
Ruhr University Bochum
Faculty of Computer Science
Software Security
Universitätsstr. 150
44801 Bochum
Room: MC 4.124
Tel: +49 (0)234 32-27779
E-Mail: kevin.borgolte@rub.de
Office hours: By Arrangement
Table of Contents
Curriculum Vitae
Since May 2021, I am a professor for Software Security in the Computer Science department at Ruhr University Bochum (RUB). Prior to joining RUB, I was a professor at TU Delft and a postdoctoral researcher at Princeton University. I received my PhD from the University of California, Santa Barbara in September 2018.
Courses
Research
My research focuses on software and Internet security, including vulnerability discovery and mitigation, as well as how software is being deployed and used, and how it affects security on the Internet. That is, I work on improving the security and privacy of networked software systems. I also work on identifying and preventing large-scale Internet abuse, discovering and defending against new attacks (such as on network applications or enabled by network and protocol interactions), and developing techniques to conduct security-relevant measurements (like enabling Internet-wide measurements for IPv6; or, investigating how new security features affect the Internet). Sometimes, I dabble in related topics, like understanding security misconfigurations, or governance and policy.
Publications
2023
2022
2021
2020
2019
2018
2017
2016
2015
2012
2011
2010
Publications
Timo Glaser, Alexander May, Julian Nowakowski
Super-Quadratic Quantum Speed-Ups and Guessing Many Likely Keys Artikel Geplante Veröffentlichung
In: Preprint, Geplante Veröffentlichung.
Links | Schlagwörter:
@article{nokey,
title = {Super-Quadratic Quantum Speed-Ups and Guessing Many Likely Keys},
author = {Timo Glaser and Alexander May and Julian Nowakowski},
url = {https://eprint.iacr.org/2023/797.pdf, Paper},
year = {2025},
date = {2025-06-01},
urldate = {2025-06-01},
journal = {Preprint},
keywords = {},
pubstate = {forthcoming},
tppubtype = {article}
}
Alexander May, Massimo Ostuzzi
Multiple Group Action Dlogs with(out) Precomputation Proceedings Article
In: Public Key Cryptography (PKC '25), 2025.
Links | Schlagwörter: Crypto Area
@inproceedings{DBLP:journals/iacr/MayO24,
title = {Multiple Group Action Dlogs with(out) Precomputation},
author = {Alexander May and Massimo Ostuzzi},
url = {https://eprint.iacr.org/2024/564, Paper
https://iacr.org/submit/files/slides/2025/pkc/pkc2025/5/5_slides.pdf, Slides
https://doi.org/10.1007/978-3-031-91826-1_12, DOI},
year = {2025},
date = {2025-05-01},
urldate = {2025-05-01},
booktitle = {Public Key Cryptography (PKC '25)},
journal = {Public Key Cryptography (PKC '25)},
keywords = {Crypto Area},
pubstate = {published},
tppubtype = {inproceedings}
}
Simon Damm, Nicolai Kraus, Alexander May, Julian Nowakowski, Jonas Thietke
One Bit to Rule Them All - Imperfect Randomness Harms Lattice Signatures Proceedings Article
In: Public Key Cryptography (PKC '25), 2025.
Links | Schlagwörter: Crypto Area
@inproceedings{nokey,
title = {One Bit to Rule Them All - Imperfect Randomness Harms Lattice Signatures},
author = {Simon Damm and Nicolai Kraus and Alexander May and Julian Nowakowski and Jonas Thietke},
url = {https://eprint.iacr.org/2025/820.pdf, Paper
https://iacr.org/submit/files/slides/2025/pkc/pkc2025/144/144_slides.pdf, Slides
https://link.springer.com/chapter/10.1007/978-3-031-91820-9_10, DOI},
year = {2025},
date = {2025-05-01},
urldate = {2025-05-01},
booktitle = {Public Key Cryptography (PKC '25)},
keywords = {Crypto Area},
pubstate = {published},
tppubtype = {inproceedings}
}
Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information Artikel
In: Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2025.
