Prof. Dr. Martina Angela Sasse
HUMAN-CENTRED SECURITY
Professor / Head of Chair
Address:
Ruhr-University Bochum
Faculty of Computer Science
Human-Centred Security
Universitätsstr. 150
D-44801 Bochum
Room: MB 2/177
Telephone: (+49)(0)234 / 32 – 25028
Office Hours: By arrangement
E-Mail: martina.sasse@rub.de
Lebenslauf
Prof. Dr. Angela Sasse studierte in den 1980er-Jahren an der Bergischen Universität Wuppertal Psychologie und setzte ihr Studium in Großbritannien fort. Ihren Master in Arbeitspsychologie machte sie an der Universität Sheffield und wurde an der Universität Birmingham promoviert.1990 begann sie eine Tätigkeit als Dozentin in Computer Science am University College London. Dort war sie seit 2003 Professorin für Human-Centred Technology. Von 2012 bis 2017 leitete sie das Britische Forschungsinstitut für empirische Sicherheitsforschung und wurde 2015 in die Royal Academy of Engineering aufgenommen.
Am 1. Mai 2018 übernahm sie die Leitung des Lehrstuhls Human-Centred Security am Horst-Görtz-Institut für IT-Sicherheit der Ruhr-Universität Bochum.
Lehrveranstaltungen
- 212001 : Requirements Engineering
- n.n. : Mensch-Maschine Interaktion
- 212021 : Human Aspects of Cryptography Adoption and Use
- 211036 : Einführung in die Usable Security and Privacy
- 212408 : Bachelor-Forschungspraktikum Human-Centred Security
- 212117 : Bachelor-Seminar Human Centered Security and Privacy
- 212162 : Kolloquium: Human Centred Security
- 212409 : Master-Forschungspraktikum Human-Centred Security
- 212410 : Master-Praktikum (Laborstudien) Human-Centred Security
- 212116 : Master-Seminar Human Centered Security and Privacy
- 211033 : Menschliches Verhalten in der IT Sicherheit
Veröffentlichungen
Ruhr-University Bochum
Human-Centred Security
Cryptography
Universitätsstr. 150
44801 Bochum
Room: MB 2.197
Tel: +49 (0)234 32-25028
E-Mail: martina.sasse@rub.de
Office hours: By Arrangement
Table of Contents
Curriculum Vitae
Prof. Dr. Angela Sasse studierte in den 1980er-Jahren an der Bergischen Universität Wuppertal Psychologie und setzte ihr Studium in Großbritannien fort. Ihren Master in Arbeitspsychologie machte sie an der Universität Sheffield und wurde an der Universität Birmingham promoviert.
1990 begann sie eine Tätigkeit als Dozentin in Computer Science am University College London. Dort war sie seit 2003 Professorin für Human-Centred Technology. Von 2012 bis 2017 leitete sie das Britische Forschungsinstitut für empirische Sicherheitsforschung und wurde 2015 in die Royal Academy of Engineering aufgenommen.
Am 1. Mai 2018 übernahm sie die Leitung des Lehrstuhls Human-Centred Security am Horst-Görtz-Institut für IT-Sicherheit der Ruhr-Universität Bochum.
Courses
- 212001 : Requirements Engineering
- n.n. : Mensch-Maschine Interaktion
- 212021 : Human Aspects of Cryptography Adoption and Use
- 211036 : Einführung in die Usable Security and Privacy
- 212408 : Bachelor-Forschungspraktikum Human-Centred Security
- 212117 : Bachelor-Seminar Human Centered Security and Privacy
- 212162 : Kolloquium: Human Centred Security
- 212409 : Master-Forschungspraktikum Human-Centred Security
- 212410 : Master-Praktikum (Laborstudien) Human-Centred Security
- 212116 : Master-Seminar Human Centered Security and Privacy
- 211033 : Menschliches Verhalten in der IT Sicherheit
Publications
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
Publications
Alexander Karenin and Elena Kirshanova and Julian Nowakowski, Alexander May
Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical Proceedings Article
In: Advances in Cryptology (ASIACRYPT 25), 2025.
