Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Lars R. Knudsen
@article{DBLP:journals/qip/HodzicK20, author = {Samir Hodzic and Lars R. Knudsen}, title = {A quantum distinguisher for 7/8-round {SMS4} block cipher}, journal = {Quantum Inf. Process.}, volume = {19}, number = {11}, pages = {411}, year = {2020}, url = {https://doi.org/10.1007/s11128-020-02929-6}, doi = {10.1007/S11128-020-02929-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/HodzicK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/HodzicRK20, author = {Samir Hodzic and Lars Ramkilde Knudsen and Andreas Brasen Kidmose}, editor = {Jintai Ding and Jean{-}Pierre Tillich}, title = {On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability}, booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12100}, pages = {461--480}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44223-1\_25}, doi = {10.1007/978-3-030-44223-1\_25}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/HodzicRK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BouraCKL17, author = {Christina Boura and Anne Canteaut and Lars R. Knudsen and Gregor Leander}, title = {Reflection ciphers}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {1-2}, pages = {3--25}, year = {2017}, url = {https://doi.org/10.1007/s10623-015-0143-x}, doi = {10.1007/S10623-015-0143-X}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BouraCKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GauravaramBK16, author = {Praveen Gauravaram and Nasour Bagheri and Lars R. Knudsen}, title = {Building indifferentiable compression functions from the {PGV} compression functions}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {547--581}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0020-z}, doi = {10.1007/S10623-014-0020-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GauravaramBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/balkancryptsec/2015, editor = {Enes Pasalic and Lars R. Knudsen}, title = {Cryptography and Information Security in the Balkans - Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9540}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29172-7}, doi = {10.1007/978-3-319-29172-7}, isbn = {978-3-319-29171-0}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/balkancryptsec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/TiessenKKL15, author = {Tyge Tiessen and Lars R. Knudsen and Stefan K{\"{o}}lbl and Martin M. Lauridsen}, editor = {Gregor Leander}, title = {Security of the {AES} with a Secret S-Box}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {175--189}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_9}, doi = {10.1007/978-3-662-48116-5\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/TiessenKKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TiessenKKL15, author = {Tyge Tiessen and Lars R. Knudsen and Stefan K{\"{o}}lbl and Martin M. Lauridsen}, title = {Security of the {AES} with a Secret S-box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2015}, url = {http://eprint.iacr.org/2015/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TiessenKKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Knudsen14, author = {Lars R. Knudsen}, title = {Dynamic Encryption}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {4}, pages = {357--370}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.341}, doi = {10.13052/JCSM2245-1439.341}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Knudsen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BorghoffKLT13, author = {Julia Borghoff and Lars R. Knudsen and Gregor Leander and S{\o}ren S. Thomsen}, title = {Slender-Set Differential Cryptanalysis}, journal = {J. Cryptol.}, volume = {26}, number = {1}, pages = {11--38}, year = {2013}, url = {https://doi.org/10.1007/s00145-011-9111-4}, doi = {10.1007/S00145-011-9111-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BorghoffKLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2012, editor = {Lars R. Knudsen and Huapeng Wu}, title = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-35999-6}, doi = {10.1007/978-3-642-35999-6}, isbn = {978-3-642-35998-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BagheriGKZ12, author = {Nasour Bagheri and Praveen Gauravaram and Lars R. Knudsen and Erik Zenner}, title = {The suffix-free-prefix-free hash function construction and its indifferentiability security analysis}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {6}, pages = {419--434}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0175-4}, doi = {10.1007/S10207-012-0175-4}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BagheriGKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BellareBKN12, author = {Mihir Bellare and Alexandra Boldyreva and Lars R. Knudsen and Chanathip Namprempre}, title = {On-line Ciphers and the Hash-CBC Constructions}, journal = {J. Cryptol.}, volume = {25}, number = {4}, pages = {640--679}, year = {2012}, url = {https://doi.org/10.1007/s00145-011-9106-1}, doi = {10.1007/S00145-011-9106-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BellareBKN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GauravaramK12, author = {Praveen Gauravaram and Lars R. Knudsen}, title = {Security Analysis of Randomize-Hash-then-Sign Digital Signatures}, journal = {J. Cryptol.}, volume = {25}, number = {4}, pages = {748--779}, year = {2012}, url = {https://doi.org/10.1007/s00145-011-9109-y}, doi = {10.1007/S00145-011-9109-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GauravaramK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BorghoffCGKKKLNPRRTY12, author = {Julia Borghoff and Anne Canteaut and Tim G{\"{u}}neysu and Elif Bilge Kavun and Miroslav Knezevic and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and S{\o}ren S. Thomsen and Tolga Yal{\c{c}}in}, editor = {Xiaoyun Wang and Kazue Sako}, title = {{PRINCE} - {A} Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {208--225}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_14}, doi = {10.1007/978-3-642-34961-4\_14}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BorghoffCGKKKLNPRRTY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BogdanovKLSST12, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Fran{\c{c}}ois{-}Xavier Standaert and