• Postbus 513, MF

    5600MB Eindhoven

    Nederland

Onderzoeksoutput

Filter
Conferentiebijdrage
2010

Information-set decoding for linear codes over Fq

Peters, C. P., 2010, Post-Quantum Cryptography (3rd International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010). Sendrier, N. (redactie). Berlin: Springer, blz. 81-94 (Lecture Notes in Computer Science; vol. 6061).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

59 Citaten (Scopus)

Interactive geometry inside MathDox

Cuypers, H., Hendriks, M. & Knopper, J. W., 2010, E-Proceedings of the Interoperable Interactive Geometry Conference (I2Geo 2010, Hluboká nad Vltavou, Czech Republic, July 2-3, 2010). blz. 1-6

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Lie algebras of vector fields : a survey

Draisma, J., 2010, Mini-workshop Algebraic and Analytic Techniques for Polynomial Vector Fields (Oberwolfach, Germany, December 12-18, 2010). Gasull, A., Hartmann, J., Llibre, J. & Walcher, S. (redactie). Zürich: EMS, blz. 3327-3329 (Oberwolfach Reports; vol. 7(4)).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Modulo reduction for Paillier encryptions and application to secure statistical analysis

Guajardo, J., Mennink, B. & Schoenmakers, B., 2010, Financial Cryptography and Data Security (14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010. Revised Selected Papers). Sion, R. (redactie). Berlin: Springer, blz. 375-382 (Lecture Notes in Computer Science; vol. 6052).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

18 Citaten (Scopus)
2 Downloads (Pure)

New software speed records for cryptographic pairings

Naehrig, M., Niederhagen, R. F. & Schwabe, P., 2010, Progress in Cryptology - LATINCRYPT 2010 (First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010. Proceedings). Abdalla, M. & Barretto, P. S. L. M. (redactie). Berlin: Springer, blz. 109-123 (Lecture Notes in Computer Science; vol. 6212).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

51 Citaten (Scopus)

Perfectly secure multiparty computation and the computational overhead of cryptography

Damgård, I., Ishai, Y. & Krøigård, M., 2010, Advances in Cryptology - Eurocrypt 2010 (29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Nice, France, May 30-June 3, 2010. Proceedings). Gilbert, H. (redactie). Berlin: Springer, blz. 445-465 (Lecture Notes in Computer Science; vol. 6110).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

89 Citaten (Scopus)
2 Downloads (Pure)

Searching keywords with wildcards on encrypted data

Sedghi, S., Liesdonk, van, P. P., Nikova, S. I., Hartel, P. H. & Jonker, W., 2010, Security and Cryptography for Networks (7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings). Garay, J. A. & De Prisco, R. (redactie). Berlin: Springer, blz. 138-153 (Lecture Notes in Computer Science; vol. 6280).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

50 Citaten (Scopus)

Secure multiparty linear programming using fixed-point arithmetic

Catrina, O. & Hoogh, de, S. J. A., 2010, Computer Security - ESORICS 2010 (15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings). Gritzalis, D., Preneel, B. & Theoharidou, M. (redactie). Berlin: Springer, blz. 134-150 (Lecture Notes in Computer Science; vol. 6345).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

37 Citaten (Scopus)

Starfish on strike

Bernstein, D. J., Birkner, P. & Lange, T., 2010, Progress in Cryptology - LATINCRYPT 2010 (First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010. Proceedings). Abdalla, M. & Barretto, P. S. L. M. (redactie). Berlin: Springer, blz. 61-80 (Lecture Notes in Computer Science; vol. 6212).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)
1 Downloads (Pure)

The eigenvalues of oppositeness graphs in buildings of spherical type

Brouwer, A. E., 2010, Combinatorics and Graphs (Twentieth Anniversary Conference of IPM Combinatorics, Theran, Iran, May 15-21, 2009). Brualdi, R. A., Hedayat, S., Kharaghani, H., Khosrovshahi, G. B. & Shahriani, S. (redactie). American Mathematical Society, blz. 1-9 (AMS Contemporary Mathematics Series; vol. 513).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

The focus of attention problem

Goossens, D., Polyakovskiy, S., Spieksma, F. C. R. & Woeginger, G. J., 2010, Proceedings 21st Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'10, Austin TX, USA, January 17-19, 2010). Society for Industrial and Applied Mathematics (SIAM), blz. 312-317

