Publication list

Search publications authored by the DTU-based staff of the Danish-Chinese Center

Publikationer rss feed

2021
  PDF

Improved Power Decoding of Algebraic Geometry Codes

Puchinger, Sven ; Rosenkilde, Johan ; Solomatov, Grigory
part of: Proceedings of 2021 IEEE International Symposium on Information Theory, pages: 509-514, 2021
Presented at:
2021 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2021     |    DOI: https://doi.org/10.1109/ISIT45174.2021.9517938

 

Success probability of decoding interleaved alternant codes

Holzbaur, Lukas ; Liu, Hedongliang ; Neri, Alessandro ; Puchinger, Sven ; Rosenkilde, Johan ; Sidorenko, Vladimir ; Wachter-Zeh, Antonia
part of: Proceedings of 2020 IEEE Information Theory Workshop , 2021
Presented at:
2020 IEEE Information Theory Workshop

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2021     |    DOI: https://doi.org/10.1109/ITW46852.2021.9457607

2020
  PDF

Fast Root Finding for Interpolation-Based Decoding of Interleaved Gabidulin Codes

Bartz, Hannes ; Jerkovits, Thomas ; Puchinger, Sven ; Rosenkilde, Johan Sebastian Heesemann
part of: Proceedings of IEEE Information Theory Workshop, 2020
Presented at:
2019 IEEE Information Theory Workshop

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2020     |    DOI: https://doi.org/10.1109/ITW44776.2019.8989290

 

Generic bivariate multi-point evaluation, interpolation and modular composition with precomputation

Neiger, Vincent ; Rosenkilde, Johan ; Solomatov, Grigory
part of: Proceedings of the 45th International Symposium on Symbolic and Algebraic Computation, pages: 388-395, 2020
Presented at:
45th International Symposium on Symbolic and Algebraic Computation

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2020     |    DOI: https://doi.org/10.1145/3373207.3404032

  PDF

Generic Decoding in the Sum-Rank Metric

Puchinger, Sven ; Renner, Julian ; Rosenkilde, Johan
part of: Proceedings of 2020 IEEE International Symposium on Information Theory, pages: 54-59, 2020
Presented at:
2020 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2020     |    DOI: https://doi.org/10.1109/ISIT44484.2020.9174497

2018
 

Computing Popov and Hermite Forms of Rectangular Polynomial Matrices

Neiger, Vincent ; Rosenkilde, Johan Sebastian Heesemann ; Solomatov, Grigory Aleksandrovich
part of: Proceedings of the 2018 ACM International Symposium on Symbolic and Algebraic Computation, pages: 295-302, 2019
Presented at:
2018 ACM International Symposium on Symbolic and Algebraic Computation

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1145/3208976.3208988

 

Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography

Beelen, Peter ; Bossert, Martin ; Puchinger, Sven ; Rosenkilde, Johan Sebastian Heesemann
part of: Proceedings of 2018 IEEE International Symposium on Information Theory, pages: 946-950, 2018
Presented at:
2018 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1109/ISIT.2018.8437923

2017
  PDF

Decoding of interleaved Reed-Solomon codes using improved power decoding

Puchinger, Sven ; Rosenkilde ne Nielsen, Johan
part of: Proceedings of 2017 IEEE International Symposium on Information Theory , pages: 356-60, 2017
Presented at:
2017 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1109/ISIT.2017.8006549

  PDF

Fast computation of the roots of polynomials over the ring of power series

Neiger, Vincent ; Rosenkilde, Johan ; Schost, Éric
part of: ISSAC 2017 - Proceedings of the 2017 ACM International Symposium on Symbolic and Algebraic Computation, pages: 349-356, 2017
Presented at:
42nd ACM International Symposium on Symbolic and Algebraic Computation, ISSAC 2017

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1145/3087604.3087642

  PDF

Further Generalisations of Twisted Gabidulin Codes

Puchinger, Sven ; Rosenkilde, Johan Sebastian Heesemann ; Sheekey, John
part of: Proceedings of International Workshop on Coding and Cryptography 2017, 2017
Presented at:
Tenth International Workshop on Coding and Cryptography 2017

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017

  PDF

Improved Power Decoding of One-Point Hermitian Codes

Puchinger, Sven ; Bouw, Irene ; Rosenkilde, Johan Sebastian Heesemann
part of: Proceedings of International Workshop on Coding and Cryptography 2017, 2017
Presented at:
Tenth International Workshop on Coding and Cryptography 2017

