Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. Published

    Bounding the number of points on a curve using a generalization of Weierstrass semigroups. / Beelen, Peter; Ruano, Diego.

    Proceedings of WCC. 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  2. Published

    Bounds on the degree of APN polynomials: the case of x −1 + g(x). / Leander, Gregor; Rodier, François.

    In: Designs, Codes and Cryptography, Vol. 59, No. 1-3, 2011, p. 207-222.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  3. Published

    C2 - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. 2. ed. Springer, 2011. p. 179-180.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  4. Published

    Cache Timing Analysis of eStream Finalists. / Zenner, Erik (Invited author).

    Dagstuhl Seminar Proceedings. Seminar 09031: Symmetric Cryptography. ed. / Helena Handschuh; Stefan Lucks; Bart Preneel; Philip Rogaway. Schloss Dagstuhl, Germany : Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, 2009. (Dagstuhl Seminar Proceedings; No. 09031).

    Publication: ResearchArticle in proceedings – Annual report year: 2009

  5. Published

    Cache Timing Analysis of HC-256. / Zenner, Erik.

    Workshop Record SASC. ed. / Christophe de Cannière. 2008.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  6. Published

    Cache Timing Analysis of LFSR-based Stream Ciphers. / Zenner, Erik; Leander, Gregor; Hawkes, Philip.

    Cryptography and Coding. Berlin : Springer, 2009. (Lecture Notes in Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  7. Published

    Claw-decompositions and Tutte-orientations. / Barat, Janos; Thomassen, Carsten.

    In: Journal of Graph Theory, Vol. 52, No. 2, 06.2006, p. 135-146.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  8. Published

    Concrete Security for Entity Recognition: The Jane Doe Protocol. / Lucks, Stefan; Zenner, Erik; Weimerskirch, Andre; Westhoff, Dirk.

    Progress in Cryptology - INDOCRYPT 2008. ed. / Dipanwita Roy Chowdhury; Vincent Rijmen; Abhijit Das. Springer, 2008. p. 158-171 (Lecture Notes in Computer Science; No. 5365).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  9. Published

    Constructing new APN functions from known ones. / Budaghyan, L.; Carlet, C.; Leander, Gregor.

    In: Finite Fields and Their Applications, Vol. 15, No. 2, 2009, p. 150-159.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  10. Published

    Construction of bent functions from near-bent functions. / Leander, Gregor; McGuire, G.

    In: Journal of Combinatorial Theory, Series A, Vol. 116, No. 4, 2009, p. 960-970.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

Previous 1 2 3 4 5 6 7 8 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word