Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. Research › Conference article
  2. Published

    A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. / Bogdanov, Andrey; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6544, 2011, p. 229-240.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  3. Published

    Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2. / Guo, Jian; Ling, San; Wang, Huaxiong; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6477, 2010, p. 56-75.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  4. Published

    Biclique cryptanalysis of the full AES. / Bogdanov, Andrey; Khovratovich, Dmitry; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 7073, 2011, p. 344-371.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  5. Published
  6. Published

    Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. / Gauravaram, Praveen; Leurent, Gaëtan; Mendel, Florian; Plasencia, Maria Naya; Peyrin, Thomas; Rechberger, Christian; Schläffer, Martin.

    In: Lecture Notes in Computer Science, Vol. 6055, 2010, p. 419-436.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  7. Published
  8. Published

    Narrow-Bicliques: Cryptanalysis of Full IDEA. / Khovratovich, D.; Leurent, G.; Rechberger, C.

    In: Lecture Notes in Computer Science, Vol. 7237, 2012, p. 392-410.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  9. Published

    Rebound Attacks on the Reduced Grøstl Hash Function. / Mendel, Florian; Rechberger, C.; Schlaffer, Martin; Thomsen, Søren S.

    In: Lecture Notes in Computer Science, Vol. 5985, 2010, p. 350–365.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  10. Published

    Second-Preimage Analysis of Reduced SHA-1. / Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6168, 2010, p. 104-116.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  11. Published

    The Minimum Distance of Graph Codes. / Høholdt, Tom; Justesen, Jørn.

    In: Lecture Notes in Computer Science, Vol. 6639, 2011, p. 201-212.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

Previous 1...3 4 5 6 7 8 9 10 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word