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017

  PDF

Popov form computation for matrices of Ore polynomials

Khochtali, Mohamed ; Né Nielsen, Johan Rosenkilde ; Storjohann, Arne
part of: ISSAC 2017 - Proceedings of the 2017 ACM International Symposium on Symbolic and Algebraic Computation, pages: 253-260, 2017
Presented at:
42nd ACM International Symposium on Symbolic and Algebraic Computation, ISSAC 2017

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1145/3087604.3087650

 

The Exact Limit of Some Cubic Towers

Anbar Meidl, Nurdagül ; Beelen, Peter ; Nguyen, Nhut
part of: Proceedings of the International Conference on Arithmetic, Geometry, Cryptography and Coding theory (2015), 2016
Presented at:
15th International Conference on Arithmetic, Geometry, Cryptography and Coding Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017

  PDF

Twisted Reed-Solomon Codes

Beelen, Peter ; Puchinger, Sven ; Rosenkilde ne Nielsen, Johan
part of: Proceedings of 2017 IEEE International Symposium on Information Theory, pages: 336-40, 2017
Presented at:
2017 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1109/ISIT.2017.8006545

2016
  PDF

Algorithms for Simultaneous Padé Approximations

Rosenkilde, Johan Sebastian Heesemann ; Storjohann, Arne
part of: Proceedings of the 41st International Symposium on Symbolic and Algebraic Computation (ISSAC '16), pages: 405-412, 2016
Presented at:
41st International Symposium on Symbolic and Algebraic Computation

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016

 

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

Beierle, Christof ; Jean, Jérémy ; Kölbl, Stefan ; Leander, Gregor ; Moradi, Amir ; Peyrin, Thomas ; Sasaki, Yu ; Sasdrich, Pascal ; Sim, Siang Meng
part of: Advances in Cryptology – CRYPTO 2016, pages: 123-153, 2016
Presented at:
36th International Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-662-53008-5_5

2015
 

Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

Beierle, Christof ; Jovanovic, Philipp ; Lauridsen, Martin Mehl ; Leander, Gregor ; Rechberger, Christian
part of: Topics in Cryptology – CT-RSA 2015, pages: 37-58, 2015
Presented at:
The RSA Conference Cryptographers' Track (CT-RSA 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-16715-2_3

 

Comb to Pipeline: Fast Software Encryption Revisited

Bogdanov, Andrey ; Lauridsen, Martin Mehl ; Tischhauser, Elmar Wolfgang
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 150-171, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_8

 

Linear complexity for multidimensional arrays - a numerical invariant

Gomez-Perez, Domingo ; Høholdt, Tom ; Moreno, Oscar ; Rubio, Ivelisse
part of: Proceedings of the IEEE International Symposium on Information Theory (ISIT 2015), pages: 2697-2701, 2015
Presented at:
2015 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1109/ISIT.2015.7282946

 

Linear Distinguishers in the Key-less Setting: Application to PRESENT

Lauridsen, Martin Mehl ; Rechberger, Christian
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 217-240, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_11

 

Security of the AES with a Secret S-Box

Tiessen, Tyge ; Knudsen, Lars Ramkilde ; Kölbl, Stefan ; Lauridsen, Martin Mehl
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 175-189, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_9

  PDF

Solving Shift Register Problems over Skew Polynomial Rings using Module Minimisation

Li, W. ; Nielsen, Johan Sebastian Rosenkilde ; Puchinger, S. ; Sidorenko, V.
Presented at:
9th International Workshop on Coding and Cryptography (WCC 2015)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2015

 

Twisted Polynomials and Forgery Attacks on GCM

Abdelraheem, Mohamed Ahmed A. M. A. ; Beelen, Peter ; Bogdanov, Andrey ; Tischhauser, Elmar Wolfgang
part of: Advances in Cryptology – EUROCRYPT 2015, pages: 762-786, 2015
Presented at:
34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-46800-5_29

2014
 

Cryptanalysis of SIMON Variants with Connections

Alizadeh, Javad ; Alkhzaimi, Hoda A. ; Aref, Mohammad Reza ; Bagheri, Nasour ; Gauravaram, Praveen ; Kumar, Abhishek ; Lauridsen, Martin Mehl ; Sanadhya, Somitra Kumar
part of: Proceedings of the 10th International Workshop on Radio Frequency Identification Security and Privacy Issues, RFIDSec 2014, pages: 90-107, 2014
Presented at:
10th International Workshop on RFID Security and Privacy (RFIDSec 2014)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-13066-8_6

