BibTeX records: Lars R. Knudsen

download as .bib file

@article{DBLP:journals/qip/HodzicK20,
  author       = {Samir Hodzic and
                  Lars R. Knudsen},
  title        = {A quantum distinguisher for 7/8-round {SMS4} block cipher},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {11},
  pages        = {411},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-020-02929-6},
  doi          = {10.1007/S11128-020-02929-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/HodzicK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/HodzicRK20,
  author       = {Samir Hodzic and
                  Lars Ramkilde Knudsen and
                  Andreas Brasen Kidmose},
  editor       = {Jintai Ding and
                  Jean{-}Pierre Tillich},
  title        = {On Quantum Distinguishers for Type-3 Generalized Feistel Network Based
                  on Separability},
  booktitle    = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
                  2020, Paris, France, April 15-17, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12100},
  pages        = {461--480},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44223-1\_25},
  doi          = {10.1007/978-3-030-44223-1\_25},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/HodzicRK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BouraCKL17,
  author       = {Christina Boura and
                  Anne Canteaut and
                  Lars R. Knudsen and
                  Gregor Leander},
  title        = {Reflection ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {1-2},
  pages        = {3--25},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-015-0143-x},
  doi          = {10.1007/S10623-015-0143-X},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BouraCKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GauravaramBK16,
  author       = {Praveen Gauravaram and
                  Nasour Bagheri and
                  Lars R. Knudsen},
  title        = {Building indifferentiable compression functions from the {PGV} compression
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {547--581},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0020-z},
  doi          = {10.1007/S10623-014-0020-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GauravaramBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/balkancryptsec/2015,
  editor       = {Enes Pasalic and
                  Lars R. Knudsen},
  title        = {Cryptography and Information Security in the Balkans - Second International
                  Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9540},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29172-7},
  doi          = {10.1007/978-3-319-29172-7},
  isbn         = {978-3-319-29171-0},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/balkancryptsec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/TiessenKKL15,
  author       = {Tyge Tiessen and
                  Lars R. Knudsen and
                  Stefan K{\"{o}}lbl and
                  Martin M. Lauridsen},
  editor       = {Gregor Leander},
  title        = {Security of the {AES} with a Secret S-Box},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {175--189},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_9},
  doi          = {10.1007/978-3-662-48116-5\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/TiessenKKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TiessenKKL15,
  author       = {Tyge Tiessen and
                  Lars R. Knudsen and
                  Stefan K{\"{o}}lbl and
                  Martin M. Lauridsen},
  title        = {Security of the {AES} with a Secret S-box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TiessenKKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Knudsen14,
  author       = {Lars R. Knudsen},
  title        = {Dynamic Encryption},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {4},
  pages        = {357--370},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.341},
  doi          = {10.13052/JCSM2245-1439.341},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Knudsen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BorghoffKLT13,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Gregor Leander and
                  S{\o}ren S. Thomsen},
  title        = {Slender-Set Differential Cryptanalysis},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {1},
  pages        = {11--38},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-011-9111-4},
  doi          = {10.1007/S00145-011-9111-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BorghoffKLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2012,
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-35999-6},
  doi          = {10.1007/978-3-642-35999-6},
  isbn         = {978-3-642-35998-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BagheriGKZ12,
  author       = {Nasour Bagheri and
                  Praveen Gauravaram and
                  Lars R. Knudsen and
                  Erik Zenner},
  title        = {The suffix-free-prefix-free hash function construction and its indifferentiability
                  security analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {6},
  pages        = {419--434},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0175-4},
  doi          = {10.1007/S10207-012-0175-4},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BagheriGKZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BellareBKN12,
  author       = {Mihir Bellare and
                  Alexandra Boldyreva and
                  Lars R. Knudsen and
                  Chanathip Namprempre},
  title        = {On-line Ciphers and the Hash-CBC Constructions},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {4},
  pages        = {640--679},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-011-9106-1},
  doi          = {10.1007/S00145-011-9106-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BellareBKN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GauravaramK12,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen},
  title        = {Security Analysis of Randomize-Hash-then-Sign Digital Signatures},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {4},
  pages        = {748--779},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-011-9109-y},
  doi          = {10.1007/S00145-011-9109-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GauravaramK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BorghoffCGKKKLNPRRTY12,
  author       = {Julia Borghoff and
                  Anne Canteaut and
                  Tim G{\"{u}}neysu and
                  Elif Bilge Kavun and
                  Miroslav Knezevic and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Ventzislav Nikov and
                  Christof Paar and
                  Christian Rechberger and
                  Peter Rombouts and
                  S{\o}ren S. Thomsen and
                  Tolga Yal{\c{c}}in},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {{PRINCE} - {A} Low-Latency Block Cipher for Pervasive Computing Applications
                  - Extended Abstract},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {208--225},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_14},
