Søren Steffen Thomsen

  1. Research › Journal article
  2. Published

    Cryptanalysis of MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 23, No. 1, 2010, p. 72-90.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  3. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 137-151.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  4. Published

    Slender-Set Differential Cryptanalysis. / Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 26, No. 1, 2013, p. 11-38.

    Publication: Research - peer-reviewJournal article – Annual report year: 2013

  5. Research › Conference article
  6. Published
  7. Published

    Rebound Attacks on the Reduced Grøstl Hash Function. / Mendel, Florian; Rechberger, C.; Schlaffer, Martin; Thomsen, Søren S.

    In: Lecture Notes in Computer Science, Vol. 5985, 2010, p. 350–365.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  8. Research › Letter
  9. Published

    Hash functions and information theoretic security. / Bagheri, Nasoor; Knudsen, Lars Ramkilde; Naderi, Majid; Thomsen, Søren Steffen.

    In: I E I C E Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 12, 2009, p. 3401-3403.

    Publication: Research - peer-reviewLetter – Annual report year: 2009

  10. Research › Report
  11. Published

    Dakota - hashing from a combination of modular arithmetic and symmetric cryptography. / Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    Technical University of Denmark, 2008. 10 p. (MAT report; No. 2008-02).

    Publication: ResearchReport – Annual report year: 2008

  12. Published

    D.SYM.4 SHA-3 Design and Cryptanalysis Report. / Gauravaram, Praveen; Thomsen, Søren Steffen.

    2011. (ECRYPT II - European Network of Excellence for Cryptology II).

    Publication: Research - peer-reviewReport – Annual report year: 2011

  13. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    2008. (MAT report; No. 2008-06).

    Publication: Research - peer-reviewReport – Annual report year: 2008

  14. Published

    The Anaconda hash functions. / Thomsen, Søren Steffen.

    2008. (MAT report; No. 2008-05).

    Publication: Research - peer-reviewReport – Annual report year: 2008

Previous 1 2 3 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word