  PDF

Fast Kötter–Nielsen–Høholdt Interpolation in the Guruswami–Sudan Algorithm

Nielsen, Johan Sebastian Rosenkilde
Presented at:
14th International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2014)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2014

 

Key Recovery Attacks on Recent Authenticated Ciphers

Bogdanov, Andrey ; Dobraunig, Christoph ; Eichlseder, Maria ; Lauridsen, Martin Mehl ; Mendel, Florian ; Schläffer, Martin ; Tischhauser, Elmar Wolfgang
part of: 3rd International Conference on Cryptology and Information Security in Latin America, pages: 274-287, 2014
Presented at:
3rd International Conference on Cryptology and Information Security in Latin America

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014

 

Lazy Modulus Switching for the BKW Algorithm on LWE

Albrecht, Martin Roland ; Faugère, Jean-Charles ; Fitzpatrick, Robert ; Perret, Ludovic
part of: Public-Key Cryptography – PKC 2014, pages: 429-445, 2014
Presented at:
17th International Conference on Practice and Theory in Public-Key Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-642-54631-0_25

 

On the Efficacy of Solving LWE by Reduction to Unique-SVP

Albrecht, Martin Roland ; Fitzpatrick, Robert ; Göpfert, Florian
part of: Information Security and Cryptology - ICISC 2013. Revised Selected Papers, pages: 293–310, 2014
Presented at:
16th Annual International Conference on Information Security and Cryptology

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-12160-4_18

  PDF

Power Decoding of Reed–Solomon Codes Revisited

Nielsen, Johan Sebastian Rosenkilde
part of: Proceedings of the 4th International Castle Meeting on Coding Theory and Applications (4ICMCTA 2014), pages: 297-305, 2015
Presented at:
4th International Castle Meeting on Coding Theory and Applications (4ICMCTA 2014)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-17296-5_32

 

Practical Cryptanalysis of a Public-key Encryption Scheme Based on New Multivariate Quadratic Assumptions

Albrecht, Martin Roland ; Faugére, Jean-Charles ; Fitzpatrick, Robert ; Perret, Ludovic ; Todo, Yosuke ; Xagawa, Keita
part of: Public-Key Cryptography – PKC 2014, pages: 446-464, 2014
Presented at:
17th International Conference on Practice and Theory in Public-Key Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-642-54631-0_26

  PDF

Reduced List Decoding of Reed–Solomon Codes Using Reliability Information

Mohamed, Mostafa H. ; Nielsen, Johan Sebastian Rosenkilde ; Bossert, Martin
Presented at:
21st International Symposium on Mathematical Theory of Networks and Systems (MTNS 2014)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2014

2013
 

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers

Albrecht, Martin Roland ; Leander, Gregor
part of: Selected Areas in Cryptography, pages: 1-15, 2013
Presented at:
19th International Conference on Selected Areas in Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/978-3-642-35999-6_1

  PDF

Generalised Multi-sequence Shift-Register Synthesis using Module Minimisation

Nielsen, Johan Sebastian Rosenkilde
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 882-886, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620353

  PDF

Multi-Trial Guruswami–Sudan Decoding for Generalised Reed–Solomon Codes

Nielsen, Johan Sebastian Rosenkilde ; Zeh, Alexander
part of: WCC 2013 International Workshop on Coding and Cryptography, 2013
Presented at:
International Workshop on Coding and Cryptography (WCC 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013

  PDF

On Decoding Interleaved Chinese Remainder Codes

Li, Wenhui ; Sidorenko, Vladimir ; Nielsen, Johan Sebastian Rosenkilde
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 1052-1056, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620387

 

On the Dimension of Graph Codes with Reed–Solomon Component Codes

Beelen, Peter ; Høholdt, Tom ; Pinero, Fernando ; Justesen, Jørn
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 1227-1231, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620422

  PDF

Recent progress in the relative equilibria of point vortices — In memoriam Hassan Aref