John P. Steinberger and Elmar Tischhauser}, editor = {David Pointcheval and Thomas Johansson}, title = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {45--62}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_5}, doi = {10.1007/978-3-642-29011-4\_5}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BogdanovKLSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovKLSST12, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Fran{\c{c}}ois{-}Xavier Standaert and John P. Steinberger and Elmar Tischhauser}, title = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2012}, url = {http://eprint.iacr.org/2012/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovKLSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorghoffCGKKKLNPRRTY12, author = {Julia Borghoff and Anne Canteaut and Tim G{\"{u}}neysu and Elif Bilge Kavun and Miroslav Knezevic and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and S{\o}ren S. Thomsen and Tolga Yal{\c{c}}in}, title = {{PRINCE} - {A} Low-latency Block Cipher for Pervasive Computing Applications (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2012}, url = {http://eprint.iacr.org/2012/529}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorghoffCGKKKLNPRRTY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0028270, author = {Lars R. Knudsen and Matthew Robshaw}, title = {The Block Cipher Companion}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-17342-4}, doi = {10.1007/978-3-642-17342-4}, isbn = {978-3-642-17341-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0028270.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GauravaramKBW11, author = {Praveen Gauravaram and Lars R. Knudsen and Nasour Bagheri and Lei Wei}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Improved Security Analysis of Fugue-256 (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {428--432}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_30}, doi = {10.1007/978-3-642-22497-3\_30}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GauravaramKBW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BorghoffKLT11, author = {Julia Borghoff and Lars R. Knudsen and Gregor Leander and S{\o}ren S. Thomsen}, editor = {Antoine Joux}, title = {Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {270--289}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_16}, doi = {10.1007/978-3-642-21702-9\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BorghoffKLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Knudsen11, author = {Lars R. Knudsen}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Block Ciphers}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {152--157}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_549}, doi = {10.1007/978-1-4419-5906-5\_549}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Knudsen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/KnudsenL11, author = {Lars R. Knudsen and Gregor Leander}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{C2} - Block Cipher}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {179--180}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_552}, doi = {10.1007/978-1-4419-5906-5\_552}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/KnudsenL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Knudsen11a, author = {Lars R. Knudsen}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{CLEFIA}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {210--211}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_561}, doi = {10.1007/978-1-4419-5906-5\_561}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Knudsen11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Knudsen11b, author = {Lars R. Knudsen}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Luby-Rackoff Ciphers}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {736--737}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_590}, doi = {10.1007/978-1-4419-5906-5\_590}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Knudsen11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/KnudsenL11a, author = {Lars R. Knudsen and Gregor Leander}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{PRESENT} - Block Cipher}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {953--955}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_605}, doi = {10.1007/978-1-4419-5906-5\_605}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/KnudsenL11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/GauravaramK11, author = {Praveen Gauravaram and Lars R. Knudsen}, editor = {Rebecca Herold}, title = {Cryptographic Hash Functions}, booktitle = {Encyclopedia of Information Assurance}, publisher = {Taylor {\&} Francis}, year = {2011}, url = {https://doi.org/10.1081/E-EIA-120047187}, doi = {10.1081/E-EIA-120047187}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/GauravaramK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KnudsenM10, author = {Lars R. Knudsen and Charlotte V. Miolane}, title = {Counting equations in algebraic attacks on block ciphers}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {2}, pages = {127--135}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0099-9}, doi = {10.1007/S10207-009-0099-9}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/KnudsenM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GauravaramKKT10, author = {Praveen Gauravaram and John Kelsey and Lars R. Knudsen and S{\o}ren S. Thomsen}, title = {On hash functions using checksums}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {2}, pages = {137--151}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0100-7}, doi = {10.1007/S10207-009-0100-7}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GauravaramKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KnudsenMMT10, author = {Lars R. Knudsen and John Erik Mathiassen and Fr{\'{e}}d{\'{e}}ric Muller and S{\o}ren S. Thomsen}, title = {Cryptanalysis of {MD2}}, journal = {J. Cryptol.