Links | Schlagwörter: Crypto Flagship, Rank A*/A
@inproceedings{nokey,
title = {Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical},
author = {Alexander Karenin and
Elena Kirshanova and
Julian Nowakowski and
Alexander May
},
url = {https://eprint.iacr.org/2025/1910.pdf, Paper},
year = {2025},
date = {2025-12-02},
urldate = {2025-12-02},
booktitle = {Advances in Cryptology (ASIACRYPT 25)},
journal = {Advances in Cryptology (ASIACRYPT 25)},
keywords = {Crypto Flagship, Rank A*/A},
pubstate = {published},
tppubtype = {inproceedings}
}
Simon Damm, Asja Fischer, Alexander May, Soundes Marzougui, Leander Schwarz, Henning Seidler, Jean-Pierre Seifert, Jonas Thietke, Vincent Quentin Ulitzsch
Solving Concealed ILWE and its Application for Breaking Masked Dilithium Proceedings Article
In: Advances in Cryptology (ASIACRYPT 25), 2025.
Links | Schlagwörter: Crypto Flagship, Rank A*/A
@inproceedings{nokey,
title = {Solving Concealed ILWE and its Application for Breaking Masked Dilithium},
author = {Simon Damm and Asja Fischer and Alexander May and Soundes Marzougui and Leander Schwarz and Henning Seidler and Jean-Pierre Seifert and Jonas Thietke and Vincent Quentin Ulitzsch},
url = {https://eprint.iacr.org/2025/1629.pdf, Paper},
year = {2025},
date = {2025-12-01},
urldate = {2025-12-01},
booktitle = {Advances in Cryptology (ASIACRYPT 25)},
keywords = {Crypto Flagship, Rank A*/A},
pubstate = {published},
tppubtype = {inproceedings}
}
Alexander May, Massimo Ostuzzi, Henrik Ressler
Just Guess: Improved (Quantum) Algorithm for the Underdetermined MQ Problem Artikel Geplante Veröffentlichung
In: Geplante Veröffentlichung.
@article{nokey,
title = {Just Guess: Improved (Quantum) Algorithm for the Underdetermined MQ Problem},
author = {Alexander May and Massimo Ostuzzi and Henrik Ressler},
url = {https://eprint.iacr.org/2025/1788.pdf, Paper},
year = {2025},
date = {2025-10-01},
urldate = {2025-10-01},
keywords = {Quantum},
pubstate = {forthcoming},
tppubtype = {article}
}
Timo Glaser, Alexander May, Julian Nowakowski
Super-Quadratic Quantum Speed-Ups and Guessing Many Likely Keys Artikel Geplante Veröffentlichung
In: Preprint, Geplante Veröffentlichung.
@article{nokey,
title = {Super-Quadratic Quantum Speed-Ups and Guessing Many Likely Keys},
author = {Timo Glaser and Alexander May and Julian Nowakowski},
url = {https://eprint.iacr.org/2023/797.pdf, Paper},
year = {2025},
date = {2025-06-01},
urldate = {2025-06-01},
journal = {Preprint},
keywords = {Quantum},
pubstate = {forthcoming},
tppubtype = {article}
}
Alexander May, Massimo Ostuzzi
Multiple Group Action Dlogs with(out) Precomputation Proceedings Article
In: Public Key Cryptography (PKC '25), 2025.
Links | Schlagwörter: Crypto Area
@inproceedings{DBLP:journals/iacr/MayO24,
title = {Multiple Group Action Dlogs with(out) Precomputation},
author = {Alexander May and Massimo Ostuzzi},
url = {https://eprint.iacr.org/2024/564, Paper
https://iacr.org/submit/files/slides/2025/pkc/pkc2025/5/5_slides.pdf, Slides
https://doi.org/10.1007/978-3-031-91826-1_12, DOI},
year = {2025},
date = {2025-05-01},
urldate = {2025-05-01},
booktitle = {Public Key Cryptography (PKC '25)},
journal = {Public Key Cryptography (PKC '25)},
keywords = {Crypto Area},
pubstate = {published},
tppubtype = {inproceedings}
}
Simon Damm, Nicolai Kraus, Alexander May, Julian Nowakowski, Jonas Thietke
One Bit to Rule Them All - Imperfect Randomness Harms Lattice Signatures Proceedings Article
In: Public Key Cryptography (PKC '25), 2025.
Links | Schlagwörter: Crypto Area
@inproceedings{nokey,
title = {One Bit to Rule Them All - Imperfect Randomness Harms Lattice Signatures},
author = {Simon Damm and Nicolai Kraus and Alexander May and Julian Nowakowski and Jonas Thietke},
url = {https://eprint.iacr.org/2025/820.pdf, Paper
https://iacr.org/submit/files/slides/2025/pkc/pkc2025/144/144_slides.pdf, Slides
https://link.springer.com/chapter/10.1007/978-3-031-91820-9_10, DOI},
year = {2025},
date = {2025-05-01},
urldate = {2025-05-01},
booktitle = {Public Key Cryptography (PKC '25)},
keywords = {Crypto Area},
pubstate = {published},
tppubtype = {inproceedings}
}
Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information Artikel
In: Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2025.