Beelen, Peter ; Brøns, Morten ; Krishnamurthy, Vikas S. ; Stremler, Mark A.
in: I U T A M. Procedia, vol: 7, pages: 3-12
Presented at:
Topological Fluid Dynamics II (IUTAM Symposium)

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1016/j.piutam.2013.03.002

2012
 

Integral and Multidimensional Linear Distinguishers with Correlation Zero

Bogdanov, Andrey ; Leander, Gregor ; Nyberg, Kaisa ; Wang, Meiqin
part of: Advances in Cryptology – ASIACRYPT 2012, pages: 244-261, 2013
Presented at:
18th International Conference on the Theory and Application of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-34961-4

 

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

Bogdanov, Andrey ; Knudsen, L.R. ; Leander, Gregor ; Standaert, Francois-Xavier ; Steinberger, John ; Tischhauser, E.
part of: Advances in Cryptology – CRYPTO 2012, pages: 45-62, 2012
Presented at:
32nd Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012

 

On the distribution of linear biases: Three instructive examples

Abdelraheem, Mohamed Ahmed ; Beelen, Peter ; Leander, Gregor ; Ågren, Martin
part of: Advances in Cryptology – CRYPTO 2012, pages: 50-67, 2012
Presented at:
32nd Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-32009-5_4

 

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract

Borghoff, J. ; Canteaut, Anne Michele ; Guneysu, T. ; Kavun, E.B. ; Knezevic, M. ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Nikov, V. ; Paar, C. ; Rechberger, Christian
part of: Advances in Cryptology – ASIACRYPT 2012, pages: 208-225, 2012
Presented at:
18th International Conference on the Theory and Application of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-34961-4_14

2011
 

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

Leander, Gregor ; Abdelraheem, Mohamed Ahmed ; Alkhzaimi, Hoda A. ; Zenner, Erik
part of: Lecture Notes in Computer Science, 2011
Presented at:
Advances in Cryptology : 31st Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

  PDF

Bounding the number of points on a curve using a generalization of Weierstrass semigroups

Beelen, Peter ; Ruano, Diego
part of: Proceedings of WCC, 2011
Presented at:
7th International workshop on coding and cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

 

Cryptanalysis of PRESENT-like ciphers with secret S-boxes

Borghoff, Julia ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Thomsen, Søren Steffen
in: Lecture Notes in Computer Science, vol: 6733, pages: 270-289
Presented at:
18th International Workshop on Fast Software Encryption

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-21702-9_16

 

Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations

Abdelraheem, Mohamed Ahmed ; Leander, Gregor ; Zenner, Erik
part of: Lecture Notes in Computer Science, 2011
Presented at:
18th International Workshop on Fast Software Encryption

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-21702-9_1

 

On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

Leander, Gregor
part of: Lecture Notes in Computer Science, pages: 303-322, 2011
Presented at:
Advances in Cryptology : 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-20465-4_18

 

Spongent: A lightweight hash function

Bogdanov, Andrey ; Knežević, Miroslav ; Leander, Gregor ; Toz, Deniz ; Varici, Kerem ; Verbauwhede, Ingrid
part of: Cryptographic hardware and embedded systems - CHES 2011. Proceedings, pages: 312-325, 2011
Presented at:
13th International Workshop on Cryptographic Hardware and Embedded Systems

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

  PDF

The Minimum Distance of Graph Codes

Høholdt, Tom ; Justesen, Jørn
in: Lecture Notes in Computer Science, vol: 6639, pages: 201-212
Presented at:
3rd International Workshop on Coding and Cryptology

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-20901-7_12

2010
 

PRINTcipher: A Block Cipher for IC-Printing

Knudsen, Lars Ramkilde ; Leander, Gregor
part of: Cryptographic Hardware and Embedded Systems, CHES 2010, pages: 16-32, 2010
Presented at:
CHES 2010

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2010

2009
 

A Practical Key Recovery Attack on Basic TCHo

Leander, Gregor ; Herrmann, Mathias
part of: Public Key Cryptography - PKC 2009, pages: 411-424, 2009
Presented at:
Public Key Cryptography -PKC 2009. 12th International Conference on Practice and Theory in Public Key Cryptograph

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009

 

Cache Timing Analysis of LFSR-based Stream Ciphers

Zenner, Erik ; Leander, Gregor ; Hawkes, Philip
part of: Cryptography and Coding, 2009, Berlin
Presented at:
12th IMA International Conference on Cryptography and Coding

