Discrete mathematics

  • Department of Mathematics - Former organisational unit. 31/12/12. Taken over by Department of Applied Mathematics and Computer Science

  1. 2013
  2. Published

    The maximum number of minimal codewords in long codes. / Alahmadi, A.; Aldred, R.E.L.; dela Cruz, R.; Solé, P.; Thomassen, Carsten.

    In: Discrete Applied Mathematics, Vol. 161, No. 3, 2013, p. 424-429.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  3. 2012
  4. Published

    A closed form expression for the Drinfeld modular polynomial ΦT (X, Y ). / Bassa, Alp; Beelen, Peter .

    In: Archiv der Mathematik, Vol. 99, No. 3, 2012, p. 237-245.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  5. Published

    A new construction of highly nonlinear S-boxes. / Beelen, Peter; Leander, Gregor.

    In: Cryptography and Communications, Vol. 4, No. 1, 2012, p. 65-77.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  6. Published

    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. / Khovratovich, Dmitry; Rechberger, Christian; Savelieva, Alexandra.

    Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Springer, 2012. p. 244-263 (Lecture Notes in Computer Science, Vol. 7549).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  7. Published

    Bilinear Relative Equilibria of Identical Point Vortices. / Aref, H.; Beelen, Peter ; Brøns, Morten.

    In: Journal of Nonlinear Science, Vol. 22, No. 5, 2012, p. 849-885.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  8. Published

    Duals of Affine Grassmann Codes and Their Relatives. / Beelen, P.; Ghorpade, S. R.; Hoholdt, T.

    In: I E E E Transactions on Information Theory, Vol. 58, No. 6, 2012, p. 3843-3855.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  9. Published

    Eigenvalues and expansion of bipartite graphs. / Høholdt, Tom; Janwa, Heeralal.

    In: Designs, Codes and Cryptography, Vol. 65, No. 3, 2012, p. 259-273.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  10. Published

    Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-like Ciphers. / Abdelraheem, Mohamed Ahmed.

    Information Security and Cryptology – ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers. Springer, 2012. p. 368-382 (Lecture Notes in Computer Science, Vol. 7839).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  11. Published

    From the plane to higher surfaces. / Kawarabayashi, Ken-ichi; Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 102, No. 4, 2012, p. 852-868.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  12. Published

    Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract). / Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor; Standaert, Francois-Xavier; Steinberger, John; Tischhauser, E.

    Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Vol. 7417 Springer, 2012. p. 45-62 (Lecture Notes in Computer Science, Vol. 7417).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  13. Published

    List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes. / Hernando, Fernando; Høholdt, Tom; Ruano , Diego.

    In: Advances in Mathematics of Communication, Vol. 6, No. 3, 2012, p. 259-272.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  14. Published

    Narrow-Bicliques: Cryptanalysis of Full IDEA. / Khovratovich, D.; Leurent, G.; Rechberger, C.

    In: Lecture Notes in Computer Science, Vol. 7237, 2012, p. 392-410.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  15. Published

    On-line Ciphers and the Hash-CBC Constructions. / Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde; Namprempre, C.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 640-679.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  16. Published

    On security arguments of the second round SHA-3 candidates. / Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart; Preneel, Bart; Rechberger, Christian.

    In: International Journal of Information Security, Vol. 11, No. 2, 2012, p. 103–120.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  17. Published

    On the distribution of linear biases: Three instructive examples. / Abdelraheem, Mohamed Ahmed; Beelen, Peter ; Leander, Gregor; Ågren, Martin.

    Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Vol. 7417 Springer, 2012. p. 50-67 (Lecture Notes in Computer Science, Vol. 7417).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  18. Published

    On the number of longest and almost longest cycles in cubic graphs. / Chia, Gek Ling; Thomassen, Carsten.

    In: Ars Combinatoria, Vol. 104, 2012, p. 307-320.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  19. Published

    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract. / Borghoff, J.; Canteaut, Anne Michele; Guneysu, T.; Kavun, E.B.; Knezevic, M.; Knudsen, Lars Ramkilde; Leander, Gregor; Nikov, V.; Paar, C.; Rechberger, Christian.

    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer, 2012. p. 208-225 (Lecture Notes in Computer Science, Vol. 7658).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  20. Published

    Security Analysis of Randomize-Hash-then-Sign Digital Signatures. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 748-779.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  21. Published

    Security, Privacy, and Applied Cryptography Engineering : Proceedings Second International Conference, SPACE 2012. / Bogdanov, Andrey (Editor); Sanadhya, Somitra (Editor).

    Springer, 2012. 185 p. (Lecture Notes in Computer Science, Vol. 7644).

    Publication: Research - peer-reviewBook – Annual report year: 2012

  22. Published

    Sur le nombre de points rationnels des variétés abéliennes et des Jacobiennes sur les corps finis. / Aubry, Yves; Haloui, Safia; Lachaud, Gilles.

    In: Academie des Sciences. Comptes Rendus. Mathematique, Vol. 350, No. 19-20, 2012, p. 907-910.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  23. Published

    The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. / Bagheri, Nasour; Gauravaram, Praveen; Knudsen, Lars R.; Zenner, Erik.

    In: International Journal of Information Security, Vol. 11, No. 6, 2012, p. 419-434.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  24. Published

    The weak 3-flow conjecture and the weak circular flow. / Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 102, No. 2, 2012, p. 521-529.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  25. 2011
  26. Published

    A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. / Bogdanov, Andrey; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6544, 2011, p. 229-240.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  27. Published

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. / Leander, Gregor; Abdelraheem, Mohamed Ahmed; Alkhzaimi, Hoda A.; Zenner, Erik.

