


default search action
Lars R. Knudsen
Lars Ramkilde Knudsen
Person information
- affiliation: Technical University of Denmark
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j30]Samir Hodzic
, Lars R. Knudsen
:
A quantum distinguisher for 7/8-round SMS4 block cipher. Quantum Inf. Process. 19(11): 411 (2020) - [c68]Samir Hodzic, Lars Ramkilde Knudsen
, Andreas Brasen Kidmose
:
On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability. PQCrypto 2020: 461-480
2010 – 2019
- 2017
- [j29]Christina Boura, Anne Canteaut, Lars R. Knudsen
, Gregor Leander
:
Reflection ciphers. Des. Codes Cryptogr. 82(1-2): 3-25 (2017) - 2016
- [j28]Praveen Gauravaram, Nasour Bagheri
, Lars R. Knudsen
:
Building indifferentiable compression functions from the PGV compression functions. Des. Codes Cryptogr. 78(2): 547-581 (2016) - [e4]Enes Pasalic
, Lars R. Knudsen
:
Cryptography and Information Security in the Balkans - Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9540, Springer 2016, ISBN 978-3-319-29171-0 [contents] - 2015
- [c67]Tyge Tiessen
, Lars R. Knudsen
, Stefan Kölbl, Martin M. Lauridsen:
Security of the AES with a Secret S-Box. FSE 2015: 175-189 - [i9]Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen:
Security of the AES with a Secret S-box. IACR Cryptol. ePrint Arch. 2015: 144 (2015) - 2014
- [j27]Lars R. Knudsen:
Dynamic Encryption. J. Cyber Secur. Mobil. 3(4): 357-370 (2014) - 2013
- [j26]Julia Borghoff, Lars R. Knudsen
, Gregor Leander
, Søren S. Thomsen:
Slender-Set Differential Cryptanalysis. J. Cryptol. 26(1): 11-38 (2013) - [e3]Lars R. Knudsen
, Huapeng Wu:
Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7707, Springer 2013, ISBN 978-3-642-35998-9 [contents] - 2012
- [j25]Nasour Bagheri
, Praveen Gauravaram, Lars R. Knudsen
, Erik Zenner:
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. Int. J. Inf. Sec. 11(6): 419-434 (2012) - [j24]Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen
, Chanathip Namprempre:
On-line Ciphers and the Hash-CBC Constructions. J. Cryptol. 25(4): 640-679 (2012) - [j23]Praveen Gauravaram, Lars R. Knudsen
:
Security Analysis of Randomize-Hash-then-Sign Digital Signatures. J. Cryptol. 25(4): 748-779 (2012) - [c66]Julia Borghoff, Anne Canteaut, Tim Güneysu
, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen
, Gregor Leander
, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. ASIACRYPT 2012: 208-225 - [c65]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander
, François-Xavier Standaert
, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract). EUROCRYPT 2012: 45-62 - [i8]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. IACR Cryptol. ePrint Arch. 2012: 35 (2012) - [i7]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version). IACR Cryptol. ePrint Arch. 2012: 529 (2012) - 2011
- [b1]Lars R. Knudsen, Matthew Robshaw:
The Block Cipher Companion. Information Security and Cryptography, Springer 2011, ISBN 978-3-642-17341-7, pp. I-XIV, 1-267 - [c64]Praveen Gauravaram, Lars R. Knudsen
, Nasour Bagheri
, Lei Wei:
Improved Security Analysis of Fugue-256 (Poster). ACISP 2011: 428-432 - [c63]Julia Borghoff, Lars R. Knudsen
, Gregor Leander
, Søren S. Thomsen:
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. FSE 2011: 270-289 - [r8]Lars R. Knudsen:
Block Ciphers. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 152-157 - [r7]Lars R. Knudsen, Gregor Leander
:
C2 - Block Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 179-180 - [r6]Lars R. Knudsen:
CLEFIA. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 210-211 - [r5]Lars R. Knudsen:
Luby-Rackoff Ciphers. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 736-737 - [r4]Lars R. Knudsen, Gregor Leander
:
PRESENT - Block Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 953-955 - [r3]Praveen Gauravaram, Lars R. Knudsen:
