Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2013
  2. Published

    The maximum number of minimal codewords in long codes. / Alahmadi, A.; Aldred, R.E.L.; dela Cruz, R.; Solé, P.; Thomassen, Carsten.

    In: Discrete Applied Mathematics, Vol. 161, No. 3, 2013, p. 424-429.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  3. 2012
  4. Published

    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. / Khovratovich, Dmitry; Rechberger, Christian; Savelieva, Alexandra.

    Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Springer, 2012. p. 244-263 (Lecture Notes in Computer Science, Vol. 7549).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  5. Published

    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract. / Borghoff, J.; Canteaut, Anne Michele; Guneysu, T.; Kavun, E.B.; Knezevic, M.; Knudsen, Lars Ramkilde; Leander, Gregor; Nikov, V.; Paar, C.; Rechberger, Christian.

    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer, 2012. p. 208-225 (Lecture Notes in Computer Science, Vol. 7658).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  6. Published

    Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract). / Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor; Standaert, Francois-Xavier; Steinberger, John; Tischhauser, E.

    Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Vol. 7417 Springer, 2012. p. 45-62 (Lecture Notes in Computer Science, Vol. 7417).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  7. Published

    Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-like Ciphers. / Abdelraheem, Mohamed Ahmed.

    Information Security and Cryptology – ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers. Springer, 2012. p. 368-382 (Lecture Notes in Computer Science, Vol. 7839).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  8. Published

    On the distribution of linear biases: Three instructive examples. / Abdelraheem, Mohamed Ahmed; Beelen, Peter ; Leander, Gregor; Ågren, Martin.

    Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Vol. 7417 Springer, 2012. p. 50-67 (Lecture Notes in Computer Science, Vol. 7417).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  9. Published

    Security, Privacy, and Applied Cryptography Engineering : Proceedings Second International Conference, SPACE 2012. / Bogdanov, Andrey (Editor); Sanadhya, Somitra (Editor).

    Springer, 2012. 185 p. (Lecture Notes in Computer Science, Vol. 7644).

    Publication: Research - peer-reviewBook – Annual report year: 2012

  10. Published

    Narrow-Bicliques: Cryptanalysis of Full IDEA. / Khovratovich, D.; Leurent, G.; Rechberger, C.

    In: Lecture Notes in Computer Science, Vol. 7237, 2012, p. 392-410.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  11. Published

    The weak 3-flow conjecture and the weak circular flow. / Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 102, No. 2, 2012, p. 521-529.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  12. Published

    From the plane to higher surfaces. / Kawarabayashi, Ken-ichi; Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 102, No. 4, 2012, p. 852-868.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

Previous 1 2 3 4 5 6 7 8 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word