Lars Ramkilde Knudsen

  1. Research › Journal article
  2. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC. / Knudsen, Lars Ramkilde; Mitchell, C.J.

    In: Discrete applied mathematics, Vol. 128, No. 1, 2003, p. 181-191.

    Publication: Research - peer-reviewJournal article – Annual report year: 2003

  3. Published

    Construction of secure and fast hash functions using nonbinary error-correcting codes. / Knudsen, Lars Ramkilde; Preneel, Bart.

    In: I E E E Transactions on Information Theory, Vol. 48, No. 9, 2002, p. 2524-2539.

    Publication: Research - peer-reviewJournal article – Annual report year: 2002

  4. Published

    Counting equations in algebraic attacks on block ciphers. / Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 127-135.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  5. Published

    Cryptanalysis of an Iterated Halving-based hash function: CRUSH. / Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde; Naderi, M; Sadeghyian, B.

    In: I E T Information Security, Vol. 3, No. 4, 2009, p. 129-138.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  6. Published

    Cryptanalysis of ANSI X9.52 CBCM mode. / Knudsen, Lars Ramkilde; Biham, Eli.

    In: Journal of Cryptology, Vol. 15, No. 1, 2002, p. 47-59.

    Publication: Research - peer-reviewJournal article – Annual report year: 2002

  7. Published

    Cryptanalysis of MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 23, No. 1, 2010, p. 72-90.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  8. Published

    Distinguishing attack on five-round Feistel networks. / Knudsen, Lars Ramkilde; Raddum, H.

    In: ELECTRON LETT, Vol. 39, No. 16, 2003, p. 1175-1177.

    Publication: Research - peer-reviewJournal article – Annual report year: 2003

  9. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 137-151.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  10. Published

    On-line Ciphers and the Hash-CBC Constructions. / Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde; Namprempre, C.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 640-679.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  11. Published

    Partial key recovery attack against RMAC. / Knudsen, Lars Ramkilde; Mitchell, Chris.

    In: Journal of Cryptology, Vol. 18, No. 4, 2005, p. 375-389.

    Publication: Research - peer-reviewJournal article – Annual report year: 2005

Previous 1 2 3 4 5 6 7 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word