Cryptographic Hash Functions. Encyclopedia of Information Assurance 2011 - 2010
- [j22]Lars R. Knudsen
, Charlotte V. Miolane:
Counting equations in algebraic attacks on block ciphers. Int. J. Inf. Sec. 9(2): 127-135 (2010) - [j21]Praveen Gauravaram, John Kelsey
, Lars R. Knudsen
, Søren S. Thomsen:
On hash functions using checksums. Int. J. Inf. Sec. 9(2): 137-151 (2010) - [j20]Lars R. Knudsen
, John Erik Mathiassen, Frédéric Muller, Søren S. Thomsen:
Cryptanalysis of MD2. J. Cryptol. 23(1): 72-90 (2010) - [c62]Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. ACISP 2010: 87-103 - [c61]Lars R. Knudsen, Gregor Leander
, Axel Poschmann, Matthew J. B. Robshaw:
PRINTcipher: A Block Cipher for IC-Printing. CHES 2010: 16-32 - [c60]Julia Borghoff, Lars R. Knudsen
, Krystian Matusiewicz:
Hill Climbing Algorithms and Trivium. Selected Areas in Cryptography 2010: 57-73 - [p1]Praveen Gauravaram, Lars R. Knudsen:
Cryptographic Hash Functions. Handbook of Information and Communication Security 2010: 59-79 - [i6]Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. IACR Cryptol. ePrint Arch. 2010: 91 (2010) - [i5]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Cryptanalysis of PRESENT-like ciphers with secret S-boxes. IACR Cryptol. ePrint Arch. 2010: 574 (2010)
2000 – 2009
- 2009
- [j19]Nasour Bagheri
, Lars R. Knudsen
, Majid Naderi, Søren S. Thomsen:
Hash Functions and Information Theoretic Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(12): 3401-3403 (2009) - [j18]Nasour Bagheri
, Matt Henricksen, Lars R. Knudsen
, Majid Naderi, B. Sadeghyian:
Cryptanalysis of an iterated halving-based hash function: CRUSH. IET Inf. Secur. 3(4): 129-138 (2009) - [c59]Julia Borghoff, Lars R. Knudsen, Gregor Leander
, Krystian Matusiewicz:
Cryptanalysis of C2. CRYPTO 2009: 250-266 - [c58]Praveen Gauravaram, Lars R. Knudsen:
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. EUROCRYPT 2009: 88-105 - [c57]Lars R. Knudsen
, Florian Mendel
, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of MDC-2. EUROCRYPT 2009: 106-120 - [c56]Julia Borghoff, Lars R. Knudsen, Mathias Stolpe:
Bivium as a Mixed-Integer Linear Programming Problem. IMACC 2009: 133-152 - [c55]Jian Guo
, Krystian Matusiewicz, Lars R. Knudsen, San Ling
, Huaxiong Wang:
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. Selected Areas in Cryptography 2009: 141-156 - [i4]Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Grøstl - a SHA-3 candidate. Symmetric Cryptography 2009 - [i3]Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang:
Practical pseudo-collisions for hash functions ARIRANG-224/384. IACR Cryptol. ePrint Arch. 2009: 197 (2009) - 2008
- [c54]Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen:
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. ACNS 2008: 144-155 - 2007
- [c53]Lars R. Knudsen, Vincent Rijmen:
Known-Key Distinguishers for Some Block Ciphers. ASIACRYPT 2007: 315-324 - [c52]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander
, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe:
PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007: 450-466 - [c51]Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen:
The Grindahl Hash Functions. FSE 2007: 39-57 - [c50]Matthew Henricksen, Lars R. Knudsen:
Cryptanalysis of the CRUSH Hash Function. Selected Areas in Cryptography 2007: 74-83 - [i2]Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre:
On-Line Ciphers and the Hash-CBC Constructions. IACR Cryptol. ePrint Arch. 2007: 197 (2007) - 2006
- [j17]Lars R. Knudsen:
Small Size Hashes with Enhanced Security. Int. J. Netw. Secur. 2(1): 41-42 (2006) - [c49]Lars R. Knudsen
, Søren S. Thomsen:
Proposals for Iterated Hash Functions. ICETE (Selected Papers) 2006: 107-118 - [c48]Lars R. Knudsen, Søren S. Thomsen:
Proposals for Iterated Hash Functions. SECRYPT 2006: 246-253 - 2005
