Lars R. Knudsen

From MaRDI portal
Person:247162

Available identifiers

zbMath Open knudsen.lars-ramkildeMaRDI QIDQ247162

List of research outcomes





PublicationDate of PublicationType
On the Role of Key Schedules in Attacks on Iterated Ciphers2022-03-07Paper
Multiple encryption with minimum key2019-10-10Paper
Serpent: A New Block Cipher Proposal2018-05-09Paper
The interpolation attack on block ciphers2018-05-09Paper
The block cipher Square2018-05-09Paper
On the Design and Security of RC22018-05-09Paper
Differential Cryptanalysis of the ICE Encryption Algorithm2018-05-09Paper
Truncated differentials of SAFER2017-11-15Paper
Reflection ciphers2017-02-10Paper
Building indifferentiable compression functions from the PGV compression functions2016-02-19Paper
CIPHERTEXT-ONLY ATTACK ON AKELARRE2015-11-13Paper
Improved Differential Attacks on RC52015-11-11Paper
Security of the AES with a Secret S-Box2015-09-18Paper
Non-Linear Approximations in Linear Cryptanalysis2014-08-20Paper
On the Difficulty of Software Key Escrow2014-08-20Paper
Slender-set differential cryptanalysis2013-04-15Paper
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications2013-03-19Paper
Security analysis of randomize-hash-then-sign digital signatures2013-01-04Paper
On-line ciphers and the Hash-CBC constructions2013-01-04Paper
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations2012-06-29Paper
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes2011-07-07Paper
Improved Security Analysis of Fugue-256 (Poster)2011-07-07Paper
Hill Climbing Algorithms and Trivium2011-03-15Paper
The block cipher companion.2010-12-08Paper
Distinguishers for the Compression Function and Output Transformation of Hamsi-2562010-10-25Paper
PRINTcipher: A Block Cipher for IC-Printing2010-08-17Paper
Cryptanalysis of MD22010-03-01Paper
Bivium as a Mixed-Integer Linear Programming Problem2010-01-07Paper
Fast Software Encryption2010-01-05Paper
Practical Pseudo-collisions for Hash Functions ARIRANG-224/3842009-12-09Paper
Cryptanalysis of C22009-10-20Paper
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures2009-05-12Paper
Cryptanalysis of MDC-22009-05-12Paper
PRESENT: An Ultra-Lightweight Block Cipher2008-09-16Paper
The Grindahl Hash Functions2008-09-16Paper
Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography2008-06-13Paper
Known-Key Distinguishers for Some Block Ciphers2008-05-15Paper
Cryptanalysis of the CRUSH Hash Function2008-03-25Paper
Some Attacks Against a Double Length Hash Proposal2008-03-18Paper
Partial key recovery attack against RMAC2006-08-14Paper
Fast Software Encryption2006-06-22Paper
Fast Software Encryption2006-06-22Paper
Advanced Encryption Standard – AES2005-09-14Paper
Construction of secure and fast hash functions using nonbinary error-correcting codes2005-05-11Paper
https://portal.mardi4nfdi.de/entity/Q30463442004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47364322004-08-09Paper
Analysis of 3gpp-MAC and two-key 3gpp-MAC2003-06-10Paper
https://portal.mardi4nfdi.de/entity/Q45362532003-01-25Paper
https://portal.mardi4nfdi.de/entity/Q47837322002-12-08Paper
The security of Feistel ciphers with six rounds or less2002-12-01Paper
https://portal.mardi4nfdi.de/entity/Q45379962002-10-13Paper
https://portal.mardi4nfdi.de/entity/Q45368012002-07-28Paper
https://portal.mardi4nfdi.de/entity/Q45379852002-06-25Paper
Cryptanalysis of the ANSI X9. 52 CBCM Mode2002-05-21Paper
Attacks on fast double block length hash functions2001-11-22Paper
Attacks on block ciphers of low algebraic degree2001-11-07Paper
An analysis of the 3gpp-MAC scheme2001-10-14Paper
On the structure of Skipjack2001-07-29Paper
https://portal.mardi4nfdi.de/entity/Q27244272001-07-12Paper
Linear frameworks for block ciphers2001-02-18Paper
https://portal.mardi4nfdi.de/entity/Q45027332001-02-15Paper
A detailed analysis of SAFER K2000-12-21Paper
https://portal.mardi4nfdi.de/entity/Q44994142000-08-30Paper
https://portal.mardi4nfdi.de/entity/Q44994062000-08-30Paper
https://portal.mardi4nfdi.de/entity/Q49418542000-07-26Paper
https://portal.mardi4nfdi.de/entity/Q44848852000-06-05Paper
https://portal.mardi4nfdi.de/entity/Q42507732000-04-10Paper
https://portal.mardi4nfdi.de/entity/Q49418052000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49347402000-02-01Paper
Two-key triple encryption1999-09-12Paper
https://portal.mardi4nfdi.de/entity/Q42508991999-06-17Paper
Analysis Methods for (Alleged) RC41999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42496311999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43657591998-04-22Paper
https://portal.mardi4nfdi.de/entity/Q43645721998-03-10Paper
https://portal.mardi4nfdi.de/entity/Q43657601997-12-14Paper
https://portal.mardi4nfdi.de/entity/Q43434411997-12-01Paper
https://portal.mardi4nfdi.de/entity/Q43416841997-07-20Paper
https://portal.mardi4nfdi.de/entity/Q43228561995-12-17Paper
Provable security against a differential attack1995-08-08Paper
https://portal.mardi4nfdi.de/entity/Q43187181995-04-04Paper
https://portal.mardi4nfdi.de/entity/Q43140141995-04-04Paper
https://portal.mardi4nfdi.de/entity/Q43187251995-01-09Paper

Research outcomes over time

This page was built for person: Lars R. Knudsen