No photo of Lars Ramkilde Knudsen
  • Phone45253048, 45881399, 51801510
  • Emaillrkn@dtu.dk
  • Website
  • Richard Petersens Plads, 322, 228

    2800 Kgs. Lyngby

    Denmark

20022023
If you made any changes in Pure these will be visible here soon.

Research Output 2002 2017

2017
124 Downloads (Pure)

Reflection ciphers

Boura, C., Canteaut, A., Knudsen, L. R. & Leander, G., 2017, In : Designs, Codes and Cryptography. 82, p. 3-25

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
2016

Building indifferentiable compression functions from the PGV compression functions

Gauravaram, P., Bagheri, N. & Knudsen, L. R., 2016, In : Designs, Codes and Cryptography. 78, 2, p. 547-581 35 p.

Research output: Contribution to journalJournal articleResearchpeer-review

2015

Revised Selected Papers of the 2nd International Conference on Cryptography and Information Security in the Balkans (BalkanCryptSec 2015)

Pasalic, E. (ed.) & Knudsen, L. R. (ed.), 2015, Springer. 205 p. (Lecture Notes in Computer Science, Vol. 9540).

Research output: Book/ReportBookResearch

1 Downloads (Pure)

Security of the AES with a Secret S-Box

Tiessen, T., Knudsen, L. R., Kölbl, S. & Lauridsen, M. M., 2015, Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015). Leander, G. (ed.). Springer, p. 175-189

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2013
166 Downloads (Pure)

Dynamic encryption method

Knudsen, L. R., 2013, IPC No. H04L9/00, Patent No. WO2013060876 , 2 May 2013, Priority date 28 Oct 2011

Research output: Patent

Open Access
File

Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers

Knudsen, L. R. (ed.) & Wu, H. (ed.), 2013, Springer. (Lecture Notes in Computer Science, Vol. 7707).

Research output: Book/ReportBookResearch

Slender-Set Differential Cryptanalysis

Borghoff, J., Knudsen, L. R., Leander, G. & Thomsen, S. S., 2013, In : Journal of Cryptology. 26, 1, p. 11-38

Research output: Contribution to journalJournal articleResearchpeer-review

2012

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

Bogdanov, A., Knudsen, L. R., Leander, G., Standaert, F-X., Steinberger, J. & Tischhauser, E., 2012, Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Springer, Vol. 7417. p. 45-62 (Lecture Notes in Computer Science, Vol. 7417).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

On-line Ciphers and the Hash-CBC Constructions

Bellare, M., Boldyreva, A., Knudsen, L. R. & Namprempre, C., 2012, In : Journal of Cryptology. 25, 4, p. 640-679

Research output: Contribution to journalJournal articleResearchpeer-review

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract

Borghoff, J., Canteaut, A. M., Guneysu, T., Kavun, E. B., Knezevic, M., Knudsen, L. R., Leander, G., Nikov, V., Paar, C. & Rechberger, C., 2012, Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer, p. 208-225 (Lecture Notes in Computer Science, Vol. 7658).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Security Analysis of Randomize-Hash-then-Sign Digital Signatures

Gauravaram, P. & Knudsen, L. R., 2012, In : Journal of Cryptology. 25, 4, p. 748-779

Research output: Contribution to journalJournal articleResearchpeer-review

368 Downloads (Pure)

The suffix-free-prefix-free hash function construction and its indifferentiability security analysis

Bagheri, N., Gauravaram, P., Knudsen, L. R. & Zenner, E., 2012, In : International Journal of Information Security. 11, 6, p. 419-434

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
2011

C2 - Block Cipher

Knudsen, L. R. & Leander, G., 2011, Encyclopedia of Cryptography and Security. 2 ed. Springer, p. 179-180 1435 p.

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

Cryptanalysis of PRESENT-like ciphers with secret S-boxes

Borghoff, J., Knudsen, L. R., Leander, G. & Thomsen, S. S., 2011, In : Lecture Notes in Computer Science. 6733, p. 270-289

Research output: Contribution to journalConference articleResearchpeer-review

Hill climbing algorithms and trivium

Borghoff, J., Knudsen, L. R. & Matusiewicz, K., 2011, Lecture Notes in Computer Science. Springer, Vol. 6544. p. 57-73 410 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

