Publication list

Search publications authored by the DTU-based staff of the Danish-Chinese Center

Publikationer rss feed

2012
 

Bilinear Relative Equilibria of Identical Point Vortices

Aref, H. ; Beelen, Peter ; Brøns, Morten
in: Journal of Nonlinear Science, vol: 22, issue: 5, pages: 849-885

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/s00332-012-9129-2

  PDF

Duals of Affine Grassmann Codes and Their Relatives

Beelen, P. ; Ghorpade, S. R. ; Hoholdt, T.
in: I E E E Transactions on Information Theory, vol: 58, issue: 6, pages: 3843-3855

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1109/TIT.2012.2187171

  PDF

Eigenvalues and expansion of bipartite graphs

Høholdt, Tom ; Janwa, Heeralal
in: Designs, Codes and Cryptography, vol: 65, issue: 3, pages: 259-273

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012

 

Integral and Multidimensional Linear Distinguishers with Correlation Zero

Bogdanov, Andrey ; Leander, Gregor ; Nyberg, Kaisa ; Wang, Meiqin
part of: Advances in Cryptology – ASIACRYPT 2012, pages: 244-261, 2013
Presented at:
18th International Conference on the Theory and Application of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-34961-4

 

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

Bogdanov, Andrey ; Knudsen, L.R. ; Leander, Gregor ; Standaert, Francois-Xavier ; Steinberger, John ; Tischhauser, E.
part of: Advances in Cryptology – CRYPTO 2012, pages: 45-62, 2012
Presented at:
32nd Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012

  PDF

List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes

Hernando, Fernando ; Høholdt, Tom ; Ruano , Diego
in: Advances in Mathematics of Communication, vol: 6, issue: 3, pages: 259-272

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.3934/amc.2012.6.259

 

On the distribution of linear biases: Three instructive examples

Abdelraheem, Mohamed Ahmed ; Beelen, Peter ; Leander, Gregor ; Ågren, Martin
part of: Advances in Cryptology – CRYPTO 2012, pages: 50-67, 2012
Presented at:
32nd Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-32009-5_4

 

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract

Borghoff, J. ; Canteaut, Anne Michele ; Guneysu, T. ; Kavun, E.B. ; Knezevic, M. ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Nikov, V. ; Paar, C. ; Rechberger, Christian
part of: Advances in Cryptology – ASIACRYPT 2012, pages: 208-225, 2012
Presented at:
18th International Conference on the Theory and Application of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-34961-4_14

  PDF

Sur le nombre de points rationnels des variétés abéliennes et des Jacobiennes sur les corps finis

Aubry, Yves ; Haloui, Safia ; Lachaud, Gilles
in: Comptes Rendus Mathématique, vol: 350, issue: 19-20, pages: 907-910

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1016/j.crma.2012.10.001

2011
 

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

Leander, Gregor ; Abdelraheem, Mohamed Ahmed ; Alkhzaimi, Hoda A. ; Zenner, Erik
part of: Lecture Notes in Computer Science, 2011
Presented at:
Advances in Cryptology : 31st Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011