Links | Schlagwörter: Crypto Area, Rank A*/A
@article{DBLP:journals/tches/BrinkmannCMNY25b,
title = {Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information},
author = {Marcus Brinkmann and Chitchanok Chuengsatiansup and Alexander May and Julian Nowakowski and Yuval Yarom},
url = {https://eprint.iacr.org/2023/1536.pdf, Paper},
year = {2025},
date = {2025-02-11},
urldate = {2025-02-11},
journal = {Transactions on Cryptographic Hardware and Embedded Systems (TCHES)},
keywords = {Crypto Area, Rank A*/A},
pubstate = {published},
tppubtype = {article}
}
Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-Zeh
How to Lose Some Weight - A Practical Template Syndrome Decoding Attack Proceedings Article
In: Coding and Cryptography (WCC 24) and Design, Codes and Cryptography (2025), 2024.
Links | Schlagwörter: Crypto Others
@inproceedings{DBLP:journals/iacr/BitzerDKMMW24,
title = {How to Lose Some Weight - A Practical Template Syndrome Decoding Attack},
author = {Sebastian Bitzer and Jeroen Delvaux and Elena Kirshanova and Sebastian Maaßen and Alexander May and Antonia Wachter-Zeh},
url = {https://eprint.iacr.org/2024/621, Paper
https://wcc2024.sites.dmi.unipg.it/SLIDES/Bitzer.pdf, Slides
https://doi.org/10.1007/s10623-025-01603-1, DOI},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {Coding and Cryptography (WCC 24) and Design, Codes and Cryptography (2025)},
journal = {IACR Cryptol. ePrint Arch.},
keywords = {Crypto Others},
pubstate = {published},
tppubtype = {inproceedings}
}
Alexander May, Julian Nowakowski
Too Many Hints - When LLL Breaks LWE Proceedings Article
In: Advances in Cryptology (ASIACRYPT 23), 2023.
Links | Schlagwörter: Crypto Flagship, Rank A*/A
@inproceedings{DBLP:conf/asiacrypt/MayN23,
title = {Too Many Hints - When LLL Breaks LWE},
author = {Alexander May and Julian Nowakowski},
url = {https://eprint.iacr.org/2023/777.pdf, Paper
https://iacr.org/submit/files/slides/2023/asiacrypt/asiacrypt2023/314/slides.pdf, Slides
https://www.youtube.com/watch?v=4USR_wlFpg8, Video
https://doi.org/10.1007/978-981-99-8730-6\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\_4, DOI
},
year = {2023},
date = {2023-12-01},
urldate = {2023-12-01},
booktitle = {Advances in Cryptology (ASIACRYPT 23)},
volume = {14441},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Flagship, Rank A*/A},
pubstate = {published},
tppubtype = {inproceedings}
}
Timo Glaser, Alexander May
How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium Proceedings Article
In: Cryptology and Network Security (CANS 23), S. 75–100, Springer, 2023.
Links | Schlagwörter: Crypto Others
@inproceedings{DBLP:conf/cans/GlaserM23,
title = {How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium},
author = {Timo Glaser and Alexander May},
url = {https://eprint.iacr.org/2022/1337.pdf, Paper
https://doi.org/10.1007/978-981-99-7563-1_4, DOI
https://dblp.uni-trier.de/rec/conf/cans/GlaserM23.html?view=bibtex, bibtex},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Cryptology and Network Security (CANS 23)},
volume = {14342},
pages = {75–100},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Others},
pubstate = {published},
tppubtype = {inproceedings}
}
Lectures (Moodle/Notes)
- Cryptanalysis (Codes, Classic 1, Cl. 2)
- Cryptography (Sym, Asym)
- Probabilistic (Basic, Algos)
- Quantum Algorithms (Script)
Former PhDs
Show names, year of graduation
- Önder Askin, 2024
- Floyd Zweydinger, 2023
- Lars Schlieper, 2022
- Alexander Helm, 2020
- Andre Esser, 2020
- Matthias Minihold, 2019
- Leif Both, 2018
- Robert Kübler, 2018
- Elena Kirshanova, 2016
- Ilya Ozerov, 2016
- Gottfried Herold, 2014
- Alexander Meurer, 2014
- Mathias Herrmann, 2011
- Maike Ritzenhofen, 2010
Calvin & Hobbes