• 2079 Citations
1971 …2014

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Henk C.A. van Tilborg is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles

Research Output

Authentication codes from e-ASU hash functions with partially secret keys

Liu, S., van Tilborg, H., Weng, J. & Chen, K., 1 Jan 2014, In : Chinese Journal of Electronics. 23, 4, p. 790-793 4 p.

Research output: Contribution to journalArticleAcademicpeer-review

  • Authentication codes from ε-ASU hash functions with partially secret keys

    Liu, S. L., Tilborg, van, H. C. A., Weng, J. & Chen, K., 2014, In : Chinese Journal of Electronics. 23, 4, p. 790-793

    Research output: Contribution to journalArticleAcademicpeer-review

    Open Access
    File
  • 49 Downloads (Pure)

    Chinese remainder theorem

    Tilborg, van, H. C. A., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 201-202

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    Encyclopedia of Cryptography and Security

    Tilborg, van, H. C. A. (ed.) & Jajodia, S. (ed.), 2011, 2nd ed. ed. New York: Springer. 1440 p.

    Research output: Book/ReportBook editingProfessional

  • Shannon's model

    Tilborg, van, H. C. A., 2011, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. & Jajodia, S. (eds.). 2nd ed. New York: Springer, p. 1194-1195

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    Student theses

    On weights in codes

    Author: van Tilborg, H., 31 Aug 1972

    Supervisor: van Lint, J. (Supervisor 1)

    Student thesis: Master