Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2010
  2. Published

    On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. / Bagheri, Nasour; Gauravaram, Praveen; Naderi, Majid; Thomsen, Søren Steffen.

    Proceedings of the 9th International Conference on Cryptology and Network Security: ,. Vol. 6467 Springer, 2010. p. 96-105 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  3. E-pub ahead of print

    Analysis of Trivium by a Simulated Annealing variant. / Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian.

    Proceedings of the ECRYPT workshop on tools in cryptanalysis 2010. ed. / Francois-Xaver Standaert. 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  4. Published

    Rotational Rebound Attacks on Reduced Skein. / Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian.

    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. ed. / Masayuki Abe. Springer, 2010. p. 1-19 (Lecture Notes in Computer Science, Vol. 6477).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  5. Published

    Cryptanalysis of Tav-128 hash function. / Kumar, Ashish; Sanadhya, Somitra Kumar; Gauravaram, Praveen; Safkhani, Masoumeh; Naderi, Majid.

    Proceedings of Indocrypt 2010: 11th International Conference on Cryptology in India. ed. / Guang Gong; Kishan Chand Gupta. Springer, 2010. p. 118-130 (Lecture Notes in Computer Science, Vol. 6498).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  6. Published

    Cryptanalysis of the ESSENCE Family of Hash Functions. / Mouha, Nicky; Sekar, Gautham; Aumasson, Jean-Philippe; Peyrin, Thomas; Thomsen, Søren Steffen; Turan, Meltem Sönmez; Preneel, Bart.

    Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Springer, 2010. p. 15-34 (Lecture Notes in Computer Science; No. 6151).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  7. Published

    Pseudo-cryptanalysis of the Original Blue Midnight Wish. / Thomsen, Søren Steffen.

    Fast Software Encryption 2010. Springer, 2010. p. 304-317 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  8. 2009
  9. Published

    Block Cipher Analysis. / Miolane, Charlotte Vikkelsø; Knudsen, Lars Ramkilde (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2009. 176 p.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  10. Published

    Cryptographic Hash Functions. / Thomsen, Søren Steffen; Knudsen, Lars Ramkilde (Supervisor).

    2009.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  11. Published

    Cryptanalysis of an Iterated Halving-based hash function: CRUSH. / Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde; Naderi, M; Sadeghyian, B.

    In: I E T Information Security, Vol. 3, No. 4, 2009, p. 129-138.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  12. Published

    A generalization of Baker's theorem. / Beelen, Peter.

    In: Finite Fields and Their Applications, Vol. 15, No. 5, 2009, p. 558-568.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

Previous 1...4 5 6 7 8 9 10 11 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word