Lars Ramkilde Knudsen

  1. 2013
  2. Published

    Dynamic encryption method. / Knudsen, Lars Ramkilde (Inventor).

    IPC No.: H04L9/00. Oct 28, 2011.

    Publication: ResearchPatent – Annual report year: 2013

  3. Published

    Selected Areas in Cryptography : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. / Knudsen, Lars Ramkilde (Editor); Wu, Huapeng (Editor).

    Springer, 2013. (Lecture Notes in Computer Science, Vol. 7707).

    Publication: ResearchBook – Annual report year: 2013

  4. Published

    Slender-Set Differential Cryptanalysis. / Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 26, No. 1, 2013, p. 11-38.

    Publication: Research - peer-reviewJournal article – Annual report year: 2013

  5. 2012
  6. Published
  7. Published

    Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract). / Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor; Standaert, Francois-Xavier; Steinberger, John; Tischhauser, E.

    Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Vol. 7417 Springer, 2012. p. 45-62 (Lecture Notes in Computer Science, Vol. 7417).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  8. Published

    On-line Ciphers and the Hash-CBC Constructions. / Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde; Namprempre, C.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 640-679.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  9. Published

    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract. / Borghoff, J.; Canteaut, Anne Michele; Guneysu, T.; Kavun, E.B.; Knezevic, M.; Knudsen, Lars Ramkilde; Leander, Gregor; Nikov, V.; Paar, C.; Rechberger, Christian.

    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer, 2012. p. 208-225 (Lecture Notes in Computer Science, Vol. 7658).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  10. Published

    Security Analysis of Randomize-Hash-then-Sign Digital Signatures. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    In: Journal of Cryptology, Vol. 25, No. 4, 2012, p. 748-779.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  11. Published

    The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. / Bagheri, Nasour; Gauravaram, Praveen; Knudsen, Lars R.; Zenner, Erik.

    In: International Journal of Information Security, Vol. 11, No. 6, 2012, p. 419-434.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  12. 2011
  13. Published

    C2 - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. 2. ed. Springer, 2011. p. 179-180.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  14. Published
  15. Published

    Hill climbing algorithms and trivium. / Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian.

    Lecture Notes in Computer Science. Vol. 6544 Springer, 2011. p. 57-73 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  16. Published

    Improved security analysis of Fugue-256. / Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars Ramkilde; Lei, Wei.

    2011.

    Publication: Research - peer-reviewReport – Annual report year: 2011

  17. Published

    Improved security analysis of Fugue-256. / Gauravaram, Praveen; Bagheri, Nasoor; Knudsen, Lars Ramkilde; Wei, Lei.

    Proceedings of Australasian Conference on Information Security and Privacy: ACISP 2011. Springer, 2011. p. 439-443 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  18. Published
  19. Published

    Post-Quantum Cryptography. / Gauthier Umana, Valérie; Knudsen, Lars Ramkilde (Supervisor); Leander, Gregor (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2011. 156 p.

    Publication: ResearchPh.D. thesis – Annual report year: 2011

  20. Published

    PRESENT - Block Cipher. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Encyclopedia of Cryptography and Security. ed. / Henk C.A. Tilborg; Sushil Jajodia. 2. ed. Springer, 2011. p. 953-955.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  21. 2010
  22. E-pub ahead of print

    Analysis of Trivium by a Simulated Annealing variant. / Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian.

    Proceedings of the ECRYPT workshop on tools in cryptanalysis 2010. ed. / Francois-Xaver Standaert. 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  23. Published

    Counting equations in algebraic attacks on block ciphers. / Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 127-135.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  24. Published

    Cryptanalysis of MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik; Muller, Frédéric; Thomsen, Søren Steffen.

    In: Journal of Cryptology, Vol. 23, No. 1, 2010, p. 72-90.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  25. Published

    Cryptographic Hash Functions. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    Handbook of Information and Communication Security. ed. / Peter Stavroulakis; Mark Stamp. 1. ed. Berlin Heidelberg : Springer, 2010. p. 59-80 (Engineering).

