Discrete mathematics

  1. 2012
  2. Published

    Security, Privacy, and Applied Cryptography Engineering : Proceedings Second International Conference, SPACE 2012. / Bogdanov, Andrey (Editor); Sanadhya, Somitra (Editor).

    Springer, 2012. 185 p. (Lecture Notes in Computer Science, Vol. 7644).

    Publication: Research - peer-reviewBook – Annual report year: 2012

  3. 2011
  4. Published

    D.SYM.4 SHA-3 Design and Cryptanalysis Report. / Gauravaram, Praveen; Thomsen, Søren Steffen.

    2011. (ECRYPT II - European Network of Excellence for Cryptology II).

    Publication: Research - peer-reviewReport – Annual report year: 2011

  5. Published

    Improved security analysis of Fugue-256. / Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars Ramkilde; Lei, Wei.

    2011.

    Publication: Research - peer-reviewReport – Annual report year: 2011

  6. 2009
  7. Published

    Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks. / Zenner, Erik.

    Kgs. Lyngby, Denmark : Technical University of Denmark, 2009. (MAT report).

    Publication: ResearchReport – Annual report year: 2009

  8. Published

    Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. / Bras-Amorós, Maria (Editor); Høholdt, Tom (Editor).

    Berlin : Springer, 2009. 243 p. (Lecture Notes in Computer Science; No. 5527).

    Publication: Research - peer-reviewBook – Annual report year: 2009

  9. Published

    Hash3: Proofs, Analysis and Implementation : Report on ECRYPT II Event on Hash Functions. / Gauravaram, Praveen.

    2009. 11 p. (MAT REPORT; No. 2009-03).

    Publication: ResearchReport – Annual report year: 2009

  10. 2008
  11. Published

    Advances in Algebraic Geometry Codes. / Martinez-Moro, Edgar (Editor); Munuera, Carlos (Editor); Ruano, Diego (Editor).

    World Scientific Publishing Co Pte Ltd, 2008. 452 p. (Series on Coding Theory and Cryptology; No. 5).

    Publication: Research - peer-reviewBook – Annual report year: 2008

  12. Published

    Dakota - hashing from a combination of modular arithmetic and symmetric cryptography. / Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    Technical University of Denmark, 2008. 10 p. (MAT report; No. 2008-02).

    Publication: ResearchReport – Annual report year: 2008

  13. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    2008. (MAT report; No. 2008-06).

    Publication: Research - peer-reviewReport – Annual report year: 2008

  14. Published

    The Anaconda hash functions. / Thomsen, Søren Steffen.

    2008. (MAT report; No. 2008-05).

    Publication: Research - peer-reviewReport – Annual report year: 2008

Previous 1 2 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word