Søren Steffen Thomsen

  1. 2013
  2. Published

    Slender-Set Differential Cryptanalysis. / Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 26, No. 1, 2013, p. 11-38.

    Publication: Research - peer-reviewJournal article – Annual report year: 2013

  3. 2011
  4. Published
  5. Published

    Deterministic Differential Properties of the Compression Function of BMW. / Guo, Jian; Thomsen, Søren Steffen.

    Selected Areas in Cryptography 2010: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, Revised Selected Papers. ed. / Alex Biryukov; Guang Gong; Douglas R. Stinson. Vol. 6544 Springer, 2011. p. 338-350 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  6. Published

    D.SYM.4 SHA-3 Design and Cryptanalysis Report. / Gauravaram, Praveen; Thomsen, Søren Steffen.

    2011. (ECRYPT II - European Network of Excellence for Cryptology II).

    Publication: Research - peer-reviewReport – Annual report year: 2011

  7. Published

    Practical near-collisions on the compression function of BMW. / Leurent, Gaëtan; Thomsen, Søren Steffen.

    Lecture Notes in Computer Science. ed. / Antoine Joux. Vol. 6733 Springer, 2011. p. 238-251.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  8. 2010
  9. Published

    Cryptanalysis of MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 23, No. 1, 2010, p. 72-90.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  10. Published

    Cryptanalysis of the ESSENCE Family of Hash Functions. / Mouha, Nicky; Sekar, Gautham; Aumasson, Jean-Philippe; Peyrin, Thomas; Thomsen, Søren Steffen; Turan, Meltem Sönmez; Preneel, Bart.

    Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Springer, 2010. p. 15-34 (Lecture Notes in Computer Science; No. 6151).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  11. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 137-151.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  12. Published

    On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. / Bagheri, Nasour; Gauravaram, Praveen; Naderi, Majid; Thomsen, Søren Steffen.

    Proceedings of the 9th International Conference on Cryptology and Network Security: ,. Vol. 6467 Springer, 2010. p. 96-105 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  13. Published

    Pseudo-cryptanalysis of the Original Blue Midnight Wish. / Thomsen, Søren Steffen.

    Fast Software Encryption 2010. Springer, 2010. p. 304-317 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  14. Published

    Rebound Attacks on the Reduced Grøstl Hash Function. / Mendel, Florian; Rechberger, C.; Schlaffer, Martin; Thomsen, Søren S.

    In: Lecture Notes in Computer Science, Vol. 5985, 2010, p. 350–365.

    Publication: Research - peer-reviewConference article – Annual report year: 2010

  15. 2009
  16. Published

    Cryptographic Hash Functions. / Thomsen, Søren Steffen; Knudsen, Lars Ramkilde (Supervisor).

    2009.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  17. Published

    Cryptanalysis of MDC-2. / Knudsen, Lars Ramkilde; Mendel, Florian; Rechberger, Christian; Thomsen, Søren Steffen.

    Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings.. ed. / Antoine Joux. Berlin / Heidelberg : Springer, 2009. p. 106-120 (Lecture Notes in Computer Science; No. 5479).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  18. Published

    Cryptanalysis of Vortex. / Aumasson, Jean-Philippe; Dunkelman, Orr; Mendel, Florian; Rechberger, Christian; Thomsen, Søren Steffen.

    Progress in Cryptology - AFRICACRYPT 2009: Proceedings. ed. / Bart Preneel. Springer, 2009. p. 14-28 (Lecture Notes in Computer Science; No. 5580).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  19. Published

    Grøstl Addendum. / Gauravaram, Praveen; Knudsen, Lars R.; Matusiewicz, Krystian; Mendel, Florian; Rechberger, Christian; Schläffer, Martin; Thomsen, Søren S.; Archives, The Pennsylvania State University CiteSeerX.

    2009, 5 p. Addendum.

    Publication: ResearchOther contribution – Annual report year: 2009

  20. Published

    Hash functions and information theoretic security. / Bagheri, Nasoor; Knudsen, Lars Ramkilde; Naderi, Majid; Thomsen, Søren Steffen.

    In: I E I C E Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 12, 2009, p. 3401-3403.

    Publication: Research - peer-reviewLetter – Annual report year: 2009

  21. Published

    The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. / Mendel, Florian; Rechberger, Christian; Schläffer, Martin; Thomsen, Søren Steffen.

    Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers. ed. / Orr Dunkelman. Springer, 2009. p. 260-276 (Lecture Notes in Computer Science; No. 5665).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  22. 2008
  23. Published

    Dakota - hashing from a combination of modular arithmetic and symmetric cryptography. / Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    Technical University of Denmark, 2008. 10 p. (MAT report; No. 2008-02).

    Publication: ResearchReport – Annual report year: 2008

  24. Published

    Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. / Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    Applied Cryptography and Network Security 2008: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings. ed. / Steven M. Bellovin; Rosario Gennaro; Angelos Keromytis; Moti Yung. Springer, 2008. p. 144-155 (Lecture Notes in Computer Science; No. 5037).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  25. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    2008. (MAT report; No. 2008-06).

    Publication: Research - peer-reviewReport – Annual report year: 2008

  26. Published

    Proposals for Iterated Hash Functions. / Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    E-Business and Telecommunication Networks: Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papers. Vol. 2 2008. p. 107-118 (Communications in Computer and Information Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  27. Published

    The Anaconda hash functions. / Thomsen, Søren Steffen.

    2008. (MAT report; No. 2008-05).

    Publication: Research - peer-reviewReport – Annual report year: 2008

  28. 2007
  29. Published

    The Grindahl Hash Functions. / Knudsen, Lars Ramkilde; Rechberger, Christian; Thomsen, Søren Steffen.

    Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers. ed. / Alex Biryukov. Springer, 2007. p. 39-57 (Lecture Notes in Computer Science; No. 4593).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  30. 2006
  31. Published

    Proposals for iterated hash functions. / Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography. Setúbal, Portugal : INSTICC, 2006. p. 246-253.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word