Publication list

Search publications authored by the DTU-based staff of the Danish-Chinese Center

Publikationer rss feed

2021
  PDF

Improved Power Decoding of Algebraic Geometry Codes

Puchinger, Sven ; Rosenkilde, Johan ; Solomatov, Grigory
part of: Proceedings of 2021 IEEE International Symposium on Information Theory, pages: 509-514, 2021
Presented at:
2021 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2021     |    DOI: https://doi.org/10.1109/ISIT45174.2021.9517938

 

Success probability of decoding interleaved alternant codes

Holzbaur, Lukas ; Liu, Hedongliang ; Neri, Alessandro ; Puchinger, Sven ; Rosenkilde, Johan ; Sidorenko, Vladimir ; Wachter-Zeh, Antonia
part of: Proceedings of 2020 IEEE Information Theory Workshop , 2021
Presented at:
2020 IEEE Information Theory Workshop

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2021     |    DOI: https://doi.org/10.1109/ITW46852.2021.9457607

2020
  PDF

Fast Root Finding for Interpolation-Based Decoding of Interleaved Gabidulin Codes

Bartz, Hannes ; Jerkovits, Thomas ; Puchinger, Sven ; Rosenkilde, Johan Sebastian Heesemann
part of: Proceedings of IEEE Information Theory Workshop, 2020
Presented at:
2019 IEEE Information Theory Workshop

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2020     |    DOI: https://doi.org/10.1109/ITW44776.2019.8989290

 

Generic bivariate multi-point evaluation, interpolation and modular composition with precomputation

Neiger, Vincent ; Rosenkilde, Johan ; Solomatov, Grigory
part of: Proceedings of the 45th International Symposium on Symbolic and Algebraic Computation, pages: 388-395, 2020
Presented at:
45th International Symposium on Symbolic and Algebraic Computation

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2020     |    DOI: https://doi.org/10.1145/3373207.3404032

  PDF

Generic Decoding in the Sum-Rank Metric

Puchinger, Sven ; Renner, Julian ; Rosenkilde, Johan
part of: Proceedings of 2020 IEEE International Symposium on Information Theory, pages: 54-59, 2020
Presented at:
2020 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2020     |    DOI: https://doi.org/10.1109/ISIT44484.2020.9174497

2018
 

Computing Popov and Hermite Forms of Rectangular Polynomial Matrices

Neiger, Vincent ; Rosenkilde, Johan Sebastian Heesemann ; Solomatov, Grigory Aleksandrovich
part of: Proceedings of the 2018 ACM International Symposium on Symbolic and Algebraic Computation, pages: 295-302, 2019
Presented at:
2018 ACM International Symposium on Symbolic and Algebraic Computation

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1145/3208976.3208988

 

Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography

Beelen, Peter ; Bossert, Martin ; Puchinger, Sven ; Rosenkilde, Johan Sebastian Heesemann
part of: Proceedings of 2018 IEEE International Symposium on Information Theory, pages: 946-950, 2018
Presented at:
2018 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1109/ISIT.2018.8437923

2017
  PDF

Decoding of interleaved Reed-Solomon codes using improved power decoding

Puchinger, Sven ; Rosenkilde ne Nielsen, Johan
part of: Proceedings of 2017 IEEE International Symposium on Information Theory , pages: 356-60, 2017
Presented at:
2017 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1109/ISIT.2017.8006549

  PDF

Fast computation of the roots of polynomials over the ring of power series

Neiger, Vincent ; Rosenkilde, Johan ; Schost, Éric
part of: ISSAC 2017 - Proceedings of the 2017 ACM International Symposium on Symbolic and Algebraic Computation, pages: 349-356, 2017
Presented at:
42nd ACM International Symposium on Symbolic and Algebraic Computation, ISSAC 2017

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1145/3087604.3087642

  PDF

Further Generalisations of Twisted Gabidulin Codes

Puchinger, Sven ; Rosenkilde, Johan Sebastian Heesemann ; Sheekey, John
part of: Proceedings of International Workshop on Coding and Cryptography 2017, 2017
Presented at:
Tenth International Workshop on Coding and Cryptography 2017