1 Downloads (Pure)

Improved security analysis of Fugue-256

Gauravaram, P., Bagheri, N., Knudsen, L. R. & Lei, W., 2011

Research output: Book/ReportReportResearchpeer-review

Improved security analysis of Fugue-256

Gauravaram, P., Bagheri, N., Knudsen, L. R. & Wei, L., 2011, Proceedings of Australasian Conference on Information Security and Privacy: ACISP 2011. Springer, p. 439-443 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Improved security analysis of Fugue-256 (poster)

Gauravaram, P., Knudsen, L. R., Bagheri, N. & Wei, L., 2011, In : Lecture Notes in Computer Science. 6812, p. 428-432

Research output: Contribution to journalConference articleResearchpeer-review

PRESENT - Block Cipher

Knudsen, L. R. & Leander, G., 2011, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. & Jajodia, S. (eds.). 2 ed. Springer, p. 953-955 1435 p.

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

2010
174 Downloads (Pure)

Analysis of Trivium by a Simulated Annealing variant

Borghoff, J., Knudsen, L. R. & Matusiewicz, K., 2010, Proceedings of the ECRYPT workshop on tools in cryptanalysis 2010. Standaert, F-X. (ed.).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

File

Counting equations in algebraic attacks on block ciphers

Knudsen, L. R. & Miolane, C. V., 2010, In : International Journal of Information Security. 9, 2, p. 127-135

Research output: Contribution to journalJournal articleResearchpeer-review

Cryptanalysis of MD2

Knudsen, L. R., Mathiassen, J. E., Muller, F. & Thomsen, S. S., 2010, In : Journal of Cryptology. 23, 1, p. 72-90

Research output: Contribution to journalJournal articleResearchpeer-review

Cryptographic Hash Functions

Gauravaram, P. & Knudsen, L. R., 2010, Handbook of Information and Communication Security. Stavroulakis, P. & Stamp, M. (eds.). 1 ed. Berlin Heidelberg: Springer, p. 59-80 (Engineering).

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

Differential Distinguishers for the Compression Function and Output Transformation of Hamsi-256

Aumasson, J-P., Käsper, E., Knudsen, L. R., Matusiewicz, K., Ødegård, R., Peyrin, T. & Schläffer, M., 2010, Proceedings of the 15th Australasian conference on Information security and privacy: July 5-7. Sydney, Australia: Springer, p. 87-103 (Lecture Notes in Computer Science; No. 6168).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

On hash functions using checksums

Gauravaram, P., Kelsey, J., Knudsen, L. R. & Thomsen, S. S., 2010, In : International Journal of Information Security. 9, 2, p. 137-151

Research output: Contribution to journalJournal articleResearchpeer-review

PRINTcipher: A Block Cipher for IC-Printing

Knudsen, L. R. & Leander, G., 2010, Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Mangard, S. & Standaert, F-X. (eds.). Springer, p. 16-32 (Lecture Notes in Computer Science; No. 6225).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2009

Bivium as a Mixed Integer Programming Problem

Borghoff, J., Knudsen, L. R. & Stolpe, M., 2009, Cryptography and Coding: 12th IMA International Conference, Cryptography and Coding 2009 Cirencester, UK, DEcenber 2009. Parker, M. G. (ed.). Springer, p. 133-152 (Lecture Notes of Computer Science; No. 5921).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Cryptanalysis of an Iterated Halving-based hash function: CRUSH

Bagheri, N., Henricksen, M., Knudsen, L. R., Naderi, M. & Sadeghyian, B., 2009, In : I E T Information Security. 3, 4, p. 129-138

Research output: Contribution to journalJournal articleResearchpeer-review

Cryptanalysis of C2

Borghoff, J., Knudsen, L. R., Leander, G. & Matusiewicz, K., 2009, Advances in Cryptology - CRYPTO 2009: 29th Annual International Cryptology Conference. Halevi, S. (ed.). 1st ed. Belin Heldelberg New York: Springer, Vol. 5677. p. 250-266 692 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Cryptanalysis of MDC-2

Knudsen, L. R., Mendel, F., Rechberger, C. & Thomsen, S. S., 2009, Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings.. Joux, A. (ed.). Berlin / Heidelberg: Springer, p. 106-120 (Lecture Notes in Computer Science; No. 5479).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Da de hemmelige koder blev offentlige

Zenner, E. & Knudsen, L. R., 2009, Matematiske horisonter. Technical University of Denmark, p. 104-113

Research output: Chapter in Book/Report/Conference proceedingBook chapterEducation

314 Downloads (Pure)

Grøstl Addendum

Gauravaram, P., Knudsen, L. R., Matusiewicz, K., Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S. S. & Archives, T. P. S. U. C., 2009, 5 p.