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009

 

Cryptanalysis of C2

Borghoff, Julia ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Matusiewicz, Krystian
part of: Advances in Cryptology - CRYPTO 2009, pages: 250-266, 2009, Belin Heldelberg New York
Presented at:
CRYPTO

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1007/978-3-642-03356-8

 

Decoding Foldes Reed-Solomon codes using Hensel-lifting

Beelen, Peter ; Brander, Kristian
part of: Gröbner Bases, Coding, and Cryptography, pages: 389-394, 2009
Presented at:
Workshop D1: Gröbner Bases in Cryptography, Coding Theory, and Algebraic Combinatorics

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009

 

On the construction of Galois towers

Bassa, Alp (Invited author) ; Beelen, Peter
part of: Contemporary Mathematics, pages: 9-20, 2009
Presented at:
Arithmetic, Geometry Cryptography and Coding Theory

Type: Article in proceedings (Peer reviewed)     |     Invited contribution

Status: Published     |    Year: 2009

 

Optimal Bipartitet Ramanujan Graphs from Balanced Incomplete Block Designs: Their Characterization and Applications to Expander/LDPC Codes.

Høholdt, Tom ; Janwa, Heeralal (Invited author)
part of: Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes, pages: 53-65, 2009, Berlin
Presented at:
18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Type: Article in proceedings (Peer reviewed)     |     Invited contribution

Status: Published     |    Year: 2009

 

The order bound for toric codes

Beelen, Peter ; Ruano, Diego (Invited author)
part of: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pages: 1-10, 2009
Presented at:
18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Type: Article in proceedings (Peer reviewed)     |     Invited contribution

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1007/978-3-642-02181-7_1

2008
 

A Syndrome Formulation of the Interpolation Step in the Guruswami-Sudan Algorithm

Beelen, Peter ; Høholdt, Tom
part of: Coding Theory and Applications, pages: 20-32, 2008
Presented at:
Second International Castle Meeting

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2008

 

List decoding using syndromes

Høholdt, Tom ; Beelen, Peter
part of: Series on Number Theory and Its Applications, 2008
Presented at:
International Conference on Algebraic Geometry and its Applications

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2008

2007
  PDF

Analysis of Iterated Hard Decision Decoding of Product Codes with Reed-Solomon Component Codes

Justesen, Jørn ; Høholdt, Tom
part of: IEEE Information Theory Workshop, 2007. ITW '07., 2007, Lake Tahoe
Presented at:
2007 IEEE Information Theory Workshop

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2007     |    DOI: https://doi.org/10.1109/ITW.2007.4313069

2006
  PDF

Graph Codes with Reed-Solomon Component Codes

Høholdt, Tom ; Justesen, Jørn
part of: ISIT 2006, 2006, Seattle, Washington, USA
Presented at:
2006 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2006     |    DOI: https://doi.org/10.1109/ISIT.2006.261904

 

The Merit Factor Problem for Binary Sequences

Høholdt, Tom
part of: Lecture Notes in Computer Science, pages: 51-59, 2006
Presented at:
16th AAECC Symposium

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2006

2005
 

Complete ML Decoding orf the (73,45) PG Code

Justesen, Jørn ; Høholdt, Tom ; Hjaltason, Johan
part of: Proceedings of the 45th Allerton Conference on Communication, Control and Computing, 2005, Allerton, USA
Presented at:
45th Allerton Conference on Communication, Control and Computing

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2005

  PDF

Euclidean Geometry Codes, minimum weight words and decodable error-patterns using bit-flipping

Høholdt, Tom ; Justesen, Jørn ; Jonsson, Bergtor
part of: Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005, Adelaide, Australia
Presented at:
2005 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2005     |    DOI: https://doi.org/10.1109/ISIT.2005.1523731

  PDF

Iterative List Decoding

Justesen, Jørn ; Høholdt, Tom ; Hjaltason, Johan
part of: Proceedings of Information Theory Workshop on Coding and Complexity, 2005
Presented at:
2005 IEEE Information Theory Workshop

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2005     |    DOI: https://doi.org/10.1109/ITW.2005.1531863

2004
  PDF

Decoding of concatenated codes with interleaved outer codes

Justesen, Jørn ; Høholdt, Tom ; Thommesen, Christian
part of: IEEE International Symposium on Information Theory, Proceedings, 2004, Chicago
Presented at:
2004 IEEE International Symposium on Information Theory

