If you made any changes in Pure these will be visible here soon.

Research Output 1971 2014

Authentication codes from e-ASU hash functions with partially secret keys

Liu, S., van Tilborg, H., Weng, J. & Chen, K., 1 Jan 2014, In : Chinese Journal of Electronics. 23, 4, p. 790-793 4 p.

Research output: Contribution to journalArticleAcademicpeer-review

Authentication Codes
Hash functions
Hash Function
Authentication
Universal Function

Authentication codes from ε-ASU hash functions with partially secret keys

Liu, S. L., Tilborg, van, H. C. A., Weng, J. & Chen, K., 2014, In : Chinese Journal of Electronics. 23, 4, p. 790-793

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Authentication Codes
Hash functions
Hash Function
Authentication
Amplification

Codes, arrangements, matroids, and their polynomial links

Jurrius, R. P. M. J., 2012, Eindhoven: Technische Universiteit Eindhoven. 148 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File
Matroid
Weight Enumerator
Arrangement
Polynomial
Geometric Lattice

Design of large scale applications of secure multiparty computation : secure linear programming

Hoogh, de, S. J. A., 2012, Eindhoven: Technische Universiteit Eindhoven. 219 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File
Linear programming
Supply chain management
Random number generation
Supply chains
Cryptography

Chinese remainder theorem

Tilborg, van, H. C. A., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 201-202

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

Chinese remainder theorem

Press / Media

Student theses

A computer search for quasi-cyclic codes

Author: Weijs, S., 31 Jul 1997

Supervisor: van Tilborg, H. (Supervisor 1), Verhoeff, T. (Supervisor 2) & Aarts, E. (Supervisor 2)

Student thesis: Master

A design for a safe Internet communication channel with the help of smartcards

Author: Cuijpers, E., 31 Oct 1997

Supervisor: van Tilborg, H. (Supervisor 1), Maclaine Pont, P. (External person) (External coach) & Schoonen, A. (External coach)

Student thesis: Master

Algebraic attacks from a Gröbner basis perspective

Author: Segers, A., 30 Nov 2004

Supervisor: van Tilborg, H. (Supervisor 1), de Weger, B. (Supervisor 2), Schmitz, G. (Supervisor 2) & Bours, P. (Supervisor 2)

Student thesis: Master

File

An efficient way of constructing certain DeBruijn sequences

Author: van Weert, M., 1993

Supervisor: van Tilborg, H. (Supervisor 1) & Jansen, C. (Supervisor 2)

Student thesis: Master

Association schemes

Author: Hollmann, H., 31 Aug 1982

Supervisor: van Lint, J. (Supervisor 1) & van Tilborg, H. (Supervisor 2)

Student thesis: Master