Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2013
  2. Published

    The maximum number of minimal codewords in long codes. / Alahmadi, A.; Aldred, R.E.L.; dela Cruz, R.; Solé, P.; Thomassen, Carsten.

    In: Discrete Applied Mathematics, Vol. 161, No. 3, 2013, p. 424-429.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  3. 2012
  4. Published

    A closed form expression for the Drinfeld modular polynomial ΦT (X, Y ). / Bassa, Alp; Beelen, Peter .

    In: Archiv der Mathematik, Vol. 99, No. 3, 2012, p. 237-245.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  5. Published

    A new construction of highly nonlinear S-boxes. / Beelen, Peter; Leander, Gregor.

    In: Cryptography and Communications, Vol. 4, No. 1, 2012, p. 65-77.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  6. Published

    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. / Khovratovich, Dmitry; Rechberger, Christian; Savelieva, Alexandra.

    Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Springer, 2012. p. 244-263 (Lecture Notes in Computer Science, Vol. 7549).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  7. Published

    Bilinear Relative Equilibria of Identical Point Vortices. / Aref, H.; Beelen, Peter ; Brøns, Morten.

    In: Journal of Nonlinear Science, Vol. 22, No. 5, 2012, p. 849-885.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  8. Published

    Duals of Affine Grassmann Codes and Their Relatives. / Beelen, P.; Ghorpade, S. R.; Hoholdt, T.

    In: I E E E Transactions on Information Theory, Vol. 58, No. 6, 2012, p. 3843-3855.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  9. Published

    Eigenvalues and expansion of bipartite graphs. / Høholdt, Tom; Janwa, Heeralal.

    In: Designs, Codes and Cryptography, Vol. 65, No. 3, 2012, p. 259-273.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  10. Published

    Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-like Ciphers. / Abdelraheem, Mohamed Ahmed.

    Information Security and Cryptology – ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers. Springer, 2012. p. 368-382 (Lecture Notes in Computer Science, Vol. 7839).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  11. Published

    From the plane to higher surfaces. / Kawarabayashi, Ken-ichi; Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 102, No. 4, 2012, p. 852-868.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  12. Published

    Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract). / Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor; Standaert, Francois-Xavier; Steinberger, John; Tischhauser, E.

    Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Vol. 7417 Springer, 2012. p. 45-62 (Lecture Notes in Computer Science, Vol. 7417).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  13. Published

    List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes. / Hernando, Fernando; Høholdt, Tom; Ruano , Diego.

    In: Advances in Mathematics of Communication, Vol. 6, No. 3, 2012, p. 259-272.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  14. Published

    Narrow-Bicliques: Cryptanalysis of Full IDEA. / Khovratovich, D.; Leurent, G.; Rechberger, C.

    In: Lecture Notes in Computer Science, Vol. 7237, 2012, p. 392-410.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  15. Published

    On-line Ciphers and the Hash-CBC Constructions. / Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde; Namprempre, C.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 640-679.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  16. Published

    On security arguments of the second round SHA-3 candidates. / Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart; Preneel, Bart; Rechberger, Christian.

    In: International Journal of Information Security, Vol. 11, No. 2, 2012, p. 103–120.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  17. Published

    On the distribution of linear biases: Three instructive examples. / Abdelraheem, Mohamed Ahmed; Beelen, Peter ; Leander, Gregor; Ågren, Martin.

    Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Vol. 7417 Springer, 2012. p. 50-67 (Lecture Notes in Computer Science, Vol. 7417).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  18. Published

    On the number of longest and almost longest cycles in cubic graphs. / Chia, Gek Ling; Thomassen, Carsten.

    In: Ars Combinatoria, Vol. 104, 2012, p. 307-320.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  19. Published

    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract. / Borghoff, J.; Canteaut, Anne Michele; Guneysu, T.; Kavun, E.B.; Knezevic, M.; Knudsen, Lars Ramkilde; Leander, Gregor; Nikov, V.; Paar, C.; Rechberger, Christian.

    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer, 2012. p. 208-225 (Lecture Notes in Computer Science, Vol. 7658).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  20. Published

    Security Analysis of Randomize-Hash-then-Sign Digital Signatures. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 748-779.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  21. Published

    Security, Privacy, and Applied Cryptography Engineering : Proceedings Second International Conference, SPACE 2012. / Bogdanov, Andrey (Editor); Sanadhya, Somitra (Editor).

    Springer, 2012. 185 p. (Lecture Notes in Computer Science, Vol. 7644).

    Publication: Research - peer-reviewBook – Annual report year: 2012

  22. Published

    Sur le nombre de points rationnels des variétés abéliennes et des Jacobiennes sur les corps finis. / Aubry, Yves; Haloui, Safia; Lachaud, Gilles.

    In: Academie des Sciences. Comptes Rendus. Mathematique, Vol. 350, No. 19-20, 2012, p. 907-910.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  23. Published

    The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. / Bagheri, Nasour; Gauravaram, Praveen; Knudsen, Lars R.; Zenner, Erik.

    In: International Journal of Information Security, Vol. 11, No. 6, 2012, p. 419-434.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  24. Published

    The weak 3-flow conjecture and the weak circular flow. / Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 102, No. 2, 2012, p. 521-529.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  25. 2011
  26. Published

    A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. / Bogdanov, Andrey; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6544, 2011, p. 229-240.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  27. Published

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. / Leander, Gregor; Abdelraheem, Mohamed Ahmed; Alkhzaimi, Hoda A.; Zenner, Erik.

    Lecture Notes in Computer Science. Vol. 6841 Springer, 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  28. Published

    A proof of a conjecture by Schweizer on the Drinfeld modular polynomial ΦT (X, Y ). / Bassa, Alp; Beelen, Peter.

