Publication list

Search publications authored by the DTU-based staff of the Danish-Chinese Center

Publikationer rss feed

2017
  PDF

Twisted Reed-Solomon Codes

Beelen, Peter ; Puchinger, Sven ; Rosenkilde ne Nielsen, Johan
part of: Proceedings of 2017 IEEE International Symposium on Information Theory, pages: 336-40, 2017
Presented at:
2017 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1109/ISIT.2017.8006545

2016
  PDF

Algorithms for Simultaneous Padé Approximations

Rosenkilde, Johan Sebastian Heesemann ; Storjohann, Arne
part of: Proceedings of the 41st International Symposium on Symbolic and Algebraic Computation (ISSAC '16), pages: 405-412, 2016
Presented at:
41st International Symposium on Symbolic and Algebraic Computation

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016

  PDF

A method for accelerating pipelined cryptographic implementations

Bogdanov, Andrey ; LAURIDSEN, Martin, Mehl ; TISCHHAUSER, Elmar, Wolfgang
Patent no.: WO2016142330, Date: 2015-03-06

Type: Patent

Status: Published     |    Year: 2016

  PDF

Design and Analysis of Symmetric Primitives

Lauridsen, Martin Mehl

Type: Ph.D. thesis

Status: Published     |    Year: 2016

 

On the Number of Rational Points on Prym Varieties over Finite Fields

Aubry, Yves ; Haloui, Safia
in: Glasgow Mathematical Journal, vol: 58, issue: 1, pages: 55-68

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1017/S0017089515000063

 

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

Beierle, Christof ; Jean, Jérémy ; Kölbl, Stefan ; Leander, Gregor ; Moradi, Amir ; Peyrin, Thomas ; Sasaki, Yu ; Sasdrich, Pascal ; Sim, Siang Meng
part of: Advances in Cryptology – CRYPTO 2016, pages: 123-153, 2016
Presented at:
36th International Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-662-53008-5_5

  PDF

The structure of dual Grassmann codes

Beelen, Peter ; Pinero, Fernando
in: Designs, Codes and Cryptography, vol: 79, issue: 3, pages: 451-470

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/s10623-015-0085-3

2015
  PDF

An algebraic approach to graph codes

Pinero, Fernando

Type: Ph.D. thesis

Status: Published     |    Year: 2015

 

Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

Beierle, Christof ; Jovanovic, Philipp ; Lauridsen, Martin Mehl ; Leander, Gregor ; Rechberger, Christian
part of: Topics in Cryptology – CT-RSA 2015, pages: 37-58, 2015
Presented at:
The RSA Conference Cryptographers' Track (CT-RSA 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-16715-2_3

 

Comb to Pipeline: Fast Software Encryption Revisited

Bogdanov, Andrey ; Lauridsen, Martin Mehl ; Tischhauser, Elmar Wolfgang
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 150-171, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_8

  PDF

Good families of Drinfeld modular curves

Bassa, Alp ; Beelen, Peter ; Nguyen, Nhut
in: LMS Journal of Computation and Mathematics, vol: 18, issue: 1, pages: 699-712

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1112/S146115701500025X

  PDF

Good towers of function Fields

Nguyen, Nhut

Type: Ph.D. thesis

Status: Published     |    Year: 2015

 

Linear codes associated to determinantal varieties

Beelen, Peter ; Ghorpade, Sudhir R. ; Hasan, Sartaj Ul
in: Discrete Mathematics, vol: 338, issue: 8, pages: 1493-1500

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1016/j.disc.2015.03.009

 

Linear complexity for multidimensional arrays - a numerical invariant

Gomez-Perez, Domingo ; Høholdt, Tom ; Moreno, Oscar ; Rubio, Ivelisse
part of: Proceedings of the IEEE International Symposium on Information Theory (ISIT 2015), pages: 2697-2701, 2015
Presented at:
2015 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1109/ISIT.2015.7282946

 

Linear Distinguishers in the Key-less Setting: Application to PRESENT

Lauridsen, Martin Mehl ; Rechberger, Christian
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 217-240, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_11

 

