptol. ePrint Arch. 2021.
- Gaëtan Pradel, Chris J. Mitchell: Privacy-Preserving Biometric Matching Using Homomorphic Encryption. In CoRR 2021.
- Carlos Cid, John Petter Indrøy, Håvard Raddum: FASTA - a stream cipher for fast FHE evaluation. In IACR Cryptol. ePrint Arch. 2021.
- Marcel Armour, Carlos Cid: Partitioning Oracles from Weak Key Forgeries. In IACR Cryptol. ePrint Arch. 2021.
- Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia: A Practical Verifiable Delay Function and Delay Encryption Scheme. In IACR Cryptol. ePrint Arch. 2021.
- Ashley Fraser, Elizabeth A. Quaglia: Report and Trace Ring Signatures. In IACR Cryptol. ePrint Arch. 2021.
- Oleksandra Lapiha: Comparing Lattice Families for Bounded Distance Decoding near Minkowski's Bound. In IACR Cryptol. ePrint Arch. 2021.
- Martin R. Albrecht, Léo Ducas: Lattice Attacks on NTRU and LWE: A History of Refinements. In IACR Cryptol. ePrint Arch. 2021.
- Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso: Cryptanalysis of an oblivious PRF from supersingular isogenies. In IACR Cryptol. ePrint Arch. 2021.
- Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková: Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong. In CoRR 2021.
- Martin R. Albrecht, Russell W. F. Lai: Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices. In IACR Cryptol. ePrint Arch. 2021.
- Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková: Mesh Messaging in Large-scale Protests: Breaking Bridgefy. In IACR Cryptol. ePrint Arch. 2021.
- Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper: One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols. In IACR Cryptol. ePrint Arch. 2021.
- Boris Fouotsa Tako, Péter Kutas, Simon-Philipp Merz: On the Isogeny Problem with Torsion Point Information. In IACR Cryptol. ePrint Arch. 2021.
- Liqun Chen, Siaw-Lynn Ng: Securing emergent behaviour in swarm robotics. In CoRR 2021.
- Chris J. Mitchell: The (in)security of some recently proposed lightweight key distribution schemes. In CoRR 2021.
- Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias: E-cclesia: Universally Composable Self-Tallying Elections. In IACR Cryptol. ePrint Arch. 2020.
- Martin R. Albrecht, Nadia Heninger: On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem. In IACR Cryptol. ePrint Arch. 2020.
- Tabitha Ogilvie, Rachel Player, Joe Rowell: Improved privacy-preserving training using fixed-Hessian minimisation. In IACR Cryptol. ePrint Arch. 2020.
- Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper: On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol. In IACR Cryptol. ePrint Arch. 2020.
- Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz: Lattice-Based Proof-of-Work for Post-Quantum Blockchains. In IACR Cryptol. ePrint Arch. 2020.
- Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell: Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance. In IACR Cryptol. ePrint Arch. 2020.
- Sean Murphy, Maura B. Paterson, Christine Swart: Boolean Ring Cryptographic Equation Solving. In IACR Cryptol. ePrint Arch. 2020.
- Jianwei Li, Phong Q. Nguyen: A Complete Analysis of the BKZ Lattice Reduction Algorithm. In IACR Cryptol. ePrint Arch. 2020.
- Eamonn W. Postlethwaite, Fernando Virdia: On the Success Probability of Solving Unique SVP via BKZ. In IACR Cryptol. ePrint Arch. 2020.
- Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit: On Index Calculus Algorithms for Subfield Curves. In IACR Cryptol. ePrint Arch. 2020.
- Ashley Fraser, Elizabeth A. Quaglia: Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting. In IACR Cryptol. ePrint Arch. 2020.
- Martin R. Albrecht, Rikke Bjerg Jensen: The Vacuity of the Open Source Security Testing Methodology Manual. In CoRR 2020.
- Jodie Knapp, Elizabeth A. Quaglia: Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles. In IACR Cryptol. ePrint Arch. 2020.