- [j16]Lars R. Knudsen, Chris J. Mitchell
:
Partial Key Recovery Attack Against RMAC. J. Cryptol. 18(4): 375-389 (2005) - [c47]Lars R. Knudsen, Frédéric Muller:
Some Attacks Against a Double Length Hash Proposal. ASIACRYPT 2005: 462-473 - [c46]Lars R. Knudsen:
SMASH - A Cryptographic Hash Function. FSE 2005: 228-242 - [c45]Lars R. Knudsen, John Erik Mathiassen:
Preimage and Collision Attacks on MD2. FSE 2005: 255-267 - [r2]Lars R. Knudsen:
Block ciphers. Encyclopedia of Cryptography and Security 2005 - [r1]Lars R. Knudsen:
Luby-Rackoff Ciphers. Encyclopedia of Cryptography and Security 2005 - [i1]Lars R. Knudsen:
Some properties of an FSE 2005 Hash Proposal. IACR Cryptol. ePrint Arch. 2005: 82 (2005) - 2004
- [c44]Hans Dobbertin, Lars R. Knudsen, Matthew J. B. Robshaw:
The Cryptanalysis of the AES - A Brief Survey. AES Conference 2004: 1-10 - [c43]Lars R. Knudsen, John Erik Mathiassen:
On the Role of Key Schedules in Attacks on Iterated Ciphers. ESORICS 2004: 322-334 - 2003
- [j15]Lars R. Knudsen, Chris J. Mitchell
:
Analysis of 3gpp-MAC and Two-key 3gpp-MAC. Discret. Appl. Math. 128(1): 181-191 (2003) - [c42]Lars R. Knudsen, Tadayoshi Kohno:
Analysis of RMAC. FSE 2003: 182-191 - 2002
- [j14]Eli Biham, Lars R. Knudsen:
Cryptanalysis of the ANSI X9.52 CBCM Mode. J. Cryptol. 15(1): 47-59 (2002) - [j13]Lars R. Knudsen:
The Security of Feistel Ciphers with Six Rounds or Less. J. Cryptol. 15(3): 207-222 (2002) - [j12]Lars R. Knudsen
, Bart Preneel:
Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Trans. Inf. Theory 48(9): 2524-2539 (2002) - [c41]Lars R. Knudsen
, David A. Wagner:
Integral Cryptanalysis. FSE 2002: 112-127 - [e2]Lars R. Knudsen:
Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings. Lecture Notes in Computer Science 2332, Springer 2002, ISBN 3-540-43553-0 [contents] - 2001
- [j11]Lars R. Knudsen, David A. Wagner:
On the structure of Skipjack. Discret. Appl. Math. 111(1-2): 103-116 (2001) - [j10]Joan Daemen, Lars R. Knudsen, Vincent Rijmen:
Linear Frameworks for Block Ciphers. Des. Codes Cryptogr. 22(1): 65-87 (2001) - [j9]Lars R. Knudsen, Chris J. Mitchell
:
An analysis of the 3gpp-MAC scheme. Electron. Notes Discret. Math. 6: 346-355 (2001) - [j8]Thomas Jakobsen, Lars R. Knudsen:
Attacks on Block Ciphers of Low Algebraic Degree. J. Cryptol. 14(3): 197-210 (2001) - [c40]Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre:
Online Ciphers and the Hash-CBC Construction. CRYPTO 2001: 292-309 - [c39]Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw:
Analysis of SHA-1 in Encryption Mode. CT-RSA 2001: 70-83 - [c38]Håvard Raddum, Lars R. Knudsen:
A Differential Attack on Reduced-Round SC2000. Selected Areas in Cryptography 2001: 190-198 - 2000
- [j7]Lars R. Knudsen, Vincent Rijmen
:
Ciphertext-only Attack on Akelarre. Cryptologia 24(2): 135-147 (2000) - [j6]Lars R. Knudsen:
A Detailed Analysis of SAFER K. J. Cryptol. 13(4): 417-436 (2000) - [c37]Ross J. Anderson, Eli Biham, Lars R. Knudsen:
The Case for Serpent. AES Candidate Conference 2000: 349-354 - [c36]Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell
:
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. CRYPTO 2000: 184-196 - [c35]Lars R. Knudsen, Willi Meier:
Correlations in RC6 with a Reduced Number of Rounds. FSE 2000: 94-108 - [c34]Lars R. Knudsen, John Erik Mathiassen:
A Chosen-Plaintext Linear Attack on DES. FSE 2000: 262-272
1990 – 1999
- 1999
- [c33]Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner:
Truncated Differentials and Skipjack. CRYPTO 1999: 165-180 - [c32]Lars R. Knudsen, Willi Meier:
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. EUROCRYPT 1999: 363-374 - [c31]Lars R. Knudsen, Vincent Rijmen
:
On the Decorrelated Fast Cipher (DFC) and Its Theory. FSE 1999: 81-94 - [c30]Lars R. Knudsen:
Advanced Encryption Standard (AES) - An Update. IMACC 1999: 185 - [e1]Lars R. Knudsen:
Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings. Lecture Notes in Computer Science 1636, Springer 1999, ISBN 3-540-66226-X [contents] - 1998
- [j5]Lars R. Knudsen, Keith M. Martin:
In Search of Multiple Domain Key Recovery. J. Comput. Secur. 6(4): 219-236 (1998) - [j4]Lars R. Knudsen, Xuejia Lai, Bart Preneel:
Attacks on Fast Double Block Length Hash Functions. J. Cryptol. 11(1): 59-72 (1998) - [j3]Ivan Damgård, Lars R. Knudsen:
Two-Key Triple Encryption. J. Cryptol. 11(3): 209-218 (1998) - [c29]Lars R. Knudsen:
Contemporary Block Ciphers. Lectures on Data Security 1998: 105-126 - [c28]Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege:
Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341 - [c27]Ross J. Anderson, Eli Biham, Lars R. Knudsen:
Serpent and Smartcards. CARDIS 1998: 246-253 - [c26]Eli Biham, Lars R. Knudsen:
Cryptanalysis of the ANSI X9.52 CBCM Mode. EUROCRYPT 1998: 100-111 - [c25]Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw:
On the Design and Security of RC2. FSE 1998: 206-221 - [c24]Eli Biham, Ross J. Anderson, Lars R. Knudsen:
Serpent: A New Block Cipher Proposal. FSE 1998: 222-238 - [c23]Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen:
Differential Cryptanalysis of the ICE Encryption Algorithm. FSE 1998: 270-283 - 1997
- [j2]Lars R. Knudsen, Willi Meier:
Differential cryptanalysis of RC5. Eur. Trans. Telecommun. 8(5): 445-454 (1997) - [c22]Lars R. Knudsen:
Block Ciphers - A Survey. State of the Art in Applied Cryptography 1997: 18-48 - [c21]Lars R. Knudsen, Bart Preneel:
Fast and Secure Hashing Based on Codes. CRYPTO 1997: 485-498 - [c20]Johan Borst, Lars R. Knudsen, Vincent Rijmen
:
Two Attacks on Reduced IDEA. EUROCRYPT 1997: 1-13 - [c19]Thomas Jakobsen, Lars R. Knudsen:
The Interpolation Attack on Block Ciphers. FSE 1997: 28-40 - [c18]Joan Daemen, Lars R. Knudsen, Vincent Rijmen:
The Block Cipher Square. FSE 1997: 149-165 - 1996
- [c17]Lars R. Knudsen, Bart Preneel:
Hash Functions Based on Block Ciphers and Quaternary Codes. ASIACRYPT 1996: 77-90 - [c16]Lars R. Knudsen, Willi Meier:
Improved Differential Attacks on RC5. CRYPTO 1996: 216-228 - [c15]Lars R. Knudsen, Matthew J. B. Robshaw:
Non-Linear Approximations in Linear Cryptanalysis. EUROCRYPT 1996: 224-236 - [c14]Lars R. Knudsen, Torben P. Pedersen:
On the Difficulty of Software Key Escrow. EUROCRYPT 1996: 237-244 - [c13]Lars R. Knudsen, Thomas A. Berson:
Truncated Differentials of SAFER. FSE 1996: 15-26 - 1995
- [j1]Kaisa Nyberg, Lars R. Knudsen:
Provable Security Against a Differential Attack. J. Cryptol. 8(1): 27-37 (1995) - [c12]Ivan Damgård, Lars R. Knudsen:
Multiple Encryption with Minimum Key. Cryptography: Policy and Algorithms 1995: 156-164 - [c11]Lars R. Knudsen:
A Key-schedule Weakness in SAFER K-64. CRYPTO 1995: 274-286 - 1994
- [c10]Lars R. Knudsen, Xuejia Lai:
New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. EUROCRYPT 1994: 410-418 - [c9]Lars R. Knudsen:
New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract). EUROCRYPT 1994: 419-424 - [c8]Lars R. Knudsen:
Truncated and Higher Order Differentials. FSE 1994: 196-211 - 1993
- [c7]Ivan Damgård, Lars R. Knudsen:
The Breaking of the AR Hash Function. EUROCRYPT 1993: 286-292 - [c6]Xuejia Lai, Lars R. Knudsen:
Attacks on Double Block Length Hash Functions. FSE 1993: 157-165 - [c5]Lars R. Knudsen:
Practically Secure Feistel Cyphers. FSE 1993: 211-221 - 1992
- [c4]Lars R. Knudsen:
Cryptanalysis of LOKI91. AUSCRYPT 1992: 196-208 - [c3]Lars R. Knudsen:
Iterative Characteristics of DES and s²-DES. CRYPTO 1992: 497-511 - [c2]Kaisa Nyberg, Lars R. Knudsen:
Provable Security Against Differential Cryptanalysis. CRYPTO 1992: 566-574 - 1991
- [c1]Lars R. Knudsen:
Cryptanalysis of LOKI. ASIACRYPT 1991: 22-35