Security of the AES with a Secret S-Box

Tiessen, Tyge ; Knudsen, Lars Ramkilde ; Kölbl, Stefan ; Lauridsen, Martin Mehl
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 175-189, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_9

  PDF

Solving Shift Register Problems over Skew Polynomial Rings using Module Minimisation

Li, W. ; Nielsen, Johan Sebastian Rosenkilde ; Puchinger, S. ; Sidorenko, V.
Presented at:
9th International Workshop on Coding and Cryptography (WCC 2015)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2015

  PDF

Sub-quadratic decoding of one-point hermitian codes

Nielsen, Johan Sebastian Rosenkilde ; Beelen, Peter
in: IEEE Transactions on Information Theory, vol: 61, issue: 6, pages: 3225-3240

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1109/TIT.2015.2424415

  PDF

Towers of Function Fields over Non-prime Finite Fields

Bassa, Alp ; Beelen, Peter ; Garcia, Arnaldo ; Stichtenoth, Henning
in: Moscow Mathematical Journal, vol: 15, issue: 1, pages: 1-29

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2015

 

Twisted Polynomials and Forgery Attacks on GCM

Abdelraheem, Mohamed Ahmed A. M. A. ; Beelen, Peter ; Bogdanov, Andrey ; Tischhauser, Elmar Wolfgang
part of: Advances in Cryptology – EUROCRYPT 2015, pages: 762-786, 2015
Presented at:
34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-46800-5_29

2014
 

An Improvement of the Gilbert–Varshamov Bound Over Nonprime Fields

Bassa, Alp ; Beelen, Peter ; Garcia, Arnaldo ; Stichtenoth, Henning
in: IEEE Transactions on Information Theory, vol: 60, issue: 7, pages: 3859-3861

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1109/TIT.2014.2316531

 

Cryptanalysis of SIMON Variants with Connections

Alizadeh, Javad ; Alkhzaimi, Hoda A. ; Aref, Mohammad Reza ; Bagheri, Nasour ; Gauravaram, Praveen ; Kumar, Abhishek ; Lauridsen, Martin Mehl ; Sanadhya, Somitra Kumar
part of: Proceedings of the 10th International Workshop on Radio Frequency Identification Security and Privacy Issues, RFIDSec 2014, pages: 90-107, 2014
Presented at:
10th International Workshop on RFID Security and Privacy (RFIDSec 2014)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-13066-8_6

  PDF

Fast Kötter–Nielsen–Høholdt Interpolation in the Guruswami–Sudan Algorithm

Nielsen, Johan Sebastian Rosenkilde
Presented at:
14th International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2014)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2014

  PDF

Galois towers over non-prime finite fields

Bassa, Alp ; Beelen, Peter ; Garcia, Arnaldo ; Stichtenoth, Henning
in: Acta Arithmetica, vol: 164, issue: 2, pages: 163-179

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.4064/aa164-2-6

 

Good Towers of Function Fields

Bassa, Alp ; Beelen, Peter ; Nguyen, Nhut
part of: Algebraic Curves and Finite Fields, 2013

Type: Book chapter (Peer reviewed)

Status: Published     |    Year: 2014

 

Key Recovery Attacks on Recent Authenticated Ciphers

Bogdanov, Andrey ; Dobraunig, Christoph ; Eichlseder, Maria ; Lauridsen, Martin Mehl ; Mendel, Florian ; Schläffer, Martin ; Tischhauser, Elmar Wolfgang
part of: 3rd International Conference on Cryptology and Information Security in Latin America, pages: 274-287, 2014
Presented at:
3rd International Conference on Cryptology and Information Security in Latin America

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014

 

Lazy Modulus Switching for the BKW Algorithm on LWE

Albrecht, Martin Roland ; Faugère, Jean-Charles ; Fitzpatrick, Robert ; Perret, Ludovic
part of: Public-Key Cryptography – PKC 2014, pages: 429-445, 2014
Presented at:
17th International Conference on Practice and Theory in Public-Key Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-642-54631-0_25

  PDF

Multi-Trial Guruswami–Sudan Decoding for Generalised Reed–Solomon Codes

Nielsen, Johan Sebastian Rosenkilde ; Zeh, Alexander
in: Designs, Codes and Cryptography, vol: 73, issue: 2, pages: 507-527

