The following pages link to Lars R. Knudsen (Q247162):
Displaying 50 items.
- (Q193616) (redirect page) (← links)
- Reflection ciphers (Q510444) (← links)
- The block cipher companion. (Q610286) (← links)
- Two-key triple encryption (Q1272336) (← links)
- Attacks on fast double block length hash functions (Q1382149) (← links)
- A detailed analysis of SAFER K (Q1590359) (← links)
- Cryptanalysis of the ANSI X9. 52 CBCM Mode (Q1596368) (← links)
- Analysis of 3gpp-MAC and two-key 3gpp-MAC (Q1811102) (← links)
- Linear frameworks for block ciphers (Q1841527) (← links)
- Provable security against a differential attack (Q1842516) (← links)
- The security of Feistel ciphers with six rounds or less (Q1849601) (← links)
- On-line ciphers and the Hash-CBC constructions (Q1928770) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Slender-set differential cryptanalysis (Q1946602) (← links)
- Cryptanalysis of MD2 (Q2267363) (← links)
- Partial key recovery attack against RMAC (Q2499260) (← links)
- (Q2724427) (← links)
- (Q2741429) (← links)
- Non-Linear Approximations in Linear Cryptanalysis (Q2876902) (← links)
- On the Difficulty of Software Key Escrow (Q2876903) (← links)
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Q2894400) (← links)
- Security of the AES with a Secret S-Box (Q2946942) (← links)
- Improved Security Analysis of Fugue-256 (Poster) (Q3013011) (← links)
- Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes (Q3013089) (← links)
- (Q3046344) (← links)
- Hill Climbing Algorithms and Trivium (Q3084244) (← links)
- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 (Q3163098) (← links)
- Cryptanalysis of C2 (Q3183568) (← links)
- Improved Differential Attacks on RC5 (Q3452353) (← links)
- CIPHERTEXT-ONLY ATTACK ON AKELARRE (Q3452609) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- The Grindahl Hash Functions (Q3524880) (← links)
- PRESENT: An Ultra-Lightweight Block Cipher (Q3525066) (← links)
- PRINTcipher: A Block Cipher for IC-Printing (Q3583438) (← links)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures (Q3627429) (← links)
- Cryptanalysis of MDC-2 (Q3627430) (← links)
- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 (Q3651253) (← links)
- Bivium as a Mixed-Integer Linear Programming Problem (Q3654616) (← links)
- Analysis Methods for (Alleged) RC4 (Q4249277) (← links)
- (Q4249631) (← links)
- (Q4250773) (← links)
- (Q4250899) (← links)
- (Q4314014) (← links)
- (Q4318718) (← links)
- (Q4318725) (← links)
- (Q4322856) (← links)
- (Q4341684) (← links)
- (Q4343441) (← links)
- (Q4364572) (← links)
- (Q4365759) (← links)