Recent publications
-
H.C.A. van Tilborg, S.W. Rienstra and F.C. Bussemaker, Code voor positionering
van een as, Rapport IWDE 94-02, Eindhoven University of Technology,
Eindhoven, the Netherlands, 1994.
-
F.P.E. Wiemans, J.M. Smits and H.C.A. van Tilborg, Encryptie: justitiële
en particuliere belangen, Delikt en Delinkwent 24, April 1994,
p. 340-359.
-
F.W. Sun and H.C.A. van Tilborg, Some features of coset decoding,
Proc. of IEEE Intern. Workshop on Information Theory, Moscow, Russia, 1994,
p. 95-97.
-
M. Blaum, J. Bruck, C.M. Melas and H.C.A. van Tilborg, Methods for synchronizing
(d,k)-constrained sequences, New Orleans, 1994 IEEE International Conference
on Communications, Piscateway IEEE Service Center, 1994, p. 1800-1808.
-
F.W. Sun and H.C.A. van Tilborg, Fast bounded-distance decoding of the
Nordstrom-Robinson code, in: Communications and Cryptology; two sides
of the same tapestry, (ed. R.E. Blahut, e.o.), Kluwer Academic Publishers,
Boston etc., 1994, p. 391-398.
-
O. Amrani, Y. Be'ery, A. Vardy, F.W. Sun and H.C.A. van Tilborg, The
Leech lattice and the Golay code: bounded distance decoding and multilevel
constructions, IEEE Trans. Inf. Theory IT - 40, 1994, p. 1030-1043.
-
P.W. Heijen and H.C.A. van Tilborg, Optimum cyclic burst-correcting
codes and their decoding algorithm, Proceedings of the International
Workshop on optimal codes and related topics, Panorama, Shumen, Bulgaria,
1995, p. 74-89.
-
F.W. Sun and H.C.A. van Tilborg, The Leech lattice, the octocode, and
decoding algorithms, IEEE Trans. Inf. Theory IT- 41, 1995, p.
1097-1106.
-
V. Korjik, M. Ivkov, Y. Merinovich, A. Barg and H.C.A. van Tilborg, A
broadcast key distribution scheme based on block designs in: Cryptography
and Coding (ed. C. Boyd), Lecture Notes in Computer Science 1025, Springer
Verlag, New York etc., 1995, p. 2-12.
-
H.C.A. van Tilborg, Authentication codes: an area where coding and cryptography
meet, in: Cryptography and Coding (ed. C. Boyd), Lecture Notes in Computer
Science 1025, Springer Verlag, New York etc., 1995, p. 169-183.
-
H.C.A. van Tilborg, Finite fields and error-correcting codes, in:
Handbook of Algebra, Vol. 1 (ed. M. Hazewinkel), Elsevier Science B.V.,
Amsterdam, 1996, p. 395-422.
-
H.C.A. van Tilborg, The role of discrete mathematics in engineering,
in: The role of mathematics in modern engineering (ed. A.K. Easton and
J.M. Steiner), Studentliteratur, Lund, 1996, p. 105-120.
-
H.C.A. van Tilborg, An old conjecture about nonlinear codes resolved,
Nieuw Archief voor Wiskunde, Vierde Serie, Deel 14, 1996, p. 113-126.
-
E. Verheul, B.J. Koops and H.C.A. van Tilborg, Public key infrastructure;
Binding cryptography - a fraud-detectible alternative to key-escrow proposals,
Computer Law & Security Report, Vol 13, no. 1, 1997, p. 3-14.
-
H.C.A. van Tilborg, Beveiliging van chipcards, in: Hoe laat de student
zich in de kaart kijken?, proceedings Symposium over chipkaarten en privacy,
Registratiekamer, 1997, p. 9-11.
-
E.R. Verheul and H.C.A. van Tilborg, A construction of a k out of n
visual secret sharing scheme, Proceedings of First INTAS International
Seminar on Coding Theory and Combinatorics, Thahkadzor, Armenia, 1997,
p. 130-138.
-
E.R. Verheul and H.C.A. van Tilborg, Constructions and properties of
k out of n visual secret sharing schemes, Designs, Codes and Cryptography,
Vol. 11, No. 2, May 1997, p. 179-196.
-
E.R. Verheul and H.C.A. van Tilborg, Binding ElGamal: a fraud- detectable
alternative to key-escrow proposals, in: Advances in Cryptology - EUROCRYPT'97
(ed. W. Fumy), Lecture Notes in Computer Science 1233, Springer Verlag,
1997, p. 119-133.
-
H.C.A. van Tilborg, Cryptology from Roman days to electronic times,
XOOTIC Magazine, Vol. 4, 1997, p. 6-10.
-
E.R. Verheul and H.C.A. van Tilborg, Cryptanalysis of 'less short' RSA
Secret Exponents, Applicable Algebra in Engineering, Communication
and Computing, Vol. 8, 1997, p. 425-435.
-
P. Heijnen and H.C.A. van Tilborg, The decoding of binary quasi-cyclic
codes, Communications and Coding (ed. M. Darnell and B. Honary), Research
Studies Press, Taunton, 1998 p. 146-159.