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/s10623-014-9951-7

 

On the Efficacy of Solving LWE by Reduction to Unique-SVP

Albrecht, Martin Roland ; Fitzpatrick, Robert ; Göpfert, Florian
part of: Information Security and Cryptology - ICISC 2013. Revised Selected Papers, pages: 293–310, 2014
Presented at:
16th Annual International Conference on Information Security and Cryptology

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-12160-4_18

 

On the sizes of expander graphs and minimum distances of graph codes

Høholdt, Tom ; Justesen, Jørn
in: Discrete Mathematics, vol: 325, pages: 38-46

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1016/j.disc.2014.02.005

 

On the subfield subcodes of Hermitian codes

Pinero, Fernando ; Janwa, Heeralal
in: Designs, Codes and Cryptography, vol: 70, issue: 1-2, pages: 157-173

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/s10623-012-9736-9

 

Optimal codes as Tanner codes with cyclic component codes

Høholdt, Tom ; Pinero, Fernando ; Zeng, Peng
in: Designs, Codes and Cryptography, vol: 76, issue: 1, pages: 37-47

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/s10623-014-9962-4

  PDF

Power Decoding of Reed–Solomon Codes Revisited

Nielsen, Johan Sebastian Rosenkilde
part of: Proceedings of the 4th International Castle Meeting on Coding Theory and Applications (4ICMCTA 2014), pages: 297-305, 2015
Presented at:
4th International Castle Meeting on Coding Theory and Applications (4ICMCTA 2014)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-17296-5_32

 

Practical Cryptanalysis of a Public-key Encryption Scheme Based on New Multivariate Quadratic Assumptions

Albrecht, Martin Roland ; Faugére, Jean-Charles ; Fitzpatrick, Robert ; Perret, Ludovic ; Todo, Yosuke ; Xagawa, Keita
part of: Public-Key Cryptography – PKC 2014, pages: 446-464, 2014
Presented at:
17th International Conference on Practice and Theory in Public-Key Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-642-54631-0_26

  PDF

Reduced List Decoding of Reed–Solomon Codes Using Reliability Information

Mohamed, Mostafa H. ; Nielsen, Johan Sebastian Rosenkilde ; Bossert, Martin
Presented at:
21st International Symposium on Mathematical Theory of Networks and Systems (MTNS 2014)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2014

2013
 

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers

Albrecht, Martin Roland ; Leander, Gregor
part of: Selected Areas in Cryptography, pages: 1-15, 2013
Presented at:
19th International Conference on Selected Areas in Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/978-3-642-35999-6_1

 

A new construction of bent functions based on Z-bent functions

Gangopadhyay, Sugata ; Joshi, Anand ; Leander, Gregor ; Sharma, Rajendra Kumar
in: Designs, Codes and Cryptography, vol: 66, issue: 1-3, pages: 243-256

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/s10623-012-9687-1

 

Bounding the number of points on a curve using a generalization of Weierstrass semigroups

Beelen, Peter ; Ruano, Diego
in: Designs, Codes and Cryptography, vol: 66, issue: 1-3, pages: 221-230

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/s10623-012-9685-3

  PDF

Generalised Multi-sequence Shift-Register Synthesis using Module Minimisation

Nielsen, Johan Sebastian Rosenkilde
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 882-886, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620353

  PDF

List Decoding of Algebraic Codes

Nielsen, Johan Sebastian Rosenkilde

Type: Ph.D. thesis

Status: Published     |    Year: 2013

  PDF

Multi-Trial Guruswami–Sudan Decoding for Generalised Reed–Solomon Codes

Nielsen, Johan Sebastian Rosenkilde ; Zeh, Alexander
part of: WCC 2013 International Workshop on Coding and Cryptography, 2013
Presented at:
International Workshop on Coding and Cryptography (WCC 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013

  PDF

On Decoding Interleaved Chinese Remainder Codes

Li, Wenhui ; Sidorenko, Vladimir ; Nielsen, Johan Sebastian Rosenkilde
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 1052-1056, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620387

