Prof. Dr. Martina Angela Sasse
HUMAN-CENTRED SECURITY
Professor / Head of Chair
Address:
Ruhr-University Bochum
Faculty of Computer Science
Human-Centred Security
Universitätsstr. 150
D-44801 Bochum
Room: MB 2/177
Telephone: (+49)(0)234 / 32 – 25028
Office Hours: By arrangement
E-Mail: martina.sasse@rub.de
Lebenslauf
Prof. Dr. Angela Sasse studierte in den 1980er-Jahren an der Bergischen Universität Wuppertal Psychologie und setzte ihr Studium in Großbritannien fort. Ihren Master in Arbeitspsychologie machte sie an der Universität Sheffield und wurde an der Universität Birmingham promoviert.1990 begann sie eine Tätigkeit als Dozentin in Computer Science am University College London. Dort war sie seit 2003 Professorin für Human-Centred Technology. Von 2012 bis 2017 leitete sie das Britische Forschungsinstitut für empirische Sicherheitsforschung und wurde 2015 in die Royal Academy of Engineering aufgenommen.
Am 1. Mai 2018 übernahm sie die Leitung des Lehrstuhls Human-Centred Security am Horst-Görtz-Institut für IT-Sicherheit der Ruhr-Universität Bochum.
Lehrveranstaltungen
- 212001 : Requirements Engineering
- n.n. : Mensch-Maschine Interaktion
- 212021 : Human Aspects of Cryptography Adoption and Use
- 211036 : Einführung in die Usable Security and Privacy
- 212408 : Bachelor-Forschungspraktikum Human-Centred Security
- 212117 : Bachelor-Seminar Human Centered Security and Privacy
- 212162 : Kolloquium: Human Centred Security
- 212409 : Master-Forschungspraktikum Human-Centred Security
- 212410 : Master-Praktikum (Laborstudien) Human-Centred Security
- 212116 : Master-Seminar Human Centered Security and Privacy
- 211033 : Menschliches Verhalten in der IT Sicherheit
Veröffentlichungen
Ruhr-University Bochum
Human-Centred Security
Cryptography
Universitätsstr. 150
44801 Bochum
Room: MB 2.197
Tel: +49 (0)234 32-25028
E-Mail: martina.sasse@rub.de
Office hours: By Arrangement
Table of Contents
Curriculum Vitae
Prof. Dr. Angela Sasse studierte in den 1980er-Jahren an der Bergischen Universität Wuppertal Psychologie und setzte ihr Studium in Großbritannien fort. Ihren Master in Arbeitspsychologie machte sie an der Universität Sheffield und wurde an der Universität Birmingham promoviert.
1990 begann sie eine Tätigkeit als Dozentin in Computer Science am University College London. Dort war sie seit 2003 Professorin für Human-Centred Technology. Von 2012 bis 2017 leitete sie das Britische Forschungsinstitut für empirische Sicherheitsforschung und wurde 2015 in die Royal Academy of Engineering aufgenommen.
Am 1. Mai 2018 übernahm sie die Leitung des Lehrstuhls Human-Centred Security am Horst-Görtz-Institut für IT-Sicherheit der Ruhr-Universität Bochum.
Courses
- 212001 : Requirements Engineering
- n.n. : Mensch-Maschine Interaktion
- 212021 : Human Aspects of Cryptography Adoption and Use
- 211036 : Einführung in die Usable Security and Privacy
- 212408 : Bachelor-Forschungspraktikum Human-Centred Security
- 212117 : Bachelor-Seminar Human Centered Security and Privacy
- 212162 : Kolloquium: Human Centred Security
- 212409 : Master-Forschungspraktikum Human-Centred Security
- 212410 : Master-Praktikum (Laborstudien) Human-Centred Security
- 212116 : Master-Seminar Human Centered Security and Privacy
- 211033 : Menschliches Verhalten in der IT Sicherheit
Publications
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
Publications
Elena Kirshanova, Alexander May
Breaking Goppa-based McEliece with hints Proceedings Article
In: Security and Cryptography for Networks (SCN 22), and Journal of Information and Computation, Volume 293, 2023.
Links | Schlagwörter: Crypto Others
@inproceedings{DBLP:journals/iandc/KirshanovaM23,
title = {Breaking Goppa-based McEliece with hints},
author = {Elena Kirshanova and Alexander May},
url = {https://eprint.iacr.org/2022/525.pdf, Paper
https://doi.org/10.1016/j.ic.2023.105045, DOI Journal
https://link-springer-com-443.webvpn.synu.edu.cn/chapter/10.1007/978-3-031-14791-3_1, DOI Conference
https://dblp.uni-trier.de/rec/conf/pqcrypto/KirshanovaMN23.html?view=bibtex, bibtex},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Security and Cryptography for Networks (SCN 22), and
Journal of Information and Computation, Volume 293},
issuetitle = {Test},
journal = {Information and Computation},
volume = {Volume 293},
keywords = {Crypto Others},
pubstate = {published},
tppubtype = {inproceedings}
}
Jesús-Javier Chi-Dominguez, Andre Esser, Sabrina Kunzweiler, Alexander May
Low Memory Attacks on Small Key CSIDH Proceedings Article
In: Applied Cryptography and Network Security (ACNS 23), S. 276–304, Springer, 2023.