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017

  PDF

Improved Power Decoding of One-Point Hermitian Codes

Puchinger, Sven ; Bouw, Irene ; Rosenkilde, Johan Sebastian Heesemann
part of: Proceedings of International Workshop on Coding and Cryptography 2017, 2017
Presented at:
Tenth International Workshop on Coding and Cryptography 2017

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017

  PDF

Popov form computation for matrices of Ore polynomials

Khochtali, Mohamed ; Né Nielsen, Johan Rosenkilde ; Storjohann, Arne
part of: ISSAC 2017 - Proceedings of the 2017 ACM International Symposium on Symbolic and Algebraic Computation, pages: 253-260, 2017
Presented at:
42nd ACM International Symposium on Symbolic and Algebraic Computation, ISSAC 2017

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1145/3087604.3087650

 

The Exact Limit of Some Cubic Towers

Anbar Meidl, Nurdagül ; Beelen, Peter ; Nguyen, Nhut
part of: Proceedings of the International Conference on Arithmetic, Geometry, Cryptography and Coding theory (2015), 2016
Presented at:
15th International Conference on Arithmetic, Geometry, Cryptography and Coding Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017

  PDF

Twisted Reed-Solomon Codes

Beelen, Peter ; Puchinger, Sven ; Rosenkilde ne Nielsen, Johan
part of: Proceedings of 2017 IEEE International Symposium on Information Theory, pages: 336-40, 2017
Presented at:
2017 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1109/ISIT.2017.8006545

2016
  PDF

Algorithms for Simultaneous Padé Approximations

Rosenkilde, Johan Sebastian Heesemann ; Storjohann, Arne
part of: Proceedings of the 41st International Symposium on Symbolic and Algebraic Computation (ISSAC '16), pages: 405-412, 2016
Presented at:
41st International Symposium on Symbolic and Algebraic Computation

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016

 

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

Beierle, Christof ; Jean, Jérémy ; Kölbl, Stefan ; Leander, Gregor ; Moradi, Amir ; Peyrin, Thomas ; Sasaki, Yu ; Sasdrich, Pascal ; Sim, Siang Meng
part of: Advances in Cryptology – CRYPTO 2016, pages: 123-153, 2016
Presented at:
36th International Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-662-53008-5_5

2015
 

Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

Beierle, Christof ; Jovanovic, Philipp ; Lauridsen, Martin Mehl ; Leander, Gregor ; Rechberger, Christian
part of: Topics in Cryptology – CT-RSA 2015, pages: 37-58, 2015
Presented at:
The RSA Conference Cryptographers' Track (CT-RSA 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-16715-2_3

 

Comb to Pipeline: Fast Software Encryption Revisited

Bogdanov, Andrey ; Lauridsen, Martin Mehl ; Tischhauser, Elmar Wolfgang
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 150-171, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_8

 

Linear complexity for multidimensional arrays - a numerical invariant

Gomez-Perez, Domingo ; Høholdt, Tom ; Moreno, Oscar ; Rubio, Ivelisse
part of: Proceedings of the IEEE International Symposium on Information Theory (ISIT 2015), pages: 2697-2701, 2015
Presented at:
2015 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1109/ISIT.2015.7282946

 

Linear Distinguishers in the Key-less Setting: Application to PRESENT

Lauridsen, Martin Mehl ; Rechberger, Christian
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 217-240, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_11

 

Security of the AES with a Secret S-Box

Tiessen, Tyge ; Knudsen, Lars Ramkilde ; Kölbl, Stefan ; Lauridsen, Martin Mehl
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 175-189, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_9

  PDF

Solving Shift Register Problems over Skew Polynomial Rings using Module Minimisation

Li, W. ; Nielsen, Johan Sebastian Rosenkilde ; Puchinger, S. ; Sidorenko, V.
Presented at:
9th International Workshop on Coding and Cryptography (WCC 2015)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2015

 

Twisted Polynomials and Forgery Attacks on GCM

Abdelraheem, Mohamed Ahmed A. M. A. ; Beelen, Peter ; Bogdanov, Andrey ; Tischhauser, Elmar Wolfgang
part of: Advances in Cryptology – EUROCRYPT 2015, pages: 762-786, 2015
Presented at:
34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-46800-5_29