}, volume = {23}, number = {1}, pages = {72--90}, year = {2010}, url = {https://doi.org/10.1007/s00145-009-9054-1}, doi = {10.1007/S00145-009-9054-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KnudsenMMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AumassonKKMOPS10, author = {Jean{-}Philippe Aumasson and Emilia K{\"{a}}sper and Lars R. Knudsen and Krystian Matusiewicz and Rune Steinsmo {\O}deg{\aa}rd and Thomas Peyrin and Martin Schl{\"{a}}ffer}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Distinguishers for the Compression Function and Output Transformation of Hamsi-256}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {87--103}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_6}, doi = {10.1007/978-3-642-14081-5\_6}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AumassonKKMOPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KnudsenLPR10, author = {Lars R. Knudsen and Gregor Leander and Axel Poschmann and Matthew J. B. Robshaw}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {PRINTcipher: {A} Block Cipher for IC-Printing}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {16--32}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_2}, doi = {10.1007/978-3-642-15031-9\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KnudsenLPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BorghoffKM10, author = {Julia Borghoff and Lars R. Knudsen and Krystian Matusiewicz}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Hill Climbing Algorithms and Trivium}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {57--73}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_4}, doi = {10.1007/978-3-642-19574-7\_4}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BorghoffKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/icsec/GauravaramK10, author = {Praveen Gauravaram and Lars R. Knudsen}, editor = {Peter P. Stavroulakis and Mark Stamp}, title = {Cryptographic Hash Functions}, booktitle = {Handbook of Information and Communication Security}, pages = {59--79}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-04117-4\_4}, doi = {10.1007/978-3-642-04117-4\_4}, timestamp = {Mon, 13 Mar 2023 20:54:16 +0100}, biburl = {https://dblp.org/rec/reference/icsec/GauravaramK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonKKMOPS10, author = {Jean{-}Philippe Aumasson and Emilia K{\"{a}}sper and Lars R. Knudsen and Krystian Matusiewicz and Rune Steinsmo {\O}deg{\aa}rd and Thomas Peyrin and Martin Schl{\"{a}}ffer}, title = {Distinguishers for the Compression Function and Output Transformation of Hamsi-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2010}, url = {http://eprint.iacr.org/2010/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonKKMOPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorghoffKLT10, author = {Julia Borghoff and Lars R. Knudsen and Gregor Leander and S{\o}ren S. Thomsen}, title = {Cryptanalysis of PRESENT-like ciphers with secret S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2010}, url = {http://eprint.iacr.org/2010/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorghoffKLT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/BagheriKNT09, author = {Nasour Bagheri and Lars R. Knudsen and Majid Naderi and S{\o}ren S. Thomsen}, title = {Hash Functions and Information Theoretic Security}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {12}, pages = {3401--3403}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.3401}, doi = {10.1587/TRANSFUN.E92.A.3401}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/BagheriKNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BagheriHKNS09, author = {Nasour Bagheri and Matt Henricksen and Lars R. Knudsen and Majid Naderi and B. Sadeghyian}, title = {Cryptanalysis of an iterated halving-based hash function: {CRUSH}}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {4}, pages = {129--138}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2009.0055}, doi = {10.1049/IET-IFS.2009.0055}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BagheriHKNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BorghoffKLM09, author = {Julia Borghoff and Lars R. Knudsen and Gregor Leander and Krystian Matusiewicz}, editor = {Shai Halevi}, title = {Cryptanalysis of {C2}}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {250--266}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_15}, doi = {10.1007/978-3-642-03356-8\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BorghoffKLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GauravaramK09, author = {Praveen Gauravaram and Lars R. Knudsen}, editor = {Antoine Joux}, title = {On Randomizing Hash Functions to Strengthen the Security of Digital Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {88--105}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_5}, doi = {10.1007/978-3-642-01001-9\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GauravaramK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KnudsenMRT09, author = {Lars R. Knudsen and Florian Mendel and Christian Rechberger and S{\o}ren S. Thomsen}, editor = {Antoine Joux}, title = {Cryptanalysis of {MDC-2}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {106--120}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_6}, doi = {10.1007/978-3-642-01001-9\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KnudsenMRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BorghoffKS09, author = {Julia Borghoff and Lars R. Knudsen and Mathias Stolpe}, editor = {Matthew Geoffrey Parker}, title = {Bivium as a Mixed-Integer Linear Programming Problem}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {133--152}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_9}, doi = {10.1007/978-3-642-10868-6\_9}, timestamp = {Wed, 01 Sep 2021 10:36:08 +0200}, biburl = {https://dblp.org/rec/conf/ima/BorghoffKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GuoMKLW09, author = {Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Practical Pseudo-collisions for Hash Functions {ARIRANG-224/384}}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {141--156}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_9}, doi = {10.1007/978-3-642-05445-7\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GuoMKLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/GauravaramKMMRS09, author = {Praveen Gauravaram and Lars R. Knudsen and Krystian Matusiewicz and Florian Mendel and Christian Rechberger and Martin Schl{\"{a}}ffer and S{\o}ren S. Thomsen}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Gr{\o}stl - a {SHA-3} candidate}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1955/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/GauravaramKMMRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoMKLW09, author = {Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang}, title = {Practical pseudo-collisions for hash functions {ARIRANG-224/384}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2009}, url = {http://eprint.iacr.org/2009/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoMKLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DamgardKT08, author = {Ivan Damg{\aa}rd and Lars R. Knudsen and S{\o}ren S. Thomsen}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {144--155}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_9}, doi = {10.1007/978-3-540-68914-0\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DamgardKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnudsenR07, author = {Lars R. Knudsen and Vincent Rijmen}, editor = {Kaoru Kurosawa}, title = {Known-Key Distinguishers for Some Block Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {315--324}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_19}, doi = {10.1007/978-3-540-76900-2\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnudsenR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovKLPPRSV07, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin and C. Vikkelsoe}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{PRESENT:} An Ultra-Lightweight Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {450--466}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_31}, doi = {10.1007/978-3-540-74735-2\_31}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BogdanovKLPPRSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenRT07, author = {Lars R. Knudsen and Christian Rechberger and S{\o}ren S. Thomsen}, editor = {Alex Biryukov}, title = {The Grindahl Hash Functions}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {39--57}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_3}, doi = {10.1007/978-3-540-74619-5\_3}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/KnudsenRT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HenricksenK07, author = {Matthew Henricksen and Lars R. Knudsen}, editor = {Carlisle M. Adams and Ali Miri and Michael J. Wiener}, title = {Cryptanalysis of the {CRUSH} Hash Function}, booktitle = {Selected Areas in Cryptography, 14th International Workshop, {SAC} 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4876}, pages = {74--83}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77360-3\_5}, doi = {10.1007/978-3-540-77360-3\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HenricksenK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareBKN07, author = {Mihir Bellare and Alexandra Boldyreva and Lars R. Knudsen and Chanathip Namprempre}, title = {On-Line Ciphers and the Hash-CBC Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2007}, url = {http://eprint.iacr.org/2007/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareBKN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Knudsen06, author = {Lars R. Knudsen}, title = {Small Size Hashes with Enhanced Security}, journal = {Int. J. Netw. Secur.}, volume = {2}, number = {1}, pages = {41--42}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v2-n1/ijns-2006-v2-n1-p41-42.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Knudsen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KnudsenT06, author = {Lars R. Knudsen and S{\o}ren S. Thomsen}, editor = {Joaquim Filipe and Mohammad S. Obaidat}, title = {Proposals for Iterated Hash Functions}, booktitle = {E-Business and Telecommunication Networks - Third International Conference, {ICETE} 2006, Set{\'{u}}bal, Portugal, August 7-10, 2006. Selected Papers}, series = {Communications in Computer and Information Science}, volume = {9}, pages = {107--118}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-70760-8\_9}, doi = {10.1007/978-3-540-70760-8\_9}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/KnudsenT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KnudsenT06, author = {Lars R. Knudsen and S{\o}ren S. Thomsen}, editor = {Manu Malek and Eduardo Fern{\'{a}}ndez{-}Medina and Javier Hernando}, title = {Proposals for Iterated Hash Functions}, booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {246--253}, publisher = {{INSTICC} Press}, year = {2006}, timestamp = {Thu, 28 Sep 2006 10:10:32 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KnudsenT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KnudsenM05, author = {Lars R. Knudsen and Chris J. Mitchell}, title = {Partial Key Recovery Attack Against {RMAC}}, journal = {J. Cryptol.}, volume = {18}, number = {4}, pages = {375--389}, year = {2005}, url = {https://doi.org/10.1007/s00145-004-0324-7}, doi = {10.1007/S00145-004-0324-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KnudsenM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnudsenM05, author = {Lars R. Knudsen and Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Bimal K. Roy}, title = {Some Attacks Against a Double Length Hash Proposal}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {462--473}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_25}, doi = {10.1007/11593447\_25}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnudsenM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Knudsen05, author = {Lars R. Knudsen}, editor = {Henri Gilbert and Helena Handschuh}, title = {{SMASH} - {A} Cryptographic Hash Function}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {228--242}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_15}, doi = {10.1007/11502760\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Knudsen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenM05, author = {Lars R. Knudsen and John Erik Mathiassen}, editor = {Henri Gilbert and Helena Handschuh}, title = {Preimage and Collision Attacks on {MD2}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {255--267}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_17}, doi = {10.1007/11502760\_17}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KnudsenM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Knudsen05, author = {Lars R. Knudsen}, editor = {Henk C. A. van