No photo of Lars Ramkilde Knudsen
  • Phone45253048, 45881399, 51801510
  • Emaillrkn@dtu.dk
  • Website
  • Richard Petersens Plads, 322, 228

    2800 Kgs. Lyngby

    Denmark

20022023
If you made any changes in Pure these will be visible here soon.

Research Output 2002 2017

Filter
Article in proceedings
2015
1 Downloads (Pure)

Security of the AES with a Secret S-Box

Tiessen, T., Knudsen, L. R., Kölbl, S. & Lauridsen, M. M., 2015, Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015). Leander, G. (ed.). Springer, p. 175-189

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2012

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

Bogdanov, A., Knudsen, L. R., Leander, G., Standaert, F-X., Steinberger, J. & Tischhauser, E., 2012, Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Springer, Vol. 7417. p. 45-62 (Lecture Notes in Computer Science, Vol. 7417).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract

Borghoff, J., Canteaut, A. M., Guneysu, T., Kavun, E. B., Knezevic, M., Knudsen, L. R., Leander, G., Nikov, V., Paar, C. & Rechberger, C., 2012, Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer, p. 208-225 (Lecture Notes in Computer Science, Vol. 7658).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2011

Hill climbing algorithms and trivium

Borghoff, J., Knudsen, L. R. & Matusiewicz, K., 2011, Lecture Notes in Computer Science. Springer, Vol. 6544. p. 57-73 410 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Improved security analysis of Fugue-256

Gauravaram, P., Bagheri, N., Knudsen, L. R. & Wei, L., 2011, Proceedings of Australasian Conference on Information Security and Privacy: ACISP 2011. Springer, p. 439-443 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2010
174 Downloads (Pure)

Analysis of Trivium by a Simulated Annealing variant

Borghoff, J., Knudsen, L. R. & Matusiewicz, K., 2010, Proceedings of the ECRYPT workshop on tools in cryptanalysis 2010. Standaert, F-X. (ed.).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

File

Differential Distinguishers for the Compression Function and Output Transformation of Hamsi-256

Aumasson, J-P., Käsper, E., Knudsen, L. R., Matusiewicz, K., Ødegård, R., Peyrin, T. & Schläffer, M., 2010, Proceedings of the 15th Australasian conference on Information security and privacy: July 5-7. Sydney, Australia: Springer, p. 87-103 (Lecture Notes in Computer Science; No. 6168).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

PRINTcipher: A Block Cipher for IC-Printing

Knudsen, L. R. & Leander, G., 2010, Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Mangard, S. & Standaert, F-X. (eds.). Springer, p. 16-32 (Lecture Notes in Computer Science; No. 6225).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2009

Bivium as a Mixed Integer Programming Problem

Borghoff, J., Knudsen, L. R. & Stolpe, M., 2009, Cryptography and Coding: 12th IMA International Conference, Cryptography and Coding 2009 Cirencester, UK, DEcenber 2009. Parker, M. G. (ed.). Springer, p. 133-152 (Lecture Notes of Computer Science; No. 5921).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Cryptanalysis of C2

Borghoff, J., Knudsen, L. R., Leander, G. & Matusiewicz, K., 2009, Advances in Cryptology - CRYPTO 2009: 29th Annual International Cryptology Conference. Halevi, S. (ed.). 1st ed. Belin Heldelberg New York: Springer, Vol. 5677. p. 250-266 692 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Cryptanalysis of MDC-2

Knudsen, L. R., Mendel, F., Rechberger, C. & Thomsen, S. S., 2009, Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings.. Joux, A. (ed.). Berlin / Heidelberg: Springer, p. 106-120 (Lecture Notes in Computer Science; No. 5479).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

On randomizing hash functions to strengthen the security of digital signatures

Gauravaram, P. & Knudsen, L. R., 2009, Proceedings of Eurocrypt-2009. Joux, A. (ed.). Berlin Heidelberg New York: Springer, Vol. 5479. p. 88-105 609 p. (Lecture Notes in Computer Science; No. 5479).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Practical Pseudo-collisions for Hash Functions ARIRANG-224/384