Links | Schlagwörter: Crypto Others
@inproceedings{DBLP:conf/acns/ChiDominguezEKM23,
title = {Low Memory Attacks on Small Key CSIDH},
author = {Jesús-Javier Chi-Dominguez and Andre Esser and Sabrina Kunzweiler and Alexander May},
url = {https://eprint.iacr.org/2023/507.pdf, Paper
https://doi.org/10.1007/978-3-031-33491-7_11, DOI},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Applied Cryptography and Network Security (ACNS 23)},
issuetitle = {Applied Cryptography and Network Security (ACNS)},
volume = {13906},
pages = {276–304},
publisher = {Springer},
chapter = {Part II},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Others},
pubstate = {published},
tppubtype = {inproceedings}
}
Elena Kirshanova, Alexander May, Julian Nowakowski
New NTRU Records with Improved Lattice Bases Proceedings Article
In: Post-Quantum Cryptography (PQCrypto 23), S. 167–195, Springer, 2023.
Links | Schlagwörter: Crypto Others
@inproceedings{DBLP:conf/pqcrypto/KirshanovaMN23c,
title = {New NTRU Records with Improved Lattice Bases},
author = {Elena Kirshanova and Alexander May and Julian Nowakowski},
url = {https://eprint.iacr.org/2023/582.pdf, Paper
https://doi.org/10.1007/978-3-031-40003-2_7, DOI
https://dblp.uni-trier.de/rec/conf/pqcrypto/KirshanovaMN23.html?view=bibtex%20bibtex, bibtex
},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Post-Quantum Cryptography (PQCrypto 23)},
volume = {14154},
pages = {167–195},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Others},
pubstate = {published},
tppubtype = {inproceedings}
}
Alexander May, Carl Richard Theodor Schneider
Dlog is Practically as Hard (or Easy) as DH - Solving Dlogs via DH Oracles on EC Standards Proceedings Article
In: Transactions on Cryptographic Hardware and Embedded Systems (TCHES), S. 146–166, 2023.
Links | Schlagwörter: Crypto Area, Rank A*/A
@inproceedings{DBLP:journals/tches/MayS23,
title = {Dlog is Practically as Hard (or Easy) as DH - Solving Dlogs via DH Oracles on EC Standards},
author = {Alexander May and Carl Richard Theodor Schneider},
url = {https://eprint.iacr.org/2023/539, Paper
https://informatik.rub.de/wp-content/uploads/2024/08/Dlog_vs_DH-2.pdf, Slides
https://doi.org/10.46586/tches.v2023.i4.146-166, DOI
https://dblp.org/rec/journals/iacr/MayS23.html?view=bibtex, bibtex},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Transactions on Cryptographic Hardware and Embedded Systems (TCHES)},
volume = {2023},
number = {4},
pages = {146–166},
keywords = {Crypto Area, Rank A*/A},
pubstate = {published},
tppubtype = {inproceedings}
}
Andre Esser, Alexander May, Javier A. Verbel, Weiqiang Wen
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU Proceedings Article
In: Advances in Cryptology (CRYPTO 2022) , S. 346–375, Springer, 2022.
Links | Schlagwörter: Crypto Flagship, Rank A*/A
@inproceedings{DBLP:conf/crypto/EsserMVW22b,
title = {Partial Key Exposure Attacks on BIKE, Rainbow and NTRU},
author = {Andre Esser and Alexander May and Javier A. Verbel and Weiqiang Wen},
url = {https://eprint.iacr.org/2022/259.pdf, Paper
https://iacr.org/submit/files/slides/2022/crypto/crypto2022/70/slides.pptx, Slides
https://doi.org/10.1007/978-3-031-15982-4_12, DOI
https://dblp.uni-trier.de/rec/conf/crypto/EsserMVW22.html?view=bibtex, bibtex},
year = {2022},
date = {2022-08-01},
urldate = {2022-08-01},
booktitle = {Advances in Cryptology (CRYPTO 2022) },
volume = {13509},
pages = {346–375},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Flagship, Rank A*/A},
pubstate = {published},
tppubtype = {inproceedings}
}
Alexander May, Julian Nowakowski, Santanu Sarkar
Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents Proceedings Article
In: Advances in Cryptology (EUROCRYPT 22) , S. 147–167, Springer, 2022.