  doi          = {10.1007/978-3-642-34961-4\_14},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BorghoffCGKKKLNPRRTY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BogdanovKLSST12,
  author       = {Andrey Bogdanov and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  John P. Steinberger and
                  Elmar Tischhauser},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a
                  Small Number of Public Permutations - (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {45--62},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_5},
  doi          = {10.1007/978-3-642-29011-4\_5},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BogdanovKLSST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovKLSST12,
  author       = {Andrey Bogdanov and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  John P. Steinberger and
                  Elmar Tischhauser},
  title        = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a
                  Small Number of Public Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovKLSST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorghoffCGKKKLNPRRTY12,
  author       = {Julia Borghoff and
                  Anne Canteaut and
                  Tim G{\"{u}}neysu and
                  Elif Bilge Kavun and
                  Miroslav Knezevic and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Ventzislav Nikov and
                  Christof Paar and
                  Christian Rechberger and
                  Peter Rombouts and
                  S{\o}ren S. Thomsen and
                  Tolga Yal{\c{c}}in},
  title        = {{PRINCE} - {A} Low-latency Block Cipher for Pervasive Computing Applications
                  (Full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/529},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorghoffCGKKKLNPRRTY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0028270,
  author       = {Lars R. Knudsen and
                  Matthew Robshaw},
  title        = {The Block Cipher Companion},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-17342-4},
  doi          = {10.1007/978-3-642-17342-4},
  isbn         = {978-3-642-17341-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0028270.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GauravaramKBW11,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen and
                  Nasour Bagheri and
                  Lei Wei},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Improved Security Analysis of Fugue-256 (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {428--432},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_30},
  doi          = {10.1007/978-3-642-22497-3\_30},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GauravaramKBW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BorghoffKLT11,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Gregor Leander and
                  S{\o}ren S. Thomsen},
  editor       = {Antoine Joux},
  title        = {Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {270--289},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_16},
  doi          = {10.1007/978-3-642-21702-9\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BorghoffKLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Knudsen11,
  author       = {Lars R. Knudsen},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Block Ciphers},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {152--157},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_549},
  doi          = {10.1007/978-1-4419-5906-5\_549},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Knudsen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/KnudsenL11,
  author       = {Lars R. Knudsen and
                  Gregor Leander},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{C2} - Block Cipher},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {179--180},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_552},
  doi          = {10.1007/978-1-4419-5906-5\_552},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/KnudsenL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Knudsen11a,
  author       = {Lars R. Knudsen},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{CLEFIA}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {210--211},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_561},
  doi          = {10.1007/978-1-4419-5906-5\_561},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Knudsen11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Knudsen11b,
  author       = {Lars R. Knudsen},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Luby-Rackoff Ciphers},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {736--737},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_590},
  doi          = {10.1007/978-1-4419-5906-5\_590},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Knudsen11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/KnudsenL11a,
  author       = {Lars R. Knudsen and
                  Gregor Leander},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{PRESENT} - Block Cipher},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {953--955},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_605},
  doi          = {10.1007/978-1-4419-5906-5\_605},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/KnudsenL11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/GauravaramK11,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen},
  editor       = {Rebecca Herold},
  title        = {Cryptographic Hash Functions},
  booktitle    = {Encyclopedia of Information Assurance},
  publisher    = {Taylor {\&} Francis},
  year         = {2011},
  url          = {https://doi.org/10.1081/E-EIA-120047187},
  doi          = {10.1081/E-EIA-120047187},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/GauravaramK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KnudsenM10,
  author       = {Lars R. Knudsen and
                  Charlotte V. Miolane},
  title        = {Counting equations in algebraic attacks on block ciphers},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {2},
  pages        = {127--135},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0099-9},
  doi          = {10.1007/S10207-009-0099-9},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/KnudsenM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GauravaramKKT10,
  author       = {Praveen Gauravaram and
                  John Kelsey and
                  Lars R. Knudsen and
                  S{\o}ren S. Thomsen},
  title        = {On hash functions using checksums},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {2},
  pages        = {137--151},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0100-7},
  doi          = {10.1007/S10207-009-0100-7},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GauravaramKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KnudsenMMT10,
  author       = {Lars R. Knudsen and
                  John Erik Mathiassen and
                  Fr{\'{e}}d{\'{e}}ric Muller and
                  S{\o}ren S. Thomsen},
