Lars Ramkilde Knudsen

  1. 2013
  2. Published

    Dynamic encryption method. / Knudsen, Lars Ramkilde (Inventor).

    IPC No.: H04L9/00. Patent No.: WO2013060876 . May 02, 2013.

    Publication: ResearchPatent – Annual report year: 2013

  3. Published

    Selected Areas in Cryptography : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. / Knudsen, Lars Ramkilde (Editor); Wu, Huapeng (Editor).

    Springer, 2013. (Lecture Notes in Computer Science, Vol. 7707).

    Publication: ResearchBook – Annual report year: 2013

  4. Published

    Slender-Set Differential Cryptanalysis. / Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 26, No. 1, 2013, p. 11-38.

    Publication: Research - peer-reviewJournal article – Annual report year: 2013

  5. 2012
  6. Published
  7. Published

    Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract). / Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor; Standaert, Francois-Xavier; Steinberger, John; Tischhauser, E.

    Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Vol. 7417 Springer, 2012. p. 45-62 (Lecture Notes in Computer Science, Vol. 7417).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  8. Published

    On-line Ciphers and the Hash-CBC Constructions. / Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde; Namprempre, C.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 640-679.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  9. Published

    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract. / Borghoff, J.; Canteaut, Anne Michele; Guneysu, T.; Kavun, E.B.; Knezevic, M.; Knudsen, Lars Ramkilde; Leander, Gregor; Nikov, V.; Paar, C.; Rechberger, Christian.

    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer, 2012. p. 208-225 (Lecture Notes in Computer Science, Vol. 7658).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  10. Published

    Security Analysis of Randomize-Hash-then-Sign Digital Signatures. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 748-779.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  11. Published

    The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. / Bagheri, Nasour; Gauravaram, Praveen; Knudsen, Lars R.; Zenner, Erik.

    In: International Journal of Information Security, Vol. 11, No. 6, 2012, p. 419-434.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  12. 2011
  13. Published

    C2 - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. 2. ed. Springer, 2011. p. 179-180.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  14. Published
  15. Published

    Hill climbing algorithms and trivium. / Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian.

    Lecture Notes in Computer Science. Vol. 6544 Springer, 2011. p. 57-73 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  16. Published

    Improved security analysis of Fugue-256. / Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars Ramkilde; Lei, Wei.

    2011.

    Publication: Research - peer-reviewReport – Annual report year: 2011

  17. Published

    Improved security analysis of Fugue-256. / Gauravaram, Praveen; Bagheri, Nasoor; Knudsen, Lars Ramkilde; Wei, Lei.

    Proceedings of Australasian Conference on Information Security and Privacy: ACISP 2011. Springer, 2011. p. 439-443 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  18. Published
  19. Published

    Post-Quantum Cryptography. / Gauthier Umana, Valérie; Knudsen, Lars Ramkilde (Supervisor); Leander, Gregor (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2011. 156 p.

    Publication: ResearchPh.D. thesis – Annual report year: 2011

  20. Published

    PRESENT - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. ed. / Henk C.A. Tilborg; Sushil Jajodia. 2. ed. Springer, 2011. p. 953-955.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  21. 2010
  22. E-pub ahead of print

    Analysis of Trivium by a Simulated Annealing variant. / Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian.

    Proceedings of the ECRYPT workshop on tools in cryptanalysis 2010. ed. / Francois-Xaver Standaert. 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  23. Published

    Counting equations in algebraic attacks on block ciphers. / Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 127-135.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  24. Published

    Cryptanalysis of MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 23, No. 1, 2010, p. 72-90.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  25. Published

    Cryptographic Hash Functions. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    Handbook of Information and Communication Security. ed. / Peter Stavroulakis; Mark Stamp. 1. ed. Berlin Heidelberg : Springer, 2010. p. 59-80 (Engineering).

    Publication: Research - peer-reviewBook chapter – Annual report year: 2010

  26. Published

    Differential Distinguishers for the Compression Function and Output Transformation of Hamsi-256. / Aumasson, Jean-Philippe; Käsper, Emilia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian; Ødegård, Rune; Peyrin, Thomas; Schläffer, Martin.

    Proceedings of the 15th Australasian conference on Information security and privacy: July 5-7. Sydney, Australia : Springer, 2010. p. 87-103 (Lecture notes in computer science; No. 6168).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  27. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 137-151.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  28. Published

    PRINTcipher: A Block Cipher for IC-Printing. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. ed. / Stefan Mangard; Francois-Xavier Standaert. Springer, 2010. p. 16-32 (Lecture notes in computer science; No. 6225).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  29. 2009
  30. Published

    Block Cipher Analysis. / Miolane, Charlotte Vikkelsø; Knudsen, Lars Ramkilde (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2009. 176 p.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

Previous 1 2 3 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word