Publication list

Search publications authored by the DTU-based staff of the Danish-Chinese Center

Publikationer rss feed

2012
 

Bilinear Relative Equilibria of Identical Point Vortices

Aref, H. ; Beelen, Peter ; Brøns, Morten
in: Journal of Nonlinear Science, vol: 22, issue: 5, pages: 849-885

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/s00332-012-9129-2

  PDF

Duals of Affine Grassmann Codes and Their Relatives

Beelen, P. ; Ghorpade, S. R. ; Hoholdt, T.
in: I E E E Transactions on Information Theory, vol: 58, issue: 6, pages: 3843-3855

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1109/TIT.2012.2187171

  PDF

Eigenvalues and expansion of bipartite graphs

Høholdt, Tom ; Janwa, Heeralal
in: Designs, Codes and Cryptography, vol: 65, issue: 3, pages: 259-273

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012

 

Integral and Multidimensional Linear Distinguishers with Correlation Zero

Bogdanov, Andrey ; Leander, Gregor ; Nyberg, Kaisa ; Wang, Meiqin
part of: Advances in Cryptology – ASIACRYPT 2012, pages: 244-261, 2013
Presented at:
18th International Conference on the Theory and Application of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-34961-4

 

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

Bogdanov, Andrey ; Knudsen, L.R. ; Leander, Gregor ; Standaert, Francois-Xavier ; Steinberger, John ; Tischhauser, E.
part of: Advances in Cryptology – CRYPTO 2012, pages: 45-62, 2012
Presented at:
32nd Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012

  PDF

List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes

Hernando, Fernando ; Høholdt, Tom ; Ruano , Diego
in: Advances in Mathematics of Communication, vol: 6, issue: 3, pages: 259-272

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.3934/amc.2012.6.259

 

On the distribution of linear biases: Three instructive examples

Abdelraheem, Mohamed Ahmed ; Beelen, Peter ; Leander, Gregor ; Ågren, Martin
part of: Advances in Cryptology – CRYPTO 2012, pages: 50-67, 2012
Presented at:
32nd Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-32009-5_4

 

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract

Borghoff, J. ; Canteaut, Anne Michele ; Guneysu, T. ; Kavun, E.B. ; Knezevic, M. ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Nikov, V. ; Paar, C. ; Rechberger, Christian
part of: Advances in Cryptology – ASIACRYPT 2012, pages: 208-225, 2012
Presented at:
18th International Conference on the Theory and Application of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-34961-4_14

  PDF

Sur le nombre de points rationnels des variétés abéliennes et des Jacobiennes sur les corps finis

Aubry, Yves ; Haloui, Safia ; Lachaud, Gilles
in: Comptes Rendus Mathématique, vol: 350, issue: 19-20, pages: 907-910

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1016/j.crma.2012.10.001

2011
 

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

Leander, Gregor ; Abdelraheem, Mohamed Ahmed ; Alkhzaimi, Hoda A. ; Zenner, Erik
part of: Lecture Notes in Computer Science, 2011
Presented at:
Advances in Cryptology : 31st Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

 

A proof of a conjecture by Schweizer on the Drinfeld modular polynomial ΦT (X, Y )

Bassa, Alp ; Beelen, Peter
in: Journal of Number Theory, vol: 131, pages: 1276-1285

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1016/j.jnt.2011.01.007

  PDF

Bounding the number of points on a curve using a generalization of Weierstrass semigroups

Beelen, Peter ; Ruano, Diego
part of: Proceedings of WCC, 2011
Presented at:
7th International workshop on coding and cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

 

Bounds on the degree of APN polynomials: the case of x −1 + g(x)

Leander, Gregor ; Rodier, François
in: Designs, Codes and Cryptography, vol: 59, issue: 1-3, pages: 207-222

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/s10623-010-9456-y

 

C2 - Block Cipher

Knudsen, Lars Ramkilde ; Leander, Gregor
part of: Encyclopedia of Cryptography and Security, pages: 179-180, 2011

Type: Book chapter (Peer reviewed)

Status: Published     |    Year: 2011

 

Counting all bent functions in dimension eight 99270589265934370305785861242880

Langevin, Philippe ; Leander, Gregor
in: Designs, Codes and Cryptography, vol: 59, issue: 1-3, pages: 193-205

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/s10623-010-9455-z

 

Cryptanalysis of PRESENT-like ciphers with secret S-boxes

Borghoff, Julia ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Thomsen, Søren Steffen
in: Lecture Notes in Computer Science, vol: 6733, pages: 270-289
Presented at:
18th International Workshop on Fast Software Encryption

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-21702-9_16

 

Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations

Abdelraheem, Mohamed Ahmed ; Leander, Gregor ; Zenner, Erik
part of: Lecture Notes in Computer Science, 2011
Presented at:
18th International Workshop on Fast Software Encryption

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-21702-9_1

 

On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

Leander, Gregor
part of: Lecture Notes in Computer Science, pages: 303-322, 2011
Presented at:
Advances in Cryptology : 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-20465-4_18

 

PRESENT - Block Cipher

Knudsen, Lars Ramkilde ; Leander, Gregor
part of: Encyclopedia of Cryptography and Security, pages: 953-955, 2011

Type: Book chapter (Peer reviewed)

Status: Published     |    Year: 2011

 

Spongent: A lightweight hash function

Bogdanov, Andrey ; Knežević, Miroslav ; Leander, Gregor ; Toz, Deniz ; Varici, Kerem ; Verbauwhede, Ingrid
part of: Cryptographic hardware and embedded systems - CHES 2011. Proceedings, pages: 312-325, 2011
Presented at:
13th International Workshop on Cryptographic Hardware and Embedded Systems

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

 

Switchings, extensions, and reductions in central digraphs

Kündgen, André ; Leander, Gregor ; Thomassen, Carsten
in: Journal of Combinatorial Theory, Series A, vol: 118, issue: 7, pages: 2025-2034

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1016/j.jcta.2011.03.009

 

The Galois closure of Drinfeld modular towers

Bassa, Alp ; Beelen, Peter
in: Journal of Number Theory, vol: 131, issue: 3, pages: 561-577

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1016/j.jnt.2010.10.006

  PDF

The Minimum Distance of Graph Codes

Høholdt, Tom ; Justesen, Jørn
in: Lecture Notes in Computer Science, vol: 6639, pages: 201-212
Presented at:
3rd International Workshop on Coding and Cryptology

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-20901-7_12

2010
 

Affine Grassmann codes

Høholdt, Tom ; Beelen, Peter ; Ghorpade, Sudhir Ramakant
in: I E E E Transactions on Information Theory, vol: 56, issue: 7, pages: 3166-3176

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2010     |    DOI: https://doi.org/10.1109/TIT.2010.2048470

 

A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree

Leander, Gregor ; Bracken, Carl
in: Finite Fields and Their Applications, vol: 16, issue: 4, pages: 231-242

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2010     |    DOI: https://doi.org/10.1016/j.ffa.2010.03.001

 

Efficient list decoding of a class of algebraic-geometry codes

Beelen, Peter ; Brander, Kristian
in: Advances in Mathematics of Communication, vol: 4, issue: 4, pages: 485-518

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2010

 

Key-equations for list decoding of Reed-Solomon codes and how to solve them

Beelen, Peter ; Brander, Kristian
in: Journal of Symbolic Computation, vol: 45, issue: 7, pages: 773-786

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2010     |    DOI: https://doi.org/10.1016/j.jsc.2010.03.010

 

PRINTcipher: A Block Cipher for IC-Printing

Knudsen, Lars Ramkilde ; Leander, Gregor
part of: Cryptographic Hardware and Embedded Systems, CHES 2010, pages: 16-32, 2010
Presented at:
CHES 2010

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2010

 

The Hassa-Witt invariant in some towers of function fields over finite fields

Beelen, Peter ; Bassa, Alp
in: Bulletin of the Brazilian Mathematical Society, New Series, vol: 41, issue: 4, pages: 567-582

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2010

2009
 

A generalization of Baker's theorem

Beelen, Peter
in: Finite Fields and Their Applications, vol: 15, issue: 5, pages: 558-568

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1016/j.ffa.2009.04.003

 

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Bras-Amorós, Maria (Editor) ; Høholdt, Tom

Type: Book (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1007/978-3-642-02181-7

 

A Practical Key Recovery Attack on Basic TCHo

Leander, Gregor ; Herrmann, Mathias
part of: Public Key Cryptography - PKC 2009, pages: 411-424, 2009
Presented at:
Public Key Cryptography -PKC 2009. 12th International Conference on Practice and Theory in Public Key Cryptograph

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009

 

Cache Timing Analysis of LFSR-based Stream Ciphers

Zenner, Erik ; Leander, Gregor ; Hawkes, Philip
part of: Cryptography and Coding, 2009, Berlin
Presented at:
12th IMA International Conference on Cryptography and Coding

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009

 

Constructing new APN functions from known ones

Budaghyan, L. ; Carlet, C. ; Leander, Gregor
in: Finite Fields and Their Applications, vol: 15, issue: 2, pages: 150-159

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1016/j.ffa.2008.10.001

 

Construction of bent functions from near-bent functions

Leander, Gregor ; McGuire, G.
in: Journal of Combinatorial Theory, Series A, vol: 116, issue: 4, pages: 960-970

