Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2009
  2. Published

    Cryptanalysis of an Iterated Halving-based hash function: CRUSH. / Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde; Naderi, M; Sadeghyian, B.

    In: I E T Information Security, Vol. 3, No. 4, 2009, p. 129-138.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  3. Published

    Cryptanalysis of C2. / Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor; Matusiewicz, Krystian.

    Advances in Cryptology - CRYPTO 2009: 29th Annual International Cryptology Conference. ed. / Shai Halevi. Vol. 5677 1st. ed. Belin Heldelberg New York : Springer, 2009. p. 250-266.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  4. Published

    Cryptanalysis of MDC-2. / Knudsen, Lars Ramkilde; Mendel, Florian; Rechberger, Christian; Thomsen, Søren Steffen.

    Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings.. ed. / Antoine Joux. Berlin / Heidelberg : Springer, 2009. p. 106-120 (Lecture Notes in Computer Science; No. 5479).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  5. Published

    Cryptanalysis of the LAKE Hash Family. / Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong.

    Fast Software Encryption. ed. / Orr Dunkelman. Vol. 5665 Berlin / Heidelberg : Springer, 2009. p. 156-179 (Lecture Notes in Computer Science; No. 5665).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  6. Published

    Da de hemmelige koder blev offentlige. / Zenner, Erik; Knudsen, Lars Ramkilde.

    Matematiske horisonter. Technical University of Denmark (DTU), 2009. p. 104-113.

    Publication: EducationBook chapter – Annual report year: 2009

  7. Published

    Decoding Foldes Reed-Solomon codes using Hensel-lifting. / Beelen, Peter; Brander, Kristian.

    Gröbner Bases, Coding, and Cryptography. 2009. p. 389-394.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  8. Published

    Decomposing a planar graph of girth 5 into an independent set and a forest. / Kawarabayashi, Ken-ichi; Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 99, No. 4, 2009, p. 674-684.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  9. Published

    Fejlrettende koder. / Beelen, Peter; Høholdt, Tom.

    Matematiske horisonter. Kgs. Lyngby : Danmarks Tekniske Universitet (DTU), 2009. p. 163-173.

    Publication: EducationBook chapter – Annual report year: 2009

  10. Published

    Grøstl Addendum. / Gauravaram, Praveen; Knudsen, Lars R.; Matusiewicz, Krystian; Mendel, Florian; Rechberger, Christian; Schläffer, Martin; Thomsen, Søren S.; Archives, The Pennsylvania State University CiteSeerX.

    2009, 5 p. Addendum.

    Publication: ResearchOther contribution – Annual report year: 2009

  11. Published

    Hash3: Proofs, Analysis and Implementation : Report on ECRYPT II Event on Hash Functions. / Gauravaram, Praveen.

    2009. 11 p. (MAT REPORT; No. 2009-03).

    Publication: ResearchReport – Annual report year: 2009

Previous 1...4 5 6 7 8 9 10 11 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word