Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2009
  2. Published

    Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks. / Zenner, Erik.

    Kgs. Lyngby, Denmark : Technical University of Denmark, 2009. (MAT report).

    Publication: ResearchReport – Annual report year: 2009

  3. Published

    Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. / Bras-Amorós, Maria (Editor); Høholdt, Tom (Editor).

    Berlin : Springer, 2009. 243 p. (Lecture Notes in Computer Science; No. 5527).

    Publication: Research - peer-reviewBook – Annual report year: 2009

  4. Published

    A Practical Key Recovery Attack on Basic TCHo. / Leander, Gregor; Herrmann, Mathias.

    Public Key Cryptography - PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography. Springer, 2009. p. 411-424 (Lecture Notes in Computer Science; No. 5443).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  5. Published

    Bivium as a Mixed Integer Programming Problem. / Borghoff, Julia; Knudsen, Lars Ramkilde; Stolpe, Mathias.

    Cryptography and Coding: 12th IMA International Conference, Cryptography and Coding 2009 Cirencester, UK, DEcenber 2009. ed. / Matthew G. Parker. Springer, 2009. p. 133-152 (Lecture Notes of Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  6. Published

    Cache Timing Analysis of eStream Finalists. / Zenner, Erik (Invited author).

    Dagstuhl Seminar Proceedings. Seminar 09031: Symmetric Cryptography. ed. / Helena Handschuh; Stefan Lucks; Bart Preneel; Philip Rogaway. Schloss Dagstuhl, Germany : Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, 2009. (Dagstuhl Seminar Proceedings; No. 09031).

    Publication: ResearchArticle in proceedings – Annual report year: 2009

  7. Published

    Cache Timing Analysis of LFSR-based Stream Ciphers. / Zenner, Erik; Leander, Gregor; Hawkes, Philip.

    Cryptography and Coding. Berlin : Springer, 2009. (Lecture Notes in Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  8. Published

    Constructing new APN functions from known ones. / Budaghyan, L.; Carlet, C.; Leander, Gregor.

    In: Finite Fields and Their Applications, Vol. 15, No. 2, 2009, p. 150-159.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  9. Published

    Construction of bent functions from near-bent functions. / Leander, Gregor; McGuire, G.

    In: Journal of Combinatorial Theory, Series A, Vol. 116, No. 4, 2009, p. 960-970.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  10. Published

    Cryptanalysis of an Iterated Halving-based hash function: CRUSH. / Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde; Naderi, M; Sadeghyian, B.

    In: I E T Information Security, Vol. 3, No. 4, 2009, p. 129-138.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  11. Published

    Cryptanalysis of C2. / Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor; Matusiewicz, Krystian.

    Advances in Cryptology - CRYPTO 2009: 29th Annual International Cryptology Conference. ed. / Shai Halevi. Vol. 5677 1st. ed. Belin Heldelberg New York : Springer, 2009. p. 250-266.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

Previous 1...5 6 7 8 9 10 11 12 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word