    Publication: Research - peer-reviewBook chapter – Annual report year: 2010

  26. Published

    Differential Distinguishers for the Compression Function and Output Transformation of Hamsi-256. / Aumasson, Jean-Philippe; Käsper, Emilia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian; Ødegård, Rune; Peyrin, Thomas; Schläffer, Martin.

    Proceedings of the 15th Australasian conference on Information security and privacy: July 5-7. Sydney, Australia : Springer, 2010. p. 87-103 (Lecture notes in computer science; No. 6168).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  27. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    In: International Journal of Information Security, Vol. 9, No. 2, 2010, p. 137-151.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  28. Published

    PRINTcipher: A Block Cipher for IC-Printing. / Knudsen, Lars Ramkilde; Leander, Gregor.

    Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. ed. / Stefan Mangard; Francois-Xavier Standaert. Springer, 2010. p. 16-32 (Lecture notes in computer science; No. 6225).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  29. 2009
  30. Published

    Block Cipher Analysis. / Miolane, Charlotte Vikkelsø; Knudsen, Lars Ramkilde (Supervisor).

    Kgs. Lyngby, Denmark : Technical University of Denmark (DTU), 2009. 176 p.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  31. Published

    Cryptographic Hash Functions. / Thomsen, Søren Steffen; Knudsen, Lars Ramkilde (Supervisor).

    2009.

    Publication: ResearchPh.D. thesis – Annual report year: 2009

  32. Published

    Bivium as a Mixed Integer Programming Problem. / Borghoff, Julia; Knudsen, Lars Ramkilde; Stolpe, Mathias.

    Cryptography and Coding: 12th IMA International Conference, Cryptography and Coding 2009 Cirencester, UK, DEcenber 2009. ed. / Matthew G. Parker. Springer, 2009. p. 133-152 (Lecture Notes of Computer Science; No. 5921).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  33. Published

    Cryptanalysis of an Iterated Halving-based hash function: CRUSH. / Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde; Naderi, M; Sadeghyian, B.

    In: I E T Information Security, Vol. 3, No. 4, 2009, p. 129-138.

    Publication: Research - peer-reviewJournal article – Annual report year: 2009

  34. Published

    Cryptanalysis of C2. / Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor; Matusiewicz, Krystian.

    Advances in Cryptology - CRYPTO 2009: 29th Annual International Cryptology Conference. ed. / Shai Halevi. Vol. 5677 1st. ed. Belin Heldelberg New York : Springer, 2009. p. 250-266.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  35. Published

    Cryptanalysis of MDC-2. / Knudsen, Lars Ramkilde; Mendel, Florian; Rechberger, Christian; Thomsen, Søren Steffen.

    Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings.. ed. / Antoine Joux. Berlin / Heidelberg : Springer, 2009. p. 106-120 (Lecture Notes in Computer Science; No. 5479).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  36. Published

    Da de hemmelige koder blev offentlige. / Zenner, Erik; Knudsen, Lars Ramkilde.

    Matematiske horisonter. Technical University of Denmark (DTU), 2009. p. 104-113.

    Publication: EducationBook chapter – Annual report year: 2009

  37. Published

    Grøstl Addendum. / Gauravaram, Praveen; Knudsen, Lars R.; Matusiewicz, Krystian; Mendel, Florian; Rechberger, Christian; Schläffer, Martin; Thomsen, Søren S.; Archives, The Pennsylvania State University CiteSeerX.

    2009, 5 p. Addendum.

    Publication: ResearchOther contribution – Annual report year: 2009

  38. Published

    Hash functions and information theoretic security. / Bagheri, Nasoor; Knudsen, Lars Ramkilde; Naderi, Majid; Thomsen, Søren Steffen.

    In: I E I C E Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 12, 2009, p. 3401-3403.

    Publication: Research - peer-reviewLetter – Annual report year: 2009

  39. Published

    On randomizing hash functions to strengthen the security of digital signatures. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    Proceedings of Eurocrypt-2009. ed. / Antoine Joux. Vol. 5479 Berlin Heidelberg New York : Springer, 2009. p. 88-105 (Lecture Notes in Computer Science; No. 5479).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  40. Published

    Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. / Guo, Jian; Matusiewicz, Krystian; Knudsen, Lars Ramkilde; Ling, San; Wang, Huaxiong.

