Michael Walter

ORCID: 0000-0003-3186-2482
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • Chaos-based Image/Signal Encryption
  • Complexity and Algorithms in Graphs
  • Security in Wireless Sensor Networks
  • Privacy-Preserving Technologies in Data
  • 3D Shape Modeling and Analysis
  • Advanced Image and Video Retrieval Techniques
  • Robotics and Sensor-Based Localization
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptography and Residue Arithmetic
  • Logic, programming, and type systems
  • Internet Traffic Analysis and Secure E-voting
  • Privacy, Security, and Data Protection
  • Image Retrieval and Classification Techniques
  • Image Processing and 3D Reconstruction
  • Data Management and Algorithms
  • Advanced Malware Detection Techniques
  • COVID-19 Digital Contact Tracing
  • Advanced Database Systems and Queries
  • Advanced Authentication Protocols Security
  • Age of Information Optimization
  • Bayesian Modeling and Causal Inference
  • Smart Grid Security and Resilience

Zone Atelier Moselle
2021-2023

Institute of Science and Technology Austria
2018-2021

University of California, San Diego
2012-2017

Austrian Federal Railways
2017

Technical University of Darmstadt
2009-2016

IBM (United States)
2001

Justus-Liebig-Universität Gießen
2000

Enumeration algorithms are the best currently known methods to solve lattice problems, both in theory (within class of polynomial space algorithms), and practice (where they routinely used evaluate concrete security cryptography). However, there is an uncomfortable gap between our theoretical understanding practical performance point enumeration algorithms. The typically have worst-case asymptotic running time 2O(n2), but perform extremely well practice, at least for all values dimension...

10.5555/2722129.2722150 article EN 2015-01-04

Previous chapter Next Full AccessProceedings Proceedings of the 2015 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA)Fast Lattice Point Enumeration with Minimal OverheadDaniele Micciancio and Michael WalterDaniele Walterpp.276 - 294Chapter DOI:https://doi.org/10.1137/1.9781611973730.21PDFBibTexSections ToolsAdd to favoritesExport CitationTrack CitationsEmail SectionsAboutAbstract algorithms are best currently known methods solve lattice problems, both in theory (within class...

10.1137/1.9781611973730.21 preprint EN 2014-12-22

In this paper we present improvements of the algebraic side-channel analysis Advanced Encryption Standard (AES) proposed in [1]. particular, optimize representation AES and obtained information order to speed up attack increase success rate. We study performance our both known unknown plaintext/ciphertext scenarios. Our experiments indicate that cases amount required is less than one attacks introduced Furthermore, introduce a method for error handling, which allows improved escape...

10.1109/hst.2012.6224335 article EN 2012-06-01

While messaging systems with strong security guarantees are widely used in practice, designing a protocol that scales efficiently to large groups and enjoys similar remains largely open. The two existing proposals date ART (Cohn-Gordon et al., CCS18) TreeKEM (IETF, Messaging Layer Security Protocol, draft). is the currently considered candidate by IETF MLS working group, but dynamic group operations (i.e. adding removing users) can cause efficiency issues. In this paper we formalize analyze...

10.1109/sp40001.2021.00035 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2021-05-01

We outline a secure and efficient methodology to do threshold distributed decryption for LWE based Fully Homomorphic Encryption schemes. Due the smaller parameters used in some FHE schemes, such as Torus-FHE (TFHE), standard technique of "noise flooding'' seems not apply. show that noise flooding can also be with schemes small parameters, by utilizing switch scheme slightly higher then bootstrapping operations which TFHE offers. Our protocol is proved via simulation argument, making its...

10.1145/3605759.3625259 article EN cc-by 2023-11-23

10.1023/a:1013121110704 article EN Annals of Mathematics and Artificial Intelligence 2001-01-01

In this paper we present the results of SHREC'09- Generic Shape Retrieval Contest. The aim track was to evaluate performances various 3D shape retrieval algorithms on NIST generic benchmark. We hope that benchmark will provide valuable contributions community. Seven groups have participated in and they submitted 22 sets rank lists based different methods parameters. performance evaluation Contest is 6 metrics.

10.5555/2381128.2381144 article EN 2009-03-29

Practical hardness results are necessary to select parameters for cryptographic schemes. Cryptographic challenges proved be useful determining the practical of computational problems that used build public-key cryptography. However, several these have drawback it is not known how create a challenge them without knowing solutions. Hence, creators excluded from participating. In this work, we present method excluding anyone This based on secure multi-party computation (MPC). We demonstrate...

10.1145/2898420.2898422 article EN 2016-05-24

Recently, a number of offloading approaches have been proposed to reduce the burden on cellular infrastructure, especially during peak hours. Ranging from pure data concepts using local caches fully-fledged services operating ad hoc networks, these are mostly tuned towards their performance. Consequently, cache hit ratios, achieved throughput, or end-to-end latencies, prominent evaluation metrics. However, when utilizing users' resources improve performance shared service, fairness with...

10.1109/wowmom.2016.7523505 article EN 2016-06-01
Coming Soon ...