  title        = {Cryptanalysis of {MD2}},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {1},
  pages        = {72--90},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-009-9054-1},
  doi          = {10.1007/S00145-009-9054-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KnudsenMMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AumassonKKMOPS10,
  author       = {Jean{-}Philippe Aumasson and
                  Emilia K{\"{a}}sper and
                  Lars R. Knudsen and
                  Krystian Matusiewicz and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Thomas Peyrin and
                  Martin Schl{\"{a}}ffer},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Distinguishers for the Compression Function and Output Transformation
                  of Hamsi-256},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_6},
  doi          = {10.1007/978-3-642-14081-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AumassonKKMOPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KnudsenLPR10,
  author       = {Lars R. Knudsen and
                  Gregor Leander and
                  Axel Poschmann and
                  Matthew J. B. Robshaw},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {PRINTcipher: {A} Block Cipher for IC-Printing},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_2},
  doi          = {10.1007/978-3-642-15031-9\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KnudsenLPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BorghoffKM10,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Krystian Matusiewicz},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Hill Climbing Algorithms and Trivium},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {57--73},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_4},
  doi          = {10.1007/978-3-642-19574-7\_4},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BorghoffKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/icsec/GauravaramK10,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen},
  editor       = {Peter P. Stavroulakis and
                  Mark Stamp},
  title        = {Cryptographic Hash Functions},
  booktitle    = {Handbook of Information and Communication Security},
  pages        = {59--79},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-04117-4\_4},
  doi          = {10.1007/978-3-642-04117-4\_4},
  timestamp    = {Mon, 13 Mar 2023 20:54:16 +0100},
  biburl       = {https://dblp.org/rec/reference/icsec/GauravaramK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonKKMOPS10,
  author       = {Jean{-}Philippe Aumasson and
                  Emilia K{\"{a}}sper and
                  Lars R. Knudsen and
                  Krystian Matusiewicz and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Thomas Peyrin and
                  Martin Schl{\"{a}}ffer},
  title        = {Distinguishers for the Compression Function and Output Transformation
                  of Hamsi-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonKKMOPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorghoffKLT10,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Gregor Leander and
                  S{\o}ren S. Thomsen},
  title        = {Cryptanalysis of PRESENT-like ciphers with secret S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorghoffKLT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/BagheriKNT09,
  author       = {Nasour Bagheri and
                  Lars R. Knudsen and
                  Majid Naderi and
                  S{\o}ren S. Thomsen},
  title        = {Hash Functions and Information Theoretic Security},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {12},
  pages        = {3401--3403},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.3401},
  doi          = {10.1587/TRANSFUN.E92.A.3401},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/BagheriKNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BagheriHKNS09,
  author       = {Nasour Bagheri and
                  Matt Henricksen and
                  Lars R. Knudsen and
                  Majid Naderi and
                  B. Sadeghyian},
  title        = {Cryptanalysis of an iterated halving-based hash function: {CRUSH}},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {129--138},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0055},
  doi          = {10.1049/IET-IFS.2009.0055},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BagheriHKNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BorghoffKLM09,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Krystian Matusiewicz},
  editor       = {Shai Halevi},
  title        = {Cryptanalysis of {C2}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {250--266},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_15},
  doi          = {10.1007/978-3-642-03356-8\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BorghoffKLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GauravaramK09,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen},
  editor       = {Antoine Joux},
  title        = {On Randomizing Hash Functions to Strengthen the Security of Digital
                  Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {88--105},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_5},
  doi          = {10.1007/978-3-642-01001-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GauravaramK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KnudsenMRT09,
  author       = {Lars R. Knudsen and
                  Florian Mendel and
                  Christian Rechberger and
                  S{\o}ren S. Thomsen},
  editor       = {Antoine Joux},
  title        = {Cryptanalysis of {MDC-2}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {106--120},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_6},
  doi          = {10.1007/978-3-642-01001-9\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KnudsenMRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BorghoffKS09,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Mathias Stolpe},
  editor       = {Matthew Geoffrey Parker},
  title        = {Bivium as a Mixed-Integer Linear Programming Problem},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_9},
  doi          = {10.1007/978-3-642-10868-6\_9},
  timestamp    = {Wed, 01 Sep 2021 10:36:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/BorghoffKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GuoMKLW09,
  author       = {Jian Guo and
                  Krystian Matusiewicz and
                  Lars R. Knudsen and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Practical Pseudo-collisions for Hash Functions {ARIRANG-224/384}},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {141--156},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_9},
  doi          = {10.1007/978-3-642-05445-7\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GuoMKLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/GauravaramKMMRS09,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen and
                  Krystian Matusiewicz and
                  Florian Mendel and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer and
