Lars R. Knudsen

From MaRDI portal
(Redirected from Person:193616)
Redirect page
Person:247162

Redirect to:


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the Role of Key Schedules in Attacks on Iterated Ciphers
Computer Security – ESORICS 2004
2022-03-07Paper
Multiple encryption with minimum key
Cryptography: Policy and Algorithms
2019-10-10Paper
Serpent: a new block cipher proposal
Fast Software Encryption
2018-05-09Paper
The interpolation attack on block ciphers
Fast Software Encryption
2018-05-09Paper
The block cipher \textsc{Square}
Fast Software Encryption
2018-05-09Paper
On the design and security of RC2
Fast Software Encryption
2018-05-09Paper
Differential Cryptanalysis of the ICE Encryption Algorithm
Fast Software Encryption
2018-05-09Paper
Truncated differentials of SAFER
Fast Software Encryption
2017-11-15Paper
Reflection ciphers
Designs, Codes and Cryptography
2017-02-10Paper
Building indifferentiable compression functions from the PGV compression functions
Designs, Codes and Cryptography
2016-02-19Paper
Ciphertext-only attack on Akelarre
Cryptologia
2015-11-13Paper
Improved differential attacks on RC5
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Security of the AES with a secret S-box
Fast Software Encryption
2015-09-18Paper
Non-linear approximations in linear cryptanalysis
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
On the difficulty of software key escrow
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Slender-set differential cryptanalysis
Journal of Cryptology
2013-04-15Paper
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Security analysis of randomize-hash-then-sign digital signatures
Journal of Cryptology
2013-01-04Paper
On-line ciphers and the Hash-CBC constructions
Journal of Cryptology
2013-01-04Paper
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
Fast Software Encryption
2011-07-07Paper
Improved security analysis of Fugue-256 (poster)
Information Security and Privacy
2011-07-07Paper
Hill climbing algorithms and Trivium
Selected Areas in Cryptography
2011-03-15Paper
The block cipher companion.
Information Security and Cryptography
2010-12-08Paper
Distinguishers for the compression function and output transformation of Hamsi-256
Information Security and Privacy
2010-10-25Paper
PRINTcipher: A Block Cipher for IC-Printing
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Cryptanalysis of MD2
Journal of Cryptology
2010-03-01Paper
Bivium as a mixed-integer linear programming problem
Cryptography and Coding
2010-01-07Paper
Analysis of RMAC.
Lecture Notes in Computer Science
2010-01-05Paper
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Selected Areas in Cryptography
2009-12-09Paper
Cryptanalysis of C2
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Cryptanalysis of MDC-2
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
PRESENT: An Ultra-Lightweight Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
The Grindahl Hash Functions
Fast Software Encryption
2008-09-16Paper
Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Applied Cryptography and Network Security
2008-06-13Paper
Known-Key Distinguishers for Some Block Ciphers
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Cryptanalysis of the CRUSH Hash Function
Selected Areas in Cryptography
2008-03-25Paper
Some Attacks Against a Double Length Hash Proposal
Lecture Notes in Computer Science
2008-03-18Paper
Partial key recovery attack against RMAC
Journal of Cryptology
2006-08-14Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Advanced Encryption Standard – AES
Lecture Notes in Computer Science
2005-09-14Paper
Construction of secure and fast hash functions using nonbinary error-correcting codes
IEEE Transactions on Information Theory
2005-05-11Paper
scientific article; zbMATH DE number 2089131 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 2085205 (Why is no real title available?)
 
2004-08-09Paper
Analysis of 3gpp-MAC and two-key 3gpp-MAC
Discrete Applied Mathematics
2003-06-10Paper
scientific article; zbMATH DE number 1759316 (Why is no real title available?)
 
2003-01-25Paper
scientific article; zbMATH DE number 1842498 (Why is no real title available?)
 
2002-12-08Paper
The security of Feistel ciphers with six rounds or less
Journal of Cryptology
2002-12-01Paper
scientific article; zbMATH DE number 1759275 (Why is no real title available?)
 
2002-10-13Paper
scientific article; zbMATH DE number 1759778 (Why is no real title available?)
 
2002-07-28Paper
scientific article; zbMATH DE number 1759264 (Why is no real title available?)
 
2002-06-25Paper
Cryptanalysis of the ANSI X9. 52 CBCM Mode
Journal of Cryptology
2002-05-21Paper
Attacks on fast double block length hash functions
Journal of Cryptology
2001-11-22Paper
Attacks on block ciphers of low algebraic degree
Journal of Cryptology
2001-11-07Paper
An analysis of the 3gpp-MAC scheme
 
2001-10-14Paper
On the structure of Skipjack
Discrete Applied Mathematics
2001-07-29Paper
scientific article; zbMATH DE number 1617919 (Why is no real title available?)
 
2001-07-12Paper
Linear frameworks for block ciphers
Designs, Codes and Cryptography
2001-02-18Paper
scientific article; zbMATH DE number 1504777 (Why is no real title available?)
 
2001-02-15Paper
A detailed analysis of SAFER K
Journal of Cryptology
2000-12-21Paper
scientific article; zbMATH DE number 1498337 (Why is no real title available?)
 
2000-08-30Paper
scientific article; zbMATH DE number 1498330 (Why is no real title available?)
 
2000-08-30Paper
scientific article; zbMATH DE number 1418294 (Why is no real title available?)
 
2000-07-26Paper
scientific article; zbMATH DE number 1455090 (Why is no real title available?)
 
2000-06-05Paper
scientific article; zbMATH DE number 1304083 (Why is no real title available?)
 
2000-04-10Paper
scientific article; zbMATH DE number 1418246 (Why is no real title available?)
 
2000-03-19Paper
scientific article; zbMATH DE number 1394324 (Why is no real title available?)
 
2000-02-01Paper
Two-key triple encryption
Journal of Cryptology
1999-09-12Paper
scientific article; zbMATH DE number 1304187 (Why is no real title available?)
 
1999-06-17Paper
Analysis Methods for (Alleged) RC4
Lecture Notes in Computer Science
1999-06-17Paper
scientific article; zbMATH DE number 1303116 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1088934 (Why is no real title available?)
 
1998-04-22Paper
scientific article; zbMATH DE number 1088255 (Why is no real title available?)
 
1998-03-10Paper
scientific article; zbMATH DE number 1088935 (Why is no real title available?)
 
1997-12-14Paper
scientific article; zbMATH DE number 1030998 (Why is no real title available?)
 
1997-12-01Paper
scientific article; zbMATH DE number 1024009 (Why is no real title available?)
 
1997-07-20Paper
scientific article; zbMATH DE number 721905 (Why is no real title available?)
 
1995-12-17Paper
Provable security against a differential attack
Journal of Cryptology
1995-08-08Paper
scientific article; zbMATH DE number 708827 (Why is no real title available?)
 
1995-04-04Paper
scientific article; zbMATH DE number 697798 (Why is no real title available?)
 
1995-04-04Paper
scientific article; zbMATH DE number 708833 (Why is no real title available?)
 
1995-01-09Paper


Research outcomes over time


This page was built for person: Lars R. Knudsen