  PDF

On Rational Interpolation-Based List-Decoding and List-Decoding Binary Goppa Codes

Beelen, Peter ; Høholdt, Tom ; Nielsen, Johan Sebastian Rosenkilde ; Wu, Yingquan
in: I E E E Transactions on Information Theory, vol: 59, issue: 6, pages: 3269-3281

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/TIT.2013.2243800

 

On the Dimension of Graph Codes with Reed–Solomon Component Codes

Beelen, Peter ; Høholdt, Tom ; Pinero, Fernando ; Justesen, Jørn
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 1227-1231, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620422

 

On the number of points on abelian and Jacobian varieties over finite fields

Aubry, Yves ; Haloui, Safia ; Lachaud, Gilles
in: Acta Arithmetica, vol: 160, issue: 3, pages: 201-241

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.4064/aa160-3-1

  PDF

Recent progress in the relative equilibria of point vortices — In memoriam Hassan Aref

Beelen, Peter ; Brøns, Morten ; Krishnamurthy, Vikas S. ; Stremler, Mark A.
in: I U T A M. Procedia, vol: 7, pages: 3-12
Presented at:
Topological Fluid Dynamics II (IUTAM Symposium)

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1016/j.piutam.2013.03.002

 

Slender-Set Differential Cryptanalysis

Borghoff, Julia ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Thomsen, Søren Steffen
in: Journal of Cryptology, vol: 26, issue: 1, pages: 11-38

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/s00145-011-9111-4

 

SPONGENT: The Design Space of Lightweight Cryptographic Hashing

Bogdanov, Andrey ; Knezevic, Miroslav ; Leander, Gregor ; Toz, Deniz ; Varici, Kerem ; Verbauwhede, Ingrid
in: I E E E Transactions on Computers, vol: 62, issue: 10, pages: 2041-2053

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/TC.2012.196

2012
 

A closed form expression for the Drinfeld modular polynomial ΦT (X, Y )

Bassa, Alp ; Beelen, Peter
in: Archiv der Mathematik, vol: 99, issue: 3, pages: 237-245

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/s00013-012-0423-x

 

A new construction of highly nonlinear S-boxes

Beelen, Peter ; Leander, Gregor
in: Cryptography and Communications, vol: 4, issue: 1, pages: 65-77

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/s12095-011-0052-4

 

Bilinear Relative Equilibria of Identical Point Vortices

Aref, H. ; Beelen, Peter ; Brøns, Morten
in: Journal of Nonlinear Science, vol: 22, issue: 5, pages: 849-885

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/s00332-012-9129-2

  PDF

Duals of Affine Grassmann Codes and Their Relatives

Beelen, P. ; Ghorpade, S. R. ; Hoholdt, T.
in: I E E E Transactions on Information Theory, vol: 58, issue: 6, pages: 3843-3855

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1109/TIT.2012.2187171

  PDF

Eigenvalues and expansion of bipartite graphs

Høholdt, Tom ; Janwa, Heeralal
in: Designs, Codes and Cryptography, vol: 65, issue: 3, pages: 259-273

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012

 

Integral and Multidimensional Linear Distinguishers with Correlation Zero

Bogdanov, Andrey ; Leander, Gregor ; Nyberg, Kaisa ; Wang, Meiqin
part of: Advances in Cryptology – ASIACRYPT 2012, pages: 244-261, 2013
Presented at:
18th International Conference on the Theory and Application of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-34961-4

 

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

Bogdanov, Andrey ; Knudsen, L.R. ; Leander, Gregor ; Standaert, Francois-Xavier ; Steinberger, John ; Tischhauser, E.
part of: Advances in Cryptology – CRYPTO 2012, pages: 45-62, 2012
Presented at:
32nd Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012

  PDF

List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes

Hernando, Fernando ; Høholdt, Tom ; Ruano , Diego
in: Advances in Mathematics of Communication, vol: 6, issue: 3, pages: 259-272

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.3934/amc.2012.6.259

 