- Chris J. Mitchell: An insecure noninteractive group key establishment scheme. In CoRR 2020.
- Jeroen Pijnenburg, Bertram Poettering: Efficiency Improvements for Encrypt-to-Self. In CoRR 2020.
- Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim: Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings. In IACR Cryptol. ePrint Arch. 2020.
- Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso: Anonymity and Rewards in Peer Rating Systems. In IACR Cryptol. ePrint Arch. 2020.
- Jeroen Pijnenburg, Bertram Poettering: Encrypt-to-self: Securely Outsourcing Storage. In IACR Cryptol. ePrint Arch. 2020.
- Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen: Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)). In IACR Cryptol. ePrint Arch. 2020.
- Jeroen Pijnenburg, Bertram Poettering: Key Assignment Schemes with Authenticated Encryption, revisited. In IACR Cryptol. ePrint Arch. 2020.
- Carlos Cid, Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger: Higher-Order Differentials of Ciphers with Low-Degree S-Boxes. In IACR Cryptol. ePrint Arch. 2020.
- Chris J. Mitchell: How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure. In CoRR 2020.
- Chris J. Mitchell: Provably insecure group authentication: Not all security proofs are what they claim to be. In CoRR 2020.
- Haibat Khan, Benjamin Dowling, Keith M. Martin: Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6. In IACR Cryptol. ePrint Arch. 2020.
- Haibat Khan, Keith M. Martin: A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future. In IACR Cryptol. ePrint Arch. 2020.
- Chris J. Mitchell: Who Needs Trust for 5G?. In CoRR 2020.
- Chris J. Mitchell: How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes. In CoRR 2020.
- Chris J. Mitchell: Yet another insecure group key distribution scheme using secret sharing. In CoRR 2020.
- Wanpeng Li, Chris J. Mitchell, Thomas M. Chen: OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect. In CoRR 2019.
- Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens: The General Sieve Kernel and New Records in Lattice Reduction. In IACR Cryptol. ePrint Arch. 2019.
- Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson: libInterMAC: Beyond Confidentiality and Integrity in Practice. In IACR Cryptol. ePrint Arch. 2019.
- Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger: Feistel Structures for MPC, and More. In IACR Cryptol. ePrint Arch. 2019.
- Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger: Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. In IACR Cryptol. ePrint Arch. 2019.
- Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan: Homomorphic Encryption Standard. In IACR Cryptol. ePrint Arch. 2019.
- Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer: Exploring Trade-offs in Batch Bounded Distance Decoding. In IACR Cryptol. ePrint Arch. 2019.
- Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck: Quantum speedups for lattice sieves are tenuous at best. In IACR Cryptol. ePrint Arch. 2019.
- Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart: Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices. In IACR Cryptol. ePrint Arch. 2019.
- Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid: Cryptanalysis of the Multivariate Encryption Scheme EFLASH. In IACR Cryptol. ePrint Arch. 2019.
- Sean Murphy, Rachel Player: A Central Limit Framework for Ring-LWE Decryption. In IACR Cryptol. ePrint Arch. 2019.
- Sean Murphy, Rachel Player: Discretisation and Product Distributions in Ring-LWE. In IACR Cryptol. ePrint Arch. 2019.
- Sauvik Bhattacharya, Óscar García-Morchón, Rachel Player, Ludo Tolhuizen: Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution. In IACR Cryptol. ePrint Arch. 2019.
- Anamaria Costache, Kim Laine, Rachel Player: Homomorphic noise growth in practice: comparing BGV and FV. In IACR Cryptol. ePrint Arch. 2019.
- Benjamin R. Curtis, Rachel Player: On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption. In IACR Cryptol. ePrint Arch. 2019.
- Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia: Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem. In IACR Cryptol. ePrint Arch. 2019.
- Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia: Implementing Grover oracles for quantum key search on AES and LowMC. In IACR Cryptol. ePrint Arch. 2019.
- Jan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia: (One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes. In IACR Cryptol. ePrint Arch. 2019.
- Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik: Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving. In IACR Cryptol. ePrint Arch. 2019.
