Lars Ramkilde Knudsen

  1. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC. / Knudsen, Lars Ramkilde; Mitchell, C.J.

    In: Discrete applied mathematics, Vol. 128, No. 1, 2003, p. 181-191.

    Publication: Research - peer-reviewJournal article – Annual report year: 2003

  2. Published

    Analysis of RMAC. / Knudsen, Lars Ramkilde; Kohno, T.

    Fast Software Encryption. 2887. ed. Berlin Heidelberg : Springer, 2003. p. 182-191 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  3. E-pub ahead of print

    Analysis of Trivium by a Simulated Annealing variant. / Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian.

    Proceedings of the ECRYPT workshop on tools in cryptanalysis 2010. ed. / Francois-Xaver Standaert. 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  4. Published

    Bivium as a Mixed Integer Programming Problem. / Borghoff, Julia; Knudsen, Lars Ramkilde; Stolpe, Mathias.

    Cryptography and Coding: 12th IMA International Conference, Cryptography and Coding 2009 Cirencester, UK, DEcenber 2009. ed. / Matthew G. Parker. Springer, 2009. p. 133-152 (Lecture Notes of Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  5. Published

    Block Cipher Analysis. / Miolane, Charlotte Vikkelsø; Knudsen, Lars Ramkilde (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2009. 176 p.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  6. Published

    C2 - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. 2. ed. Springer, 2011. p. 179-180.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  7. Published

    Construction of secure and fast hash functions using nonbinary error-correcting codes. / Knudsen, Lars Ramkilde; Preneel, Bart.

    In: I E E E Transactions on Information Theory, Vol. 48, No. 9, 2002, p. 2524-2539.

    Publication: Research - peer-reviewJournal article – Annual report year: 2002

  8. Published

    Counting equations in algebraic attacks on block ciphers. / Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 127-135.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  9. Published

    Cryptanalysis of an Iterated Halving-based hash function: CRUSH. / Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde; Naderi, M; Sadeghyian, B.

    In: I E T Information Security, Vol. 3, No. 4, 2009, p. 129-138.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  10. Published

    Cryptanalysis of ANSI X9.52 CBCM mode. / Knudsen, Lars Ramkilde; Biham, Eli.

    In: Journal of Cryptology, Vol. 15, No. 1, 2002, p. 47-59.

    Publication: Research - peer-reviewJournal article – Annual report year: 2002

Previous 1 2 3 4 5 6 7 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word