    Lecture Notes in Computer Science. Vol. 6841 Springer, 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  28. Published

    A proof of a conjecture by Schweizer on the Drinfeld modular polynomial ΦT (X, Y ). / Bassa, Alp; Beelen, Peter.

    In: Journal of Number Theory, Vol. 131, 2011, p. 1276-1285.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  29. Published

    Biclique cryptanalysis of the full AES. / Bogdanov, Andrey; Khovratovich, Dmitry; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 7073, 2011, p. 344-371.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  30. Published

    Bounding the number of points on a curve using a generalization of Weierstrass semigroups. / Beelen, Peter; Ruano, Diego.

    Proceedings of WCC. 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  31. Published

    Bounds on the degree of APN polynomials: the case of x −1 + g(x). / Leander, Gregor; Rodier, François.

    In: Designs, Codes and Cryptography, Vol. 59, No. 1-3, 2011, p. 207-222.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  32. Published

    C2 - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. 2. ed. Springer, 2011. p. 179-180.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  33. Published

    Counting all bent functions in dimension eight 99270589265934370305785861242880. / Langevin, Philippe; Leander, Gregor.

    In: Designs, Codes and Cryptography, Vol. 59, No. 1-3, 2011, p. 193-205.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  34. Published
  35. Published

    Decoding algorithms. / Peters, Christiane.

    Encyclopedia of Cryptography and Security. ed. / Henk C.A. van Tilborg; Sushil Jajodia. Springer, 2011.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  36. Published

    Deterministic Differential Properties of the Compression Function of BMW. / Guo, Jian; Thomsen, Søren Steffen.

    Selected Areas in Cryptography 2010: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, Revised Selected Papers. ed. / Alex Biryukov; Guang Gong; Douglas R. Stinson. Vol. 6544 Springer, 2011. p. 338-350 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  37. Published

    Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations. / Abdelraheem, Mohamed Ahmed; Leander, Gregor; Zenner, Erik.

    Lecture Notes in Computer Science. Vol. 6733 Springer, 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  38. Published

    D.SYM.4 SHA-3 Design and Cryptanalysis Report. / Gauravaram, Praveen; Thomsen, Søren Steffen.

    2011. (ECRYPT II - European Network of Excellence for Cryptology II).

    Publication: Research - peer-reviewReport – Annual report year: 2011

  39. Published

    Fast high-performance modeling tools for many-core architectures. / Glimberg, Stefan Lemvig; Engsig-Karup, Allan Peter; Sørensen, Hans Henrik Brandenborg; Gade-Nielsen, Nicolai Fog; Noer, Dennis; Zenner, Erik; Madsen, Morten Gorm.

    2011. Poster session presented at Model Based Control, Technical University of Denmark, .

    Publication: ResearchPoster – Annual report year: 2011

  40. Published

    Grinberg's Criterion Applied to Some Non-Planar Graphs. / Chia, G. L.; Thomassen, Carsten.

    In: Ars Combinatoria, Vol. 100, 2011, p. 3-7.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  41. Published

    Hill climbing algorithms and trivium. / Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian.

    Lecture Notes in Computer Science. Vol. 6544 Springer, 2011. p. 57-73 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  42. Published

    Improved security analysis of Fugue-256. / Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars Ramkilde; Lei, Wei.

    2011.

    Publication: Research - peer-reviewReport – Annual report year: 2011

  43. Published

    Improved security analysis of Fugue-256. / Gauravaram, Praveen; Bagheri, Nasoor; Knudsen, Lars Ramkilde; Wei, Lei.

    Proceedings of Australasian Conference on Information Security and Privacy: ACISP 2011. Springer, 2011. p. 439-443 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  44. Published
  45. Published

    Improved Software Implementation of DES Using CUDA and OpenCL. / Noer, Dennis; Engsig-Karup, Allan Peter; Zenner, Erik.

    Proceedings of the Western European Workshop on Research in Cryptology. 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  46. Published

    On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN. / Leander, Gregor.

    Lecture Notes in Computer Science. Vol. 6917 Springer, 2011. p. 303-322.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  47. Published

    On planarity of compact, locally connected, metric spaces. / Richter, R. Bruce; Rooney, Brendan; Thomassen, Carsten.

    In: Combinatorica, Vol. 31, No. 3, 2011, p. 365-376.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  48. Published

    On the complexity of some colorful problems parameterized by treewidth. / Fellows, Michael R.; Fomin, Fedor V.; Lokshtanov, Daniel; Rosamond, Frances; Saurabh, Sakel; Szeider, Stefan; Thomassen, Carsten.

    In: Information and Computation, Vol. 209, No. 2, 2011, p. 143-153.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  49. Published

    Post-Quantum Cryptography. / Gauthier Umana, Valérie; Knudsen, Lars Ramkilde (Supervisor); Leander, Gregor (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2011. 156 p.

    Publication: ResearchPh.D. thesis – Annual report year: 2011

  50. Published

    Practical near-collisions on the compression function of BMW. / Leurent, Gaëtan; Thomsen, Søren Steffen.

    Lecture Notes in Computer Science. ed. / Antoine Joux. Vol. 6733 Springer, 2011. p. 238-251.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  51. Published

    PRESENT - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. ed. / Henk C.A. Tilborg; Sushil Jajodia. 2. ed. Springer, 2011. p. 953-955.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  52. Published

    Rainbow paths with prescribed ends. / Alishahi, Meysam; Taherkhani, Ali; Thomassen, Carsten.