                  S{\o}ren S. Thomsen},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Gr{\o}stl - a {SHA-3} candidate},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1955/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/GauravaramKMMRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoMKLW09,
  author       = {Jian Guo and
                  Krystian Matusiewicz and
                  Lars R. Knudsen and
                  San Ling and
                  Huaxiong Wang},
  title        = {Practical pseudo-collisions for hash functions {ARIRANG-224/384}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoMKLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DamgardKT08,
  author       = {Ivan Damg{\aa}rd and
                  Lars R. Knudsen and
                  S{\o}ren S. Thomsen},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric
                  Cryptography},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {144--155},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_9},
  doi          = {10.1007/978-3-540-68914-0\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DamgardKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnudsenR07,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Kaoru Kurosawa},
  title        = {Known-Key Distinguishers for Some Block Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {315--324},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_19},
  doi          = {10.1007/978-3-540-76900-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KnudsenR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovKLPPRSV07,
  author       = {Andrey Bogdanov and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Yannick Seurin and
                  C. Vikkelsoe},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{PRESENT:} An Ultra-Lightweight Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {450--466},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_31},
  doi          = {10.1007/978-3-540-74735-2\_31},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovKLPPRSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenRT07,
  author       = {Lars R. Knudsen and
                  Christian Rechberger and
                  S{\o}ren S. Thomsen},
  editor       = {Alex Biryukov},
  title        = {The Grindahl Hash Functions},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {39--57},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_3},
  doi          = {10.1007/978-3-540-74619-5\_3},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenRT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HenricksenK07,
  author       = {Matthew Henricksen and
                  Lars R. Knudsen},
  editor       = {Carlisle M. Adams and
                  Ali Miri and
                  Michael J. Wiener},
  title        = {Cryptanalysis of the {CRUSH} Hash Function},
  booktitle    = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
                  2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4876},
  pages        = {74--83},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77360-3\_5},
  doi          = {10.1007/978-3-540-77360-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HenricksenK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareBKN07,
  author       = {Mihir Bellare and
                  Alexandra Boldyreva and
                  Lars R. Knudsen and
                  Chanathip Namprempre},
  title        = {On-Line Ciphers and the Hash-CBC Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareBKN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Knudsen06,
  author       = {Lars R. Knudsen},
  title        = {Small Size Hashes with Enhanced Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {41--42},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v2-n1/ijns-2006-v2-n1-p41-42.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Knudsen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KnudsenT06,
  author       = {Lars R. Knudsen and
                  S{\o}ren S. Thomsen},
  editor       = {Joaquim Filipe and
                  Mohammad S. Obaidat},
  title        = {Proposals for Iterated Hash Functions},
  booktitle    = {E-Business and Telecommunication Networks - Third International Conference,
                  {ICETE} 2006, Set{\'{u}}bal, Portugal, August 7-10, 2006. Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {9},
  pages        = {107--118},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-70760-8\_9},
  doi          = {10.1007/978-3-540-70760-8\_9},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KnudsenT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KnudsenT06,
  author       = {Lars R. Knudsen and
                  S{\o}ren S. Thomsen},
  editor       = {Manu Malek and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Javier Hernando},
  title        = {Proposals for Iterated Hash Functions},
  booktitle    = {{SECRYPT} 2006, Proceedings of the International Conference on Security
                  and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
                  {SECRYPT} is part of {ICETE} - The International Joint Conference
                  on e-Business and Telecommunications},
  pages        = {246--253},
  publisher    = {{INSTICC} Press},
  year         = {2006},
  timestamp    = {Thu, 28 Sep 2006 10:10:32 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KnudsenT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KnudsenM05,
  author       = {Lars R. Knudsen and
                  Chris J. Mitchell},
  title        = {Partial Key Recovery Attack Against {RMAC}},
  journal      = {J. Cryptol.},
  volume       = {18},
  number       = {4},
  pages        = {375--389},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00145-004-0324-7},
  doi          = {10.1007/S00145-004-0324-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KnudsenM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnudsenM05,
  author       = {Lars R. Knudsen and
                  Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Bimal K. Roy},
  title        = {Some Attacks Against a Double Length Hash Proposal},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {462--473},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_25},
  doi          = {10.1007/11593447\_25},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KnudsenM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Knudsen05,
  author       = {Lars R. Knudsen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {{SMASH} - {A} Cryptographic Hash Function},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_15},
  doi          = {10.1007/11502760\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Knudsen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenM05,
  author       = {Lars R. Knudsen and
                  John Erik Mathiassen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Preimage and Collision Attacks on {MD2}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {255--267},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_17},
  doi          = {10.1007/11502760\_17},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Knudsen05,
  author       = {Lars R. Knudsen},
  editor       = {Henk C. A. van Tilborg},