Research output: Other contributionResearch

Open Access
File

Hash functions and information theoretic security

Bagheri, N., Knudsen, L. R., Naderi, M. & Thomsen, S. S., 2009, In : I E I C E Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 12, p. 3401-3403

Research output: Contribution to journalLetterResearchpeer-review

On randomizing hash functions to strengthen the security of digital signatures

Gauravaram, P. & Knudsen, L. R., 2009, Proceedings of Eurocrypt-2009. Joux, A. (ed.). Berlin Heidelberg New York: Springer, Vol. 5479. p. 88-105 609 p. (Lecture Notes in Computer Science; No. 5479).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Practical Pseudo-collisions for Hash Functions ARIRANG-224/384

Guo, J., Matusiewicz, K., Knudsen, L. R., Ling, S. & Wang, H., 2009, Selected Areas in Cryptography: 16th Annual International Workshop. Jacobson, M. J., Rijmen, V. & Safavi-Naini, R. (eds.). 1st ed. Berlin Heidelberg: Springer, Vol. 5867. p. 141-156 467 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2008

Dakota - hashing from a combination of modular arithmetic and symmetric cryptography

Damgård, I. B., Knudsen, L. R. & Thomsen, S. S., 2008, Technical University of Denmark. 10 p. (MAT report; No. 2008-02).

Research output: Book/ReportReportResearch

Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography

Damgård, I. B., Knudsen, L. R. & Thomsen, S. S., 2008, Applied Cryptography and Network Security 2008: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings. Bellovin, S. M., Gennaro, R., Keromytis, A. & Yung, M. (eds.). Springer, p. 144-155 (Lecture Notes in Computer Science; No. 5037).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

277 Downloads (Pure)

On hash functions using checksums

Gauravaram, P., Kelsey, J., Knudsen, L. R. & Thomsen, S. S., 2008, (MAT report; No. 2008-06).

Research output: Book/ReportReportResearchpeer-review

File

Polyedre: Mappe og udklipsark

Knudsen, L. R., Markvorsen, S. & Sloth, H., 2008, 1. udgave ed. Egtved: Forlaget TRIP. 15 p.

Research output: Book/ReportBookEducation

Proposals for Iterated Hash Functions

Knudsen, L. R. & Thomsen, S. S., 2008, E-Business and Telecommunication Networks: Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papers. Vol. 2. p. 107-118 (Communications in Computer and Information Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2007

Cryptanalysis of the CRUSH Hash Function

Knudsen, L. R. & Henricksen, M., 2007, Selected Areas in Cryptography: SAC 2007. Berlin: Springer Verlag, p. 74-83 (Lecture Notes in Computer Science; No. 4876).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Known-Key Distinguishers for Some Block Ciphers

Knudsen, L. R. & Rijmen, V., 2007, Advances in Cryptology: ASIACRYPT 2007. Berlin: Springer Verlag, p. 315-324 (Lecture Notes in Computer Science; No. 4833).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

PRESENT: An Ultra-Lightweight Block Cipher

Knudsen, L. R. & Vikkelsø, C. H., 2007, Cryptographic Hardware and Embedded Systems. Springer Verlag, p. 450-466 (Lecture Notes in Computer Science; No. 4727).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Small-Footprint Block Cipher Design - How far can you go?

Knudsen, L. R. & Vikkelsø, C. H., 2007, RFID Security 2007.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearch

The Grindahl Hash Functions

Knudsen, L. R., Rechberger, C. & Thomsen, S. S., 2007, Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers. Biryukov, A. (ed.). Springer, p. 39-57 (Lecture Notes in Computer Science; No. 4593).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2006

Hash Functions Based on Block Ciphers

Knudsen, L. R., 2006.

Research output: Contribution to conferencePaperResearch

New Hash Function Constructions

Knudsen, L. R., 2006.

Research output: Contribution to conferencePaperResearch

Proposals for iterated hash functions

Knudsen, L. R. & Thomsen, S. S., 2006, SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography. Setúbal, Portugal: INSTICC, p. 246-253

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Small size hashes with enhanced security

Knudsen, L. R., 2006, In : International Journal of Network Security. 2, 1, p. 41-42

Research output: Contribution to journalJournal articleResearchpeer-review

2005

Partial key recovery attack against RMAC

Knudsen, L. R. & Mitchell, C., 2005, In : Journal of Cryptology. 18, 4, p. 375-389

Research output: Contribution to journalJournal articleResearchpeer-review