    In: The Electronic Journal of Combinatorics, Vol. 18, No. 1, 2011, p. P86.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  53. Published

    Spongent: A lightweight hash function. / Bogdanov, Andrey; Knežević, Miroslav; Leander, Gregor; Toz, Deniz; Varici, Kerem; Verbauwhede, Ingrid.

    Cryptographic hardware and embedded systems - CHES 2011. Proceedings. Vol. 6917 Springer, 2011. p. 312-325 (Lecture Notes in Computer Science, Vol. 6917).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  54. Published

    Switchings, extensions, and reductions in central digraphs. / Kündgen, André; Leander, Gregor; Thomassen, Carsten.

    In: Journal of Combinatorial Theory, Series A, Vol. 118, No. 7, 2011, p. 2025-2034.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  55. Published

    The Galois closure of Drinfeld modular towers. / Bassa, Alp; Beelen, Peter.

    In: Journal of Number Theory, Vol. 131, No. 3, 2011, p. 561-577.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  56. Published

    The Minimum Distance of Graph Codes. / Høholdt, Tom; Justesen, Jørn.

    In: Lecture Notes in Computer Science, Vol. 6639, 2011, p. 201-212.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  57. Published

    Wild McEliece Incognito. / Bernstein, Daniel J.; Lange, Tanja; Peters, Christiane.

    Lecture Notes in Computer Science. Vol. 7071 Springer, 2011. p. 244-254.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  58. 2010
  59. Published

    Interpolation and List Decoding of Algebraic Codes. / Brander, Kristian; Beelen, Peter (Supervisor); Høholdt, Tom (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2010.

    Publication: ResearchPh.D. thesis – Annual report year: 2010

  60. Published

    Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2. / Guo, Jian; Ling, San; Wang, Huaxiong; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6477, 2010, p. 56-75.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  61. Published

    Affine Grassmann codes. / Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant.

    In: I E E E Transactions on Information Theory, Vol. 56, No. 7, 2010, p. 3166-3176.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  62. Published

    A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. / Leander, Gregor; Bracken, Carl.

    In: Finite Fields and Their Applications, Vol. 16, No. 4, 2010, p. 231-242.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  63. E-pub ahead of print

    Analysis of Trivium by a Simulated Annealing variant. / Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian.

    Proceedings of the ECRYPT workshop on tools in cryptanalysis 2010. ed. / Francois-Xaver Standaert. 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  64. Published

    Counting equations in algebraic attacks on block ciphers. / Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 127-135.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  65. Published

    Cryptanalysis of MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 23, No. 1, 2010, p. 72-90.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  66. Published

    Cryptanalysis of Tav-128 hash function. / Kumar, Ashish; Sanadhya, Somitra Kumar; Gauravaram, Praveen; Safkhani, Masoumeh; Naderi, Majid.

    Proceedings of Indocrypt 2010: 11th International Conference on Cryptology in India. ed. / Guang Gong; Kishan Chand Gupta. Springer, 2010. p. 118-130 (Lecture Notes in Computer Science, Vol. 6498).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  67. Published

    Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. / Gauravaram, Praveen; Leurent, Gaëtan; Mendel, Florian; Plasencia, Maria Naya; Peyrin, Thomas; Rechberger, Christian; Schläffer, Martin.

    In: Lecture Notes in Computer Science, Vol. 6055, 2010, p. 419-436.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  68. Published

    Cryptanalysis of the ESSENCE Family of Hash Functions. / Mouha, Nicky; Sekar, Gautham; Aumasson, Jean-Philippe; Peyrin, Thomas; Thomsen, Søren Steffen; Turan, Meltem Sönmez; Preneel, Bart.

    Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Springer, 2010. p. 15-34 (Lecture Notes in Computer Science; No. 6151).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  69. Published

    Cryptographic Hash Functions. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    Handbook of Information and Communication Security. ed. / Peter Stavroulakis; Mark Stamp. 1. ed. Berlin Heidelberg : Springer, 2010. p. 59-80 (Engineering).

    Publication: Research - peer-reviewBook chapter – Annual report year: 2010

  70. Published

    Efficient list decoding of a class of algebraic-geometry codes. / Beelen, Peter; Brander, Kristian.

    In: Advances in Mathematics of Communication, Vol. 4, No. 4, 2010, p. 485-518.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  71. Published

    EPC: A Provably Secure Permutation Based Compression Function. / Bagheri, Nasour; Gauravaram, Praveen; Naderi, Majid; Sadeghiyan, Babak.

    In: I E I C E Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E93-A, No. 10, 2010, p. 1833-1836.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  72. Published

    Key-equations for list decoding of Reed-Solomon codes and how to solve them. / Beelen, Peter; Brander, Kristian.

    In: Journal of Symbolic Computation, Vol. 45, No. 7, 2010, p. 773-786.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  73. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 137-151.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  74. Published

    On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. / Bagheri, Nasour; Gauravaram, Praveen; Naderi, Majid; Thomsen, Søren Steffen.

    Proceedings of the 9th International Conference on Cryptology and Network Security: ,. Vol. 6467 Springer, 2010. p. 96-105 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  75. Published

    Pseudo-cryptanalysis of the Original Blue Midnight Wish. / Thomsen, Søren Steffen.

    Fast Software Encryption 2010. Springer, 2010. p. 304-317 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  76. Published

    Rebound Attacks on the Reduced Grøstl Hash Function. / Mendel, Florian; Rechberger, C.; Schlaffer, Martin; Thomsen, Søren S.