  title        = {Block ciphers},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_33},
  doi          = {10.1007/0-387-23483-7\_33},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Knudsen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Knudsen05a,
  author       = {Lars R. Knudsen},
  editor       = {Henk C. A. van Tilborg},
  title        = {Luby-Rackoff Ciphers},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_238},
  doi          = {10.1007/0-387-23483-7\_238},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Knudsen05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Knudsen05,
  author       = {Lars R. Knudsen},
  title        = {Some properties of an {FSE} 2005 Hash Proposal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Knudsen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/DobbertinKR04,
  author       = {Hans Dobbertin and
                  Lars R. Knudsen and
                  Matthew J. B. Robshaw},
  editor       = {Hans Dobbertin and
                  Vincent Rijmen and
                  Aleksandra Sowa},
  title        = {The Cryptanalysis of the {AES} - {A} Brief Survey},
  booktitle    = {Advanced Encryption Standard - AES, 4th International Conference,
                  {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3373},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11506447\_1},
  doi          = {10.1007/11506447\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/DobbertinKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KnudsenM04,
  author       = {Lars R. Knudsen and
                  John Erik Mathiassen},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {On the Role of Key Schedules in Attacks on Iterated Ciphers},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {322--334},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_20},
  doi          = {10.1007/978-3-540-30108-0\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KnudsenM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/KnudsenM03,
  author       = {Lars R. Knudsen and
                  Chris J. Mitchell},
  title        = {Analysis of 3gpp-MAC and Two-key 3gpp-MAC},
  journal      = {Discret. Appl. Math.},
  volume       = {128},
  number       = {1},
  pages        = {181--191},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0166-218X(02)00444-4},
  doi          = {10.1016/S0166-218X(02)00444-4},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/KnudsenM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenK03,
  author       = {Lars R. Knudsen and
                  Tadayoshi Kohno},
  editor       = {Thomas Johansson},
  title        = {Analysis of {RMAC}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {182--191},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_14},
  doi          = {10.1007/978-3-540-39887-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamK02,
  author       = {Eli Biham and
                  Lars R. Knudsen},
  title        = {Cryptanalysis of the {ANSI} {X9.52} {CBCM} Mode},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {47--59},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0016-5},
  doi          = {10.1007/S00145-001-0016-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BihamK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Knudsen02,
  author       = {Lars R. Knudsen},
  title        = {The Security of Feistel Ciphers with Six Rounds or Less},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {3},
  pages        = {207--222},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-002-9839-y},
  doi          = {10.1007/S00145-002-9839-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Knudsen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KnudsenP02,
  author       = {Lars R. Knudsen and
                  Bart Preneel},
  title        = {Construction of secure and fast hash functions using nonbinary error-correcting
                  codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {48},
  number       = {9},
  pages        = {2524--2539},
  year         = {2002},
  url          = {https://doi.org/10.1109/TIT.2002.801402},
  doi          = {10.1109/TIT.2002.801402},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KnudsenP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenW02,
  author       = {Lars R. Knudsen and
                  David A. Wagner},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Integral Cryptanalysis},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {112--127},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_9},
  doi          = {10.1007/3-540-45661-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2002,
  editor       = {Lars R. Knudsen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7},
  doi          = {10.1007/3-540-46035-7},
  isbn         = {3-540-43553-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/KnudsenW01,
  author       = {Lars R. Knudsen and
                  David A. Wagner},
  title        = {On the structure of Skipjack},
  journal      = {Discret. Appl. Math.},
  volume       = {111},
  number       = {1-2},
  pages        = {103--116},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0166-218X(00)00347-4},
  doi          = {10.1016/S0166-218X(00)00347-4},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/KnudsenW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DaemenKR01,
  author       = {Joan Daemen and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  title        = {Linear Frameworks for Block Ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {22},
  number       = {1},
  pages        = {65--87},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DaemenKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/KnudsenM01,
  author       = {Lars R. Knudsen and
                  Chris J. Mitchell},
  title        = {An analysis of the 3gpp-MAC scheme},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {6},
  pages        = {346--355},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0653(04)00186-6},
  doi          = {10.1016/S1571-0653(04)00186-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/endm/KnudsenM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JakobsenK01,
  author       = {Thomas Jakobsen and
                  Lars R. Knudsen},
  title        = {Attacks on Block Ciphers of Low Algebraic Degree},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {3},
  pages        = {197--210},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0003-x},
  doi          = {10.1007/S00145-001-0003-X},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JakobsenK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareBKN01,
  author       = {Mihir Bellare and
                  Alexandra Boldyreva and
                  Lars R. Knudsen and
                  Chanathip Namprempre},
  editor       = {Joe Kilian},
  title        = {Online Ciphers and the Hash-CBC Construction},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {292--309},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_18},
  doi          = {10.1007/3-540-44647-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareBKN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HandschuhKR01,