Tilborg}, title = {Block ciphers}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_33}, doi = {10.1007/0-387-23483-7\_33}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Knudsen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Knudsen05a, author = {Lars R. Knudsen}, editor = {Henk C. A. van Tilborg}, title = {Luby-Rackoff Ciphers}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_238}, doi = {10.1007/0-387-23483-7\_238}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Knudsen05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Knudsen05, author = {Lars R. Knudsen}, title = {Some properties of an {FSE} 2005 Hash Proposal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2005}, url = {http://eprint.iacr.org/2005/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Knudsen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/DobbertinKR04, author = {Hans Dobbertin and Lars R. Knudsen and Matthew J. B. Robshaw}, editor = {Hans Dobbertin and Vincent Rijmen and Aleksandra Sowa}, title = {The Cryptanalysis of the {AES} - {A} Brief Survey}, booktitle = {Advanced Encryption Standard - AES, 4th International Conference, {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3373}, pages = {1--10}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11506447\_1}, doi = {10.1007/11506447\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/aes/DobbertinKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KnudsenM04, author = {Lars R. Knudsen and John Erik Mathiassen}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {On the Role of Key Schedules in Attacks on Iterated Ciphers}, booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, pages = {322--334}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30108-0\_20}, doi = {10.1007/978-3-540-30108-0\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KnudsenM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/KnudsenM03, author = {Lars R. Knudsen and Chris J. Mitchell}, title = {Analysis of 3gpp-MAC and Two-key 3gpp-MAC}, journal = {Discret. Appl. Math.}, volume = {128}, number = {1}, pages = {181--191}, year = {2003}, url = {https://doi.org/10.1016/S0166-218X(02)00444-4}, doi = {10.1016/S0166-218X(02)00444-4}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/KnudsenM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenK03, author = {Lars R. Knudsen and Tadayoshi Kohno}, editor = {Thomas Johansson}, title = {Analysis of {RMAC}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {182--191}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_14}, doi = {10.1007/978-3-540-39887-5\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamK02, author = {Eli Biham and Lars R. Knudsen}, title = {Cryptanalysis of the {ANSI} {X9.52} {CBCM} Mode}, journal = {J. Cryptol.}, volume = {15}, number = {1}, pages = {47--59}, year = {2002}, url = {https://doi.org/10.1007/s00145-001-0016-5}, doi = {10.1007/S00145-001-0016-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BihamK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Knudsen02, author = {Lars R. Knudsen}, title = {The Security of Feistel Ciphers with Six Rounds or Less}, journal = {J. Cryptol.}, volume = {15}, number = {3}, pages = {207--222}, year = {2002}, url = {https://doi.org/10.1007/s00145-002-9839-y}, doi = {10.1007/S00145-002-9839-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Knudsen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KnudsenP02, author = {Lars R. Knudsen and Bart Preneel}, title = {Construction of secure and fast hash functions using nonbinary error-correcting codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {48}, number = {9}, pages = {2524--2539}, year = {2002}, url = {https://doi.org/10.1109/TIT.2002.801402}, doi = {10.1109/TIT.2002.801402}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KnudsenP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenW02, author = {Lars R. Knudsen and David A. Wagner}, editor = {Joan Daemen and Vincent Rijmen}, title = {Integral Cryptanalysis}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {112--127}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_9}, doi = {10.1007/3-540-45661-9\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2002, editor = {Lars R. Knudsen}, title = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7}, doi = {10.1007/3-540-46035-7}, isbn = {3-540-43553-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/KnudsenW01, author = {Lars R. Knudsen and David A. Wagner}, title = {On the structure of Skipjack}, journal = {Discret. Appl. Math.}, volume = {111}, number = {1-2}, pages = {103--116}, year = {2001}, url = {https://doi.org/10.1016/S0166-218X(00)00347-4}, doi = {10.1016/S0166-218X(00)00347-4}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/KnudsenW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DaemenKR01, author = {Joan Daemen and Lars R. Knudsen and Vincent Rijmen}, title = {Linear Frameworks for Block Ciphers}, journal = {Des. Codes Cryptogr.}, volume = {22}, number = {1}, pages = {65--87}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DaemenKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/endm/KnudsenM01, author = {Lars R. Knudsen and Chris J. Mitchell}, title = {An analysis of the 3gpp-MAC scheme}, journal = {Electron. Notes Discret. Math.}, volume = {6}, pages = {346--355}, year = {2001}, url = {https://doi.org/10.1016/S1571-0653(04)00186-6}, doi = {10.1016/S1571-0653(04)00186-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/endm/KnudsenM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JakobsenK01, author = {Thomas Jakobsen and Lars R. Knudsen}, title = {Attacks on Block Ciphers of Low Algebraic Degree}, journal = {J. Cryptol.