Department of Mathematics

  1. Published

    On security arguments of the second round SHA-3 candidates. / Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart; Preneel, Bart; Rechberger, Christian.

    In: International Journal of Information Security, Vol. 11, No. 2, 2012, p. 103–120.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  2. Published

    Bilinear Relative Equilibria of Identical Point Vortices. / Aref, H.; Beelen, Peter ; Brøns, Morten.

    In: Journal of Nonlinear Science, Vol. 22, No. 5, 2012, p. 849-885.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  3. Published

    Sur le nombre de points rationnels des variétés abéliennes et des Jacobiennes sur les corps finis. / Aubry, Yves; Haloui, Safia; Lachaud, Gilles.

    In: Academie des Sciences. Comptes Rendus. Mathematique, Vol. 350, No. 19-20, 2012, p. 907-910.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  4. Published
  5. Published

    The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. / Bagheri, Nasour; Gauravaram, Praveen; Knudsen, Lars R.; Zenner, Erik.

    In: International Journal of Information Security, Vol. 11, No. 6, 2012, p. 419-434.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  6. Published

    A closed form expression for the Drinfeld modular polynomial ΦT (X, Y ). / Bassa, Alp; Beelen, Peter .

    In: Archiv der Mathematik, Vol. 99, No. 3, 2012, p. 237-245.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  7. Published

    A new construction of highly nonlinear S-boxes. / Beelen, Peter; Leander, Gregor.

    In: Cryptography and Communications, Vol. 4, No. 1, 2012, p. 65-77.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  8. Published

    Duals of Affine Grassmann Codes and Their Relatives. / Beelen, P.; Ghorpade, S. R.; Hoholdt, T.

    In: I E E E Transactions on Information Theory, Vol. 58, No. 6, 2012, p. 3843-3855.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  9. Published

    On-line Ciphers and the Hash-CBC Constructions. / Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde; Namprempre, C.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 640-679.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  10. Published

    Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract). / Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor; Standaert, Francois-Xavier; Steinberger, John; Tischhauser, E.

    Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Vol. 7417 Springer, 2012. p. 45-62 (Lecture Notes in Computer Science, Vol. 7417).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

Previous 1 2 3 4 5 6 7 8 ...172 Next
Download list: To download, please limit the number of search results to 1,000 or less.