No photo of Lars Ramkilde Knudsen
  • Phone45253048, 45881399, 51801510
  • Emaillrkn@dtu.dk
  • Website
  • Richard Petersens Plads, 322, 228

    2800 Kgs. Lyngby

    Denmark

20022023
If you made any changes in Pure these will be visible here soon.

Research Output 2002 2017

Filter
Journal article
2017
124 Downloads (Pure)

Reflection ciphers

Boura, C., Canteaut, A., Knudsen, L. R. & Leander, G., 2017, In : Designs, Codes and Cryptography. 82, p. 3-25

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
2016

Building indifferentiable compression functions from the PGV compression functions

Gauravaram, P., Bagheri, N. & Knudsen, L. R., 2016, In : Designs, Codes and Cryptography. 78, 2, p. 547-581 35 p.

Research output: Contribution to journalJournal articleResearchpeer-review

2013

Slender-Set Differential Cryptanalysis

Borghoff, J., Knudsen, L. R., Leander, G. & Thomsen, S. S., 2013, In : Journal of Cryptology. 26, 1, p. 11-38

Research output: Contribution to journalJournal articleResearchpeer-review

2012

On-line Ciphers and the Hash-CBC Constructions

Bellare, M., Boldyreva, A., Knudsen, L. R. & Namprempre, C., 2012, In : Journal of Cryptology. 25, 4, p. 640-679

Research output: Contribution to journalJournal articleResearchpeer-review

Security Analysis of Randomize-Hash-then-Sign Digital Signatures

Gauravaram, P. & Knudsen, L. R., 2012, In : Journal of Cryptology. 25, 4, p. 748-779

Research output: Contribution to journalJournal articleResearchpeer-review

368 Downloads (Pure)

The suffix-free-prefix-free hash function construction and its indifferentiability security analysis

Bagheri, N., Gauravaram, P., Knudsen, L. R. & Zenner, E., 2012, In : International Journal of Information Security. 11, 6, p. 419-434

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
2010

Counting equations in algebraic attacks on block ciphers

Knudsen, L. R. & Miolane, C. V., 2010, In : International Journal of Information Security. 9, 2, p. 127-135

Research output: Contribution to journalJournal articleResearchpeer-review

Cryptanalysis of MD2

Knudsen, L. R., Mathiassen, J. E., Muller, F. & Thomsen, S. S., 2010, In : Journal of Cryptology. 23, 1, p. 72-90

Research output: Contribution to journalJournal articleResearchpeer-review

On hash functions using checksums

Gauravaram, P., Kelsey, J., Knudsen, L. R. & Thomsen, S. S., 2010, In : International Journal of Information Security. 9, 2, p. 137-151

Research output: Contribution to journalJournal articleResearchpeer-review

2009

Cryptanalysis of an Iterated Halving-based hash function: CRUSH

Bagheri, N., Henricksen, M., Knudsen, L. R., Naderi, M. & Sadeghyian, B., 2009, In : I E T Information Security. 3, 4, p. 129-138

Research output: Contribution to journalJournal articleResearchpeer-review

2006

Small size hashes with enhanced security

Knudsen, L. R., 2006, In : International Journal of Network Security. 2, 1, p. 41-42

Research output: Contribution to journalJournal articleResearchpeer-review

2005

Partial key recovery attack against RMAC

Knudsen, L. R. & Mitchell, C., 2005, In : Journal of Cryptology. 18, 4, p. 375-389

Research output: Contribution to journalJournal articleResearchpeer-review

2003

Analysis of 3gpp-MAC and two-key 3gpp-MAC

Knudsen, L. R. & Mitchell, C. J., 2003, In : Discrete Applied Mathematics. 128, 1, p. 181-191

Research output: Contribution to journalJournal articleResearchpeer-review

Distinguishing attack on five-round Feistel networks

Knudsen, L. R. & Raddum, H., 2003, In : ELECTRON LETT. 39, 16, p. 1175-1177

Research output: Contribution to journalJournal articleResearchpeer-review

Jeg har “knækket” en kode

Knudsen, L. R., 2003, In : Matilde. 18, p. 18-20

Research output: Contribution to journalJournal articleCommunication

2002
306 Downloads (Pure)

Construction of secure and fast hash functions using nonbinary error-correcting codes

Knudsen, L. R. & Preneel, B., 2002, In : I E E E Transactions on Information Theory. 48, 9, p. 2524-2539

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Cryptanalysis of ANSI X9.52 CBCM mode

Knudsen, L. R. & Biham, E., 2002, In : Journal of Cryptology. 15, 1, p. 47-59

Research output: Contribution to journalJournal articleResearchpeer-review

The Security of Feistel Ciphers with Six Rounds or Less

Knudsen, L. R., 2002, In : Journal of Cryptology. 15, 3, p. 207-222

Research output: Contribution to journalJournal articleResearchpeer-review