    In: Lecture Notes in Computer Science, Vol. 5985, 2010, p. 350–365.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  77. Published

    Rotational Rebound Attacks on Reduced Skein. / Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian.

    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. ed. / Masayuki Abe. Springer, 2010. p. 1-19 (Lecture Notes in Computer Science, Vol. 6477).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  78. Published

    Second-Preimage Analysis of Reduced SHA-1. / Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6168, 2010, p. 104-116.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  79. Published

    Spanning trees and orientations of graphs. / Thomassen, Carsten.

    In: The Journal of Combinatorics, Vol. 1, No. 2, 2010, p. 101-111.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  80. Published

    The Hassa-Witt invariant in some towers of function fields over finite fields. / Beelen, Peter; Bassa, Alp.

    In: Sociedade Brasileira de Matematica. Boletim, Nova Serie, Vol. 41, No. 4, 2010, p. 567-582.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  81. 2009
  82. Published

    Block Cipher Analysis. / Miolane, Charlotte Vikkelsø; Knudsen, Lars Ramkilde (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2009. 176 p.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  83. Published

    Cryptographic Hash Functions. / Thomsen, Søren Steffen; Knudsen, Lars Ramkilde (Supervisor).

    2009.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  84. Published

    A Cache Timing Analysis of HC-256. / Zenner, Erik.

    Selected Areas in Cryptography: Workshop Proceedings. ed. / R. Avanzi; L. Keliher; F. Sica. Springer, 2009. p. 199-213 (Springer Lecture Notes in Computer Science (LNCS); No. 5381).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  85. Published

    A generalization of Baker's theorem. / Beelen, Peter.

    In: Finite Fields and Their Applications, Vol. 15, No. 5, 2009, p. 558-568.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  86. Published

    Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks. / Zenner, Erik.

    Kgs. Lyngby, Denmark : Technical University of Denmark, 2009. (MAT report).

    Publication: ResearchReport – Annual report year: 2009

  87. Published

    Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. / Bras-Amorós, Maria (Editor); Høholdt, Tom (Editor).

    Berlin : Springer, 2009. 243 p. (Lecture Notes in Computer Science; No. 5527).

    Publication: Research - peer-reviewBook – Annual report year: 2009

  88. Published

    A Practical Key Recovery Attack on Basic TCHo. / Leander, Gregor; Herrmann, Mathias.

    Public Key Cryptography - PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography. Springer, 2009. p. 411-424 (Lecture Notes in Computer Science; No. 5443).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  89. Published

    Bivium as a Mixed Integer Programming Problem. / Borghoff, Julia; Knudsen, Lars Ramkilde; Stolpe, Mathias.

    Cryptography and Coding: 12th IMA International Conference, Cryptography and Coding 2009 Cirencester, UK, DEcenber 2009. ed. / Matthew G. Parker. Springer, 2009. p. 133-152 (Lecture Notes of Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  90. Published

    Cache Timing Analysis of eStream Finalists. / Zenner, Erik (Invited author).

    Dagstuhl Seminar Proceedings. Seminar 09031: Symmetric Cryptography. ed. / Helena Handschuh; Stefan Lucks; Bart Preneel; Philip Rogaway. Schloss Dagstuhl, Germany : Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, 2009. (Dagstuhl Seminar Proceedings; No. 09031).

    Publication: ResearchArticle in proceedings – Annual report year: 2009

  91. Published

    Cache Timing Analysis of LFSR-based Stream Ciphers. / Zenner, Erik; Leander, Gregor; Hawkes, Philip.

    Cryptography and Coding. Berlin : Springer, 2009. (Lecture Notes in Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  92. Published

    Constructing new APN functions from known ones. / Budaghyan, L.; Carlet, C.; Leander, Gregor.

    In: Finite Fields and Their Applications, Vol. 15, No. 2, 2009, p. 150-159.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  93. Published

    Construction of bent functions from near-bent functions. / Leander, Gregor; McGuire, G.

    In: Journal of Combinatorial Theory, Series A, Vol. 116, No. 4, 2009, p. 960-970.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  94. Published

    Cryptanalysis of an Iterated Halving-based hash function: CRUSH. / Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde; Naderi, M; Sadeghyian, B.

    In: I E T Information Security, Vol. 3, No. 4, 2009, p. 129-138.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  95. Published

    Cryptanalysis of C2. / Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor; Matusiewicz, Krystian.

    Advances in Cryptology - CRYPTO 2009: 29th Annual International Cryptology Conference. ed. / Shai Halevi. Vol. 5677 1st. ed. Belin Heldelberg New York : Springer, 2009. p. 250-266.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  96. Published

    Cryptanalysis of MDC-2. / Knudsen, Lars Ramkilde; Mendel, Florian; Rechberger, Christian; Thomsen, Søren Steffen.

    Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings.. ed. / Antoine Joux. Berlin / Heidelberg : Springer, 2009. p. 106-120 (Lecture Notes in Computer Science; No. 5479).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  97. Published

    Cryptanalysis of the LAKE Hash Family. / Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong.

    Fast Software Encryption. ed. / Orr Dunkelman. Vol. 5665 Berlin / Heidelberg : Springer, 2009. p. 156-179 (Lecture Notes in Computer Science; No. 5665).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  98. Published

    Da de hemmelige koder blev offentlige. / Zenner, Erik; Knudsen, Lars Ramkilde.

    Matematiske horisonter. Technical University of Denmark (DTU), 2009. p. 104-113.

    Publication: EducationBook chapter – Annual report year: 2009

  99. Published

    Decoding Foldes Reed-Solomon codes using Hensel-lifting. / Beelen, Peter; Brander, Kristian.