Guo, J., Matusiewicz, K., Knudsen, L. R., Ling, S. & Wang, H., 2009, Selected Areas in Cryptography: 16th Annual International Workshop. Jacobson, M. J., Rijmen, V. & Safavi-Naini, R. (eds.). 1st ed. Berlin Heidelberg: Springer, Vol. 5867. p. 141-156 467 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2008

Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography

Damgård, I. B., Knudsen, L. R. & Thomsen, S. S., 2008, Applied Cryptography and Network Security 2008: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings. Bellovin, S. M., Gennaro, R., Keromytis, A. & Yung, M. (eds.). Springer, p. 144-155 (Lecture Notes in Computer Science; No. 5037).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Proposals for Iterated Hash Functions

Knudsen, L. R. & Thomsen, S. S., 2008, E-Business and Telecommunication Networks: Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papers. Vol. 2. p. 107-118 (Communications in Computer and Information Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2007

Cryptanalysis of the CRUSH Hash Function

Knudsen, L. R. & Henricksen, M., 2007, Selected Areas in Cryptography: SAC 2007. Berlin: Springer Verlag, p. 74-83 (Lecture Notes in Computer Science; No. 4876).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Known-Key Distinguishers for Some Block Ciphers

Knudsen, L. R. & Rijmen, V., 2007, Advances in Cryptology: ASIACRYPT 2007. Berlin: Springer Verlag, p. 315-324 (Lecture Notes in Computer Science; No. 4833).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

PRESENT: An Ultra-Lightweight Block Cipher

Knudsen, L. R. & Vikkelsø, C. H., 2007, Cryptographic Hardware and Embedded Systems. Springer Verlag, p. 450-466 (Lecture Notes in Computer Science; No. 4727).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Small-Footprint Block Cipher Design - How far can you go?

Knudsen, L. R. & Vikkelsø, C. H., 2007, RFID Security 2007.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearch

The Grindahl Hash Functions

Knudsen, L. R., Rechberger, C. & Thomsen, S. S., 2007, Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers. Biryukov, A. (ed.). Springer, p. 39-57 (Lecture Notes in Computer Science; No. 4593).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2006

Proposals for iterated hash functions

Knudsen, L. R. & Thomsen, S. S., 2006, SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography. Setúbal, Portugal: INSTICC, p. 246-253

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2005

Preimage and Collision Attacks on MD2

Knudsen, L. R. & Mathiassen, J. E., 2005, Fast Software Encryption: Proceedings. Springer Verlag, Vol. 3557. p. 255-267 (Lecture Notes in Computer Science; No. 3557).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

SMASH - a cryptographic hash function

Knudsen, L. R., 2005, Fast Software Encryption: Proceedings. Springer Verlage, p. 228-242 (Lecture Notes in Computer Science; No. 3557).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Some Attacks Against a Double Length Hash Proposal

Knudsen, L. R. & Muller, F., 2005, Asiacrypt 2005: Proceedings. Springer Verlag, Vol. 3788. p. 462-473 (Lecture Notes in Computer Science; No. 3788).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

The Cryptanalysis of the AES - A Brief Survey

Knudsen, L. R., 2005, AES 2004. Springer Verlag, Vol. 3373. p. 1-10 (Lecture Notes in Computer Science; No. 3373).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearch

2004

On the Role of Key Schedules in Attacks on Iterated Ciphers

Knudsen, L. R., 2004, Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings: ESORICS. Knudsen, L. R. (ed.). Vol. Springer Lecture Notes in Computer Science, volume 3193. p. 322-334

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2003

Analysis of RMAC

Knudsen, L. R. & Kohno, T., 2003, Fast Software Encryption. 2887 ed. Berlin Heidelberg: Springer, p. 182-191 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2002

Integral cryptanalysis

Knudsen, L. R. & Wagner, D., 2002, Fast Software Encryption (Revised Papers): Proceedings. Springer Verlag, p. 112-127 (Lecture Notes in Computer Science, Vol. 2365).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review