On the distribution of linear biases: Three instructive examples

Abdelraheem, Mohamed Ahmed ; Beelen, Peter ; Leander, Gregor ; Ågren, Martin
part of: Advances in Cryptology – CRYPTO 2012, pages: 50-67, 2012
Presented at:
32nd Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-32009-5_4

 

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract

Borghoff, J. ; Canteaut, Anne Michele ; Guneysu, T. ; Kavun, E.B. ; Knezevic, M. ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Nikov, V. ; Paar, C. ; Rechberger, Christian
part of: Advances in Cryptology – ASIACRYPT 2012, pages: 208-225, 2012
Presented at:
18th International Conference on the Theory and Application of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/978-3-642-34961-4_14

  PDF

Sur le nombre de points rationnels des variétés abéliennes et des Jacobiennes sur les corps finis

Aubry, Yves ; Haloui, Safia ; Lachaud, Gilles
in: Comptes Rendus Mathématique, vol: 350, issue: 19-20, pages: 907-910

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1016/j.crma.2012.10.001

2011
 

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

Leander, Gregor ; Abdelraheem, Mohamed Ahmed ; Alkhzaimi, Hoda A. ; Zenner, Erik
part of: Lecture Notes in Computer Science, 2011
Presented at:
Advances in Cryptology : 31st Annual Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

 

A proof of a conjecture by Schweizer on the Drinfeld modular polynomial ΦT (X, Y )

Bassa, Alp ; Beelen, Peter
in: Journal of Number Theory, vol: 131, pages: 1276-1285

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1016/j.jnt.2011.01.007

  PDF

Bounding the number of points on a curve using a generalization of Weierstrass semigroups

Beelen, Peter ; Ruano, Diego
part of: Proceedings of WCC, 2011
Presented at:
7th International workshop on coding and cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

 

Bounds on the degree of APN polynomials: the case of x −1 + g(x)

Leander, Gregor ; Rodier, François
in: Designs, Codes and Cryptography, vol: 59, issue: 1-3, pages: 207-222

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/s10623-010-9456-y

 

C2 - Block Cipher

Knudsen, Lars Ramkilde ; Leander, Gregor
part of: Encyclopedia of Cryptography and Security, pages: 179-180, 2011

Type: Book chapter (Peer reviewed)

Status: Published     |    Year: 2011

 

Counting all bent functions in dimension eight 99270589265934370305785861242880

Langevin, Philippe ; Leander, Gregor
in: Designs, Codes and Cryptography, vol: 59, issue: 1-3, pages: 193-205

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/s10623-010-9455-z

 

Cryptanalysis of PRESENT-like ciphers with secret S-boxes

Borghoff, Julia ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Thomsen, Søren Steffen
in: Lecture Notes in Computer Science, vol: 6733, pages: 270-289
Presented at:
18th International Workshop on Fast Software Encryption

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-21702-9_16

 

Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations

Abdelraheem, Mohamed Ahmed ; Leander, Gregor ; Zenner, Erik
part of: Lecture Notes in Computer Science, 2011
Presented at:
18th International Workshop on Fast Software Encryption

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-21702-9_1

 

On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

Leander, Gregor
part of: Lecture Notes in Computer Science, pages: 303-322, 2011
Presented at:
Advances in Cryptology : 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-20465-4_18

 

PRESENT - Block Cipher

Knudsen, Lars Ramkilde ; Leander, Gregor
part of: Encyclopedia of Cryptography and Security, pages: 953-955, 2011

Type: Book chapter (Peer reviewed)

Status: Published     |    Year: 2011

 

Spongent: A lightweight hash function

Bogdanov, Andrey ; Knežević, Miroslav ; Leander, Gregor ; Toz, Deniz ; Varici, Kerem ; Verbauwhede, Ingrid
part of: Cryptographic hardware and embedded systems - CHES 2011. Proceedings, pages: 312-325, 2011
Presented at:
13th International Workshop on Cryptographic Hardware and Embedded Systems

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2011

 

Switchings, extensions, and reductions in central digraphs

Kündgen, André ; Leander, Gregor ; Thomassen, Carsten
in: Journal of Combinatorial Theory, Series A, vol: 118, issue: 7, pages: 2025-2034