    Gröbner Bases, Coding, and Cryptography. 2009. p. 389-394.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  100. Published

    Decomposing a planar graph of girth 5 into an independent set and a forest. / Kawarabayashi, Ken-ichi; Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 99, No. 4, 2009, p. 674-684.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  101. Published

    Fejlrettende koder. / Beelen, Peter; Høholdt, Tom.

    Matematiske horisonter. Kgs. Lyngby : Danmarks Tekniske Universitet (DTU), 2009. p. 163-173.

    Publication: EducationBook chapter – Annual report year: 2009

  102. Published

    Grøstl Addendum. / Gauravaram, Praveen; Knudsen, Lars R.; Matusiewicz, Krystian; Mendel, Florian; Rechberger, Christian; Schläffer, Martin; Thomsen, Søren S.; Archives, The Pennsylvania State University CiteSeerX.

    2009, 5 p. Addendum.

    Publication: ResearchOther contribution – Annual report year: 2009

  103. Published

    Hash3: Proofs, Analysis and Implementation : Report on ECRYPT II Event on Hash Functions. / Gauravaram, Praveen.

    2009. 11 p. (MAT REPORT; No. 2009-03).

    Publication: ResearchReport – Annual report year: 2009

  104. Published

    Hash functions and information theoretic security. / Bagheri, Nasoor; Knudsen, Lars Ramkilde; Naderi, Majid; Thomsen, Søren Steffen.

    In: I E I C E Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 12, 2009, p. 3401-3403.

    Publication: Research - peer-reviewLetter – Annual report year: 2009

  105. Published

    Nonce Generators and the Nonce Reset Problem. / Zenner, Erik.

    Proceedings ISC 2009. ed. / P. Samarati. Springer, 2009. p. 411-426 (Lecture Notes in Computer Science; No. 5735).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  106. Published

    On randomizing hash functions to strengthen the security of digital signatures. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    Proceedings of Eurocrypt-2009. ed. / Antoine Joux. Vol. 5479 Berlin Heidelberg New York : Springer, 2009. p. 88-105 (Lecture Notes in Computer Science; No. 5479).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  107. Published

    On the construction of Galois towers. / Bassa, Alp (Invited author); Beelen, Peter (Invited author).

    Contemporary Mathematics: Arithmetic, Geometry Cryptography and Coding Theory. Vol. 487 2009. p. 9-20.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  108. Published

    On the structure of generalized toric codes. / Ruano, Diego.

    In: Journal of Symbolic Computation, Vol. 44, No. 5, 2009, p. 499-506.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  109. Published

    Optimal Bipartitet Ramanujan Graphs from Balanced Incomplete Block Designs: Their Characterization and Applications to Expander/LDPC Codes.. / Høholdt, Tom (Invited author); Janwa, Heeralal (Invited author).

    Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes: Springer Lecture Notes in Computer Science. Vol. 5527 Berlin : Springer, 2009. p. 53-65.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  110. Published

    Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. / Guo, Jian; Matusiewicz, Krystian; Knudsen, Lars Ramkilde; Ling, San; Wang, Huaxiong.

    Selected Areas in Cryptography: 16th Annual International Workshop. ed. / Michael J. Jacobson; Vincent Rijmen; Reihaneh Safavi-Naini. Vol. 5867 1st. ed. Berlin Heidelberg : Springer, 2009. p. 141-156.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  111. Published

    Preimages for Step-Reduced SHA-2. / Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei.

    Advances in Cryptology -- ASIACRYPT 2009. ed. / Mitsuru Matsui. Vol. 5912 Springer, 2009. p. 578-597 (Lecture Notes in Computer Science; No. 5912).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  112. Published

    Rebound Attack on the Full LANE Compression Function. / Matusiewicz, Krystian; Naya-Plasencia, Maria; Nikolic, Ivica; Sasaki, Yu; Martin Schlaeffer, Martin.

    Advances in Cryptology -- ASIACRYPT 2009. ed. / Mitsuru Matsui. Vol. 5912 1. ed. Springer, 2009. p. 106-125 (Lecture Notes in Computer Science; No. 5912).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  113. Published

    The chromatic polynomial and list colorings. / Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 99, No. 2, 2009, p. 474-479.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  114. Published

    The order bound for toric codes. / Beelen, Peter (Invited author); Ruano, Diego (Invited author).

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5527 Springer, 2009. p. 1-10.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  115. Published

    The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. / Mendel, Florian; Rechberger, Christian; Schläffer, Martin; Thomsen, Søren Steffen.

    Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers. ed. / Orr Dunkelman. Springer, 2009. p. 260-276 (Lecture Notes in Computer Science; No. 5665).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  116. 2008
  117. Published

    2-list-coloring planar graphs without monochromatic triangles. / Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 98, No. 6, 2008, p. 1337-1348.

    Publication: Research - peer-reviewJournal article – Annual report year: 2008

  118. Published

    Advances in Algebraic Geometry Codes. / Martinez-Moro, Edgar (Editor); Munuera, Carlos (Editor); Ruano, Diego (Editor).

    World Scientific Publishing Co Pte Ltd, 2008. 452 p. (Series on Coding Theory and Cryptology; No. 5).

    Publication: Research - peer-reviewBook – Annual report year: 2008

  119. Published

    An Optimal Unramified Tower of Function Fields. / Brander, Kristian.

    Algebraic Geometry and its Applications: Proceedings of the First SAGA Conference. World Scientific Publishing Co Pte Ltd, 2008. p. 351-365 (Series on Number Theory and Its Applications, Vol. 5).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  120. Published

    A Syndrome Formulation of the Interpolation Step in the Guruswami-Sudan Algorithm. / Beelen, Peter (Invited author); Høholdt, Tom (Invited author).