  author       = {Helena Handschuh and
                  Lars R. Knudsen and
                  Matthew J. B. Robshaw},
  editor       = {David Naccache},
  title        = {Analysis of {SHA-1} in Encryption Mode},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {70--83},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_7},
  doi          = {10.1007/3-540-45353-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HandschuhKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/RaddumK01,
  author       = {H{\aa}vard Raddum and
                  Lars R. Knudsen},
  editor       = {Serge Vaudenay and
                  Amr M. Youssef},
  title        = {A Differential Attack on Reduced-Round {SC2000}},
  booktitle    = {Selected Areas in Cryptography, 8th Annual International Workshop,
                  {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {190--198},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45537-X\_15},
  doi          = {10.1007/3-540-45537-X\_15},
  timestamp    = {Tue, 01 Jun 2021 15:22:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/RaddumK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KnudsenR00,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen},
  title        = {Ciphertext-only Attack on Akelarre},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {2},
  pages        = {135--147},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984238},
  doi          = {10.1080/01611190008984238},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KnudsenR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Knudsen00,
  author       = {Lars R. Knudsen},
  title        = {A Detailed Analysis of {SAFER} {K}},
  journal      = {J. Cryptol.},
  volume       = {13},
  number       = {4},
  pages        = {417--436},
  year         = {2000},
  url          = {https://doi.org/10.1007/s001450010004},
  doi          = {10.1007/S001450010004},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Knudsen00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/AndersonBK00,
  author       = {Ross J. Anderson and
                  Eli Biham and
                  Lars R. Knudsen},
  title        = {The Case for Serpent},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {349--354},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/AndersonBK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoppersmithKM00,
  author       = {Don Coppersmith and
                  Lars R. Knudsen and
                  Chris J. Mitchell},
  editor       = {Mihir Bellare},
  title        = {Key Recovery and Forgery Attacks on the MacDES {MAC} Algorithm},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {184--196},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_11},
  doi          = {10.1007/3-540-44598-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoppersmithKM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenM00,
  author       = {Lars R. Knudsen and
                  Willi Meier},
  editor       = {Bruce Schneier},
  title        = {Correlations in {RC6} with a Reduced Number of Rounds},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_7},
  doi          = {10.1007/3-540-44706-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenM00a,
  author       = {Lars R. Knudsen and
                  John Erik Mathiassen},
  editor       = {Bruce Schneier},
  title        = {A Chosen-Plaintext Linear Attack on {DES}},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {262--272},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_18},
  doi          = {10.1007/3-540-44706-7\_18},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenM00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KnudsenRW99,
  author       = {Lars R. Knudsen and
                  Matthew J. B. Robshaw and
                  David A. Wagner},
  editor       = {Michael J. Wiener},
  title        = {Truncated Differentials and Skipjack},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {165--180},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_11},
  doi          = {10.1007/3-540-48405-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KnudsenRW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KnudsenM99,
  author       = {Lars R. Knudsen and
                  Willi Meier},
  editor       = {Jacques Stern},
  title        = {Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron
                  Problem},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {363--374},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_25},
  doi          = {10.1007/3-540-48910-X\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KnudsenM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenR99,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Lars R. Knudsen},
  title        = {On the Decorrelated Fast Cipher {(DFC)} and Its Theory},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {81--94},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_7},
  doi          = {10.1007/3-540-48519-8\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Knudsen99,
  author       = {Lars R. Knudsen},
  editor       = {Michael Walker},
  title        = {Advanced Encryption Standard {(AES)} - An Update},
  booktitle    = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
                  UK, December 20-22, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1746},
  pages        = {185},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46665-7\_21},
  doi          = {10.1007/3-540-46665-7\_21},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Knudsen99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1999,
  editor       = {Lars R. Knudsen},
  title        = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8},
  doi          = {10.1007/3-540-48519-8},
  isbn         = {3-540-66226-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KnudsenM98,
  author       = {Lars R. Knudsen and
                  Keith M. Martin},
  title        = {In Search of Multiple Domain Key Recovery},
  journal      = {J. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {219--236},
  year         = {1998},
  url          = {https://doi.org/10.3233/jcs-1998-6401},
  doi          = {10.3233/JCS-1998-6401},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KnudsenM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KnudsenLP98,
  author       = {Lars R. Knudsen and
                  Xuejia Lai and
                  Bart Preneel},
  title        = {Attacks on Fast Double Block Length Hash Functions},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {59--72},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900035},
  doi          = {10.1007/S001459900035},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KnudsenLP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DamgardK98,
  author       = {Ivan Damg{\aa}rd and
                  Lars R. Knudsen},
  title        = {Two-Key Triple Encryption},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {209--218},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900044},
  doi          = {10.1007/S001459900044},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DamgardK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Knudsen98,
