Practical, predictable lattice basis reduction D Micciancio, M Walter Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 137 | 2016 |
Gaussian sampling over the integers: Efficient, generic, constant-time D Micciancio, M Walter Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 133 | 2017 |
Fast lattice point enumeration with minimal overhead D Micciancio, M Walter Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete …, 2014 | 84 | 2014 |
Histograms of oriented gradients for 3d object retrieval M Scherer, M Walter, T Schreck Václav Skala-UNION Agency, 2010 | 50 | 2010 |
On the bit security of cryptographic primitives D Micciancio, M Walter Annual International Conference on the Theory and Applications of …, 2018 | 43 | 2018 |
Improved algebraic side-channel attack on AES MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann 2012 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2012 | 37 | 2012 |
Improved algebraic side-channel attack on AES MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann Journal of Cryptographic Engineering 3, 139-156, 2013 | 29 | 2013 |
SHREC'09 Track: Generic shape retrieval. A Godil, H Dutagaci, CB Akgül, A Axenopoulos, B Bustos, M Chaouch, ... 3DOR@ Eurographics, 61-68, 2009 | 27 | 2009 |
Improved discrete gaussian and subgaussian analysis for lattice cryptography N Genise, D Micciancio, C Peikert, M Walter IACR International Conference on Public-Key Cryptography, 623-651, 2020 | 21 | 2020 |
Improving 3D similarity search by enhancing and combining 3D descriptors B Bustos, T Schreck, M Walter, JM Barrios, M Schaefer, D Keim Multimedia Tools and Applications 58, 81-108, 2012 | 16 | 2012 |
Reversible Proofs of Sequential Work H Abusalah, C Kamath, K Klein, K Pietrzak, M Walter Annual International Conference on the Theory and Applications of …, 2019 | 15 | 2019 |
Lattice point enumeration on block reduced bases M Walter International Conference on Information Theoretic Security, 269-282, 2015 | 14 | 2015 |
Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol. J Alwen, M Capretto, M Cueto, C Kamath, K Klein, G Pascual-Perez, ... IACR Cryptol. ePrint Arch. 2019, 1489, 2019 | 13 | 2019 |
Sampling the Integers with Low Relative Error M Walter International Conference on Cryptology in Africa 11627, 157--180, 2019 | 13 | 2019 |
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC M Walter, S Bulygin, J Buchmann Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013 | 12 | 2013 |
SHREC 2009-Generic Shape Retrieval Contest C Akgul, A Axenopoulos, B Bustos, M Chaouch, P Daras, H Dutagaci, ... 30th international conference on EUROGRAPHICS 2009, workshop on 3D object …, 2009 | 12 | 2009 |
Study of the invariant coset attack on printcipher: more weak keys with practical key recovery S Bulygin, M Walter Cryptology ePrint Archive, 2012 | 11 | 2012 |
Graph-based combinations of fragment descriptors for improved 3D object retrieval T Schreck, M Scherer, M Walter, B Bustos, SM Yoon, A Kuijper Proceedings of the 3rd Multimedia Systems Conference, 23-28, 2012 | 7 | 2012 |
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures S Bulygin, M Walter, J Buchmann Designs, codes and cryptography 73, 997-1022, 2014 | 5 | 2014 |
Algebraic Methods in Analysing Lightweight Cryptographic Symmetric Primitives M Walter | 5 | 2012 |