    Coding Theory and Applications: 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Proceedings. 1. ed. Springer, 2008. p. 20-32.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  121. Published

    Cache Timing Analysis of HC-256. / Zenner, Erik.

    Workshop Record SASC. ed. / Christophe de Cannière. 2008.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  122. Published

    Concrete Security for Entity Recognition: The Jane Doe Protocol. / Lucks, Stefan; Zenner, Erik; Weimerskirch, Andre; Westhoff, Dirk.

    Progress in Cryptology - INDOCRYPT 2008. ed. / Dipanwita Roy Chowdhury; Vincent Rijmen; Abhijit Das. Springer, 2008. p. 158-171 (Lecture Notes in Computer Science; No. 5365).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  123. Published

    Dakota - hashing from a combination of modular arithmetic and symmetric cryptography. / Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    Technical University of Denmark, 2008. 10 p. (MAT report; No. 2008-02).

    Publication: ResearchReport – Annual report year: 2008

  124. Published

    Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. / Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    Applied Cryptography and Network Security 2008: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings. ed. / Steven M. Bellovin; Rosario Gennaro; Angelos Keromytis; Moti Yung. Springer, 2008. p. 144-155 (Lecture Notes in Computer Science; No. 5037).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  125. Published

    Decompositions of highly connected graphs into paths of length 3. / Thomassen, Carsten.

    In: Journal of Graph Theory, Vol. 58, 2008, p. 286-292.

    Publication: Research - peer-reviewJournal article – Annual report year: 2008

  126. Published

    Edge-decompositions of highly connected graphs into paths. / Thomassen, Carsten.

    In: Universitaet Hamburg. Mathematisches Seminar. Abhandlungen, Vol. 78, No. 1, 2008, p. 17-26.

    Publication: Research - peer-reviewJournal article – Annual report year: 2008

  127. Published

    Graph-like continua, augmenting arcs, and Menger's theorem. / Thomassen, Carsten; Vella, Antoine.

    In: Combinatorica, Vol. 28, No. 5, 2008, p. 595-623.

    Publication: Research - peer-reviewJournal article – Annual report year: 2008

  128. Published

    Linear-XOR and Additive Checksums Don't Protect Damgard-Merkle Hashes. / Gauravaram, Praveen; Kelsey, John.

    RSA Conference 2008, Cryptographers' Track. ed. / Tal Malkin. Springer, 2008. p. 36-51 (Lecture Notes in Computer Science; No. 4964).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  129. Published

    List decoding using syndromes. / Høholdt, Tom (Invited author); Beelen, Peter (Invited author).

    Series on Number Theory and Its Applications: Algebraic Geometry and Its Applications. Vol. 5 World Scientific Publishing Co Pte Ltd, 2008.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  130. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    2008. (MAT report; No. 2008-06).

    Publication: Research - peer-reviewReport – Annual report year: 2008

  131. Published

    On the maximum number of cycles in a planar graph. / Aldred, R.E.L.; Thomassen, Carsten.

    In: Journal of Graph Theory, Vol. 57, No. 3, 2008, p. 255-264.

    Publication: Research - peer-reviewJournal article – Annual report year: 2008

  132. Published

    Periodic Ciphers with Small Blocks and Cryptanalysis of KeeLoq. / Courtois, Nicolas T.; Bard, Gregory V.; Bogdanov, Andrey.

    Tatracrypt '07 - 7th Central Europe Conference Of Cryptology. Slovak Academy Sciences Mathematical Institute, 2008. p. 167-188 (Tatra Mountains Mathematical Publications, Vol. 41).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  133. Published

    Polyedre : Mappe og udklipsark. / Knudsen, Lars Ramkilde; Markvorsen, Steen; Sloth, Hans.

    1. udgave ed. Egtved : Forlaget TRIP, 2008. 15 p.

    Publication: EducationBook – Annual report year: 2008

  134. Published

    Proposals for Iterated Hash Functions. / Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    E-Business and Telecommunication Networks: Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papers. Vol. 2 2008. p. 107-118 (Communications in Computer and Information Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  135. Published

    Side channel analysis of some hash based MACs: A response to SHA-3 requirements. / Gauravaram, Praveen; Okeya, Katsuyuki.

    Information and Communications Security: 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings. ed. / Liqun Chen; Mark Ryan; Guilin Wang. 10. ed. Springer, 2008. p. 111-127 (Lecture Notes in Computer Science; No. 5308).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  136. Published

    Side channel analysis of some hash based MACs:A response to SHA-3 requirements. / Gauravaram, Praveen (Author); Okeya, Katsuyuki (Author).

    2008. 10th International Conference on Information and Communication Security, Birmingham, United Kingdom, 20/10/08.

    Publication: ResearchSound/Visual production (digital) – Annual report year: 2008

  137. Published

    The Anaconda hash functions. / Thomsen, Søren Steffen.

    2008. (MAT report; No. 2008-05).

    Publication: Research - peer-reviewReport – Annual report year: 2008

  138. Published

    The Decoding of Algebraic Geometry Codes. / Beelen, Peter; Høholdt, Tom.

    Series on Coding Theory and Cryptology: Advances in Algebraic Geometry Codes. Vol. volume 5 World Scientific Publishing Co Pte Ltd, 2008. p. 49-98.

    Publication: ResearchBook chapter – Annual report year: 2008

  139. Published

    The Rabbit Stream Cipher. / Boesgaard, Martin; Vesterager, Mette; Zenner, Erik.

