Follow
Michael Walter
Michael Walter
Verified email at ist.ac.at - Homepage
Title
Cited by
Cited by
Year
Practical, predictable lattice basis reduction
D Micciancio, M Walter
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
1372016
Gaussian sampling over the integers: Efficient, generic, constant-time
D Micciancio, M Walter
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
1332017
Fast lattice point enumeration with minimal overhead
D Micciancio, M Walter
Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete …, 2014
842014
Histograms of oriented gradients for 3d object retrieval
M Scherer, M Walter, T Schreck
Václav Skala-UNION Agency, 2010
502010
On the bit security of cryptographic primitives
D Micciancio, M Walter
Annual International Conference on the Theory and Applications of …, 2018
432018
Improved algebraic side-channel attack on AES
MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann
2012 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2012
372012
Improved algebraic side-channel attack on AES
MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann
Journal of Cryptographic Engineering 3, 139-156, 2013
292013
SHREC'09 Track: Generic shape retrieval.
A Godil, H Dutagaci, CB Akgül, A Axenopoulos, B Bustos, M Chaouch, ...
3DOR@ Eurographics, 61-68, 2009
272009
Improved discrete gaussian and subgaussian analysis for lattice cryptography
N Genise, D Micciancio, C Peikert, M Walter
IACR International Conference on Public-Key Cryptography, 623-651, 2020
212020
Improving 3D similarity search by enhancing and combining 3D descriptors
B Bustos, T Schreck, M Walter, JM Barrios, M Schaefer, D Keim
Multimedia Tools and Applications 58, 81-108, 2012
162012
Reversible Proofs of Sequential Work
H Abusalah, C Kamath, K Klein, K Pietrzak, M Walter
Annual International Conference on the Theory and Applications of …, 2019
152019
Lattice point enumeration on block reduced bases
M Walter
International Conference on Information Theoretic Security, 269-282, 2015
142015
Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol.
J Alwen, M Capretto, M Cueto, C Kamath, K Klein, G Pascual-Perez, ...
IACR Cryptol. ePrint Arch. 2019, 1489, 2019
132019
Sampling the Integers with Low Relative Error
M Walter
International Conference on Cryptology in Africa 11627, 157--180, 2019
132019
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC
M Walter, S Bulygin, J Buchmann
Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013
122013
SHREC 2009-Generic Shape Retrieval Contest
C Akgul, A Axenopoulos, B Bustos, M Chaouch, P Daras, H Dutagaci, ...
30th international conference on EUROGRAPHICS 2009, workshop on 3D object …, 2009
122009
Study of the invariant coset attack on printcipher: more weak keys with practical key recovery
S Bulygin, M Walter
Cryptology ePrint Archive, 2012
112012
Graph-based combinations of fragment descriptors for improved 3D object retrieval
T Schreck, M Scherer, M Walter, B Bustos, SM Yoon, A Kuijper
Proceedings of the 3rd Multimedia Systems Conference, 23-28, 2012
72012
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures
S Bulygin, M Walter, J Buchmann
Designs, codes and cryptography 73, 997-1022, 2014
52014
Algebraic Methods in Analysing Lightweight Cryptographic Symmetric Primitives
M Walter
52012
The system can't perform the operation now. Try again later.
Articles 1–20