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

The Traveling Salesman Problem under squared Euclidean distances

Berg, de, M. T., Nijnatten, van, F. S. B., Sitters, R. A., Woeginger, G. J. & Wolff, A., 2010, Proceedings 27th Annual Symposium on Theoretical Aspects of Computer Science (STACS 2010, Nancy, France, March 4-6, 2010). Marion, J-Y. & Schwentick, T. (redactie). Leibniz-Zentrum für Informatik, blz. 239-250 (LIPIcs: Leibniz International Proceedings in Informatics).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)

Type-II optimal polynomial bases

Bernstein, D. J. & Lange, T., 2010, Arithmetic of Finite Fields (Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings). Hasan, M. A. & Helleseth, T. (redactie). Berlin: Springer, blz. 41-61 (Lecture Notes in Computer Science; vol. 6087).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

13 Citaten (Scopus)
1 Downloads (Pure)
2009

Charlemagne's challenge : the periodic latency problem

Coene, S., Woeginger, G. J. & Spieksma, F. C. R., 2009, Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management (IEEM'09, Hong Kong, December 8-11, 2009). Institute of Electrical and Electronics Engineers, blz. 296-300

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Combinatorial optimization problems with conflict graphs

Darmann, A., Pferschy, U., Schauer, J. & Woeginger, G. J., 2009, Proceedings of the 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization (CTW 2009, Paris, France, June 2-4, 2009). Cafieri, S., Mucherino, A., Nannicini, G., Tarissan, F. & Liberti, L. (redactie). blz. 293-296

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Downloads (Pure)

Constant-rounds, almost-linear bit-decomposition of secret shared values

Toft, T., 2009, Topics in Cryptology – CT-RSA 2009 (The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings). Berlin: Springer, blz. 357-371 (Lecture Notes in Computer Science; vol. 5473).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

20 Citaten (Scopus)
4 Downloads (Pure)

Designing an ASIP for cryptographic pairings over Barreto-Naehrig curves

Kammler, D., Zhang, D., Schwabe, P., Scharwaechter, H., Langenberg, M., Auras, D., Ascheid, G. & Mathar, R., 2009, Cryptographic Hardware and Embedded Systems - CHES 2009 (11th International Workshop Lausanne, Switzerland, September 6-9, 2009. Proceedings). Clavier, C. & Gaj, K. (redactie). Berlin: Springer, blz. 254-271 (Lecture Notes in Computer Science; vol. 5747).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

34 Citaten (Scopus)
1 Downloads (Pure)

ECM on graphics cards

Bernstein, D. J., Chen, T. R., Cheng, C. M., Lange, T. & Yang, B. Y., 2009, Advances in Cryptology - Eurocrypt 2009 (28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings). Joux, A. (redactie). Berlin: Springer, blz. 483-501 (Lecture Notes in Computer Science; vol. 5479).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

44 Citaten (Scopus)

Explicit bounds for generic decoding algorithms for code-based cryptography

Bernstein, D. J., Lange, T., Peters, C. P. & Tilborg, van, H. C. A., 2009, International Workshop on Coding and Cryptography (WCC 2009, Ullensvang, Norway, May 10-15, 2009. Pre-proceedings). Bergen: Selmer Center, University of Bergen, blz. 168-180

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Downloads (Pure)

Extended and generalized weight enumerators

Jurrius, R. P. M. J. & Pellikaan, G. R., 2009, International Workshop on Coding and Cryptography (WCC 2009, Ullensvang, Norway, May 10-15, 2009. Proceedings). Bergen: Selmer Center, University of Bergen, blz. 76-91

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Downloads (Pure)

Fast elliptic-curve cryptography on the Cell Broadband Engine

Costigan, N. & Schwabe, P., 2009, Progress in Cryptology - AfricaCrypt 2009 (Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009, Proceedings). Preneel, B. (redactie). Berlin: Springer, blz. 368-385 (Lecture Notes in Computer Science; vol. 5580).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

19 Citaten (Scopus)

Faster and timing-attack resistant AES-GCM

Käsper, E. & Schwabe, P., 2009, Cryptographic Hardware and Embedded Systems - CHES 2009 (11th International Workshop, Lausanne, Switzerland, September 6-9, 2009. Proceedings). Clavier, C. & Gaj, K. (redactie). Berlin: Springer, blz. 1-17 (Lecture Notes in Computer Science; vol. 5747).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

