Publication list

Search publications authored by the DTU-based staff of the Danish-Chinese Center

Publikationer rss feed

2017
  PDF

Twisted Reed-Solomon Codes

Beelen, Peter ; Puchinger, Sven ; Rosenkilde ne Nielsen, Johan
part of: Proceedings of 2017 IEEE International Symposium on Information Theory, pages: 336-40, 2017
Presented at:
2017 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1109/ISIT.2017.8006545

2016
  PDF

Algorithms for Simultaneous Padé Approximations

Rosenkilde, Johan Sebastian Heesemann ; Storjohann, Arne
part of: Proceedings of the 41st International Symposium on Symbolic and Algebraic Computation (ISSAC '16), pages: 405-412, 2016
Presented at:
41st International Symposium on Symbolic and Algebraic Computation

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016

  PDF

A method for accelerating pipelined cryptographic implementations

Bogdanov, Andrey ; LAURIDSEN, Martin, Mehl ; TISCHHAUSER, Elmar, Wolfgang
Patent no.: WO2016142330, Date: 2015-03-06

Type: Patent

Status: Published     |    Year: 2016

  PDF

Design and Analysis of Symmetric Primitives

Lauridsen, Martin Mehl

Type: Ph.D. thesis

Status: Published     |    Year: 2016

 

On the Number of Rational Points on Prym Varieties over Finite Fields

Aubry, Yves ; Haloui, Safia
in: Glasgow Mathematical Journal, vol: 58, issue: 1, pages: 55-68

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1017/S0017089515000063

 

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

Beierle, Christof ; Jean, Jérémy ; Kölbl, Stefan ; Leander, Gregor ; Moradi, Amir ; Peyrin, Thomas ; Sasaki, Yu ; Sasdrich, Pascal ; Sim, Siang Meng
part of: Advances in Cryptology – CRYPTO 2016, pages: 123-153, 2016
Presented at:
36th International Cryptology Conference

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-662-53008-5_5

  PDF

The structure of dual Grassmann codes

Beelen, Peter ; Pinero, Fernando
in: Designs, Codes and Cryptography, vol: 79, issue: 3, pages: 451-470

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/s10623-015-0085-3

2015
  PDF

An algebraic approach to graph codes

Pinero, Fernando

Type: Ph.D. thesis

Status: Published     |    Year: 2015

 

Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

Beierle, Christof ; Jovanovic, Philipp ; Lauridsen, Martin Mehl ; Leander, Gregor ; Rechberger, Christian
part of: Topics in Cryptology – CT-RSA 2015, pages: 37-58, 2015
Presented at:
The RSA Conference Cryptographers' Track (CT-RSA 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-16715-2_3

 

Comb to Pipeline: Fast Software Encryption Revisited

Bogdanov, Andrey ; Lauridsen, Martin Mehl ; Tischhauser, Elmar Wolfgang
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 150-171, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_8

  PDF

Good families of Drinfeld modular curves

Bassa, Alp ; Beelen, Peter ; Nguyen, Nhut
in: LMS Journal of Computation and Mathematics, vol: 18, issue: 1, pages: 699-712

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1112/S146115701500025X

  PDF

Good towers of function Fields

Nguyen, Nhut

Type: Ph.D. thesis

Status: Published     |    Year: 2015

 

Linear codes associated to determinantal varieties

Beelen, Peter ; Ghorpade, Sudhir R. ; Hasan, Sartaj Ul
in: Discrete Mathematics, vol: 338, issue: 8, pages: 1493-1500

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1016/j.disc.2015.03.009

 

Linear complexity for multidimensional arrays - a numerical invariant

Gomez-Perez, Domingo ; Høholdt, Tom ; Moreno, Oscar ; Rubio, Ivelisse
part of: Proceedings of the IEEE International Symposium on Information Theory (ISIT 2015), pages: 2697-2701, 2015
Presented at:
2015 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1109/ISIT.2015.7282946

 

Linear Distinguishers in the Key-less Setting: Application to PRESENT

Lauridsen, Martin Mehl ; Rechberger, Christian
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 217-240, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_11

 

Security of the AES with a Secret S-Box

Tiessen, Tyge ; Knudsen, Lars Ramkilde ; Kölbl, Stefan ; Lauridsen, Martin Mehl
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 175-189, 2015
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_9

  PDF

Solving Shift Register Problems over Skew Polynomial Rings using Module Minimisation

Li, W. ; Nielsen, Johan Sebastian Rosenkilde ; Puchinger, S. ; Sidorenko, V.
Presented at:
9th International Workshop on Coding and Cryptography (WCC 2015)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2015

  PDF

Sub-quadratic decoding of one-point hermitian codes

Nielsen, Johan Sebastian Rosenkilde ; Beelen, Peter
in: IEEE Transactions on Information Theory, vol: 61, issue: 6, pages: 3225-3240