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1016/j.jcta.2011.03.009

 

The Galois closure of Drinfeld modular towers

Bassa, Alp ; Beelen, Peter
in: Journal of Number Theory, vol: 131, issue: 3, pages: 561-577

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1016/j.jnt.2010.10.006

  PDF

The Minimum Distance of Graph Codes

Høholdt, Tom ; Justesen, Jørn
in: Lecture Notes in Computer Science, vol: 6639, pages: 201-212
Presented at:
3rd International Workshop on Coding and Cryptology

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2011     |    DOI: https://doi.org/10.1007/978-3-642-20901-7_12

2010
 

Affine Grassmann codes

Høholdt, Tom ; Beelen, Peter ; Ghorpade, Sudhir Ramakant
in: I E E E Transactions on Information Theory, vol: 56, issue: 7, pages: 3166-3176

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2010     |    DOI: https://doi.org/10.1109/TIT.2010.2048470

 

A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree

Leander, Gregor ; Bracken, Carl
in: Finite Fields and Their Applications, vol: 16, issue: 4, pages: 231-242

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2010     |    DOI: https://doi.org/10.1016/j.ffa.2010.03.001

 

Efficient list decoding of a class of algebraic-geometry codes

Beelen, Peter ; Brander, Kristian
in: Advances in Mathematics of Communication, vol: 4, issue: 4, pages: 485-518

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2010

 

Key-equations for list decoding of Reed-Solomon codes and how to solve them

Beelen, Peter ; Brander, Kristian
in: Journal of Symbolic Computation, vol: 45, issue: 7, pages: 773-786

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2010     |    DOI: https://doi.org/10.1016/j.jsc.2010.03.010

 

PRINTcipher: A Block Cipher for IC-Printing

Knudsen, Lars Ramkilde ; Leander, Gregor
part of: Cryptographic Hardware and Embedded Systems, CHES 2010, pages: 16-32, 2010
Presented at:
CHES 2010

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2010

 

The Hassa-Witt invariant in some towers of function fields over finite fields

Beelen, Peter ; Bassa, Alp
in: Bulletin of the Brazilian Mathematical Society, New Series, vol: 41, issue: 4, pages: 567-582

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2010

2009
 

A generalization of Baker's theorem

Beelen, Peter
in: Finite Fields and Their Applications, vol: 15, issue: 5, pages: 558-568

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1016/j.ffa.2009.04.003

 

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Bras-Amorós, Maria (Editor) ; Høholdt, Tom

Type: Book (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1007/978-3-642-02181-7

 

A Practical Key Recovery Attack on Basic TCHo

Leander, Gregor ; Herrmann, Mathias
part of: Public Key Cryptography - PKC 2009, pages: 411-424, 2009
Presented at:
Public Key Cryptography -PKC 2009. 12th International Conference on Practice and Theory in Public Key Cryptograph

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009

 

Cache Timing Analysis of LFSR-based Stream Ciphers

Zenner, Erik ; Leander, Gregor ; Hawkes, Philip
part of: Cryptography and Coding, 2009, Berlin
Presented at:
12th IMA International Conference on Cryptography and Coding

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009

 

Constructing new APN functions from known ones

Budaghyan, L. ; Carlet, C. ; Leander, Gregor
in: Finite Fields and Their Applications, vol: 15, issue: 2, pages: 150-159

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1016/j.ffa.2008.10.001

 

Construction of bent functions from near-bent functions

Leander, Gregor ; McGuire, G.
in: Journal of Combinatorial Theory, Series A, vol: 116, issue: 4, pages: 960-970

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1016/j.jcta.2008.12.004

 

Cryptanalysis of C2

Borghoff, Julia ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Matusiewicz, Krystian
part of: Advances in Cryptology - CRYPTO 2009, pages: 250-266, 2009, Belin Heldelberg New York
Presented at:
CRYPTO

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1007/978-3-642-03356-8

 

Decoding Foldes Reed-Solomon codes using Hensel-lifting

Beelen, Peter ; Brander, Kristian
part of: Gröbner Bases, Coding, and Cryptography, pages: 389-394, 2009
Presented at:
Workshop D1: Gröbner Bases in Cryptography, Coding Theory, and Algebraic Combinatorics