  author       = {Lars R. Knudsen},
  editor       = {Ivan Damg{\aa}rd},
  title        = {Contemporary Block Ciphers},
  booktitle    = {Lectures on Data Security, Modern Cryptology in Theory and Practice,
                  Summer School, Aarhus, Denmark, July 1998},
  series       = {Lecture Notes in Computer Science},
  volume       = {1561},
  pages        = {105--126},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48969-X\_5},
  doi          = {10.1007/3-540-48969-X\_5},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Knudsen98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnudsenMPRV98,
  author       = {Lars R. Knudsen and
                  Willi Meier and
                  Bart Preneel and
                  Vincent Rijmen and
                  Sven Verdoolaege},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Analysis Methods for (Alleged) {RC4}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {327--341},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_26},
  doi          = {10.1007/3-540-49649-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KnudsenMPRV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AndersonBK98,
  author       = {Ross J. Anderson and
                  Eli Biham and
                  Lars R. Knudsen},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Serpent and Smartcards},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {246--253},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_23},
  doi          = {10.1007/10721064\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/AndersonBK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamK98,
  author       = {Eli Biham and
                  Lars R. Knudsen},
  editor       = {Kaisa Nyberg},
  title        = {Cryptanalysis of the {ANSI} {X9.52} {CBCM} Mode},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {100--111},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054120},
  doi          = {10.1007/BFB0054120},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenRRR98,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen and
                  Ronald L. Rivest and
                  Matthew J. B. Robshaw},
  editor       = {Serge Vaudenay},
  title        = {On the Design and Security of {RC2}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {206--221},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_14},
  doi          = {10.1007/3-540-69710-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenRRR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamAK98,
  author       = {Eli Biham and
                  Ross J. Anderson and
                  Lars R. Knudsen},
  editor       = {Serge Vaudenay},
  title        = {Serpent: {A} New Block Cipher Proposal},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {222--238},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_15},
  doi          = {10.1007/3-540-69710-1\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamAK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RompayKR98,
  author       = {Bart Van Rompay and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Serge Vaudenay},
  title        = {Differential Cryptanalysis of the {ICE} Encryption Algorithm},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {270--283},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_18},
  doi          = {10.1007/3-540-69710-1\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RompayKR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/KnudsenM97,
  author       = {Lars R. Knudsen and
                  Willi Meier},
  title        = {Differential cryptanalysis of {RC5}},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {8},
  number       = {5},
  pages        = {445--454},
  year         = {1997},
  url          = {https://doi.org/10.1002/ett.4460080503},
  doi          = {10.1002/ETT.4460080503},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/KnudsenM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Knudsen97,
  author       = {Lars R. Knudsen},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {Block Ciphers - {A} Survey},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {18--48},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_2},
  doi          = {10.1007/3-540-49248-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Knudsen97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KnudsenP97,
  author       = {Lars R. Knudsen and
                  Bart Preneel},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Fast and Secure Hashing Based on Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {485--498},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052257},
  doi          = {10.1007/BFB0052257},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KnudsenP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BorstKR97,
  author       = {Johan Borst and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Walter Fumy},
  title        = {Two Attacks on Reduced {IDEA}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_1},
  doi          = {10.1007/3-540-69053-0\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BorstKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JakobsenK97,
  author       = {Thomas Jakobsen and
                  Lars R. Knudsen},
  editor       = {Eli Biham},
  title        = {The Interpolation Attack on Block Ciphers},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {28--40},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052332},
  doi          = {10.1007/BFB0052332},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JakobsenK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenKR97,
  author       = {Joan Daemen and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Eli Biham},
  title        = {The Block Cipher Square},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {149--165},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052343},
  doi          = {10.1007/BFB0052343},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnudsenP96,
  author       = {Lars R. Knudsen and
                  Bart Preneel},
  editor       = {Kwangjo Kim and
                  Tsutomu Matsumoto},
  title        = {Hash Functions Based on Block Ciphers and Quaternary Codes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Kyongju, Korea, November 3-7, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1163},
  pages        = {77--90},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034837},
  doi          = {10.1007/BFB0034837},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KnudsenP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KnudsenM96,
  author       = {Lars R. Knudsen and
                  Willi Meier},
  editor       = {Neal Koblitz},
  title        = {Improved Differential Attacks on {RC5}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {216--228},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_17},
  doi          = {10.1007/3-540-68697-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KnudsenM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KnudsenR96,
  author       = {Lars R. Knudsen and