- Simon-Philipp Merz, Romy Minko, Christophe Petit: Another look at some isogeny hardness assumptions. In IACR Cryptol. ePrint Arch. 2019.
- Marcel Armour, Bertram Poettering: Subverting Decryption in AEAD. In IACR Cryptol. ePrint Arch. 2019.
- Marcel Armour, Bertram Poettering: Substitution Attacks against Message Authentication. In IACR Cryptol. ePrint Arch. 2019.
- Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth: A critique of game-based definitions of receipt-freeness for voting. In IACR Cryptol. ePrint Arch. 2019.
- Lydia Garms, Elizabeth A. Quaglia: A New Approach to Modelling Centralised Reputation Systems. In IACR Cryptol. ePrint Arch. 2019.
- Chris J. Mitchell: The impact of quantum computing on real-world security: A 5G case study. In CoRR 2019.
- Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia: Implementing Grover oracles for quantum key search on AES and LowMC. In CoRR 2019.
- Divesh Aggarwal, Jianwei Li, Phong Q. Nguyen, Noah Stephens-Davidowitz: Slide Reduction, Revisited - Filling the Gaps in SVP Approximation. In CoRR 2019.
- Chris J. Mitchell: The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure. In CoRR 2019.
- Maxime Meyer, Elizabeth A. Quaglia, Ben Smyth: An Overview of GSMA's M2M Remote Provisioning Specification. In CoRR 2019.
- Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell: Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking. In CoRR 2019.
- Wanpeng Li, Chris J. Mitchell, Thomas M. Chen: Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect. In CoRR 2018.
- Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer: Estimate all the {LWE, NTRU} schemes!. In IACR Cryptol. ePrint Arch. 2018.
- Martin R. Albrecht, Christian Hanser, Andrea Höller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner: Learning with Errors on RSA Co-Processors. In IACR Cryptol. ePrint Arch. 2018.
- Martin R. Albrecht, Amit Deo, Kenneth G. Paterson: Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. In IACR Cryptol. ePrint Arch. 2018.
- Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky: Prime and Prejudice: Primality Testing Under Adversarial Conditions. In IACR Cryptol. ePrint Arch. 2018.
- Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song: Boomerang Connectivity Table: A New Cryptanalysis Tool. In IACR Cryptol. ePrint Arch. 2018.
- Haibat Khan, Benjamin Dowling, Keith M. Martin: Identity Confidentiality in 5G Mobile Telephony Systems. In IACR Cryptol. ePrint Arch. 2018.
- Simon-Philipp Merz, Christophe Petit: On the (non) obfuscating power of Garside Normal Forms. In IACR Cryptol. ePrint Arch. 2018.
- Elizabeth A. Quaglia, Ben Smyth: Authentication with weaker trust assumptions for voting systems. In IACR Cryptol. ePrint Arch. 2018.
- Siaw-Lynn Ng, Maura B. Paterson: Functional repair codes: a view from projective geometry. In CoRR 2018.
- Chatdanai Dorkson, Siaw-Lynn Ng: Multi-Message Private Information Retrieval using Product-Matrix MSR and MBR Codes. In CoRR 2018.
- Fatma Al Maqbali, Chris J. Mitchell: Web password recovery - a necessary evil?. In CoRR 2018.
- Chris J. Mitchell: Security issues in a group key establishment protocol. In CoRR 2018.
- Chris J. Mitchell: The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure. In CoRR 2018.
- Chatdanai Dorkson, Siaw-Lynn Ng: Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes. In CoRR 2018.
- Martin R. Albrecht: On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL. In IACR Cryptol. ePrint Arch. 2017.
- Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart: Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. In IACR Cryptol. ePrint Arch. 2017.
- Martin R. Albrecht, Amit Deo: Large Modulus Ring-LWE >= Module-LWE. In IACR Cryptol. ePrint Arch. 2017.
- Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer: Revisiting the Expected Cost of Solving uSVP and Applications to LWE. In IACR Cryptol. ePrint Arch. 2017.