    Selected Areas in Cryptography: 16th Annual International Workshop. ed. / Michael J. Jacobson; Vincent Rijmen; Reihaneh Safavi-Naini. Vol. 5867 1st. ed. Berlin Heidelberg : Springer, 2009. p. 141-156.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  41. 2008
  42. Published

    Dakota - hashing from a combination of modular arithmetic and symmetric cryptography. / Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    Technical University of Denmark, 2008. 10 p. (MAT report; No. 2008-02).

    Publication: ResearchReport – Annual report year: 2008

  43. Published

    Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. / Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    Applied Cryptography and Network Security 2008: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings. ed. / Steven M. Bellovin; Rosario Gennaro; Angelos Keromytis; Moti Yung. Springer, 2008. p. 144-155 (Lecture Notes in Computer Science; No. 5037).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  44. Published

    On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    2008. (MAT report; No. 2008-06).

    Publication: Research - peer-reviewReport – Annual report year: 2008

  45. Published

    Polyedre : Mappe og udklipsark. / Knudsen, Lars Ramkilde; Markvorsen, Steen; Sloth, Hans.

    1. udgave ed. Egtved : Forlaget TRIP, 2008. 15 p.

    Publication: EducationBook – Annual report year: 2008

  46. Published

    Proposals for Iterated Hash Functions. / Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    E-Business and Telecommunication Networks: Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papers. Vol. 2 2008. p. 107-118 (Communications in Computer and Information Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  47. 2007
  48. Published

    Cryptanalysis of the CRUSH Hash Function. / Knudsen, Lars Ramkilde; Henricksen, Matt.

    Selected Areas in Cryptography: SAC 2007. Berlin : Springer Verlag, 2007. p. 74-83 (Lecture Notes in Computer Science; No. 4876).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  49. Published

    Known-Key Distinguishers for Some Block Ciphers. / Knudsen, Lars Ramkilde; Rijmen, Vincent.

    Advances in Cryptology: ASIACRYPT 2007. Berlin : Springer Verlag, 2007. p. 315-324 (Lecture Notes in Computer Science; No. 4833).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  50. Published

    PRESENT: An Ultra-Lightweight Block Cipher. / Knudsen, Lars Ramkilde; Vikkelsø, Charlotte Heinstrup.

    Cryptographic Hardware and Embedded Systems. Springer Verlag, 2007. p. 450-466 (Lecture Notes in Computer Science; No. 4727).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  51. Published

    Small-Footprint Block Cipher Design - How far can you go?. / Knudsen, Lars Ramkilde; Vikkelsø, Charlotte Heinstrup.

    RFID Security 2007. 2007.

    Publication: ResearchArticle in proceedings – Annual report year: 2007

  52. Published

    The Grindahl Hash Functions. / Knudsen, Lars Ramkilde; Rechberger, Christian; Thomsen, Søren Steffen.

    Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers. ed. / Alex Biryukov. Springer, 2007. p. 39-57 (Lecture Notes in Computer Science; No. 4593).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  53. 2006
  54. Published

    Hash Functions Based on Block Ciphers. / Knudsen, Lars Ramkilde.

    2006. Paper presented at ICE-EM RNSA 2006 Workshop, Brisbane, Australia.

    Publication: ResearchPaper – Annual report year: 2006

  55. Published

    New Hash Function Constructions. / Knudsen, Lars Ramkilde.

    2006. Paper presented at ICE-EM RNSA 2006 Workshop, Brisbane, Australia.

    Publication: ResearchPaper – Annual report year: 2006

  56. Published

    Proposals for iterated hash functions. / Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography. Setúbal, Portugal : INSTICC, 2006. p. 246-253.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2006

  57. Published

    Small size hashes with enhanced security. / Knudsen, Lars Ramkilde.

    In: International Journal of Network Security, Vol. 2, No. 1, 2006, p. 41-42.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  58. 2005
  59. Published

    Partial key recovery attack against RMAC. / Knudsen, Lars Ramkilde; Mitchell, Chris.

    In: Journal of Cryptology, Vol. 18, No. 4, 2005, p. 375-389.