    In: Journal of Number Theory, Vol. 131, 2011, p. 1276-1285.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  29. Published

    Biclique cryptanalysis of the full AES. / Bogdanov, Andrey; Khovratovich, Dmitry; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 7073, 2011, p. 344-371.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  30. Published

    Bounding the number of points on a curve using a generalization of Weierstrass semigroups. / Beelen, Peter; Ruano, Diego.

    Proceedings of WCC. 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  31. Published

    Bounds on the degree of APN polynomials: the case of x −1 + g(x). / Leander, Gregor; Rodier, François.

    In: Designs, Codes and Cryptography, Vol. 59, No. 1-3, 2011, p. 207-222.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  32. Published

    C2 - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. 2. ed. Springer, 2011. p. 179-180.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  33. Published

    Counting all bent functions in dimension eight 99270589265934370305785861242880. / Langevin, Philippe; Leander, Gregor.

    In: Designs, Codes and Cryptography, Vol. 59, No. 1-3, 2011, p. 193-205.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  34. Published
  35. Published

    Decoding algorithms. / Peters, Christiane.

    Encyclopedia of Cryptography and Security. ed. / Henk C.A. van Tilborg; Sushil Jajodia. Springer, 2011.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  36. Published

    Deterministic Differential Properties of the Compression Function of BMW. / Guo, Jian; Thomsen, Søren Steffen.

    Selected Areas in Cryptography 2010: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, Revised Selected Papers. ed. / Alex Biryukov; Guang Gong; Douglas R. Stinson. Vol. 6544 Springer, 2011. p. 338-350 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  37. Published

    Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations. / Abdelraheem, Mohamed Ahmed; Leander, Gregor; Zenner, Erik.

    Lecture Notes in Computer Science. Vol. 6733 Springer, 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  38. Published

    D.SYM.4 SHA-3 Design and Cryptanalysis Report. / Gauravaram, Praveen; Thomsen, Søren Steffen.

    2011. (ECRYPT II - European Network of Excellence for Cryptology II).

    Publication: Research - peer-reviewReport – Annual report year: 2011

  39. Published

    Fast high-performance modeling tools for many-core architectures. / Glimberg, Stefan Lemvig; Engsig-Karup, Allan Peter; Sørensen, Hans Henrik Brandenborg; Gade-Nielsen, Nicolai Fog; Noer, Dennis; Zenner, Erik; Madsen, Morten Gorm.

    2011. Poster session presented at Model Based Control, Technical University of Denmark, .

    Publication: ResearchPoster – Annual report year: 2011

  40. Published

    Grinberg's Criterion Applied to Some Non-Planar Graphs. / Chia, G. L.; Thomassen, Carsten.

    In: Ars Combinatoria, Vol. 100, 2011, p. 3-7.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  41. Published

    Hill climbing algorithms and trivium. / Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian.

    Lecture Notes in Computer Science. Vol. 6544 Springer, 2011. p. 57-73 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  42. Published

    Improved security analysis of Fugue-256. / Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars Ramkilde; Lei, Wei.

    2011.

    Publication: Research - peer-reviewReport – Annual report year: 2011

  43. Published

    Improved security analysis of Fugue-256. / Gauravaram, Praveen; Bagheri, Nasoor; Knudsen, Lars Ramkilde; Wei, Lei.

    Proceedings of Australasian Conference on Information Security and Privacy: ACISP 2011. Springer, 2011. p. 439-443 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  44. Published
  45. Published

    Improved Software Implementation of DES Using CUDA and OpenCL. / Noer, Dennis; Engsig-Karup, Allan Peter; Zenner, Erik.

    Proceedings of the Western European Workshop on Research in Cryptology. 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  46. Published

    On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN. / Leander, Gregor.

    Lecture Notes in Computer Science. Vol. 6917 Springer, 2011. p. 303-322.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  47. Published

    On planarity of compact, locally connected, metric spaces. / Richter, R. Bruce; Rooney, Brendan; Thomassen, Carsten.

    In: Combinatorica, Vol. 31, No. 3, 2011, p. 365-376.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  48. Published

    On the complexity of some colorful problems parameterized by treewidth. / Fellows, Michael R.; Fomin, Fedor V.; Lokshtanov, Daniel; Rosamond, Frances; Saurabh, Sakel; Szeider, Stefan; Thomassen, Carsten.

    In: Information and Computation, Vol. 209, No. 2, 2011, p. 143-153.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  49. Published

    Post-Quantum Cryptography. / Gauthier Umana, Valérie; Knudsen, Lars Ramkilde (Supervisor); Leander, Gregor (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2011. 156 p.

    Publication: ResearchPh.D. thesis – Annual report year: 2011

  50. Published

    Practical near-collisions on the compression function of BMW. / Leurent, Gaëtan; Thomsen, Søren Steffen.

    Lecture Notes in Computer Science. ed. / Antoine Joux. Vol. 6733 Springer, 2011. p. 238-251.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  51. Published

    PRESENT - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. ed. / Henk C.A. Tilborg; Sushil Jajodia. 2. ed. Springer, 2011. p. 953-955.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  52. Published

    Rainbow paths with prescribed ends. / Alishahi, Meysam; Taherkhani, Ali; Thomassen, Carsten.

    In: The Electronic Journal of Combinatorics, Vol. 18, No. 1, 2011, p. P86.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  53. Published

    Spongent: A lightweight hash function. / Bogdanov, Andrey; Knežević, Miroslav; Leander, Gregor; Toz, Deniz; Varici, Kerem; Verbauwhede, Ingrid.

    Cryptographic hardware and embedded systems - CHES 2011. Proceedings. Vol. 6917 Springer, 2011. p. 312-325 (Lecture Notes in Computer Science, Vol. 6917).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

Previous 1 2 3 4 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word