Type: Article in proceedings

Status: Published     |    Year: 2004     |    DOI: https://doi.org/10.1109/ISIT.2004.1365365

  PDF

From concatenated codes to graph codes

Justesen, Jørn ; Høholdt, Tom
part of: IEEE Information Theory Workshop, San Antonio, pages: 13-16, 2004, San Antonio, Texas
Presented at:
2004 IEEE Information Theory Workshop

Type: Article in proceedings

Status: Published     |    Year: 2004     |    DOI: https://doi.org/10.1109/ITW.2004.1405266

2001
 

On Hyperbolic Codes

Høholdt, Tom
part of: Springer Lecture Notes in Computer Science, pages: 159-171, 2001
Presented at:
14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2001

1999
 

Algebraic Geometry Codes

Høholdt, Tom ; Blake, Ian ; Heegaard, Chris ; Wei, Victor
part of: Information Theory 50 years of discovery, pages: 552-574, 1999, New York

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 1999

 

Decoding Hermitian Codes with Sudan's Algorithm

Høholdt, Tom ; Nielsen, Rasmus Refslund
part of: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, Proceedings, pages: 260-270, 2000, Berlin
Presented at:
International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 1999     |    DOI: https://doi.org/10.1007/3-540-46796-3_26

 

Decoding Reed-Solomon Codes beyond half the minimum distance

Høholdt, Tom ; Nielsen, Rasmus Refslund
part of: Coding Theory, Cryptography and Related Areas, pages: 221-236, 1999, Berlin
Presented at:
International Conference on Coding Theory, Cryptography and Related Areas

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 1999

1998
 

Algebraic Geometry codes

Høholdt, Tom ; Lint, van
part of: Handbook of Coding Theory, pages: 871-962, 1998, New York

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 1998

 

Fast Erasure-and error decoding of algebraic geometry codes up to the Feng-Rao bound

Høholdt, Tom ; Jensen, Helge Elbrønd ; Sakata, Shojiro ; Leonard, Doug
in: I E E E Transactions on Information Theory, vol: 44, issue: 4, pages: 1558-1564
Presented at:
1997 IEEE International Symposium on Information Theory

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 1998     |    DOI: https://doi.org/10.1109/18.681332

 

On(or in) D. Blahut's footprint

Høholdt, Tom
part of: codes,curves and signals, pages: 3-9, 1998, New York
Presented at:
Blahutfest

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 1998

  PDF

Performance Analysis of a Decoding Algorithm for Algebraic Geometry Codes

Jensen, Helge Elbrønd ; Nielsen, Rasmus Refslund ; Høholdt, Tom
part of: Information Theory, 1998. Proceedings. 1998 IEEE International Symposium on, 1998, New York
Presented at:
1998 IEEE International Symposium on Information Theory

Type: Article in proceedings

Status: Published     |    Year: 1998     |    DOI: https://doi.org/10.1109/ISIT.1998.708983

  PDF

Recent results in the decoding of Algebraic geometry codes

Høholdt, Tom ; Jensen, Helge Elbrønd ; Nielsen, Rasmus Refslund
part of: Information Theory Workshop, 1998, pages: 35-36, 1998, Kilarney
Presented at:
IEEE Information Thery Workshop

Type: Article in proceedings

Status: Published     |    Year: 1998     |    DOI: https://doi.org/10.1109/ITW.1998.706397

 

Recent Results on the decoding of algebraic geometry codes

Nielsen, Rasmus Refsgaard ; Høholdt, Tom
part of: Proceedings of ICCC'98, pages: 35-36, 1998, Mexico
Presented at:
International Conference on Coding Theory, Cryptography and related subject

Type: Article in proceedings

Status: Published     |    Year: 1998

1997
 

Fast Erasure and Errror decoding of algebraic geomery codes up to the Feng Rao Bound

Høholdt, Tom ; Jensen, Helge Elbrønd ; Sakata, Shojiro ; Leonard, Doug
part of: Proceedings of the ISIT 1997, 1997, Piscataway
Presented at:
1997 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 1997

 

Order functions and evaluation codes.

Høholdt, Tom ; Pellikaan, Ruud ; van Lint, Jack
part of: Lecture notes in Computer Science vol.1255, pages: 138-150, 1997, Berlin
Presented at:
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 1997