2014
 

Cryptanalysis of SIMON Variants with Connections

Alizadeh, Javad ; Alkhzaimi, Hoda A. ; Aref, Mohammad Reza ; Bagheri, Nasour ; Gauravaram, Praveen ; Kumar, Abhishek ; Lauridsen, Martin Mehl ; Sanadhya, Somitra Kumar
part of: Proceedings of the 10th International Workshop on Radio Frequency Identification Security and Privacy Issues, RFIDSec 2014, pages: 90-107, 2014
Presented at:
10th International Workshop on RFID Security and Privacy (RFIDSec 2014)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-13066-8_6

  PDF

Fast Kötter–Nielsen–Høholdt Interpolation in the Guruswami–Sudan Algorithm

Nielsen, Johan Sebastian Rosenkilde
Presented at:
14th International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2014)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2014

 

Key Recovery Attacks on Recent Authenticated Ciphers

Bogdanov, Andrey ; Dobraunig, Christoph ; Eichlseder, Maria ; Lauridsen, Martin Mehl ; Mendel, Florian ; Schläffer, Martin ; Tischhauser, Elmar Wolfgang
part of: 3rd International Conference on Cryptology and Information Security in Latin America, pages: 274-287, 2014
Presented at:
3rd International Conference on Cryptology and Information Security in Latin America

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014

 

Lazy Modulus Switching for the BKW Algorithm on LWE

Albrecht, Martin Roland ; Faugère, Jean-Charles ; Fitzpatrick, Robert ; Perret, Ludovic
part of: Public-Key Cryptography – PKC 2014, pages: 429-445, 2014
Presented at:
17th International Conference on Practice and Theory in Public-Key Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-642-54631-0_25

 

On the Efficacy of Solving LWE by Reduction to Unique-SVP

Albrecht, Martin Roland ; Fitzpatrick, Robert ; Göpfert, Florian
part of: Information Security and Cryptology - ICISC 2013. Revised Selected Papers, pages: 293–310, 2014
Presented at:
16th Annual International Conference on Information Security and Cryptology

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-12160-4_18

  PDF

Power Decoding of Reed–Solomon Codes Revisited

Nielsen, Johan Sebastian Rosenkilde
part of: Proceedings of the 4th International Castle Meeting on Coding Theory and Applications (4ICMCTA 2014), pages: 297-305, 2015
Presented at:
4th International Castle Meeting on Coding Theory and Applications (4ICMCTA 2014)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-17296-5_32

 

Practical Cryptanalysis of a Public-key Encryption Scheme Based on New Multivariate Quadratic Assumptions

Albrecht, Martin Roland ; Faugére, Jean-Charles ; Fitzpatrick, Robert ; Perret, Ludovic ; Todo, Yosuke ; Xagawa, Keita
part of: Public-Key Cryptography – PKC 2014, pages: 446-464, 2014
Presented at:
17th International Conference on Practice and Theory in Public-Key Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-642-54631-0_26

  PDF

Reduced List Decoding of Reed–Solomon Codes Using Reliability Information

Mohamed, Mostafa H. ; Nielsen, Johan Sebastian Rosenkilde ; Bossert, Martin
Presented at:
21st International Symposium on Mathematical Theory of Networks and Systems (MTNS 2014)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2014

2013
 

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers

Albrecht, Martin Roland ; Leander, Gregor
part of: Selected Areas in Cryptography, pages: 1-15, 2013
Presented at:
19th International Conference on Selected Areas in Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/978-3-642-35999-6_1

  PDF

Generalised Multi-sequence Shift-Register Synthesis using Module Minimisation

Nielsen, Johan Sebastian Rosenkilde
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 882-886, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620353

  PDF

Multi-Trial Guruswami–Sudan Decoding for Generalised Reed–Solomon Codes

Nielsen, Johan Sebastian Rosenkilde ; Zeh, Alexander
part of: WCC 2013 International Workshop on Coding and Cryptography, 2013
Presented at:
International Workshop on Coding and Cryptography (WCC 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013

  PDF

On Decoding Interleaved Chinese Remainder Codes

Li, Wenhui ; Sidorenko, Vladimir ; Nielsen, Johan Sebastian Rosenkilde
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 1052-1056, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620387

 

On the Dimension of Graph Codes with Reed–Solomon Component Codes

Beelen, Peter ; Høholdt, Tom ; Pinero, Fernando ; Justesen, Jørn
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 1227-1231, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620422