Links | Schlagwörter: Crypto Area, Rank A*/A
@article{DBLP:journals/tches/BrinkmannCMNY25b,
title = {Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information},
author = {Marcus Brinkmann and Chitchanok Chuengsatiansup and Alexander May and Julian Nowakowski and Yuval Yarom},
url = {https://eprint.iacr.org/2023/1536.pdf, Paper},
year = {2025},
date = {2025-02-11},
urldate = {2025-02-11},
journal = {Transactions on Cryptographic Hardware and Embedded Systems (TCHES)},
keywords = {Crypto Area, Rank A*/A},
pubstate = {published},
tppubtype = {article}
}
Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-Zeh
How to Lose Some Weight - A Practical Template Syndrome Decoding Attack Proceedings Article
In: Coding and Cryptography (WCC 24) and Design, Codes and Cryptography (2025), 2024.
Links | Schlagwörter: Crypto Others
@inproceedings{DBLP:journals/iacr/BitzerDKMMW24,
title = {How to Lose Some Weight - A Practical Template Syndrome Decoding Attack},
author = {Sebastian Bitzer and Jeroen Delvaux and Elena Kirshanova and Sebastian Maaßen and Alexander May and Antonia Wachter-Zeh},
url = {https://eprint.iacr.org/2024/621, Paper
https://wcc2024.sites.dmi.unipg.it/SLIDES/Bitzer.pdf, Slides
https://doi.org/10.1007/s10623-025-01603-1, DOI},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {Coding and Cryptography (WCC 24) and Design, Codes and Cryptography (2025)},
journal = {IACR Cryptol. ePrint Arch.},
keywords = {Crypto Others},
pubstate = {published},
tppubtype = {inproceedings}
}
Alexander May, Julian Nowakowski
Too Many Hints - When LLL Breaks LWE Proceedings Article
In: Advances in Cryptology (ASIACRYPT 23), 2023.
Links | Schlagwörter: Crypto Flagship, Rank A*/A
@inproceedings{DBLP:conf/asiacrypt/MayN23,
title = {Too Many Hints - When LLL Breaks LWE},
author = {Alexander May and Julian Nowakowski},
url = {https://eprint.iacr.org/2023/777.pdf, Paper
https://iacr.org/submit/files/slides/2023/asiacrypt/asiacrypt2023/314/slides.pdf, Slides
https://www.youtube.com/watch?v=4USR_wlFpg8, Video
https://doi.org/10.1007/978-981-99-8730-6\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\_4, DOI
},
year = {2023},
date = {2023-12-01},
urldate = {2023-12-01},
booktitle = {Advances in Cryptology (ASIACRYPT 23)},
volume = {14441},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Flagship, Rank A*/A},
pubstate = {published},
tppubtype = {inproceedings}
}
Timo Glaser, Alexander May
How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium Proceedings Article
In: Cryptology and Network Security (CANS 23), S. 75–100, Springer, 2023.
Links | Schlagwörter: Crypto Others
@inproceedings{DBLP:conf/cans/GlaserM23,
title = {How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium},
author = {Timo Glaser and Alexander May},
url = {https://eprint.iacr.org/2022/1337.pdf, Paper
https://doi.org/10.1007/978-981-99-7563-1_4, DOI
https://dblp.uni-trier.de/rec/conf/cans/GlaserM23.html?view=bibtex, bibtex},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Cryptology and Network Security (CANS 23)},
volume = {14342},
pages = {75–100},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Others},
pubstate = {published},
tppubtype = {inproceedings}
}
Elena Kirshanova, Alexander May
Breaking Goppa-based McEliece with hints Proceedings Article
In: Security and Cryptography for Networks (SCN 22), and Journal of Information and Computation, Volume 293, 2023.
