Survey
Conference Publications
- Leif Both, Alexander May
"Decoding Linear Codes with High Error Rate and its Impact for LPN Security", In International Conference on Post-Quantum Cryptography (PQCrypto 2018), Lecture Notes in Computer Science, 2018. - Gregor Leander, Alexander May
"Grover Meets Simon – Quantumly Attacking the FX-construction" , In Advances in Cryptology (Asiacrypt 2017), Lecture Notes in Computer Science, Springer-Verlag, 2017.
- Leif Both, Alexander May
"Optimizing BJMM with Nearest Neighbors: Full Decoding in 2^{2n/21} and McEliece Security", In International Workshop on Coding and Cryptography (WCC 2017), 2017.
- Andre Esser, Robert Kübler, Alexander May
"LPN Decoded" , In Advances in Cryptology (Crypto 2017), Lecture Notes in Computer Science, Springer-Verlag, 2017.
- Gottfried Herold, Alexander May
"LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWE" , In International Conference on Practice and Theory of Public-Key Cryptography (PKC 2017), Lecture Notes in Computer Science, Springer-Verlag, 2017.
- Elena Kirshanova, Alexander May, Friedrich Wiemer
"Parallel Implementation of BDD enumeration for LWE" , In International Conference on Applied Cryptography and Network Security (ACNS 2016), Lecture Notes in Computer Science, Springer-Verlag, 2016.
- Alexander May, Ilya Ozerov
"On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes" , In Advances in Cryptology (Eurocrypt 2015), Lecture Notes in Computer Science, Springer-Verlag, 2015.
- Alexander May, Ilya Ozerov
"A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups" , In Selected Areas in Cryptography (SAC 2014), Lecture Notes in Computer Science, Springer-Verlag, 2014.
- Saqib A. Kakvi, Eike Kiltz, Alexander May
"Certifying RSA" , In Advances in Cryptology (Asiacrypt 2012), Lecture Notes in Computer Science Volume 7658, 404-414, Springer-Verlag, 2012.
- Anja Becker, Antoine Joux, Alexander May, Alexander Meurer
"Decoding Random Binary Linear Codes in 2^(n/20): How 1+1=0 Improves Information Set Decoding" , In Advances in Cryptology (Eurocrypt 2012), Lecture Notes in Computer Science, Springer-Verlag, 2012.
- Alexander May, Alexander Meurer, Enrico Thomae
"Decoding Random Linear Codes in O(2^{0.054n})" , In Advances in Cryptology (Asiacrypt 2011), Lecture Notes in Computer Science, Springer-Verlag, 2011.
- Jake Loftus, Alexander May, Nigel P. Smart, Frederik Vercauteren
"On CCA-Secure Somewhat Homomorphic Encryption" , In Selected Areas in Cryptography (SAC 2011), Lecture Notes in Computer Science, Springer-Verlag, 2011.
- Wilko Henecka, Alexander May, Alexander Meurer
"Correcting Errors in RSA Private Keys" In Advances in Cryptology (Crypto 2010), Lecture Notes in Computer Science, Springer-Verlag, 2010.
- Mathias Herrmann, Alexander May
"Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA"In Practice and Theory in Public Key Cryptography (PKC 2010), Lecture
Notes in Computer Science, Springer-Verlag, 2010.
- Mathias Herrmann, Alexander May
"Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?" In Advances in Cryptology (Asiacrypt 2009), Lecture Notes in Computer Science, Springer-Verlag, 2009.
- Alexander May, Maike Ritzenhofen
"Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint" In Practice and Theory in Public Key Cryptography (PKC 2009), Lecture Notes in Computer Science, Springer-Verlag, 2009.
- Mathias Herrmann, Alexander May
"Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits" In Advances in Cryptology (Asiacrypt 2008), Lecture Notes in Computer Science, Springer-Verlag, 2008.
- Alexander May, Maike Ritzenhofen
"Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?"
In Practice and Theory in Public Key Cryptography (PKC 2008), Lecture Notes in Computer Science Volume 4939, pages 37-46, Springer-Verlag, 2008.