  PDF

Recent progress in the relative equilibria of point vortices — In memoriam Hassan Aref

Beelen, Peter ; Brøns, Morten ; Krishnamurthy, Vikas S. ; Stremler, Mark A.
in: I U T A M. Procedia, vol: 7, pages: 3-12
Presented at:
Topological Fluid Dynamics II (IUTAM Symposium)

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1016/j.piutam.2013.03.002

2012
 

Integral and Multidimensional Linear Distinguishers with Correlation Zero

Bogdanov, Andrey ; Leander, Gregor ; Nyberg, Kaisa ; Wang, Meiqin
part of: Advances in Cryptology – ASIACRYPT 2012, pages: 244-261, 2013
Presented at:
18th International Conference on the Theory and Application of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-34961-4

 

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

Bogdanov, Andrey ; Knudsen, L.R. ; Leander, Gregor ; Standaert, Francois-Xavier ; Steinberger, John ; Tischhauser, E.
part of: Advances in Cryptology – CRYPTO 2012, pages: 45-62, 2012
Presented at:
32nd Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012

 

On the distribution of linear biases: Three instructive examples

Abdelraheem, Mohamed Ahmed ; Beelen, Peter ; Leander, Gregor ; Ågren, Martin
part of: Advances in Cryptology – CRYPTO 2012, pages: 50-67, 2012
Presented at:
32nd Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-32009-5_4

 

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract

Borghoff, J. ; Canteaut, Anne Michele ; Guneysu, T. ; Kavun, E.B. ; Knezevic, M. ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Nikov, V. ; Paar, C. ; Rechberger, Christian
part of: Advances in Cryptology – ASIACRYPT 2012, pages: 208-225, 2012
Presented at:
18th International Conference on the Theory and Application of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-34961-4_14

2011
 

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

Leander, Gregor ; Abdelraheem, Mohamed Ahmed ; Alkhzaimi, Hoda A. ; Zenner, Erik
part of: Lecture Notes in Computer Science, 2011
Presented at:
Advances in Cryptology : 31st Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

  PDF

Bounding the number of points on a curve using a generalization of Weierstrass semigroups

Beelen, Peter ; Ruano, Diego
part of: Proceedings of WCC, 2011
Presented at:
7th International workshop on coding and cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

 

Cryptanalysis of PRESENT-like ciphers with secret S-boxes

Borghoff, Julia ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Thomsen, Søren Steffen
in: Lecture Notes in Computer Science, vol: 6733, pages: 270-289
Presented at:
18th International Workshop on Fast Software Encryption

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-21702-9_16

 

Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations

Abdelraheem, Mohamed Ahmed ; Leander, Gregor ; Zenner, Erik
part of: Lecture Notes in Computer Science, 2011
Presented at:
18th International Workshop on Fast Software Encryption

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-21702-9_1

 

On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

Leander, Gregor
part of: Lecture Notes in Computer Science, pages: 303-322, 2011
Presented at:
Advances in Cryptology : 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-20465-4_18

 

Spongent: A lightweight hash function

Bogdanov, Andrey ; Knežević, Miroslav ; Leander, Gregor ; Toz, Deniz ; Varici, Kerem ; Verbauwhede, Ingrid
part of: Cryptographic hardware and embedded systems - CHES 2011. Proceedings, pages: 312-325, 2011
Presented at:
13th International Workshop on Cryptographic Hardware and Embedded Systems

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

  PDF

The Minimum Distance of Graph Codes

Høholdt, Tom ; Justesen, Jørn
in: Lecture Notes in Computer Science, vol: 6639, pages: 201-212
Presented at:
3rd International Workshop on Coding and Cryptology

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-20901-7_12

2010
 

PRINTcipher: A Block Cipher for IC-Printing

Knudsen, Lars Ramkilde ; Leander, Gregor
part of: Cryptographic Hardware and Embedded Systems, CHES 2010, pages: 16-32, 2010
Presented at:
CHES 2010

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2010

2009
 

A Practical Key Recovery Attack on Basic TCHo

Leander, Gregor ; Herrmann, Mathias
part of: Public Key Cryptography - PKC 2009, pages: 411-424, 2009
Presented at:
Public Key Cryptography -PKC 2009. 12th International Conference on Practice and Theory in Public Key Cryptograph

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009