                  Matthew J. B. Robshaw},
  editor       = {Ueli M. Maurer},
  title        = {Non-Linear Approximations in Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {224--236},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_20},
  doi          = {10.1007/3-540-68339-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KnudsenR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KnudsenP96,
  author       = {Lars R. Knudsen and
                  Torben P. Pedersen},
  editor       = {Ueli M. Maurer},
  title        = {On the Difficulty of Software Key Escrow},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {237--244},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_21},
  doi          = {10.1007/3-540-68339-9\_21},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KnudsenP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenB96,
  author       = {Lars R. Knudsen and
                  Thomas A. Berson},
  editor       = {Dieter Gollmann},
  title        = {Truncated Differentials of {SAFER}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {15--26},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_38},
  doi          = {10.1007/3-540-60865-6\_38},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NybergK95,
  author       = {Kaisa Nyberg and
                  Lars R. Knudsen},
  title        = {Provable Security Against a Differential Attack},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {27--37},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00204800},
  doi          = {10.1007/BF00204800},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NybergK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpa/DamgardK95,
  author       = {Ivan Damg{\aa}rd and
                  Lars R. Knudsen},
  editor       = {Ed Dawson and
                  Jovan Dj. Golic},
  title        = {Multiple Encryption with Minimum Key},
  booktitle    = {Cryptography: Policy and Algorithms, International Conference, Brisbane,
                  Queensland, Australia, July 3-5, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1029},
  pages        = {156--164},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0032355},
  doi          = {10.1007/BFB0032355},
  timestamp    = {Sat, 19 Oct 2019 20:36:44 +0200},
  biburl       = {https://dblp.org/rec/conf/cpa/DamgardK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Knudsen95,
  author       = {Lars R. Knudsen},
  editor       = {Don Coppersmith},
  title        = {A Key-schedule Weakness in {SAFER} {K-64}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {274--286},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_22},
  doi          = {10.1007/3-540-44750-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Knudsen95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KnudsenL94,
  author       = {Lars R. Knudsen and
                  Xuejia Lai},
  editor       = {Alfredo De Santis},
  title        = {New Attacks on all Double Block Length Hash Functions of Hash Rate
                  1, including the Parallel-DM},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {410--418},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053455},
  doi          = {10.1007/BFB0053455},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KnudsenL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Knudsen94,
  author       = {Lars R. Knudsen},
  editor       = {Alfredo De Santis},
  title        = {New Potentially 'Weak' Keys for {DES} and {LOKI} (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {419--424},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053456},
  doi          = {10.1007/BFB0053456},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Knudsen94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Knudsen94,
  author       = {Lars R. Knudsen},
  editor       = {Bart Preneel},
  title        = {Truncated and Higher Order Differentials},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {196--211},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_16},
  doi          = {10.1007/3-540-60590-8\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Knudsen94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardK93,
  author       = {Ivan Damg{\aa}rd and
                  Lars R. Knudsen},
  editor       = {Tor Helleseth},
  title        = {The Breaking of the {AR} Hash Function},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {286--292},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_25},
  doi          = {10.1007/3-540-48285-7\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LaiK93,
  author       = {Xuejia Lai and
                  Lars R. Knudsen},
  editor       = {Ross J. Anderson},
  title        = {Attacks on Double Block Length Hash Functions},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {157--165},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_19},
  doi          = {10.1007/3-540-58108-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LaiK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Knudsen93,
  author       = {Lars R. Knudsen},
  editor       = {Ross J. Anderson},
  title        = {Practically Secure Feistel Cyphers},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {211--221},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_26},
  doi          = {10.1007/3-540-58108-1\_26},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Knudsen93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Knudsen92,
  author       = {Lars R. Knudsen},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {Cryptanalysis of {LOKI91}},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {196--208},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_62},
  doi          = {10.1007/3-540-57220-1\_62},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Knudsen92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Knudsen92,
  author       = {Lars R. Knudsen},
  editor       = {Ernest F. Brickell},
  title        = {Iterative Characteristics of {DES} and s{\({^2}\)}-DES},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {497--511},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_35},
  doi          = {10.1007/3-540-48071-4\_35},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Knudsen92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NybergK92,
  author       = {Kaisa Nyberg and
                  Lars R. Knudsen},
  editor       = {Ernest F. Brickell},
  title        = {Provable Security Against Differential Cryptanalysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {566--574},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_41},
  doi          = {10.1007/3-540-48071-4\_41},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NybergK92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Knudsen91,
  author       = {Lars R. Knudsen},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {Cryptanalysis of {LOKI}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {22--35},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_2},
  doi          = {10.1007/3-540-57332-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Knudsen91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics