Lars Ramkilde Knudsen

  1. 2006
  2. Published

    Proposals for iterated hash functions. / Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography. Setúbal, Portugal : INSTICC, 2006. p. 246-253.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

  3. Published

    Small size hashes with enhanced security. / Knudsen, Lars Ramkilde.

    In: International Journal of Network Security, Vol. 2, No. 1, 2006, p. 41-42.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  4. 2005
  5. Published

    Partial key recovery attack against RMAC. / Knudsen, Lars Ramkilde; Mitchell, Chris.

    In: Journal of Cryptology, Vol. 18, No. 4, 2005, p. 375-389.

    Publication: Research - peer-reviewJournal article – Annual report year: 2005

  6. Published

    Preimage and Collision Attacks on MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik.

    Fast Software Encryption: Proceedings. Vol. 3557 Springer Verlag, 2005. p. 255-267 (Lecture Notes in Computer Science; No. 3557).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2005

  7. Published

    SMASH - a cryptographic hash function. / Knudsen, Lars Ramkilde.

    Fast Software Encryption: Proceedings. Springer Verlage, 2005. p. 228-242 (Lecture Notes in Computer Science; No. 3557).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2005

  8. Published

    Some Attacks Against a Double Length Hash Proposal. / Knudsen, Lars Ramkilde; Muller, Frederic.

    Asiacrypt 2005: Proceedings. Vol. 3788 Springer Verlag, 2005. p. 462-473 (Lecture Notes in Computer Science; No. 3788).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2005

  9. Published

    The Cryptanalysis of the AES - A Brief Survey. / Knudsen, Lars Ramkilde.

    AES 2004. Vol. 3373 Springer Verlag, 2005. p. 1-10 (Lecture Notes in Computer Science; No. 3373).

    Publication: ResearchArticle in proceedings – Annual report year: 2005

  10. 2004
  11. Published

    Making Sense of "%AC&@9^(}". / Knudsen, Lars Ramkilde.

    BRIDGING from technology to society: DTU 1829-2004 - 175 år. ed. / Kristian Stubkjær; Tine Kortenbach. Technical University of Denmark, 2004. p. 128-139.

    Publication: CommunicationBook chapter – Annual report year: 2004

  12. Published

    On the Role of Key Schedules in Attacks on Iterated Ciphers. / Knudsen, Lars Ramkilde.

    Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings: ESORICS. ed. / Lars Ramkilde Knudsen. Vol. Springer Lecture Notes in Computer Science, volume 3193 2004. p. 322-334.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2004

  13. 2003
  14. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC. / Knudsen, Lars Ramkilde; Mitchell, C.J.

    In: Discrete applied mathematics, Vol. 128, No. 1, 2003, p. 181-191.

    Publication: Research - peer-reviewJournal article – Annual report year: 2003

Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word