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2009

 

Fejlrettende koder

Beelen, Peter ; Høholdt, Tom
part of: Matematiske horisonter, pages: 163-173, 2009, Kgs. Lyngby

Type: Book chapter

Status: Published     |    Year: 2009

 

On the construction of Galois towers

Bassa, Alp (Invited author) ; Beelen, Peter
part of: Contemporary Mathematics, pages: 9-20, 2009
Presented at:
Arithmetic, Geometry Cryptography and Coding Theory

Type: Article in proceedings (Peer reviewed)     |     Invited contribution

Status: Published     |    Year: 2009

 

Optimal Bipartitet Ramanujan Graphs from Balanced Incomplete Block Designs: Their Characterization and Applications to Expander/LDPC Codes.

Høholdt, Tom ; Janwa, Heeralal (Invited author)
part of: Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes, pages: 53-65, 2009, Berlin
Presented at:
18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Type: Article in proceedings (Peer reviewed)     |     Invited contribution

Status: Published     |    Year: 2009

 

The order bound for toric codes

Beelen, Peter ; Ruano, Diego (Invited author)
part of: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pages: 1-10, 2009
Presented at:
18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Type: Article in proceedings (Peer reviewed)     |     Invited contribution

Status: Published     |    Year: 2009     |    DOI: https://doi.org/10.1007/978-3-642-02181-7_1

2008
 

A Syndrome Formulation of the Interpolation Step in the Guruswami-Sudan Algorithm

Beelen, Peter ; Høholdt, Tom
part of: Coding Theory and Applications, pages: 20-32, 2008
Presented at:
Second International Castle Meeting

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2008

 

List decoding using syndromes

Høholdt, Tom ; Beelen, Peter
part of: Series on Number Theory and Its Applications, 2008
Presented at:
International Conference on Algebraic Geometry and its Applications

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2008

 

Monomial Bent Functions and Stickelberger's Theorem

Langevin, Philippe ; Leander, Gregor
in: Finite Fields and Their Applications, vol: 14, issue: 3, pages: 727-742

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2008

 

On Codes, Matroids, and Secure Multi-party Computation From Linear Secret Sharing Schemes

Cramer, Ronald ; Daza, Vanesa ; Gracia, Ignacio ; Jiménez Urroz, Jorge ; Leander, Gregor ; Martí-Farré, Jaume ; Padró, Carles
in: I E E E Transactions on Information Theory, vol: 54, issue: 6, pages: 2644-2657

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2008

 

The Decoding of Algebraic Geometry Codes

Beelen, Peter ; Høholdt, Tom
part of: Series on Coding Theory and Cryptology, pages: 49-98, 2008

Type: Book chapter

Status: Published     |    Year: 2008

 

Two Classes of Quadratic APN Binomials Inequivalent to Power Functions

Budaghyan, Lilya ; Carlet, Claude ; Leander, Gregor
in: I E E E Transactions on Information Theory, vol: 54, issue: 9, pages: 4218-4229

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2008

2007
 

A Counter-Example to a Conjecture of Niho

Langevin, Philippe ; Leander, Gregor ; McGuire, Gary
in: I E E E Transactions on Information Theory, vol: 53, issue: 12, pages: 4785-4786

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2007     |    DOI: https://doi.org/10.1109/TIT.2007.909109

  PDF

Analysis of Iterated Hard Decision Decoding of Product Codes with Reed-Solomon Component Codes

Justesen, Jørn ; Høholdt, Tom
part of: IEEE Information Theory Workshop, 2007. ITW '07., 2007, Lake Tahoe
Presented at:
2007 IEEE Information Theory Workshop

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2007     |    DOI: https://doi.org/10.1109/ITW.2007.4313069

 

Iterative List Decoding of Some LDPC Codes

Justesen, Jørn ; Høholdt, Tom ; Hjaltason, Johann
in: IEEE Transactions on Information Theory, vol: 53, issue: 11, pages: 4276-4284

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2007     |    DOI: https://doi.org/10.1109/TIT.2007.907485