Links | Schlagwörter: Crypto Others
@inproceedings{DBLP:journals/iandc/KirshanovaM23,
title = {Breaking Goppa-based McEliece with hints},
author = {Elena Kirshanova and Alexander May},
url = {https://eprint.iacr.org/2022/525.pdf, Paper
https://doi.org/10.1016/j.ic.2023.105045, DOI Journal
https://link-springer-com-443.webvpn.synu.edu.cn/chapter/10.1007/978-3-031-14791-3_1, DOI Conference
https://dblp.uni-trier.de/rec/conf/pqcrypto/KirshanovaMN23.html?view=bibtex, bibtex},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Security and Cryptography for Networks (SCN 22), and
Journal of Information and Computation, Volume 293},
issuetitle = {Test},
journal = {Information and Computation},
volume = {Volume 293},
keywords = {Crypto Others},
pubstate = {published},
tppubtype = {inproceedings}
}
Jesús-Javier Chi-Dominguez, Andre Esser, Sabrina Kunzweiler, Alexander May
Low Memory Attacks on Small Key CSIDH Proceedings Article
In: Applied Cryptography and Network Security (ACNS 23), S. 276–304, Springer, 2023.
Links | Schlagwörter: Crypto Others
@inproceedings{DBLP:conf/acns/ChiDominguezEKM23,
title = {Low Memory Attacks on Small Key CSIDH},
author = {Jesús-Javier Chi-Dominguez and Andre Esser and Sabrina Kunzweiler and Alexander May},
url = {https://eprint.iacr.org/2023/507.pdf, Paper
https://doi.org/10.1007/978-3-031-33491-7_11, DOI},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Applied Cryptography and Network Security (ACNS 23)},
issuetitle = {Applied Cryptography and Network Security (ACNS)},
volume = {13906},
pages = {276–304},
publisher = {Springer},
chapter = {Part II},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Others},
pubstate = {published},
tppubtype = {inproceedings}
}
Elena Kirshanova, Alexander May, Julian Nowakowski
New NTRU Records with Improved Lattice Bases Proceedings Article
In: Post-Quantum Cryptography (PQCrypto 23), S. 167–195, Springer, 2023.
Links | Schlagwörter: Crypto Others
@inproceedings{DBLP:conf/pqcrypto/KirshanovaMN23c,
title = {New NTRU Records with Improved Lattice Bases},
author = {Elena Kirshanova and Alexander May and Julian Nowakowski},
url = {https://eprint.iacr.org/2023/582.pdf, Paper
https://doi.org/10.1007/978-3-031-40003-2_7, DOI
https://dblp.uni-trier.de/rec/conf/pqcrypto/KirshanovaMN23.html?view=bibtex%20bibtex, bibtex
},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Post-Quantum Cryptography (PQCrypto 23)},
volume = {14154},
pages = {167–195},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Others},
pubstate = {published},
tppubtype = {inproceedings}
}
Lectures (Moodle/Notes)
- Cryptanalysis (Codes, Classic 1, Cl. 2)
- Cryptography (Sym, Asym)
- Probabilistic (Basic, Algos)
- Quantum Algorithms (Script)
Former PhDs
Show names, year of graduation
- Önder Askin, 2024
- Floyd Zweydinger, 2023
- Lars Schlieper, 2022
- Alexander Helm, 2020
- Andre Esser, 2020
- Matthias Minihold, 2019
- Leif Both, 2018
- Robert Kübler, 2018
- Elena Kirshanova, 2016
- Ilya Ozerov, 2016
- Gottfried Herold, 2014
- Alexander Meurer, 2014
- Mathias Herrmann, 2011
- Maike Ritzenhofen, 2010
Calvin & Hobbes

Prof. Dr. Kevin Borgolte
Software Security
Professor / Head of Chair
Address:
Ruhr-University Bochum
Faculty of Computer Science
Software Security
Universitätsstr. 150
--D-44801 Bochum
Room: ID 2/627
Office Hours: By arrangement
E-Mail: kevin.borgolte@rub.de

Curriculum Vitae
Since May 2021, I am a professor for Software Security in the Computer Science department at Ruhr University Bochum (RUB). Prior to joining RUB, I was a professor at TU Delft and a postdoctoral researcher at Princeton University. I received my PhD from the University of California, Santa Barbara in September 2018.
Courses