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1109/TIT.2015.2424415

  PDF

Towers of Function Fields over Non-prime Finite Fields

Bassa, Alp ; Beelen, Peter ; Garcia, Arnaldo ; Stichtenoth, Henning
in: Moscow Mathematical Journal, vol: 15, issue: 1, pages: 1-29

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2015

 

Twisted Polynomials and Forgery Attacks on GCM

Abdelraheem, Mohamed Ahmed A. M. A. ; Beelen, Peter ; Bogdanov, Andrey ; Tischhauser, Elmar Wolfgang
part of: Advances in Cryptology – EUROCRYPT 2015, pages: 762-786, 2015
Presented at:
34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-46800-5_29

2014
 

An Improvement of the Gilbert–Varshamov Bound Over Nonprime Fields

Bassa, Alp ; Beelen, Peter ; Garcia, Arnaldo ; Stichtenoth, Henning
in: IEEE Transactions on Information Theory, vol: 60, issue: 7, pages: 3859-3861

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1109/TIT.2014.2316531

 

Cryptanalysis of SIMON Variants with Connections

Alizadeh, Javad ; Alkhzaimi, Hoda A. ; Aref, Mohammad Reza ; Bagheri, Nasour ; Gauravaram, Praveen ; Kumar, Abhishek ; Lauridsen, Martin Mehl ; Sanadhya, Somitra Kumar
part of: Proceedings of the 10th International Workshop on Radio Frequency Identification Security and Privacy Issues, RFIDSec 2014, pages: 90-107, 2014
Presented at:
10th International Workshop on RFID Security and Privacy (RFIDSec 2014)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-13066-8_6

  PDF

Fast Kötter–Nielsen–Høholdt Interpolation in the Guruswami–Sudan Algorithm

Nielsen, Johan Sebastian Rosenkilde
Presented at:
14th International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2014)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2014

  PDF

Galois towers over non-prime finite fields

Bassa, Alp ; Beelen, Peter ; Garcia, Arnaldo ; Stichtenoth, Henning
in: Acta Arithmetica, vol: 164, issue: 2, pages: 163-179

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.4064/aa164-2-6

 

Good Towers of Function Fields

Bassa, Alp ; Beelen, Peter ; Nguyen, Nhut
part of: Algebraic Curves and Finite Fields, 2013

Type: Book chapter (Peer reviewed)

Status: Published     |    Year: 2014

 

Key Recovery Attacks on Recent Authenticated Ciphers

Bogdanov, Andrey ; Dobraunig, Christoph ; Eichlseder, Maria ; Lauridsen, Martin Mehl ; Mendel, Florian ; Schläffer, Martin ; Tischhauser, Elmar Wolfgang
part of: 3rd International Conference on Cryptology and Information Security in Latin America, pages: 274-287, 2014
Presented at:
3rd International Conference on Cryptology and Information Security in Latin America

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014

 

Lazy Modulus Switching for the BKW Algorithm on LWE

Albrecht, Martin Roland ; Faugère, Jean-Charles ; Fitzpatrick, Robert ; Perret, Ludovic
part of: Public-Key Cryptography – PKC 2014, pages: 429-445, 2014
Presented at:
17th International Conference on Practice and Theory in Public-Key Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-642-54631-0_25

  PDF

Multi-Trial Guruswami–Sudan Decoding for Generalised Reed–Solomon Codes

Nielsen, Johan Sebastian Rosenkilde ; Zeh, Alexander
in: Designs, Codes and Cryptography, vol: 73, issue: 2, pages: 507-527

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/s10623-014-9951-7

 

On the Efficacy of Solving LWE by Reduction to Unique-SVP

Albrecht, Martin Roland ; Fitzpatrick, Robert ; Göpfert, Florian
part of: Information Security and Cryptology - ICISC 2013. Revised Selected Papers, pages: 293–310, 2014
Presented at:
16th Annual International Conference on Information Security and Cryptology

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-12160-4_18

 

On the sizes of expander graphs and minimum distances of graph codes

Høholdt, Tom ; Justesen, Jørn
in: Discrete Mathematics, vol: 325, pages: 38-46

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1016/j.disc.2014.02.005

 

On the subfield subcodes of Hermitian codes

Pinero, Fernando ; Janwa, Heeralal
in: Designs, Codes and Cryptography, vol: 70, issue: 1-2, pages: 157-173

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/s10623-012-9736-9

 

Optimal codes as Tanner codes with cyclic component codes

Høholdt, Tom ; Pinero, Fernando ; Zeng, Peng
in: Designs, Codes and Cryptography, vol: 76, issue: 1, pages: 37-47

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/s10623-014-9962-4

  PDF

Power Decoding of Reed–Solomon Codes Revisited

Nielsen, Johan Sebastian Rosenkilde
part of: Proceedings of the 4th International Castle Meeting on Coding Theory and Applications (4ICMCTA 2014), pages: 297-305, 2015
Presented at:
4th International Castle Meeting on Coding Theory and Applications (4ICMCTA 2014)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-17296-5_32

 

Practical Cryptanalysis of a Public-key Encryption Scheme Based on New Multivariate Quadratic Assumptions

