Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2012
  2. Published

    List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes. / Hernando, Fernando; Høholdt, Tom; Ruano , Diego.

    In: Advances in Mathematics of Communication, Vol. 6, No. 3, 2012, p. 259-272.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  3. Published

    Narrow-Bicliques: Cryptanalysis of Full IDEA. / Khovratovich, D.; Leurent, G.; Rechberger, C.

    In: Lecture Notes in Computer Science, Vol. 7237, 2012, p. 392-410.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  4. Published

    On-line Ciphers and the Hash-CBC Constructions. / Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde; Namprempre, C.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 640-679.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  5. Published

    On security arguments of the second round SHA-3 candidates. / Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart; Preneel, Bart; Rechberger, Christian.

    In: International Journal of Information Security, Vol. 11, No. 2, 2012, p. 103–120.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  6. Published

    On the distribution of linear biases: Three instructive examples. / Abdelraheem, Mohamed Ahmed; Beelen, Peter ; Leander, Gregor; Ågren, Martin.

    Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Vol. 7417 Springer, 2012. p. 50-67 (Lecture Notes in Computer Science, Vol. 7417).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  7. Published

    On the number of longest and almost longest cycles in cubic graphs. / Chia, Gek Ling; Thomassen, Carsten.

    In: Ars Combinatoria, Vol. 104, 2012, p. 307-320.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  8. Published

    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract. / Borghoff, J.; Canteaut, Anne Michele; Guneysu, T.; Kavun, E.B.; Knezevic, M.; Knudsen, Lars Ramkilde; Leander, Gregor; Nikov, V.; Paar, C.; Rechberger, Christian.

    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer, 2012. p. 208-225 (Lecture Notes in Computer Science, Vol. 7658).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  9. Published

    Security Analysis of Randomize-Hash-then-Sign Digital Signatures. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 748-779.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  10. Published

    Security, Privacy, and Applied Cryptography Engineering : Proceedings Second International Conference, SPACE 2012. / Bogdanov, Andrey (Editor); Sanadhya, Somitra (Editor).

    Springer, 2012. 185 p. (Lecture Notes in Computer Science, Vol. 7644).

    Publication: Research - peer-reviewBook – Annual report year: 2012

  11. Published

    Sur le nombre de points rationnels des variétés abéliennes et des Jacobiennes sur les corps finis. / Aubry, Yves; Haloui, Safia; Lachaud, Gilles.

    In: Academie des Sciences. Comptes Rendus. Mathematique, Vol. 350, No. 19-20, 2012, p. 907-910.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

Previous 1 2 3 4 5 6 7 8 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word