    New Stream Cipher Designs: The eStream Finalists. ed. / Matthew Robshaw; Olivier Billet. Berlin : Springer, 2008. p. 69-83 (Lecture Notes in Computer Science; No. 4986).

    Publication: ResearchBook chapter – Annual report year: 2008

  140. Published

    Toric Codes. / Martinez-Moro, Edgar; Ruano, Diego.

    Advances in Algebraic Geometry Codes. Vol. 5 1. ed. World Scientific Publishing Co Pte Ltd, 2008. p. 295-322 (Series on Coding Theory and Cryptology).

    Publication: ResearchBook chapter – Annual report year: 2008

  141. 2007
  142. Published

    Analysis of Iterated Hard Decision Decoding of Product Codes with Reed-Solomon Component Codes. / Justesen, Jørn (Invited author); Høholdt, Tom (Invited author).

    IEEE Information Theory Workshop, 2007. ITW '07.. Lake Tahoe : IEEE, 2007.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  143. Published

    An update on the side channel cryptanalysis of MACs based on cryptographic hash functions. / Gauravaram, Praveen; Okeya, Katsuyuki.

    INDOCRYPT 2007: 8th International Conference on Cryptology in India. ed. / Kannan Srinathan; Pandu Rangan; Moti Yung. Vol. 4859 Berlin Heidelberg : Springer-Verlag, 2007. p. 393-403 (Lecture Notes in Computer Science; No. 4859).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  144. Published

    Cryptanalysis of the CRUSH Hash Function. / Knudsen, Lars Ramkilde; Henricksen, Matt.

    Selected Areas in Cryptography: SAC 2007. Berlin : Springer Verlag, 2007. p. 74-83 (Lecture Notes in Computer Science; No. 4876).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  145. Published

    Exponentially many 5-list-colorings of planar graphs. / Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 97, No. 4, 2007, p. 571-583.

    Publication: Research - peer-reviewJournal article – Annual report year: 2007

  146. Published

    Hajos' conjecture for line graphs. / Thomassen, Carsten.

    In: Journal of Combinatorial Theory, Ser. B., Vol. 97, 2007, p. 156-157.

    Publication: Research - peer-reviewJournal article – Annual report year: 2007

  147. Published

    Iterative List Decoding of Some LDPC Codes. / Justesen, Jørn; Høholdt, Tom; Hjaltason, Johann.

    In: IEEE Transactions on Information Theory, Vol. 53, No. 11, 2007, p. 4276-4284.

    Publication: Research - peer-reviewJournal article – Annual report year: 2007

  148. Published

    Known-Key Distinguishers for Some Block Ciphers. / Knudsen, Lars Ramkilde; Rijmen, Vincent.

    Advances in Cryptology: ASIACRYPT 2007. Berlin : Springer Verlag, 2007. p. 315-324 (Lecture Notes in Computer Science; No. 4833).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  149. Published

    Many 3-colorings of triangle-free planar graphs. / Thomassen, Carsten.

    In: Journal of Combinatorial Theory, Ser. B, Vol. 97, 2007, p. 334-349.

    Publication: Research - peer-reviewJournal article – Annual report year: 2007

  150. Published

    On the chromatic number of pentagon-free graphs of large minimum degree. / Thomassen, Carsten.

    In: Combinatorica, Vol. 27, No. 2, 2007, p. 241-243.

    Publication: Research - peer-reviewJournal article – Annual report year: 2007

  151. Published

    On the complexity of some colorful problems parametrized by treewidth. / Fellows, Michael (Invited author); Fomin, Fedor (Invited author); Lokshanov, Daniel (Invited author); Rosamund, Frances (Invited author); Saurabh, Saket (Invited author); Szeider, Stefan (Invited author); Thomassen, Carsten (Invited author).

    COCOA 2007. Vol. LNCS 4616 2007. p. 366-377.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  152. Published

    PRESENT: An Ultra-Lightweight Block Cipher. / Knudsen, Lars Ramkilde; Vikkelsø, Charlotte Heinstrup.

    Cryptographic Hardware and Embedded Systems. Springer Verlag, 2007. p. 450-466 (Lecture Notes in Computer Science; No. 4727).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  153. Published

    Protecting Online Transactions with Unique Embedded Key Generators. / Boesgaard, Martin; Zenner, Erik.

    Proc. 2nd International Conference on Availability, Reliability and Security (ARES'07). Los Alamitos, CA, USA : IEEE Computer Society Press, 2007. p. 663-669.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  154. Published

    Small-Footprint Block Cipher Design - How far can you go?. / Knudsen, Lars Ramkilde; Vikkelsø, Charlotte Heinstrup.

    RFID Security 2007. 2007.

    Publication: ResearchArticle in proceedings – Annual report year: 2007

  155. Published

    The Grindahl Hash Functions. / Knudsen, Lars Ramkilde; Rechberger, Christian; Thomsen, Søren Steffen.

    Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers. ed. / Alex Biryukov. Springer, 2007. p. 39-57 (Lecture Notes in Computer Science; No. 4593).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  156. Published

    The order-bound for general algebraic geometric codes. / Beelen, Peter.

    In: Finite Fields and Their Applications, Vol. 13, 2007, p. 665-680.

    Publication: Research - peer-reviewJournal article – Annual report year: 2007

  157. Published

    Why IV Setup for Stream Ciphers is Difficult. / Zenner, Erik (Invited author).

