Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. Published

    A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. / Leander, Gregor; Bracken, Carl.

    In: Finite Fields and Their Applications, Vol. 16, No. 4, 2010, p. 231-242.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  2. Published

    Rebound Attacks on the Reduced Grøstl Hash Function. / Mendel, Florian; Rechberger, C.; Schlaffer, Martin; Thomsen, Søren S.

    In: Lecture Notes in Computer Science, Vol. 5985, 2010, p. 350–365.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  3. Published

    Cryptanalysis of the ESSENCE Family of Hash Functions. / Mouha, Nicky; Sekar, Gautham; Aumasson, Jean-Philippe; Peyrin, Thomas; Thomsen, Søren Steffen; Turan, Meltem Sönmez; Preneel, Bart.

    Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Springer, 2010. p. 15-34 (Lecture Notes in Computer Science; No. 6151).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  4. Published

    Second-Preimage Analysis of Reduced SHA-1. / Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6168, 2010, p. 104-116.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  5. Published

    Spanning trees and orientations of graphs. / Thomassen, Carsten.

    In: The Journal of Combinatorics, Vol. 1, No. 2, 2010, p. 101-111.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  6. Published

    Pseudo-cryptanalysis of the Original Blue Midnight Wish. / Thomsen, Søren Steffen.

    Fast Software Encryption 2010. Springer, 2010. p. 304-317 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  7. Published

    Block Cipher Analysis. / Miolane, Charlotte Vikkelsø; Knudsen, Lars Ramkilde (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2009. 176 p.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  8. Published

    Cryptographic Hash Functions. / Thomsen, Søren Steffen; Knudsen, Lars Ramkilde (Supervisor).

    2009.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  9. Published

    Preimages for Step-Reduced SHA-2. / Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei.

    Advances in Cryptology -- ASIACRYPT 2009. ed. / Mitsuru Matsui. Vol. 5912 Springer, 2009. p. 578-597 (Lecture Notes in Computer Science; No. 5912).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  10. Published

    Cryptanalysis of an Iterated Halving-based hash function: CRUSH. / Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde; Naderi, M; Sadeghyian, B.

    In: I E T Information Security, Vol. 3, No. 4, 2009, p. 129-138.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

Previous 1...4 5 6 7 8 9 10 11 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word