Links | Schlagwörter: Crypto Flagship, Rank A*/A
@inproceedings{DBLP:conf/eurocrypt/MayNS22,
title = {Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents},
author = {Alexander May and Julian Nowakowski and Santanu Sarkar},
url = {https://eprint.iacr.org/2022/271.pdf, Paper
https://iacr.org/submit/files/slides/2022/eurocrypt/eurocrypt2022/94/slides.pdf, Slides
https://youtube.com/watch?v=4USR_wlFpg8, Video
https://doi.org/10.1007/978-3-031-07082-2_6, DOI},
year = {2022},
date = {2022-05-02},
urldate = {2022-05-02},
booktitle = {Advances in Cryptology (EUROCRYPT 22) },
volume = {13277},
pages = {147–167},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Flagship, Rank A*/A},
pubstate = {published},
tppubtype = {inproceedings}
}
Andre Esser, Alexander May, Floyd Zweydinger
McEliece Needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD Proceedings Article
In: Advances in Cryptology (EUROCRYPT 22), S. 433–457, Springer, 2022.
Links | Schlagwörter: Crypto Flagship, Rank A*/A
@inproceedings{DBLP:conf/eurocrypt/EsserMZ22,
title = {McEliece Needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD},
author = {Andre Esser and Alexander May and Floyd Zweydinger},
url = {https://eprint.iacr.org/2021/1634.pdf, Paper
https://iacr.org/submit/files/slides/2022/eurocrypt/eurocrypt2022/109/slides.pdf, Slides
https://youtube.com/watch?v=nkRpkf4efuE, Video
https://doi.org/10.1007/978-3-031-07082-2_16, DOI},
year = {2022},
date = {2022-05-01},
urldate = {2022-05-01},
booktitle = {Advances in Cryptology (EUROCRYPT 22)},
volume = {13277},
pages = {433–457},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {Crypto Flagship, Rank A*/A},
pubstate = {published},
tppubtype = {inproceedings}
}
Julian Speith, Florian Schweins, Maik Ender, Marc Fyrbiak, Alexander May, Christof Paar
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations Proceedings Article
In: Symposium on Security and Privacy (S&P 22), 2022.
Links | Schlagwörter: Rank A*/A, Security
@inproceedings{DBLP:conf/sp/SpeithSEF0P22,
title = {How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations},
author = {Julian Speith and Florian Schweins and Maik Ender and Marc Fyrbiak and Alexander May and Christof Paar},
url = {https://arxiv.org/abs/2112.04838, Paper
https://www.youtube.com/watch?v=-xmWZgldab8, Video
https://doi.org/10.1109/SP46214.2022.9833605, DOI},
year = {2022},
date = {2022-04-01},
urldate = {2022-04-01},
booktitle = {Symposium on Security and Privacy (S&P 22)},
keywords = {Rank A*/A, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Alexander May, Floyd Zweydinger
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing Proceedings Article
In: Computer Security Foundations Symposium (CSF 22), S. 428–438, IEEE, 2022.
Links | Schlagwörter: Rank A*/A, Security
@inproceedings{DBLP:conf/csfw/MayZ22,
title = {Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing},
author = {Alexander May and Floyd Zweydinger},
url = {https://eprint.iacr.org/2021/645.pdf, Paper
https://informatik.rub.de/wp-content/uploads/2022/10/Slides-1.pdf, Slides
https://doi.org/10.1109/CSF54842.2022.9919640, DOI},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {Computer Security Foundations Symposium (CSF 22)},
pages = {428–438},
publisher = {IEEE},
keywords = {Rank A*/A, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Alexander May, Lars Schlieper
Quantum Period Finding is Compression Robust Proceedings Article
In: Transactions on Symmetric Cryptology (TOSC 22), S. 183–211, 2022.
Links | Schlagwörter: Crypto Area, Quantum
@inproceedings{DBLP:journals/tosc/MayS22,
title = {Quantum Period Finding is Compression Robust},
author = {Alexander May and Lars Schlieper},
url = {https://arxiv.org/abs/1905.10074, Paper
https://2020.qcrypt.net/posters/QCrypt2020Poster013Schlieper.pdf, Poster
https://doi.org/10.46586/tosc.v2022.i1.183-211, DOI
https://dblp.uni-trier.de/rec/journals/tosc/MayS22.html?view=bibtex, bibtex},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {Transactions on Symmetric Cryptology (TOSC 22)},
journal = {IACR Trans. Symmetric Cryptol.},
volume = {2022},
number = {1},
pages = {183–211},
keywords = {Crypto Area, Quantum},
pubstate = {published},
tppubtype = {inproceedings}
}
Lectures (Moodle/Notes)
- Cryptanalysis (Codes, Classic 1, Cl. 2)
- Cryptography (Sym, Asym)
- Probabilistic (Basic, Algos)
- Quantum Algorithms (Script)
Former PhDs
Show names, year of graduation
- Önder Askin, 2024
- Floyd Zweydinger, 2023
- Lars Schlieper, 2022
- Alexander Helm, 2020
- Andre Esser, 2020
- Matthias Minihold, 2019
- Leif Both, 2018
- Robert Kübler, 2018
- Elena Kirshanova, 2016
- Ilya Ozerov, 2016
- Gottfried Herold, 2014
- Alexander Meurer, 2014
- Mathias Herrmann, 2011
- Maike Ritzenhofen, 2010
Calvin & Hobbes