Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2010
  2. Published

    Affine Grassmann codes. / Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant.

    In: I E E E Transactions on Information Theory, Vol. 56, No. 7, 2010, p. 3166-3176.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  3. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 137-151.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  4. Published

    Efficient list decoding of a class of algebraic-geometry codes. / Beelen, Peter; Brander, Kristian.

    In: Advances in Mathematics of Communication, Vol. 4, No. 4, 2010, p. 485-518.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  5. Published

    Key-equations for list decoding of Reed-Solomon codes and how to solve them. / Beelen, Peter; Brander, Kristian.

    In: Journal of Symbolic Computation, Vol. 45, No. 7, 2010, p. 773-786.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  6. Published

    The Hassa-Witt invariant in some towers of function fields over finite fields. / Beelen, Peter; Bassa, Alp.

    In: Sociedade Brasileira de Matematica. Boletim, Nova Serie, Vol. 41, No. 4, 2010, p. 567-582.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  7. Published

    EPC: A Provably Secure Permutation Based Compression Function. / Bagheri, Nasour; Gauravaram, Praveen; Naderi, Majid; Sadeghiyan, Babak.

    In: I E I C E Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E93-A, No. 10, 2010, p. 1833-1836.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  8. 2009
  9. Published

    Da de hemmelige koder blev offentlige. / Zenner, Erik; Knudsen, Lars Ramkilde.

    Matematiske horisonter. Technical University of Denmark (DTU), 2009. p. 104-113.

    Publication: EducationBook chapter – Annual report year: 2009

  10. Published

    Fejlrettende koder. / Beelen, Peter; Høholdt, Tom.

    Matematiske horisonter. Kgs. Lyngby : Danmarks Tekniske Universitet (DTU), 2009. p. 163-173.

    Publication: EducationBook chapter – Annual report year: 2009

  11. Published

    Grøstl Addendum. / Gauravaram, Praveen; Knudsen, Lars R.; Matusiewicz, Krystian; Mendel, Florian; Rechberger, Christian; Schläffer, Martin; Thomsen, Søren S.; Archives, The Pennsylvania State University CiteSeerX.

    2009, 5 p. Addendum.

    Publication: ResearchOther contribution – Annual report year: 2009

  12. Published

    A Cache Timing Analysis of HC-256. / Zenner, Erik.

    Selected Areas in Cryptography: Workshop Proceedings. ed. / R. Avanzi; L. Keliher; F. Sica. Springer, 2009. p. 199-213 (Springer Lecture Notes in Computer Science (LNCS); No. 5381).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

Previous 1...4 5 6 7 8 9 10 11 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word