    Proc. Dagstuhl Seminar on Symmetric Cryptography. ed. / Eli Biham; Helena Handschuh; Stefan Lucks; Vincent Rijmen. Schloss Dagstuhl, Germany : Internationales Begegnungs- und Forschungszentrum fuer Informatik, 2007. (Dagstuhl Seminar Proceedings; No. 07021).

    Publication: ResearchArticle in proceedings – Annual report year: 2007

  158. 2006
  159. Published

    Claw-decompositions and Tutte-orientations. / Barat, Janos; Thomassen, Carsten.

    In: Journal of Graph Theory, Vol. 52, No. 2, 06.2006, p. 135-146.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  160. Published

    Edge-disjoint Hamiltonian cycles in hypertournaments. / Thomassen, Carsten.

    In: Journal of Graph Theory, Vol. 51, No. 1, 01.2006, p. 49-52.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  161. Published

    Graph Codes with Reed-Solomon Component Codes. / Høholdt, Tom; Justesen, Jørn.

    ISIT 2006: 2006 IEEE International Symposium on Information Theory. Seattle, Washington, USA : IEEE Press, 2006.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

  162. Published

    Hash Functions Based on Block Ciphers. / Knudsen, Lars Ramkilde.

    2006. Paper presented at ICE-EM RNSA 2006 Workshop, Brisbane, Australia.

    Publication: ResearchPaper – Annual report year: 2006

  163. Published

    New Hash Function Constructions. / Knudsen, Lars Ramkilde.

    2006. Paper presented at ICE-EM RNSA 2006 Workshop, Brisbane, Australia.

    Publication: ResearchPaper – Annual report year: 2006

  164. Published

    On the max-cut problem for a planar, cubic, triangle-free graph, and the Chinese Postman Problen for a planar triangulation. / Thomassen, Carsten.

    In: Journal of Graph Theory, Vol. 53, 2006, p. 261-269.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  165. Published

    Proposals for iterated hash functions. / Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography. Setúbal, Portugal : INSTICC, 2006. p. 246-253.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

  166. Published

    Rectangular and visibility representations of infinite planar graphs. / Thomassen, Carsten.

    In: Journal of Graph Theory, Vol. 52, 2006, p. 257-265.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  167. Published

    Small size hashes with enhanced security. / Knudsen, Lars Ramkilde.

    In: International Journal of Network Security, Vol. 2, No. 1, 2006, p. 41-42.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  168. Published

    The Merit Factor Problem for Binary Sequences. / Høholdt, Tom (Invited author).

    Lecture Notes in Computer Science. Vol. 3857 2006. p. 51-59.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

  169. Published

    The number of k-colorings of a graph on a fixed surface. / Thomassen, Carsten.

    In: Discrete Mathematics, Vol. 306, No. 23, 2006, p. 3145-3153.

    Publication: Research - peer-reviewConference article – Annual report year: 2006

  170. 2005
  171. Published

    2-list-coloring planar graphs without monochromatic triangles. / Thomassen, Carsten.

    2005-05 ed. MAT, DTU, 2005. 10 p.

    Publication: ResearchReport – Annual report year: 2005

  172. 2004
  173. Published

    Algebraic Geometry codes and Ramanujan Graphs. / Høholdt, Tom; Alzola, Domingo Ramirez.

    Mat-report No. 2004-18 ed. DTU : MAT, 2004.

    Publication: Research - peer-reviewReport – Annual report year: 2004

  174. 2003
  175. Published

    Analysis of RMAC. / Knudsen, Lars Ramkilde; Kohno, T.

    Fast Software Encryption. 2887. ed. Berlin Heidelberg : Springer, 2003. p. 182-191 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  176. 2002
  177. Published

    3-connected planar spaces uniquely embed in the sphere. / Thomassen, Carsten; Richter, Bruce.

    In: American Mathematical Society. Transactions, Vol. 354, No. 11, 2002, p. 4585-4595.

    Publication: Research - peer-reviewJournal article – Annual report year: 2002

  178. 2001
  179. Published

    Decomposing a planar graph into an independent set and a 3-degenerate graph. / Thomassen, Carsten.

    In: Journal of Combinatorial Theory. Series B, Vol. 83, No. 2, 11.2001, p. 262-271.

    Publication: Research - peer-reviewJournal article – Annual report year: 2001

  180. Published

    3-connected Planar Graphs Uniquely Embed in the Sphere. / Thomassen, Carsten; Richter, Bruce.

    2001.

    Publication: Research - peer-reviewReport – Annual report year: 2001

  181. 1998
  182. Published

    Performance Analysis of a Decoding Algorithm for Algebraic Geometry Codes. / Jensen, Helge Elbrønd; Nielsen, Rasmus Refslund; Høholdt, Tom.

    Information Theory, 1998. Proceedings. 1998 IEEE International Symposium on. New York : IEEE, 1998.

    Publication: ResearchArticle in proceedings – Annual report year: 1998

  183. Published

    Recent results in the decoding of Algebraic geometry codes. / Høholdt, Tom; Jensen, Helge Elbrønd; Nielsen, Rasmus Refslund.

    Information Theory Workshop, 1998. Kilarney : IEEE, 1998. p. 35-36.

    Publication: ResearchArticle in proceedings – Annual report year: 1998

  184. 1992
  185. Published

    Fast decoding of codes from algebraic plane curves. / Justesen, Jørn; Larsen, Knud J.; Jensen, Helge Elbrønd; Høholdt, Tom.

    In: I E E E Transactions on Information Theory, Vol. 38, No. 1, 1992, p. 111-119.

    Publication: Research - peer-reviewJournal article – Annual report year: 1992

Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word