Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. E-pub ahead of print

    Analysis of Trivium by a Simulated Annealing variant. / Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian.

    Proceedings of the ECRYPT workshop on tools in cryptanalysis 2010. ed. / Francois-Xaver Standaert. 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  2. Published

    Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. / Gauravaram, Praveen; Leurent, Gaëtan; Mendel, Florian; Plasencia, Maria Naya; Peyrin, Thomas; Rechberger, Christian; Schläffer, Martin.

    In: Lecture Notes in Computer Science, Vol. 6055, 2010, p. 419-436.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  3. Published

    Cryptographic Hash Functions. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    Handbook of Information and Communication Security. ed. / Peter Stavroulakis; Mark Stamp. 1. ed. Berlin Heidelberg : Springer, 2010. p. 59-80 (Engineering).

    Publication: Research - peer-reviewBook chapter – Annual report year: 2010

  4. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 137-151.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  5. Published

    Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2. / Guo, Jian; Ling, San; Wang, Huaxiong; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6477, 2010, p. 56-75.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  6. Published

    Affine Grassmann codes. / Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant.

    In: I E E E Transactions on Information Theory, Vol. 56, No. 7, 2010, p. 3166-3176.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  7. Published

    Rotational Rebound Attacks on Reduced Skein. / Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian.

    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. ed. / Masayuki Abe. Springer, 2010. p. 1-19 (Lecture Notes in Computer Science, Vol. 6477).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  8. Published

    Counting equations in algebraic attacks on block ciphers. / Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 127-135.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  9. Published

    Cryptanalysis of MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 23, No. 1, 2010, p. 72-90.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  10. Published

    Cryptanalysis of Tav-128 hash function. / Kumar, Ashish; Sanadhya, Somitra Kumar; Gauravaram, Praveen; Safkhani, Masoumeh; Naderi, Majid.

    Proceedings of Indocrypt 2010: 11th International Conference on Cryptology in India. ed. / Guang Gong; Kishan Chand Gupta. Springer, 2010. p. 118-130 (Lecture Notes in Computer Science, Vol. 6498).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

Previous 1...3 4 5 6 7 8 9 10 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word