Søren S. Thomsen

According to our database1, Søren S. Thomsen authored at least 21 papers between 2006 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Slender-Set Differential Cryptanalysis.
J. Cryptol., 2013

2012
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).
IACR Cryptol. ePrint Arch., 2012

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Practical Near-Collisions on the Compression Function of BMW.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Cryptanalysis of MD2.
J. Cryptol., 2010

On hash functions using checksums.
Int. J. Inf. Sec., 2010

Cryptanalysis of PRESENT-like ciphers with secret S-boxes.
IACR Cryptol. ePrint Arch., 2010

Deterministic Differential Properties of the Compression Function of BMW.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Rebound Attacks on the Reduced Grøstl Hash Function.
Proceedings of the Topics in Cryptology, 2010

On the Collision and Preimage Resistance of Certain Two-Call Hash Functions.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Hash Functions and Information Theoretic Security.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Pseudo-cryptanalysis of the Original Blue Midnight Wish.
IACR Cryptol. ePrint Arch., 2009

The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Cryptanalysis of MDC-2.
Proceedings of the Advances in Cryptology, 2009

Grøstl - a SHA-3 candidate.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

Cryptanalysis of the ESSENCE Family of Hash Functions.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Cryptanalysis of Vortex.
Proceedings of the Progress in Cryptology, 2009

2008
An improved preimage attack on MD2.
IACR Cryptol. ePrint Arch., 2008

Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
The Grindahl Hash Functions.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Proposals for Iterated Hash Functions.
Proceedings of the E-Business and Telecommunication Networks, 2006


  Loading...