- Martin R. Albrecht, Alex Davidson, Enrique Larraia, Alice Pellet-Mary: Notes On GGH13 Without The Presence Of Ideals. In IACR Cryptol. ePrint Arch. 2017.
- Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid: Cloud Storage File Recoverability. In IACR Cryptol. ePrint Arch. 2017.
- Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song: Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers. In IACR Cryptol. ePrint Arch. 2017.
- James Alderman, Keith M. Martin, Sarah Louise Renwick: Multi-level Access in Searchable Symmetric Encryption. In IACR Cryptol. ePrint Arch. 2017.
- Sean Murphy, Rachel Player: Noise Distributions in Homomorphic Ring-LWE. In IACR Cryptol. ePrint Arch. 2017.
- Hao Chen, Kim Laine, Rachel Player: Simple Encrypted Arithmetic Library - SEAL v2.1. In IACR Cryptol. ePrint Arch. 2017.
- Hao Chen, Kim Laine, Rachel Player, Yuhou Xia: High-Precision Arithmetic in Homomorphic Encryption. In IACR Cryptol. ePrint Arch. 2017.
- Fatma Al Maqbali, Chris J. Mitchell: AutoPass: An Automatic Password Generator. In CoRR 2017.
- Elizabeth A. Quaglia, Ben Smyth: A short introduction to secrecy and verifiability for elections. In CoRR 2017.
- Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer: On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. In IACR Cryptol. ePrint Arch. 2016.
- Martin R. Albrecht, Shi Bai, Léo Ducas: A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes. In IACR Cryptol. ePrint Arch. 2016.
- Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen: MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In IACR Cryptol. ePrint Arch. 2016.
- Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner: Ciphers for MPC and FHE. In IACR Cryptol. ePrint Arch. 2016.
- Alex Davidson, Carlos Cid: Computing Private Set Operations with Linear Complexities. In IACR Cryptol. ePrint Arch. 2016.
- Liqun Chen, Thalia M. Laing, Keith M. Martin: Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme. In IACR Cryptol. ePrint Arch. 2016.
- Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe: Analysing and Exploiting the Mantin Biases in RC4. In IACR Cryptol. ePrint Arch. 2016.
- Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy: Algorithms for the Approximate Common Divisor Problem. In IACR Cryptol. ePrint Arch. 2016.
- Chris J. Mitchell: On the security of 2-key triple DES. In CoRR 2016.
- Mohammed Shafiul Alam Khan, Chris J. Mitchell: Retrofitting mutual authentication to GSM using RAND hijacking. In CoRR 2016.
- Fatma Al Maqbali, Chris J. Mitchell: Password Generators: Old Ideas and New. In CoRR 2016.
- Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng: Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. In CoRR 2015.
- Martin R. Albrecht, Rachel Player, Sam Scott: On the concrete hardness of Learning with Errors. In IACR Cryptol. ePrint Arch. 2015.
- Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson: Multilinear Maps from Obfuscation. In IACR Cryptol. ePrint Arch. 2015.
- Martin R. Albrecht, Kenneth G. Paterson: Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS. In IACR Cryptol. ePrint Arch. 2015.
- Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid: Multi-Client Non-Interactive Verifiable Computation. In IACR Cryptol. ePrint Arch. 2015.
- James Alderman, Christian Janson, Carlos Cid, Jason Crampton: Hybrid Publicly Verifiable Computation. In IACR Cryptol. ePrint Arch. 2015.
- Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Localised Multisecret Sharing. In IACR Cryptol. ePrint Arch. 2015.
- James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick: Extended Functionality in Verifiable Searchable Encryption. In IACR Cryptol. ePrint Arch. 2015.
- Elizabeth A. Quaglia, Ben Smyth: Constructing secret, verifiable auction schemes from election schemes. In IACR Cryptol. ePrint Arch. 2015.
- Siaw-Lynn Ng, Maura B. Paterson: Disjoint difference families and their applications. In CoRR 2015.
- M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa: Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report). In CoRR 2015.