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1016/j.jcta.2008.12.004

 

Cryptanalysis of C2

Borghoff, Julia ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Matusiewicz, Krystian
part of: Advances in Cryptology - CRYPTO 2009, pages: 250-266, 2009, Belin Heldelberg New York
Presented at:
CRYPTO

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1007/978-3-642-03356-8

 

Decoding Foldes Reed-Solomon codes using Hensel-lifting

Beelen, Peter ; Brander, Kristian
part of: Gröbner Bases, Coding, and Cryptography, pages: 389-394, 2009
Presented at:
Workshop D1: Gröbner Bases in Cryptography, Coding Theory, and Algebraic Combinatorics

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009

 

Fejlrettende koder

Beelen, Peter ; Høholdt, Tom
part of: Matematiske horisonter, pages: 163-173, 2009, Kgs. Lyngby

Type: Book chapter

Status: Published     |    Year: 2009

 

On the construction of Galois towers

Bassa, Alp (Invited author) ; Beelen, Peter
part of: Contemporary Mathematics, pages: 9-20, 2009
Presented at:
Arithmetic, Geometry Cryptography and Coding Theory

Type: Article in proceedings (Peer reviewed)     |     Invited contribution

Status: Published     |    Year: 2009

 

Optimal Bipartitet Ramanujan Graphs from Balanced Incomplete Block Designs: Their Characterization and Applications to Expander/LDPC Codes.

Høholdt, Tom ; Janwa, Heeralal (Invited author)
part of: Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes, pages: 53-65, 2009, Berlin
Presented at:
18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Type: Article in proceedings (Peer reviewed)     |     Invited contribution

Status: Published     |    Year: 2009

 

The order bound for toric codes

Beelen, Peter ; Ruano, Diego (Invited author)
part of: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pages: 1-10, 2009
Presented at:
18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Type: Article in proceedings (Peer reviewed)     |     Invited contribution

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1007/978-3-642-02181-7_1

2008
 

A Syndrome Formulation of the Interpolation Step in the Guruswami-Sudan Algorithm

Beelen, Peter ; Høholdt, Tom
part of: Coding Theory and Applications, pages: 20-32, 2008
Presented at:
Second International Castle Meeting

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2008

 

List decoding using syndromes

Høholdt, Tom ; Beelen, Peter
part of: Series on Number Theory and Its Applications, 2008
Presented at:
International Conference on Algebraic Geometry and its Applications

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2008

 

Monomial Bent Functions and Stickelberger's Theorem

Langevin, Philippe ; Leander, Gregor
in: Finite Fields and Their Applications, vol: 14, issue: 3, pages: 727-742

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2008

 

On Codes, Matroids, and Secure Multi-party Computation From Linear Secret Sharing Schemes

Cramer, Ronald ; Daza, Vanesa ; Gracia, Ignacio ; Jiménez Urroz, Jorge ; Leander, Gregor ; Martí-Farré, Jaume ; Padró, Carles
in: I E E E Transactions on Information Theory, vol: 54, issue: 6, pages: 2644-2657

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2008

 

The Decoding of Algebraic Geometry Codes

Beelen, Peter ; Høholdt, Tom
part of: Series on Coding Theory and Cryptology, pages: 49-98, 2008

Type: Book chapter

Status: Published     |    Year: 2008

 

Two Classes of Quadratic APN Binomials Inequivalent to Power Functions

Budaghyan, Lilya ; Carlet, Claude ; Leander, Gregor
in: I E E E Transactions on Information Theory, vol: 54, issue: 9, pages: 4218-4229

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2008

2007
 

A Counter-Example to a Conjecture of Niho

Langevin, Philippe ; Leander, Gregor ; McGuire, Gary
in: I E E E Transactions on Information Theory, vol: 53, issue: 12, pages: 4785-4786

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2007     |    DOI: https://doi.org/10.1109/TIT.2007.909109

  PDF

Analysis of Iterated Hard Decision Decoding of Product Codes with Reed-Solomon Component Codes

Justesen, Jørn ; Høholdt, Tom
part of: IEEE Information Theory Workshop, 2007. ITW '07., 2007, Lake Tahoe
Presented at:
2007 IEEE Information Theory Workshop

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2007     |    DOI: https://doi.org/10.1109/ITW.2007.4313069

 

Iterative List Decoding of Some LDPC Codes

Justesen, Jørn ; Høholdt, Tom ; Hjaltason, Johann
in: IEEE Transactions on Information Theory, vol: 53, issue: 11, pages: 4276-4284

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2007     |    DOI: https://doi.org/10.1109/TIT.2007.907485