Home
Håvard Raddum's picture
  • E-mailHavard.Raddum@uib.no
  • Phone+47 410 91 109+47 410 91 109
  • Visitor Address
    HIB - Thormøhlensgt. 55
  • Postal Address
    Postboks 7803
    5020 Bergen
Journal articles
  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. 2016. Using Cryptography to Control Your Data at a Distance. ERCIM News. 106: 17-18.
  • Kazymyrov, Oleksandr; Oliynykov, Roman; Raddum, Håvard. 2016. Influence of addition modulo 2n on algebraic attacks. Cryptography and Communications. 8: 277-289. doi: 10.1007/s12095-015-0136-7
  • Raddum, Håvard; Kazymyrov, Oleksandr. 2015. Algebraic attacks using binary decision diagrams. Lecture Notes in Computer Science. 9024: 40-54. doi: 10.1007/978-3-319-21356-9_4
  • Raddum, Håvard; Schilling, Thorsten Ernst. 2012. Analysis of trivium using compressed right hand side equations. Lecture Notes in Computer Science. 18-32. doi: 10.1007/978-3-642-31912-9_2
  • Nestås, Lars Hopland; Raddum, Håvard; Hole, Kjell Jørgen. 2010. Valg på nett er mulig. Aftenposten (morgenutg. : trykt utg.). Published 2010-01-25.
  • Raddum, Håvard; Sys, Marek. 2010. The Zodiac Killer Ciphers. Tatra Mountains Mathematical Publications. 45: 75-91.
  • Muhammad Reza, Z'aba; Raddum, Håvard; Simpson, Leonie; Dawson, Ed; Henricksen, Matt; Wong, Kenneth. 2009. Algebraic Analysis of LEX. Conferences in Research and Practice in Information Technology. 98: 33-46.
  • Raddum, Håvard; Nestås, Lars Hopland; Hole, Kjell Jørgen. 2009. Når folket stemmer hjemme. Hubro. Magasin for Universitetet i Bergen. 4. 24-25.
  • Muhammad Reza, Z'aba; Raddum, Håvard; Henricksen, Matt; Dawson, Ed. 2008. Bit-Pattern Based Integral Attack. Lecture Notes in Computer Science. 5086: 363-381.
  • Raddum, Håvard; Semaev, Igor A. 2008. Solving Multiple Right Hand Sides linear equations. Designs, Codes and Cryptography. 49: 147-160. doi: 10.1007/s10623-008-9180-z
  • Rønsom, Sondre; Raddum, Håvard. 2008. On the Number of Linearly Independent Equations Generated by XL. Lecture Notes in Computer Science. 5203: 239-251.
  • Babbage, Steve; Cid, Carlos; Pramstaller, Norbert; Raddum, Håvard. 2007. An Analysis of the Hermes8 Stream Ciphers. Lecture Notes in Computer Science. 4586: 1-10.
  • Raddum, Håvard. 2007. MRHS Equation Systems. Lecture Notes in Computer Science. 4876: 232-245.
  • Raddum, Håvard. 2005. More dual Rijndaels. Lecture Notes in Computer Science. 3373: 142-147.
  • Moen, Vebjørn; Raddum, Håvard; Hole, Kjell Jørgen. 2004. Weaknesses in the Temporal Key Hash of WPA. Mobile Computing and Communications Review. 8: 76-83.
  • Raddum, Håvard. 2004. On the computation of coset leaders with high Hamming weight. Discrete Mathematics. 274: 213-231.
  • Raddum, Håvard. 2004. Cryptanalysis of IDEA-X/2. Lecture Notes in Computer Science. 2887: 1-8.
  • Knudsen, Lars Ramkilde; Raddum, Håvard. 2003. Distinguishing attack on five-round Feistel networks. Electronics Letters. 39: 1175-1177.
Reports and theses
  • Raddum, Håvard. 2005. Cryptanalytic Methods for Block Cipher Encryption Schemes.
  • Raddum, Håvard. 1999. MDS-formodniungen og vekt-hierkiet for sterkt algebraisk-geometriske koder. Matematisk institutt, UiB, Matematisk institutt, UiB. 100 pages.
  • Raddum, Håvard. 1999. MDS-formodningen og vekthierarkiet for sterkt algebraisk-geometriske koder.
Book sections
  • Raddum, Håvard; Nestås, Lars Hopland; Hole, Kjell Jørgen. 2010. Security Analysis of Mobile Phones Used as OTP Generators. artikkel, pages 324-331. In:
    • Samarati, Pierangela; Sauveron, Damien; Tunstall, Michael; Posegga, Joachim; Markantonakis, Konstantinos. 2010. Information Security Theory and Practices, WISTP 2010. Springer. 386 pages. ISBN: 3-642-12367-8.
  • Schilling, Thorsten Ernst; Raddum, Håvard. 2010. Solving Equation Systems by Agreeing and Learning. artikkel, pages 151-165. In:
    • Hasan, M. Anwar; Helleseth, Tor. 2010. Arithmetic of Finite Fields, WAIFI 2010. Springer. 268 pages. ISBN: 3-642-13796-2.

More information in national current research information system (CRIStin)