Folgen
Anja Becker
Anja Becker
EPFL, Lausanne, Switzerland
Bestätigte E-Mail-Adresse bei epfl.ch - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
A Becker, A Joux, A May, A Meurer
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
5102012
New directions in nearest neighbor searching with applications to lattice sieving
A Becker, L Ducas, N Gama, T Laarhoven
Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete …, 2016
4212016
Improved generic algorithms for hard knapsacks
A Becker, JS Coron, A Joux
Annual International Conference on the Theory and Applications of …, 2011
1432011
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search
A Becker, N Gama, A Joux
Cryptology ePrint Archive, 2015
542015
Efficient (ideal) lattice sieving using cross-polytope LSH
A Becker, T Laarhoven
Africacrypt 2016. https://eprint.iacr.org/2015/823, 2015
502015
A sieve algorithm based on overlattices
A Becker, N Gama, A Joux
LMS Journal of Computation and Mathematics 17 (A), 49-70, 2014
492014
Solving shortest and closest vector problems: The decomposition approach
A Becker, N Gama, A Joux
Cryptology ePrint Archive, 2013
352013
Assessing privacy criteria for drm using eu privacy legislation
A Becker, A Arnab, M Serra
Proceedings of the 8th ACM Workshop on Digital Rights Management, 77--86, 2008
132008
Concept for a key management in a drm system
B Greevenbosch, H Fuchs, MS Joan, S Kraegeloh, A Arnab, A Becker
US Patent App. 12/680,910, 2010
122010
Advances in Cryptology–EUROCRYPT 2011
A Becker, JS Coron, A Joux
Springer 6632, 364-385, 2011
82011
Methods of fault analysis attacks on elliptic curve cryptosystems
A Becker
Comparison and Combination of Countermeasures to resist SCA, 1-17, 2006
72006
The representation technique: application to hard problems in cryptography
A Becker
Versailles-St Quentin en Yvelines, 2012
42012
Speeding up lattice sieve with Xeon Phi coprocessor
A Becker, D Kostic
2016
New directions in nearest neighbor searching with applications to lattice sieving
TL Anja Becker, Léo Ducas, Nicolas Gama
In Proceeedings of the 27th ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, 2015
2015
The representation technique Applications to hard problems in cryptography La technique de représentation Application à des problèmes difficiles en cryptographie
A Becker
University of Ottawa, 2012
2012
Handbook of research on secure multimedia distribution
IGI Global, 2009
2009
Overview of OMA digital rights management
M Serra Joan, B Greevenbosch, A Becker, H Fuchs, S Krägeloh
2009
Overview of OMA Digital Rights Management
MS Joan, B Greevenbosch, A Becker, H Fuchs
Handbook of Research on Secure Multimedia Distribution, 55-70, 2009
2009
Concept for a key management in a drm system
AB Bert Greevenbosch, Harald Fuchs, Merce Serra Joan, Stefan Kraegeloh ...
2008
Looking for Work, Searching for Workers: American Labor Markets during Industrialization
A Becker, JL Rosenbloom
Amerikastudien/American Studies 51 (1), 119-121, 2006
2006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20