Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2009
  2. Published

    Cryptanalysis of MDC-2. / Knudsen, Lars Ramkilde; Mendel, Florian; Rechberger, Christian; Thomsen, Søren Steffen.

    Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings.. ed. / Antoine Joux. Berlin / Heidelberg : Springer, 2009. p. 106-120 (Lecture Notes in Computer Science; No. 5479).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  3. Published

    Cryptanalysis of the LAKE Hash Family. / Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong.

    Fast Software Encryption. ed. / Orr Dunkelman. Vol. 5665 Berlin / Heidelberg : Springer, 2009. p. 156-179 (Lecture Notes in Computer Science; No. 5665).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  4. Published

    Da de hemmelige koder blev offentlige. / Zenner, Erik; Knudsen, Lars Ramkilde.

    Matematiske horisonter. Technical University of Denmark (DTU), 2009. p. 104-113.

    Publication: EducationBook chapter – Annual report year: 2009

  5. Published

    Decoding Foldes Reed-Solomon codes using Hensel-lifting. / Beelen, Peter; Brander, Kristian.

    Gröbner Bases, Coding, and Cryptography. 2009. p. 389-394.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  6. Published

    Decomposing a planar graph of girth 5 into an independent set and a forest. / Kawarabayashi, Ken-ichi; Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 99, No. 4, 2009, p. 674-684.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  7. Published

    Fejlrettende koder. / Beelen, Peter; Høholdt, Tom.

    Matematiske horisonter. Kgs. Lyngby : Danmarks Tekniske Universitet (DTU), 2009. p. 163-173.

    Publication: EducationBook chapter – Annual report year: 2009

  8. Published

    Grøstl Addendum. / Gauravaram, Praveen; Knudsen, Lars R.; Matusiewicz, Krystian; Mendel, Florian; Rechberger, Christian; Schläffer, Martin; Thomsen, Søren S.; Archives, The Pennsylvania State University CiteSeerX.

    2009, 5 p. Addendum.

    Publication: ResearchOther contribution – Annual report year: 2009

  9. Published

    Hash3: Proofs, Analysis and Implementation : Report on ECRYPT II Event on Hash Functions. / Gauravaram, Praveen.

    2009. 11 p. (MAT REPORT; No. 2009-03).

    Publication: ResearchReport – Annual report year: 2009

  10. Published

    Hash functions and information theoretic security. / Bagheri, Nasoor; Knudsen, Lars Ramkilde; Naderi, Majid; Thomsen, Søren Steffen.

    In: I E I C E Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 12, 2009, p. 3401-3403.

    Publication: Research - peer-reviewLetter – Annual report year: 2009

  11. Published

    Nonce Generators and the Nonce Reset Problem. / Zenner, Erik.

    Proceedings ISC 2009. ed. / P. Samarati. Springer, 2009. p. 411-426 (Lecture Notes in Computer Science; No. 5735).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

Previous 1...6 7 8 9 10 11 12 13 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word