Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2012
  2. Published

    The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. / Bagheri, Nasour; Gauravaram, Praveen; Knudsen, Lars R.; Zenner, Erik.

    In: International Journal of Information Security, Vol. 11, No. 6, 2012, p. 419-434.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  3. Published

    The weak 3-flow conjecture and the weak circular flow. / Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 102, No. 2, 2012, p. 521-529.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  4. 2011
  5. Published

    A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. / Bogdanov, Andrey; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6544, 2011, p. 229-240.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  6. Published

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. / Leander, Gregor; Abdelraheem, Mohamed Ahmed; Alkhzaimi, Hoda A.; Zenner, Erik.

    Lecture Notes in Computer Science. Vol. 6841 Springer, 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  7. Published

    A proof of a conjecture by Schweizer on the Drinfeld modular polynomial ΦT (X, Y ). / Bassa, Alp; Beelen, Peter.

    In: Journal of Number Theory, Vol. 131, 2011, p. 1276-1285.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  8. Published

    Biclique cryptanalysis of the full AES. / Bogdanov, Andrey; Khovratovich, Dmitry; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 7073, 2011, p. 344-371.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  9. Published

    Bounding the number of points on a curve using a generalization of Weierstrass semigroups. / Beelen, Peter; Ruano, Diego.

    Proceedings of WCC. 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  10. Published

    Bounds on the degree of APN polynomials: the case of x −1 + g(x). / Leander, Gregor; Rodier, François.

    In: Designs, Codes and Cryptography, Vol. 59, No. 1-3, 2011, p. 207-222.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  11. Published

    C2 - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. 2. ed. Springer, 2011. p. 179-180.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  12. Published

    Counting all bent functions in dimension eight 99270589265934370305785861242880. / Langevin, Philippe; Leander, Gregor.

    In: Designs, Codes and Cryptography, Vol. 59, No. 1-3, 2011, p. 193-205.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

Previous 1 2 3 4 5 6 7 8 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word