}, volume = {14}, number = {3}, pages = {197--210}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0003-x}, doi = {10.1007/S00145-001-0003-X}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JakobsenK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareBKN01, author = {Mihir Bellare and Alexandra Boldyreva and Lars R. Knudsen and Chanathip Namprempre}, editor = {Joe Kilian}, title = {Online Ciphers and the Hash-CBC Construction}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {292--309}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_18}, doi = {10.1007/3-540-44647-8\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareBKN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HandschuhKR01, author = {Helena Handschuh and Lars R. Knudsen and Matthew J. B. Robshaw}, editor = {David Naccache}, title = {Analysis of {SHA-1} in Encryption Mode}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {70--83}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_7}, doi = {10.1007/3-540-45353-9\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HandschuhKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/RaddumK01, author = {H{\aa}vard Raddum and Lars R. Knudsen}, editor = {Serge Vaudenay and Amr M. Youssef}, title = {A Differential Attack on Reduced-Round {SC2000}}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {190--198}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X\_15}, doi = {10.1007/3-540-45537-X\_15}, timestamp = {Tue, 01 Jun 2021 15:22:31 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/RaddumK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KnudsenR00, author = {Lars R. Knudsen and Vincent Rijmen}, title = {Ciphertext-only Attack on Akelarre}, journal = {Cryptologia}, volume = {24}, number = {2}, pages = {135--147}, year = {2000}, url = {https://doi.org/10.1080/01611190008984238}, doi = {10.1080/01611190008984238}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KnudsenR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Knudsen00, author = {Lars R. Knudsen}, title = {A Detailed Analysis of {SAFER} {K}}, journal = {J. Cryptol.}, volume = {13}, number = {4}, pages = {417--436}, year = {2000}, url = {https://doi.org/10.1007/s001450010004}, doi = {10.1007/S001450010004}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Knudsen00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/AndersonBK00, author = {Ross J. Anderson and Eli Biham and Lars R. Knudsen}, title = {The Case for Serpent}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {349--354}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 17:13:16 +0200}, biburl = {https://dblp.org/rec/conf/aes/AndersonBK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoppersmithKM00, author = {Don Coppersmith and Lars R. Knudsen and Chris J. Mitchell}, editor = {Mihir Bellare}, title = {Key Recovery and Forgery Attacks on the MacDES {MAC} Algorithm}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {184--196}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_11}, doi = {10.1007/3-540-44598-6\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoppersmithKM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenM00, author = {Lars R. Knudsen and Willi Meier}, editor = {Bruce Schneier}, title = {Correlations in {RC6} with a Reduced Number of Rounds}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {94--108}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_7}, doi = {10.1007/3-540-44706-7\_7}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenM00a, author = {Lars R. Knudsen and John Erik Mathiassen}, editor = {Bruce Schneier}, title = {A Chosen-Plaintext Linear Attack on {DES}}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {262--272}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_18}, doi = {10.1007/3-540-44706-7\_18}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KnudsenM00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KnudsenRW99, author = {Lars R. Knudsen and Matthew J. B. Robshaw and David A. Wagner}, editor = {Michael J. Wiener}, title = {Truncated Differentials and Skipjack}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {165--180}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_11}, doi = {10.1007/3-540-48405-1\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KnudsenRW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KnudsenM99, author = {Lars R. Knudsen and Willi Meier}, editor = {Jacques Stern}, title = {Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {363--374}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_25}, doi = {10.1007/3-540-48910-X\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KnudsenM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenR99, author = {Lars R. Knudsen and Vincent Rijmen}, editor = {Lars R. Knudsen}, title = {On the Decorrelated Fast Cipher {(DFC)} and Its Theory}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {81--94}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_7}, doi = {10.1007/3-540-48519-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Knudsen99, author = {Lars R. Knudsen}, editor = {Michael Walker}, title = {Advanced Encryption Standard {(AES)} - An Update}, booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester, UK, December 20-22, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1746}, pages = {185}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46665-7\_21}, doi = {10.1007/3-540-46665-7\_21}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/Knudsen99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/1999, editor = {Lars R. Knudsen}, title = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8}, doi = {10.1007/3-540-48519-8}, isbn = {3-540-66226-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KnudsenM98, author = {Lars R. Knudsen and Keith M. Martin}, title = {In Search of Multiple Domain Key Recovery}, journal = {J. Comput. Secur.}, volume = {6}, number = {4}, pages = {219--236}, year = {1998}, url = {https://doi.org/10.3233/jcs-1998-6401}, doi = {10.3233/JCS-1998-6401}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KnudsenM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KnudsenLP98, author = {Lars R. Knudsen and Xuejia Lai and Bart Preneel}, title = {Attacks on Fast Double Block Length Hash Functions}, journal = {J. Cryptol.}, volume = {11}, number = {1}, pages = {59--72}, year = {1998}, url = {https://doi.org/10.1007/s001459900035}, doi = {10.1007/S001459900035}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KnudsenLP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DamgardK98, author = {Ivan Damg{\aa}rd and Lars R. Knudsen}, title = {Two-Key Triple Encryption}, journal = {J. Cryptol.