125 Citaten (Scopus)
11 Downloads (Pure)

Faster halvings in genus 2

Birkner, P. & Thériault, N., 2009, Selected Areas in Cryptography (15th Annual Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, 2008, Revised Selected Papers). Avanzi, R., Keliher, L. & Sica, F. (redactie). Berlin: Springer, blz. 1-17 (Lecture Notes in Computer Science; vol. 5381).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)

FSBday : Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB

Bernstein, D. J., Lange, T., Niederhagen, R. F., Peters, C. P. & Schwabe, P., 2009, SHARCS'09 Workshop Record (Proceedings 4th Workshop on Special-purpose Hardware for Attacking Cryptographic Systems, Lausanne, Switzerland, September 9-10, 2009). blz. 85-104

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Downloads (Pure)

FSBday : Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB

Bernstein, D. J., Lange, T., Niederhagen, R. F., Peters, C. P. & Schwabe, P., 2009, Progress in Cryptology - INDOCRYPT 2009 (Proceedings 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009). Roy, B. & Sendrier, N. (redactie). Berlin: Springer, blz. 18-38 (Lecture Notes in Computer Science; vol. 5922).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)
15 Downloads (Pure)

Fully decomposable split graphs

Broersma, H. J., Kratsch, D. & Woeginger, G. J., 2009, Combinatorial Algorithms (20th International Workshop, IWOCA 2009, Hradec nad Moravici, Czech Republic, June 28-July 2, 2009, Revised Selected Papers). Fiala, J., Kratochvil, J. & Miller, M. (redactie). Berlin: Springer, blz. 105-112 (Lecture Notes in Computer Science; vol. 5874).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)

MathDox editor

Brouwer, M., Cuypers, H. & Knopper, J. W., 2009, Proceedings of the 5th Mathematical User-Interfaces Workshop (MathUI'09, Grand Bend ON, Canada, July 6, 2009; co-located with MKM 2009). blz. 1-8

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Mediated ciphertext-policy attribute-based encryption and Its application

Ibraimi, L., Petkovic, M., Nikova, S. I., Hartel, P. H. & Jonker, W., 2009, Information Security Applications (10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers ). Youm, H. Y. & Yung, M. (redactie). Berlin: Springer, blz. 309-323 (Lecture Notes in Computer Science; vol. 5932).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

108 Citaten (Scopus)
4 Downloads (Pure)

MESS: the MathDox Exercise System

Cuypers, H., Knopper, J. W. & Sterk, H. J. M., 2009, e-Proceedings of the 6th JEM Workshop (Aachen, Germany, August 21, 2009; co-located with ICWL 2009). blz. 1-12

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Downloads (Pure)

Open Math in SCIEnce : SCSCP and POPCORN

Horn, P. & Roozemond, D. A., 2009, Intelligent Computer Mathematics (16th Symposium, Calculemus 2009, 8th International Conference, MKM 2009, Held as Part of CICM 2009, Grand Bend, Canada, July 6-12, 2009. Proceedings). Carette, J., Dixon, L., Sacerdoti Coen, C. & Watt, S. M. (redactie). Berlin: Springer, blz. 474-479 (Lecture Notes in Computer Science; vol. 5625).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)
1 Downloads (Pure)

Partition arguments in multiparty communication complexity

Draisma, J., Kushilevitz, E. & Weinreb, E., 2009, Automata, Languages and Programming (36th International Colloquium, ICALP 2009, Rhodes, Greece, July 5-12, 2009. Proceedings, Part I). Albers, S., Marchetti-Spaccamela, A., Matias, Y., Nikoletseas, S. & Thomas, W. (redactie). Berlin: Springer, blz. 390-402 (Lecture Notes in Computer Science; vol. 5555).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)
1 Downloads (Pure)

Partitioning graphs into connected parts

Hof, van 't, P., Paulusma, D. & Woeginger, G. J., 2009, Computer Science: Theory and Applications (Fourth International Computer Science Symposium in Russia, CSR 2009, Novosibirsk, Russia, August 18-23, 2009, Proceedings). Frid, A., Morozov, A. S., Rybalchenko, A. & Wagner, K. W. (redactie). Berlin: Springer, blz. 143-154 (Lecture Notes in Computer Science; vol. 5675).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)

Performance comparison of secure comparison protocols

Kerschbaum, F., Biswas, D. & Hoogh, de, S. J. A., 2009, Database and Expert Systems Applications (Proceedings 20th International Workshop, DEXA'09, Linz, Austria, August 31-September 4, 2009). IEEE Computer Society, blz. 133-136

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

32 Citaten (Scopus)
1 Downloads (Pure)

Secure multiparty computation goes live

Bogetoft, P., Christensen, D. L., Damgard, I., Geisler, M., Jakobsen, T., Kroigaard, M., Nielsen, J. D., Nielsen, J. B., Nielsen, K., Pagter, J., Schwartzbach, M. & Toft, T., 2009, Financial Cryptography and Data Security (13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers). Dingledine, R. & Golle, P. (redactie). Berlin: Springer, blz. 325-343 (Lecture Notes in Computer Science; vol. 5628).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

221 Citaten (Scopus)
1 Downloads (Pure)

Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate

Stevens, M. M. J., Sotirov, A., Appelbaum, J. R., Lenstra, A. K., Molnar, D., Osvik, D. A. & Weger, de, B. M. M., 2009, Advances in Cryptology - CRYPTO 2009 (29th Annual International Cryptology Conference, Santa Barbara CA, USA, August 16-20, 2009. Proceedings). Halevi, S. (redactie). Berlin: Springer, blz. 55-69 (Lecture Notes in Computer Science; vol. 5677).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
93 Citaten (Scopus)
98 Downloads (Pure)

Solving linear programs using multiparty computation

Toft, T., 2009, Financial Cryptography and Data Security (FC'09). Berlin: Springer, blz. 90-107 (Lecture Notes in Computer Science; vol. 5628).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

21 Citaten (Scopus)
2 Downloads (Pure)

The billion-mulmod-per-second PC

Bernstein, D. J., Chen, H-C., Chen, M. S., Cheng, C. M., Hsiao, C. H., Lange, T., Lin, Z. C. & Yang, B. Y., 2009, SHARCS'09 Workshop Record (Proceedings 4th Workshop on Special-purpose Hardware for Attacking Cryptograhic Systems, Lausanne, Switserland, September 9-10, 2009). blz. 131-144

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

12 Citaten (Scopus)

The Certicom challenges ECC2-X

Bailey, D. V., Baldwin, B., Batina, L., Bernstein, D. J., Birkner, P., Bos, J. W., Damme, van, G., De Meulenaer, G., Fan, J., Güneysu, T., Gurkaynak, F., Kleinjung, T., Lange, T., Mentens, N., Paar, C., Regazzoni, F., Schwabe, P. & Uhsadel, L., 2009, SHARCS'09 Workshop Record (Proceedings 4th Workshop on Special-purpose Hardware for Attacking Cryptographic Systems, Lausanne, Switzerland, September 9-10, 2009). blz. 51-82

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Downloads (Pure)

The extended coset leader weight enumerator

Jurrius, R. P. M. J. & Pellikaan, G. R., 2009, Proceedings 30th Symposium on Information Theory on the Benelux (Eindhoven, The Netherlands, May 28-29, 2009). Tjalkens, T. J. & Willems, F. M. J. (redactie). Eindhoven: Technische Universiteit Eindhoven, blz. 217-224

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Use the Web to close the mathematics gap

Gastel, van, L. J., Cuypers, H., Kooij, van der, H., Tempelaar, D. T. & Vrie, van de, E. M., 2009, e-Proceedings of the 6th JEM Workshop (Aachen, Germany, August 21, 2009; co-located with ICWL 2009). blz. 1-8

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Verifiable rotation of homomorphic encryptions

Hoogh, de, S. J. A., Schoenmakers, B., Skoric, B. & Villegas Bautista, J. A., 2009, Public Key Cryptography - PKC 2009 (12th International Conference on Practice and Theory in Public-Key Cryptography, Irvine CA, USA, March 18-20, 2009, Proceedings). Jarecki, S. & Tsudik, G. (redactie). Berlin: Springer, blz. 393-410 (Lecture Notes in Computer Science; vol. 5443).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Citaten (Scopus)
2008