    Publication: Research - peer-reviewJournal article – Annual report year: 2005

  60. Published

    Preimage and Collision Attacks on MD2. / Knudsen, Lars Ramkilde; Mathiassen, John Erik.

    Fast Software Encryption: Proceedings. Vol. 3557 Springer Verlag, 2005. p. 255-267 (Lecture Notes in Computer Science; No. 3557).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2005

  61. Published

    SMASH - a cryptographic hash function. / Knudsen, Lars Ramkilde.

    Fast Software Encryption: Proceedings. Springer Verlage, 2005. p. 228-242 (Lecture Notes in Computer Science; No. 3557).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2005

  62. Published

    Some Attacks Against a Double Length Hash Proposal. / Knudsen, Lars Ramkilde; Muller, Frederic.

    Asiacrypt 2005: Proceedings. Vol. 3788 Springer Verlag, 2005. p. 462-473 (Lecture Notes in Computer Science; No. 3788).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2005

  63. Published

    The Cryptanalysis of the AES - A Brief Survey. / Knudsen, Lars Ramkilde.

    AES 2004. Vol. 3373 Springer Verlag, 2005. p. 1-10 (Lecture Notes in Computer Science; No. 3373).

    Publication: ResearchArticle in proceedings – Annual report year: 2005

  64. 2004
  65. Published

    Making Sense of "%AC&@9^(}". / Knudsen, Lars Ramkilde.

    BRIDGING from technology to society: DTU 1829-2004 - 175 år. ed. / Kristian Stubkjær; Tine Kortenbach. Technical University of Denmark, 2004. p. 128-139.

    Publication: CommunicationBook chapter – Annual report year: 2004

  66. Published

    On the Role of Key Schedules in Attacks on Iterated Ciphers. / Knudsen, Lars Ramkilde.

    Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings: ESORICS. ed. / Lars Ramkilde Knudsen. Vol. Springer Lecture Notes in Computer Science, volume 3193 2004. p. 322-334.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2004

  67. 2003
  68. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC. / Knudsen, Lars Ramkilde; Mitchell, C.J.

    In: Discrete applied mathematics, Vol. 128, No. 1, 2003, p. 181-191.

    Publication: Research - peer-reviewJournal article – Annual report year: 2003

  69. Published

    Analysis of RMAC. / Knudsen, Lars Ramkilde; Kohno, T.

    Fast Software Encryption. 2887. ed. Berlin Heidelberg : Springer, 2003. p. 182-191 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  70. Published

    Distinguishing attack on five-round Feistel networks. / Knudsen, Lars Ramkilde; Raddum, H.

    In: ELECTRON LETT, Vol. 39, No. 16, 2003, p. 1175-1177.

    Publication: Research - peer-reviewJournal article – Annual report year: 2003

  71. Published

    Jeg har “knækket” en kode. / Knudsen, Lars Ramkilde.

    In: Matilde, No. 18, 2003, p. 18-20.

    Publication: CommunicationJournal article – Annual report year: 2003

  72. 2002
  73. Published

    Construction of secure and fast hash functions using nonbinary error-correcting codes. / Knudsen, Lars Ramkilde; Preneel, Bart.

    In: I E E E Transactions on Information Theory, Vol. 48, No. 9, 2002, p. 2524-2539.

    Publication: Research - peer-reviewJournal article – Annual report year: 2002

  74. Published

    Cryptanalysis of ANSI X9.52 CBCM mode. / Knudsen, Lars Ramkilde; Biham, Eli.

    In: Journal of Cryptology, Vol. 15, No. 1, 2002, p. 47-59.

    Publication: Research - peer-reviewJournal article – Annual report year: 2002

  75. Published

    Integral cryptanalysis. / Knudsen, Lars Ramkilde; Wagner, David.

    Fast Software Encryption (Revised Papers): Proceedings. Springer Verlag, 2002. p. 112-127 (Lecture Notes in Computer Science, Vol. 2365).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2002

  76. Published

    The Security of Feistel Ciphers with Six Rounds or Less. / Knudsen, Lars Ramkilde.

    In: Journal of Cryptology, Vol. 15, No. 3, 2002, p. 207-222.

    Publication: Research - peer-reviewJournal article – Annual report year: 2002

Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word