- Mwawi M. Nyirenda, Siaw-Lynn Ng, Keith M. Martin: A Combinatorial Model of Interference in Frequency Hopping Schemes. In CoRR 2015.
- Mohammed Shafiul Alam Khan, Chris J. Mitchell: Improving Air Interface User Privacy in Mobile Telephony. In CoRR 2015.
- Wanpeng Li, Chris J. Mitchell: Analysing the Security of Google's implementation of OpenID Connect. In CoRR 2015.
- Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: Lazy Modulus Switching for the BKW Algorithm on LWE. In IACR Cryptol. ePrint Arch. 2014.
- Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin: Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version. In IACR Cryptol. ePrint Arch. 2014.
- Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois: Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices. In IACR Cryptol. ePrint Arch. 2014.
- Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: Algebraic Algorithms for LWE Problems. In IACR Cryptol. ePrint Arch. 2014.
- Viet Pham, M. H. R. Khouzani, Carlos Cid: Optimal Contracts for Outsourced Computation. In IACR Cryptol. ePrint Arch. 2014.
- James Alderman, Carlos Cid, Jason Crampton, Christian Janson: Revocation in Publicly Verifiable Outsourced Computation. In IACR Cryptol. ePrint Arch. 2014.
- James Alderman, Carlos Cid, Jason Crampton, Christian Janson: Access Control in Publicly Verifiable Outsourced Computation. In IACR Cryptol. ePrint Arch. 2014.
- Michelle Kendall, Keith M. Martin: Graph-theoretic design and analysis of key predistribution schemes. In IACR Cryptol. ePrint Arch. 2014.
- James Alderman, Carlos Cid, Jason Crampton, Christian Janson: Publicly Verifiable Outsourced Computation with a Key Distribution Centre. In CoRR 2014.
- Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. In IACR Cryptol. ePrint Arch. 2013.
- Martin R. Albrecht, Robert Fitzpatrick, Florian Göpfert: On the Efficacy of Solving LWE by Reduction to Unique-SVP. In IACR Cryptol. ePrint Arch. 2013.
- Gordon Procter, Carlos Cid: On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes. In IACR Cryptol. ePrint Arch. 2013.
- Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Gottfried Herold, Ludovic Perret: Polly Cracker, Revisited. In Electron. Colloquium Comput. Complex. 2012.
- Martin R. Albrecht, Gregor Leander: An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. In IACR Cryptol. ePrint Arch. 2012.
- Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret: On the Complexity of the BKW Algorithm on LWE. In IACR Cryptol. ePrint Arch. 2012.
- Viet Pham, Carlos Cid: Are We Compromised? Modelling Security Assessment Games. In IACR Cryptol. ePrint Arch. 2012.
- Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson: Broadcast-enhanced Key Predistribution Schemes. In IACR Cryptol. ePrint Arch. 2012.
- Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia: Robust Encryption, Revisited. In IACR Cryptol. ePrint Arch. 2012.
- Martin R. Albrecht, Carlos Cid: Cold Boot Key Recovery by Solving Polynomial Systems with Noise. In IACR Cryptol. ePrint Arch. 2011.
- Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret: On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms. In IACR Cryptol. ePrint Arch. 2011.
- Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson: On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. In IACR Cryptol. ePrint Arch. 2011.
- Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret: Polly Cracker, Revisited. In IACR Cryptol. ePrint Arch. 2011.
- Simon R. Blackburn, Carlos Cid, Ciaran Mullan: Cryptanalysis of three matrix-based key establishment protocols. In IACR Cryptol. ePrint Arch. 2011.
- Michelle Kendall, Keith M. Martin: On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks. In IACR Cryptol. ePrint Arch. 2011.
- Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia: Anonymous Broadcast Encryption. In IACR Cryptol. ePrint Arch. 2011.
- Martin R. Albrecht, Gregory V. Bard, Clément Pernet: Efficient Dense Gaussian Elimination over the Finite Field with Two Elements. In CoRR 2011.
- Martin R. Albrecht: The M4RIE library for dense linear algebra over small fields with even characteristic. In CoRR 2011.