-
P. Heijnen and H.C.A. van Tilborg, Two observations concerning optimum
cyclic burst-correcting codes, Discrete Mathematics 184, 1998, p. 111-120.
-
P. Heijnen, H.C.A. van Tilborg, T. Verhoeff and S. Weijs, Some new binary
codes, IEEE Trans. Inf. Theory IT 44, 1998, p. 1994-1996.
-
H.C.A. van Tilborg, Coding theory at work in cryptology and vice versa,
in: Handbook of Coding Theory (ed. V.S. Pless and W.C. Huffman), North-Holland,
1998, p. 1195-1227.
-
M. Blaum, P.G. Farrell and H.C.A. van Tilborg, Array codes, in:
Handbook of Coding Theory (ed. V.S. Pless and W.C. Huffman), North-Holland,
1998, p. 1855-1909.
-
S.-B. Xu and H.C.A. van Tilborg, A construction of systematic authentication
codes based on error-correcting codes, in: Proc. of the 1999 Workshop
on Coding and Cryptography (ed. D. Augot and C. Carlet), INRIA, Paris,
1999, p. 279-289.
-
A. Barg, E. Krouk and H.C.A. van Tilborg, On the complexity of minimum
distance decoding of long linear codes, IEEE Trans. Inf. Theory IT-45,
1999, p. 1392-1405.
-
S.-B. Xu, C. Jansen and H.C.A. van Tilborg, A new authentication protocol
for portable communication systems, in: Secure Information Networks;
Communications and Multimedia Security (ed. B. Preneel), Kluwer Academic
Publishers, Boston, 1999, p. 216-230.
-
A.G. van Asch and H.C.A. van Tilborg, Two "dual"
families of nearly-linear codes over Zp , p odd,
AAECC-11, 2001, p. 313-329.
-
A.G. van Asch and H.C.A. van Tilborg, Some observations about linear
Zp2 codes, Proceedings of the Third
EuroWorkshop On Optimal Codes and related Topics, Institute of Mathemtics
and Informatics, Bulgarian Academy of Sciences, 2001, p. 5-12.
-
C. Carlet (Guest-editor), P. Charpin, M. Girault, G. Kabatiansky and
H.C.A. van Tilborg (Co-guest editors), Discrete Applied Mathematics,
Special Issue on Coding and Cryptography, Vol. 111, Numbers 1-2,
2001, p. 1-218.
-
H.C.A. van Tilborg, Elliptic curve cryptosystems; too good to be true?,
Nieuw Archief voor Wiskunde, Vijfde Serie, Deel 2, 2001, p. 220-225.
-
E.R. Verheul, J.M. Doumen and H.C.A. van Tilborg, Sloppy Alice attacks! Adaptive
chosen ciphertext attacks on the McEliece public-key cryptosystem, in: Information,
Coding and Mathematics (ed. M. Blaum, P.G. Farrell and H.C.A. van Tilborg), Kluwer
Academic Publishers, Boston, 2002, p. 99-119.
-
L.A.M. Schoenmakers and H.C.A. van Tilborg, What
cryptology can mean for electronic commerce, in: Trust in
Electronic Commerce (ed. L.E.J. Prins et al.), Kluwer Law
International, The Hague etc., 2002, p. 45-54.
-
A. Kholosha and H.C.A. van Tilborg, Tensor transform of
Boolean functions and related algebraic and probabilistic
properties, in: Information and Communications Security (ed. R.
Deng a.o.), Springer LNCS 2513, 2002, p. 434-446.
-
S.B. Xu, J. Doumen and H.C.A. van Tilborg, On the security of digital signature
schemes based for error-correcting codes, Designs, Codes and Cryptography,
Vol. 28, 2003, p. 187-200.
-
S. Liu, H.C.A. van Tilborg and M. van Dijk, A practical protocol for advantage
distillation and information reconciliation, Designs, Codes and Cryptography,
Vol. 30, 2003, p.39-62.
-
H.C.A. van Tilborg, B. Preneel and B. Macq,
Cryptology, in: Information Theory in the Benelux: An overview of WIC symposia
1980-2003 (eds. R.L. Lagendijk a.o.), 2004, p. 61-88.
-
H.C.A. van Tilborg, Elliptische krommen in de cryptografie, in: Actuele Wiskunde,
CWI Syllabus 56, 2006, p. 7-20.
-
A.G. van Asch, A. Blokhuis, H.D.L. Hollmann, W.M. Kantor and H.C.A. van Tilborg,
Jack van Lint (1932-2004): A survey of his scientific work, in: Journal of
Combinatorial Theory, Series A, 113 (eds. H.C.A. van Tilborg a.o.), 2006, p. 1594-1613.
-
H.C.A. van Tilborg, J. Pieprzyk, R. Steinfeld and H.-X. Wang, New constructions
of anonymous membership broadcasting schemes, Advances in Mathematics of
Communications, Vol. 1, 2007, p. 29-44.
-
H.C.A. van Tilborg, Authentication codes from error-correcting codes; an
overview, in: Enhancing Cryptographic Primitives with Techniques from Error
Correcting Codes (eds. B. Preneel e.a.), NATO Science for Peace and Security
Series, Vol. 23, IOS Press, 2009, p. 3-16.