Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2010
  2. Published

    Cryptographic Hash Functions. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    Handbook of Information and Communication Security. ed. / Peter Stavroulakis; Mark Stamp. 1. ed. Berlin Heidelberg : Springer, 2010. p. 59-80 (Engineering).

    Publication: Research - peer-reviewBook chapter – Annual report year: 2010

  3. Published

    Interpolation and List Decoding of Algebraic Codes. / Brander, Kristian; Beelen, Peter (Supervisor); Høholdt, Tom (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2010.

    Publication: ResearchPh.D. thesis – Annual report year: 2010

  4. Published

    Second-Preimage Analysis of Reduced SHA-1. / Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6168, 2010, p. 104-116.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  5. Published

    Rebound Attacks on the Reduced Grøstl Hash Function. / Mendel, Florian; Rechberger, C.; Schlaffer, Martin; Thomsen, Søren S.

    In: Lecture Notes in Computer Science, Vol. 5985, 2010, p. 350–365.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  6. Published

    Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2. / Guo, Jian; Ling, San; Wang, Huaxiong; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6477, 2010, p. 56-75.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  7. Published

    Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. / Gauravaram, Praveen; Leurent, Gaëtan; Mendel, Florian; Plasencia, Maria Naya; Peyrin, Thomas; Rechberger, Christian; Schläffer, Martin.

    In: Lecture Notes in Computer Science, Vol. 6055, 2010, p. 419-436.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  8. Published

    Spanning trees and orientations of graphs. / Thomassen, Carsten.

    In: The Journal of Combinatorics, Vol. 1, No. 2, 2010, p. 101-111.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  9. Published

    A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. / Leander, Gregor; Bracken, Carl.

    In: Finite Fields and Their Applications, Vol. 16, No. 4, 2010, p. 231-242.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  10. Published

    Counting equations in algebraic attacks on block ciphers. / Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 127-135.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  11. Published

    Cryptanalysis of MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 23, No. 1, 2010, p. 72-90.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

Previous 1...3 4 5 6 7 8 9 10 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word