Lars Ramkilde Knudsen

  1. Research › Journal article
  2. Published

    Cryptanalysis of an Iterated Halving-based hash function: CRUSH. / Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde; Naderi, M; Sadeghyian, B.

    In: I E T Information Security, Vol. 3, No. 4, 2009, p. 129-138.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  3. Published

    The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. / Bagheri, Nasour; Gauravaram, Praveen; Knudsen, Lars R.; Zenner, Erik.

    In: International Journal of Information Security, Vol. 11, No. 6, 2012, p. 419-434.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  4. Published

    On-line Ciphers and the Hash-CBC Constructions. / Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde; Namprempre, C.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 640-679.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  5. Published

    Slender-Set Differential Cryptanalysis. / Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 26, No. 1, 2013, p. 11-38.

    Publication: Research - peer-reviewJournal article – Annual report year: 2013

  6. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 137-151.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  7. Published

    Security Analysis of Randomize-Hash-then-Sign Digital Signatures. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 748-779.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  8. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC. / Knudsen, Lars Ramkilde; Mitchell, C.J.

    In: Discrete applied mathematics, Vol. 128, No. 1, 2003, p. 181-191.

    Publication: Research - peer-reviewJournal article – Annual report year: 2003

  9. Published

    Construction of secure and fast hash functions using nonbinary error-correcting codes. / Knudsen, Lars Ramkilde; Preneel, Bart.

    In: I E E E Transactions on Information Theory, Vol. 48, No. 9, 2002, p. 2524-2539.

    Publication: Research - peer-reviewJournal article – Annual report year: 2002

  10. Published

    Counting equations in algebraic attacks on block ciphers. / Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 127-135.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  11. Published

    Cryptanalysis of ANSI X9.52 CBCM mode. / Knudsen, Lars Ramkilde; Biham, Eli.

    In: Journal of Cryptology, Vol. 15, No. 1, 2002, p. 47-59.

    Publication: Research - peer-reviewJournal article – Annual report year: 2002

Previous 1 2 3 4 5 6 7 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word