}, volume = {11}, number = {3}, pages = {209--218}, year = {1998}, url = {https://doi.org/10.1007/s001459900044}, doi = {10.1007/S001459900044}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DamgardK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Knudsen98, author = {Lars R. Knudsen}, editor = {Ivan Damg{\aa}rd}, title = {Contemporary Block Ciphers}, booktitle = {Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998}, series = {Lecture Notes in Computer Science}, volume = {1561}, pages = {105--126}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48969-X\_5}, doi = {10.1007/3-540-48969-X\_5}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Knudsen98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnudsenMPRV98, author = {Lars R. Knudsen and Willi Meier and Bart Preneel and Vincent Rijmen and Sven Verdoolaege}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Analysis Methods for (Alleged) {RC4}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {327--341}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_26}, doi = {10.1007/3-540-49649-1\_26}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnudsenMPRV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AndersonBK98, author = {Ross J. Anderson and Eli Biham and Lars R. Knudsen}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {Serpent and Smartcards}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {246--253}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_23}, doi = {10.1007/10721064\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AndersonBK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamK98, author = {Eli Biham and Lars R. Knudsen}, editor = {Kaisa Nyberg}, title = {Cryptanalysis of the {ANSI} {X9.52} {CBCM} Mode}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {100--111}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054120}, doi = {10.1007/BFB0054120}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenRRR98, author = {Lars R. Knudsen and Vincent Rijmen and Ronald L. Rivest and Matthew J. B. Robshaw}, editor = {Serge Vaudenay}, title = {On the Design and Security of {RC2}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {206--221}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_14}, doi = {10.1007/3-540-69710-1\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenRRR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamAK98, author = {Eli Biham and Ross J. Anderson and Lars R. Knudsen}, editor = {Serge Vaudenay}, title = {Serpent: {A} New Block Cipher Proposal}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {222--238}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_15}, doi = {10.1007/3-540-69710-1\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamAK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RompayKR98, author = {Bart Van Rompay and Lars R. Knudsen and Vincent Rijmen}, editor = {Serge Vaudenay}, title = {Differential Cryptanalysis of the {ICE} Encryption Algorithm}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {270--283}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_18}, doi = {10.1007/3-540-69710-1\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RompayKR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/KnudsenM97, author = {Lars R. Knudsen and Willi Meier}, title = {Differential cryptanalysis of {RC5}}, journal = {Eur. Trans. Telecommun.}, volume = {8}, number = {5}, pages = {445--454}, year = {1997}, url = {https://doi.org/10.1002/ett.4460080503}, doi = {10.1002/ETT.4460080503}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/KnudsenM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Knudsen97, author = {Lars R. Knudsen}, editor = {Bart Preneel and Vincent Rijmen}, title = {Block Ciphers - {A} Survey}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {18--48}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_2}, doi = {10.1007/3-540-49248-8\_2}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Knudsen97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KnudsenP97, author = {Lars R. Knudsen and Bart Preneel}, editor = {Burton S. Kaliski Jr.}, title = {Fast and Secure Hashing Based on Codes}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {485--498}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052257}, doi = {10.1007/BFB0052257}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KnudsenP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BorstKR97, author = {Johan Borst and Lars R. Knudsen and Vincent Rijmen}, editor = {Walter Fumy}, title = {Two Attacks on Reduced {IDEA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {1--13}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_1}, doi = {10.1007/3-540-69053-0\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BorstKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JakobsenK97, author = {Thomas Jakobsen and Lars R. Knudsen}, editor = {Eli Biham}, title = {The Interpolation Attack on Block Ciphers}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {28--40}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052332}, doi = {10.1007/BFB0052332}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/JakobsenK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenKR97, author = {Joan Daemen and Lars R. Knudsen and Vincent Rijmen}, editor = {Eli Biham}, title = {The Block Cipher Square}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {149--165}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052343}, doi = {10.1007/BFB0052343}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnudsenP96, author = {Lars R. Knudsen and Bart Preneel}, editor = {Kwangjo Kim and Tsutomu Matsumoto}, title = {Hash Functions Based on Block Ciphers and Quaternary Codes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1163}, pages = {77--90}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034837}, doi = {10.1007/BFB0034837}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnudsenP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KnudsenM96, author = {Lars R. Knudsen and Willi Meier}, editor = {Neal Koblitz}, title = {Improved Differential Attacks on {RC5}}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {216--228}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_17}, doi = {10.1007/3-540-68697-5\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KnudsenM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KnudsenR96, author = {Lars R. Knudsen and Matthew J. B. Robshaw}, editor = {Ueli M. Maurer}, title = {Non-Linear Approximations in Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {224--236}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_20}, doi = {10.1007/3-540-68339-9\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KnudsenR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KnudsenP96, author = {Lars R. Knudsen and Torben P. Pedersen}, editor = {Ueli M. Maurer}, title = {On the Difficulty of Software Key Escrow}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {237--244}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_21}, doi = {10.1007/3-540-68339-9\_21}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KnudsenP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenB96, author = {Lars R. Knudsen and Thomas A. Berson}, editor = {Dieter Gollmann}, title = {Truncated Differentials of {SAFER}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {15--26}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_38}, doi = {10.1007/3-540-60865-6\_38}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NybergK95, author = {Kaisa Nyberg and Lars R. Knudsen}, title = {Provable Security Against a Differential Attack}, journal = {J. Cryptol.}, volume = {8}, number = {1}, pages = {27--37}, year = {1995}, url = {https://doi.org/10.1007/BF00204800}, doi = {10.1007/BF00204800}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NybergK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpa/DamgardK95, author = {Ivan Damg{\aa}rd and Lars R. Knudsen}, editor = {Ed Dawson and Jovan Dj. Golic}, title = {Multiple Encryption with Minimum Key}, booktitle = {Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1029}, pages = {156--164}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0032355}, doi = {10.1007/BFB0032355}, timestamp = {Sat, 19 Oct 2019 20:36:44 +0200}, biburl = {https://dblp.org/rec/conf/cpa/DamgardK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Knudsen95, author = {Lars R. Knudsen}, editor = {Don Coppersmith}, title = {A Key-schedule Weakness in {SAFER} {K-64}}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {274--286}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_22}, doi = {10.1007/3-540-44750-4\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Knudsen95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KnudsenL94, author = {Lars R. Knudsen and Xuejia Lai}, editor = {Alfredo De Santis}, title = {New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {410--418}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053455}, doi = {10.1007/BFB0053455}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KnudsenL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Knudsen94, author = {Lars R. Knudsen}, editor = {Alfredo De Santis}, title = {New Potentially 'Weak' Keys for {DES} and {LOKI} (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {419--424}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053456}, doi = {10.1007/BFB0053456}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Knudsen94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Knudsen94, author = {Lars R. Knudsen}, editor = {Bart Preneel}, title = {Truncated and Higher Order Differentials}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {196--211}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_16}, doi = {10.1007/3-540-60590-8\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Knudsen94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardK93, author = {Ivan Damg{\aa}rd and Lars R. Knudsen}, editor = {Tor Helleseth}, title = {The Breaking of the {AR} Hash Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {286--292}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_25}, doi = {10.1007/3-540-48285-7\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LaiK93, author = {Xuejia Lai and Lars R. Knudsen}, editor = {Ross J. Anderson}, title = {Attacks on Double Block Length Hash Functions}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {157--165}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_19}, doi = {10.1007/3-540-58108-1\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/LaiK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Knudsen93, author = {Lars R. Knudsen}, editor = {Ross J. Anderson}, title = {Practically Secure Feistel Cyphers}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {211--221}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_26}, doi = {10.1007/3-540-58108-1\_26}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Knudsen93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Knudsen92, author = {Lars R. Knudsen}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {Cryptanalysis of {LOKI91}}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {196--208}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_62}, doi = {10.1007/3-540-57220-1\_62}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Knudsen92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Knudsen92, author = {Lars R. Knudsen}, editor = {Ernest F. Brickell}, title = {Iterative Characteristics of {DES} and s{\({^2}\)}-DES}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {497--511}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_35}, doi = {10.1007/3-540-48071-4\_35}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Knudsen92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NybergK92, author = {Kaisa Nyberg and Lars R. Knudsen}, editor = {Ernest F. Brickell}, title = {Provable Security Against Differential Cryptanalysis}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {566--574}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_41}, doi = {10.1007/3-540-48071-4\_41}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NybergK92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Knudsen91, author = {Lars R. Knudsen}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {Cryptanalysis of {LOKI}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {22--35}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_2}, doi = {10.1007/3-540-57332-1\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Knudsen91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.