Analysis and optimization of elliptic-curve single-scalar multiplication

Bernstein, D. J. & Lange, T., 2008, Finite Fields and Applications (Proceedings 8th International Conference, Fq8, Melbourne, Australia, July 9-13, 2007). Mullen, G. L., Panario, D. & Shparlinski, I. E. (redactie). Providence RI: American Mathematical Society, blz. 1-20 (Contemporary Mathematics Series; vol. 461).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

An efficient protocol for fair secure two-party computation

Kiraz, M. S. & Schoenmakers, B., 2008, Topics in Cryptology - CT-RSA 2008 (Proceedings of The Cryptographers' Track at the RSA Conference 2008, San Francisco CA, USA, April 8-11, 2008). Malkin, T. G. (redactie). Berlin: Springer, blz. 88-105 (Lecture Notes in Computer Science; vol. 4964).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)
1 Downloads (Pure)

Attacking and defending the McEliece cryptosystem

Bernstein, D. J., Lange, T. & Peters, C. P., 2008, Post-Quantum Cryptography (2nd International Workshop, PQCrypto 2008, Cincinnati OH, USA, October 17-19, 2008, Proceedings). Buchmann, J. & Ding, J. (redactie). Berlin: Springer, blz. 31-46 (Lecture Notes in Computer Science; vol. 5299).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

130 Citaten (Scopus)

Binary Edwards curves

Bernstein, D. J., Lange, T. & Rezaeian Farashahi, R., 2008, Cryptographic Hardware and Embedded Systems - CHES 2008 (10th International Workshop, Washington DC, USA, August 10-13, 2008, Proceedings). Oswald, E. & Rohatgi, P. (redactie). Berlin: Springer, blz. 244-265 (Lecture Notes in Computer Science; vol. 5154).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

76 Citaten (Scopus)
2 Downloads (Pure)

Coefficient functions of the Ehrhart quasi-polynomials of rational polygons

McAllister, T. B., 2008, Proceedings of the 2008 International Conference on Information Theory and Statistical Learning (ITSL 2008, Las Vegas NV, USA, July 14-17, 2008). Dehmer, M., Drmota, M. & Emmert-Streib, F. (redactie). CSREA Press, blz. 114-118

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)

Cross-curriculum search for Intergeo

Libbrecht, P., Desmoulins, C., Mercat, C., Laborde, C., Dietrich, M. & Hendriks, M., 2008, Intelligent Computer Mathematics (9th International Conference, AISC 2008; 15th Symposium, Calculemus 2008; 7th International Conference, MKM 2008, Birmingham, UK, July 28-August 1, 2008, Proceedings). Autexier, S., Campbell, J., Rubio, J., Sorge, V., Suzuki, M. & Wiedijk, F. (redactie). Berlin: Springer, blz. 520-535 (Lecture Notes in Computer Science; vol. 5144).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)

Extractors for Jacobians of binary genus-2 hyperelliptic curves

Rezaeian Farashahi, R., 2008, Information Security and Privacy (13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings). Mu, Y., Susilo, W. & Seberry, J. (redactie). Berlin: Springer, blz. 447-462 (Lecture Notes in Computer Science; vol. 5107).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

How hard is it to find extreme Nash equilibria in network congestion games?

Gassner, E., Hatzl, J., Krumke, S. O., Sperber, H. & Woeginger, G. J., 2008, Internet and Network Economics (Proceedings 4th International Workshop, WINE'08, Shanghai, China, December 17-20, 2008). Papadimitriou, C. & Zhang, S. (redactie). Berlin: Springer, blz. 82-93 (Lecture Notes in Computer Science; vol. 5385).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)

Increasing detection performance of surveillance sensor networks

Litvak, N., Altaf, M. U., Barbu, A., Jain, S., Miretskiy, D. I., Mohammadi, L., Onur, E., Panhuis, in 't, J. C. H. W., Sumihar, J. H., Vellekoop, M., Wijk, van, A. C. C. & Bisseling, R. H., 2008, Proceedings of the sixty-third European Study Group Mathematics with Industry (SWI 2008, Enschede, The Netherlands, January 28-February 1, 2008). Bokhove, O. & et al., X. (redactie). Enschede: Universiteit Twente, blz. 85-116

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Open Access
Bestand
32 Downloads (Pure)