- Ellen Jochemz, Alexander May
"A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N^0.073" In Advances in Cryptology (Crypto 2007), Lecture Notes in Computer Science, Springer-Verlag, 2007.
- Ellen Jochemz, Alexander May
"A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants"
In Advances in Cryptology (Asiacrypt 2006), Lecture Notes in Computer Science, Springer-Verlag, 2006.
- Daniel Bleichenbacher, Alexander May
"New Attacks on RSA with Small Secret CRT-Exponents" In Practice and Theory in Public Key Cryptography (PKC 2006), Lecture
Notes in Computer Science, Springer-Verlag, 2006.
- Johannes Blömer, Alexander May
"A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers" In Advances in Cryptology (Eurocrypt 2005), Lecture Notes in Computer Science Volume 3494, pages 251-267, Springer-Verlag, 2005.
- Matthias Ernst, Ellen Jochemsz, Alexander May and Benne de Weger
"Partial Key Exposure Attacks on RSA up to Full Size Exponents"In Advances in Cryptology (Eurocrypt 2005), Lecture Notes in Computer Science Volume 3494, pages 371-386, Springer-Verlag, 2005.
- Alexander May
"Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring"In Advances in Cryptology (Crypto 2004), Lecture Notes in Computer Science Volume 3152, pages 213-219, Springer Verlag, 2004.
- Alexander May
"Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^rq"In Practice and Theory in Public Key Cryptography (PKC 2004), Lecture Notes in Computer Science Volume 2947, pages 218-230, Springer-Verlag,
2004.
- Johannes Blömer, Alexander May
"A Generalized Wiener Attack on RSA"
In Practice and Theory in Public Key Cryptography (PKC 2004), Lecture Notes in Computer Science Volume 2947, pages 1-13, Springer-Verlag, 2004.
- Johannes Blömer, Alexander May
"New Partial Key Exposure Attacks on RSA" In Advances in Cryptology (Crypto 2003), Lecture Notes in Computer Science Volume 2729, pages 27-43, Springer Verlag, 2003.
- Alexander May
"Cryptanalysis of Unbalanced RSA with Small CRT-Exponent", In Advances in Cryptology (Crypto 2002), Lecture Notes in Computer Science Volume 2442, pages 242-256, Springer Verlag, 2002.
- Johannes Blömer, Alexander May
"Key Revocation with Interval Cover Families" In Selected Areas in Cryptography (SAC 2001), Lecture Notes in Computer
Science Volume 2259, pages 325-341, Springer-Verlag, 2001.
- Alexander May, Joseph H. Silverman
"Dimension Reduction Methods for Convolution Modular Lattices"
In Cryptography and Lattice Conference (CaLC 2001), Lecture Notes in
Computer Science Volume 2146, pages 110-125, Springer-Verlag, 2001.
- Johannes Blömer, Alexander May
"Low Secret Exponent RSA Revisited"
In Cryptography and Lattice Conference (CaLC 2001), Lecture Notes in Computer Science Volume 2146, pages 4-19, Springer-Verlag, 2001.
- Alexander May
"Cryptanalysis of NTRU-107" (Note: Preprint).
Journal Publications
- Leif Both, Alexander May
"The Approximate k-List Problem" , In Transactions on Symmetric Cryptology (TOSC 2017), DOI: http://dx.doi.org/10.13154/tosc.v2017.i1.380-397, 2017. - Gottfried Herold, Elena Kirshanova, Alexander May
"On the Asymptotic Complexity of Solving LWE" , In International Journal of Design, Codes and Cryptography, Springer-Verlag, 2017. - Jean-Sébastien Coron, Alexander May
"Deterministic Polynomial Time Equivalent of Computing the RSA Secret Key and Factoring", Journal of Cryptology, 2006
- Johannes Buchmann, Alexander May, Ulrich Vollmer
"Perspectives for Cryptographic Long-Term Security", Communications of the ACM, Vol. 94(9), 2006
- Johannes Buchmann, Erik Dahmen, Alexander May, Ulrich Vollmer
"Krypto 2020", KES - The Information Security Journal, Nr 5, 2006
PhD Thesis
Diploma Thesis