Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding A Becker, A Joux, A May, A Meurer Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012 | 529 | 2012 |
New directions in nearest neighbor searching with applications to lattice sieving A Becker, L Ducas, N Gama, T Laarhoven Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete …, 2016 | 444 | 2016 |
Improved generic algorithms for hard knapsacks A Becker, JS Coron, A Joux Annual International Conference on the Theory and Applications of …, 2011 | 147 | 2011 |
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search A Becker, N Gama, A Joux Cryptology ePrint Archive, 2015 | 57 | 2015 |
Efficient (ideal) lattice sieving using cross-polytope LSH A Becker, T Laarhoven Africacrypt 2016. https://eprint.iacr.org/2015/823, 2015 | 51 | 2015 |
A sieve algorithm based on overlattices A Becker, N Gama, A Joux LMS Journal of Computation and Mathematics 17 (A), 49-70, 2014 | 50 | 2014 |
Solving shortest and closest vector problems: The decomposition approach A Becker, N Gama, A Joux Cryptology ePrint Archive, 2013 | 38 | 2013 |
Assessing privacy criteria for drm using eu privacy legislation A Becker, A Arnab, M Serra Proceedings of the 8th ACM Workshop on Digital Rights Management, 77--86, 2008 | 13 | 2008 |
Concept for a key management in a drm system B Greevenbosch, H Fuchs, MS Joan, S Kraegeloh, A Arnab, A Becker US Patent App. 12/680,910, 2010 | 12 | 2010 |
Advances in Cryptology–EUROCRYPT 2011 A Becker, JS Coron, A Joux Springer 6632, 364-385, 2011 | 8 | 2011 |
Methods of fault analysis attacks on elliptic curve cryptosystems A Becker Comparison and Combination of Countermeasures to resist SCA, 1-17, 2006 | 7 | 2006 |
The representation technique: application to hard problems in cryptography A Becker Versailles-St Quentin en Yvelines, 2012 | 4 | 2012 |
Speeding up lattice sieve with Xeon Phi coprocessor A Becker, D Kostic | | 2016 |
New directions in nearest neighbor searching with applications to lattice sieving TL Anja Becker, Léo Ducas, Nicolas Gama In Proceeedings of the 27th ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, 2015 | | 2015 |
The representation technique Applications to hard problems in cryptography La technique de représentation Application à des problèmes difficiles en cryptographie A Becker University of Ottawa, 2012 | | 2012 |
Handbook of research on secure multimedia distribution IGI Global, 2009 | | 2009 |
Overview of OMA digital rights management M Serra Joan, B Greevenbosch, A Becker, H Fuchs, S Krägeloh | | 2009 |
Overview of OMA Digital Rights Management MS Joan, B Greevenbosch, A Becker, H Fuchs Handbook of Research on Secure Multimedia Distribution, 55-70, 2009 | | 2009 |
Concept for a key management in a drm system AB Bert Greevenbosch, Harald Fuchs, Merce Serra Joan, Stefan Kraegeloh ... | | 2008 |
Looking for Work, Searching for Workers: American Labor Markets during Industrialization A Becker, JL Rosenbloom Amerikastudien/American Studies 51 (1), 119-121, 2006 | | 2006 |