If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Henk van Tilborg is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Authentication Codes Mathematics
Authentication Engineering & Materials Science
Hash functions Engineering & Materials Science
Hash Function Mathematics
Cryptography Engineering & Materials Science
Chinese remainder theorem Mathematics
Key Distribution Mathematics
Amplification Mathematics

Research Output 1971 2014

Authentication codes from e-ASU hash functions with partially secret keys

Liu, S., van Tilborg, H., Weng, J. & Chen, K., 1 Jan 2014, In : Chinese Journal of Electronics. 23, 4, p. 790-793 4 p.

Research output: Contribution to journalArticleAcademicpeer-review

Authentication Codes
Hash functions
Hash Function
Authentication
Universal Function

Authentication codes from ε-ASU hash functions with partially secret keys

Liu, S. L., Tilborg, van, H. C. A., Weng, J. & Chen, K., 2014, In : Chinese Journal of Electronics. 23, 4, p. 790-793

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Authentication Codes
Hash functions
Hash Function
Authentication
Amplification

Chinese remainder theorem

Tilborg, van, H. C. A., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 201-202

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

Chinese remainder theorem

Encyclopedia of Cryptography and Security

Tilborg, van, H. C. A. (ed.) & Jajodia, S. (ed.), 2011, 2nd ed. ed. New York: Springer. 1440 p.

Research output: Book/ReportBook editingProfessional

edition
coverage
lack
trend

Shannon's model

Tilborg, van, H. C. A., 2011, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. & Jajodia, S. (eds.). 2nd ed. New York: Springer, p. 1194-1195

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

Student theses

A computer search for quasi-cyclic codes

Author: Weijs, S., 31 Jul 1997

Supervisor: van Tilborg, H. (Supervisor 1), Verhoeff, T. (Supervisor 2) & Aarts, E. (Supervisor 2)

Student thesis: Master

A design for a safe Internet communication channel with the help of smartcards

Author: Cuijpers, E., 31 Oct 1997

Supervisor: van Tilborg, H. (Supervisor 1), Maclaine Pont, P. (External person) (External coach) & Schoonen, A. (External coach)

Student thesis: Master

Algebraic attacks from a Gröbner basis perspective

Author: Segers, A., 30 Nov 2004

Supervisor: van Tilborg, H. (Supervisor 1), de Weger, B. (Supervisor 2), Schmitz, G. (Supervisor 2) & Bours, P. (Supervisor 2)

Student thesis: Master

File

An efficient way of constructing certain DeBruijn sequences

Author: van Weert, M., 1993

Supervisor: van Tilborg, H. (Supervisor 1) & Jansen, C. (Supervisor 2)

Student thesis: Master

Association schemes

Author: Hollmann, H., 31 Aug 1982

Supervisor: van Lint, J. (Supervisor 1) & van Tilborg, H. (Supervisor 2)

Student thesis: Master