Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2009
  2. Published

    A Cache Timing Analysis of HC-256. / Zenner, Erik.

    Selected Areas in Cryptography: Workshop Proceedings. ed. / R. Avanzi; L. Keliher; F. Sica. Springer, 2009. p. 199-213 (Springer Lecture Notes in Computer Science (LNCS); No. 5381).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  3. Published

    A generalization of Baker's theorem. / Beelen, Peter.

    In: Finite Fields and Their Applications, Vol. 15, No. 5, 2009, p. 558-568.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  4. Published

    Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks. / Zenner, Erik.

    Kgs. Lyngby, Denmark : Technical University of Denmark, 2009. (MAT report).

    Publication: ResearchReport – Annual report year: 2009

  5. Published

    Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. / Bras-Amorós, Maria (Editor); Høholdt, Tom (Editor).

    Berlin : Springer, 2009. 243 p. (Lecture Notes in Computer Science; No. 5527).

    Publication: Research - peer-reviewBook – Annual report year: 2009

  6. Published

    A Practical Key Recovery Attack on Basic TCHo. / Leander, Gregor; Herrmann, Mathias.

    Public Key Cryptography - PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography. Springer, 2009. p. 411-424 (Lecture Notes in Computer Science; No. 5443).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  7. Published

    Bivium as a Mixed Integer Programming Problem. / Borghoff, Julia; Knudsen, Lars Ramkilde; Stolpe, Mathias.

    Cryptography and Coding: 12th IMA International Conference, Cryptography and Coding 2009 Cirencester, UK, DEcenber 2009. ed. / Matthew G. Parker. Springer, 2009. p. 133-152 (Lecture Notes of Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  8. Published

    Cache Timing Analysis of eStream Finalists. / Zenner, Erik (Invited author).

    Dagstuhl Seminar Proceedings. Seminar 09031: Symmetric Cryptography. ed. / Helena Handschuh; Stefan Lucks; Bart Preneel; Philip Rogaway. Schloss Dagstuhl, Germany : Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, 2009. (Dagstuhl Seminar Proceedings; No. 09031).

    Publication: ResearchArticle in proceedings – Annual report year: 2009

  9. Published

    Cache Timing Analysis of LFSR-based Stream Ciphers. / Zenner, Erik; Leander, Gregor; Hawkes, Philip.

    Cryptography and Coding. Berlin : Springer, 2009. (Lecture Notes in Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  10. Published

    Constructing new APN functions from known ones. / Budaghyan, L.; Carlet, C.; Leander, Gregor.

    In: Finite Fields and Their Applications, Vol. 15, No. 2, 2009, p. 150-159.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  11. Published

    Construction of bent functions from near-bent functions. / Leander, Gregor; McGuire, G.

    In: Journal of Combinatorial Theory, Series A, Vol. 116, No. 4, 2009, p. 960-970.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

Previous 1...3 4 5 6 7 8 9 10 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word