- Simon R. Blackburn, Carlos Cid, Ciaran Mullan: Cryptanalysis of three matrix-based key establishment protocols. In CoRR 2011.
- Martin R. Albrecht, Kenneth G. Paterson: Breaking An Identity-Based Encryption Scheme based on DHIES. In IACR Cryptol. ePrint Arch. 2010.
- Kenneth G. Paterson, Elizabeth A. Quaglia: Time-Specific Encryption. In IACR Cryptol. ePrint Arch. 2010.
- Martin R. Albrecht, Clément Pernet: Efficient Decomposition of Dense Matrices over GF(2). In CoRR 2010.
- Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz: Attacking Cryptographic Schemes Based on "Perturbation Polynomials". In IACR Cryptol. ePrint Arch. 2009.
- Simon R. Blackburn, Carlos Cid, Ciaran Mullan: Cryptanalysis of the MST. In IACR Cryptol. ePrint Arch. 2009.
- Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson: Key Predistribution Techniques for Grid-Based Wireless Sensor Networks. In IACR Cryptol. ePrint Arch. 2009.
- Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures. In IACR Cryptol. ePrint Arch. 2009.
- Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng: Traceability Codes. In IACR Cryptol. ePrint Arch. 2009.
- Keith M. Martin: On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks. In CoRR 2009.
- Martin R. Albrecht, Carlos Cid: Algebraic Techniques in Differential Cryptanalysis. In IACR Cryptol. ePrint Arch. 2008.
- Keith M. Martin, Maura B. Paterson, Douglas R. Stinson: Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes. In IACR Cryptol. ePrint Arch. 2008.
- Liqun Chen, Chris J. Mitchell: Parsing ambiguities in authentication and key establishment protocols. In IACR Cryptol. ePrint Arch. 2008.
- Martin R. Albrecht, Gregory V. Bard, William Hart: Efficient Multiplication of Dense Matrices over GF(2). In CoRR 2008.
- Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng: Prolific Codes with the Identifiable Parent Property. In IACR Cryptol. ePrint Arch. 2007.
- Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum: An Analysis of the Hermes8 Stream Ciphers. In IACR Cryptol. ePrint Arch. 2006.
- Qiang Tang, Chris J. Mitchell: Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme. In IACR Cryptol. ePrint Arch. 2005.
- Qiang Tang, Chris J. Mitchell: Cryptanalysis of two identification schemes based on an ID-based cryptosystem. In IACR Cryptol. ePrint Arch. 2005.
- Qiang Tang, Chris J. Mitchell: Enhanced password-based key establishment protocol. In IACR Cryptol. ePrint Arch. 2005.
- Qiang Tang, Chris J. Mitchell: On the security of some password-based key agreement schemes. In IACR Cryptol. ePrint Arch. 2005.
- Qiang Tang, Chris J. Mitchell: Weaknesses in a leakage-resilient authenticated key transport protocol. In IACR Cryptol. ePrint Arch. 2005.
- Qiang Tang, Chris J. Mitchell: Security properties of two provably secure conference key agreement protocols. In IACR Cryptol. ePrint Arch. 2005.
- Qiang Tang, Chris J. Mitchell: Efficient Compilers for Authenticated Group Key Exchange. In IACR Cryptol. ePrint Arch. 2005.
- Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin: Updating the Parameters of a Threshold Scheme by Minimal Broadcast. In IACR Cryptol. ePrint Arch. 2004.
- Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe: Optimal Updating of Ideal Threshold Schemes. In IACR Cryptol. ePrint Arch. 2004.
- Qiang Tang, Chris J. Mitchell: Rethinking the security of some authenticated group key agreement schemes. In IACR Cryptol. ePrint Arch. 2004.
- Simon R. Blackburn, Carlos Cid, Steven D. Galbraith: Cryptanalysis of a Cryptosystem based on Drinfeld modules. In IACR Cryptol. ePrint Arch. 2003.
- Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. In IACR Cryptol. ePrint Arch. 2003.