Albrecht, Martin Roland ; Faugére, Jean-Charles ; Fitzpatrick, Robert ; Perret, Ludovic ; Todo, Yosuke ; Xagawa, Keita
part of: Public-Key Cryptography – PKC 2014, pages: 446-464, 2014
Presented at:
17th International Conference on Practice and Theory in Public-Key Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-642-54631-0_26

  PDF

Reduced List Decoding of Reed–Solomon Codes Using Reliability Information

Mohamed, Mostafa H. ; Nielsen, Johan Sebastian Rosenkilde ; Bossert, Martin
Presented at:
21st International Symposium on Mathematical Theory of Networks and Systems (MTNS 2014)

Type: Paper (Peer reviewed)

Status: Published     |    Year: 2014

2013
 

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers

Albrecht, Martin Roland ; Leander, Gregor
part of: Selected Areas in Cryptography, pages: 1-15, 2013
Presented at:
19th International Conference on Selected Areas in Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/978-3-642-35999-6_1

 

A new construction of bent functions based on Z-bent functions

Gangopadhyay, Sugata ; Joshi, Anand ; Leander, Gregor ; Sharma, Rajendra Kumar
in: Designs, Codes and Cryptography, vol: 66, issue: 1-3, pages: 243-256

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/s10623-012-9687-1

 

Bounding the number of points on a curve using a generalization of Weierstrass semigroups

Beelen, Peter ; Ruano, Diego
in: Designs, Codes and Cryptography, vol: 66, issue: 1-3, pages: 221-230

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/s10623-012-9685-3

  PDF

Generalised Multi-sequence Shift-Register Synthesis using Module Minimisation

Nielsen, Johan Sebastian Rosenkilde
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 882-886, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620353

  PDF

List Decoding of Algebraic Codes

Nielsen, Johan Sebastian Rosenkilde

Type: Ph.D. thesis

Status: Published     |    Year: 2013

  PDF

Multi-Trial Guruswami–Sudan Decoding for Generalised Reed–Solomon Codes

Nielsen, Johan Sebastian Rosenkilde ; Zeh, Alexander
part of: WCC 2013 International Workshop on Coding and Cryptography, 2013
Presented at:
International Workshop on Coding and Cryptography (WCC 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013

  PDF

On Decoding Interleaved Chinese Remainder Codes

Li, Wenhui ; Sidorenko, Vladimir ; Nielsen, Johan Sebastian Rosenkilde
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 1052-1056, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620387

  PDF

On Rational Interpolation-Based List-Decoding and List-Decoding Binary Goppa Codes

Beelen, Peter ; Høholdt, Tom ; Nielsen, Johan Sebastian Rosenkilde ; Wu, Yingquan
in: I E E E Transactions on Information Theory, vol: 59, issue: 6, pages: 3269-3281

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/TIT.2013.2243800

 

On the Dimension of Graph Codes with Reed–Solomon Component Codes

Beelen, Peter ; Høholdt, Tom ; Pinero, Fernando ; Justesen, Jørn
part of: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pages: 1227-1231, 2013
Presented at:
2013 IEEE International Symposium on Information Theory

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ISIT.2013.6620422

 

On the number of points on abelian and Jacobian varieties over finite fields

Aubry, Yves ; Haloui, Safia ; Lachaud, Gilles
in: Acta Arithmetica, vol: 160, issue: 3, pages: 201-241

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.4064/aa160-3-1

  PDF

Recent progress in the relative equilibria of point vortices — In memoriam Hassan Aref

Beelen, Peter ; Brøns, Morten ; Krishnamurthy, Vikas S. ; Stremler, Mark A.
in: I U T A M. Procedia, vol: 7, pages: 3-12
Presented at:
Topological Fluid Dynamics II (IUTAM Symposium)

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1016/j.piutam.2013.03.002

 

Slender-Set Differential Cryptanalysis

Borghoff, Julia ; Knudsen, Lars Ramkilde ; Leander, Gregor ; Thomsen, Søren Steffen
in: Journal of Cryptology, vol: 26, issue: 1, pages: 11-38

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/s00145-011-9111-4

 

SPONGENT: The Design Space of Lightweight Cryptographic Hashing

Bogdanov, Andrey ; Knezevic, Miroslav ; Leander, Gregor ; Toz, Deniz ; Varici, Kerem ; Verbauwhede, Ingrid
in: I E E E Transactions on Computers, vol: 62, issue: 10, pages: 2041-2053

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/TC.2012.196

2012
 

A closed form expression for the Drinfeld modular polynomial ΦT (X, Y )

Bassa, Alp ; Beelen, Peter
in: Archiv der Mathematik, vol: 99, issue: 3, pages: 237-245

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/s00013-012-0423-x

 

A new construction of highly nonlinear S-boxes

Beelen, Peter ; Leander, Gregor
in: Cryptography and Communications, vol: 4, issue: 1, pages: 65-77

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2012     |    DOI: https://doi.org/10.1007/s12095-011-0052-4