Søren S. Thomsen

From MaRDI portal
Person:1946601



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Slender-set differential cryptanalysis
Journal of Cryptology
2013-04-15Paper
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
Fast Software Encryption
2011-07-07Paper
Practical near-collisions on the compression function of BMW
Fast Software Encryption
2011-07-07Paper
Deterministic differential properties of the compression function of BMW
Selected Areas in Cryptography
2011-03-15Paper
On the collision and preimage resistance of certain two-call hash functions
Cryptology and Network Security
2010-12-07Paper
Cryptanalysis of the ESSENCE family of hash functions
Information Security and Cryptology
2010-11-23Paper
Pseudo-cryptanalysis of the Original Blue Midnight Wish
Fast Software Encryption
2010-07-13Paper
Rebound Attacks on the Reduced Grøstl Hash Function
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Cryptanalysis of MD2
Journal of Cryptology
2010-03-01Paper
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Fast Software Encryption
2009-08-11Paper
Cryptanalysis of Vortex
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Cryptanalysis of MDC-2
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
The Grindahl Hash Functions
Fast Software Encryption
2008-09-16Paper
Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Applied Cryptography and Network Security
2008-06-13Paper


Research outcomes over time


This page was built for person: Søren S. Thomsen