Søren Steffen Thomsen

  1. Published

    Cryptanalysis of MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 23, No. 1, 2010, p. 72-90.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  2. Published

    Cryptanalysis of MDC-2. / Knudsen, Lars Ramkilde; Mendel, Florian; Rechberger, Christian; Thomsen, Søren Steffen.

    Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings.. ed. / Antoine Joux. Berlin / Heidelberg : Springer, 2009. p. 106-120 (Lecture Notes in Computer Science; No. 5479).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  3. Published
  4. Published

    Cryptanalysis of the ESSENCE Family of Hash Functions. / Mouha, Nicky; Sekar, Gautham; Aumasson, Jean-Philippe; Peyrin, Thomas; Thomsen, Søren Steffen; Turan, Meltem Sönmez; Preneel, Bart.

    Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Springer, 2010. p. 15-34 (Lecture Notes in Computer Science; No. 6151).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  5. Published

    Cryptanalysis of Vortex. / Aumasson, Jean-Philippe; Dunkelman, Orr; Mendel, Florian; Rechberger, Christian; Thomsen, Søren Steffen.

    Progress in Cryptology - AFRICACRYPT 2009: Proceedings. ed. / Bart Preneel. Springer, 2009. p. 14-28 (Lecture Notes in Computer Science; No. 5580).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  6. Published

    Cryptographic Hash Functions. / Thomsen, Søren Steffen; Knudsen, Lars Ramkilde (Supervisor).

    2009.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  7. Published

    Dakota - hashing from a combination of modular arithmetic and symmetric cryptography. / Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    Technical University of Denmark, 2008. 10 p. (MAT report; No. 2008-02).

    Publication: ResearchReport – Annual report year: 2008

  8. Published

    Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. / Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    Applied Cryptography and Network Security 2008: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings. ed. / Steven M. Bellovin; Rosario Gennaro; Angelos Keromytis; Moti Yung. Springer, 2008. p. 144-155 (Lecture Notes in Computer Science; No. 5037).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  9. Published

    Deterministic Differential Properties of the Compression Function of BMW. / Guo, Jian; Thomsen, Søren Steffen.

    Selected Areas in Cryptography 2010: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, Revised Selected Papers. ed. / Alex Biryukov; Guang Gong; Douglas R. Stinson. Vol. 6544 Springer, 2011. p. 338-350 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  10. Published

    D.SYM.4 SHA-3 Design and Cryptanalysis Report. / Gauravaram, Praveen; Thomsen, Søren Steffen.

    2011. (ECRYPT II - European Network of Excellence for Cryptology II).

    Publication: Research - peer-reviewReport – Annual report year: 2011

Previous 1 2 3 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word