What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Lars R. Knudsen
Google Scholar
69
publications in security and cryptology related venues
Year
Venue
Title
2015
conf/fse
Security of the AES with a Secret S-Box.
Tyge Tiessen
Lars R. Knudsen
Stefan Kölbl
Martin M. Lauridsen
2013
journals/joc
Slender-Set Differential Cryptanalysis.
Julia Borghoff
Lars R. Knudsen
Gregor Leander
Søren S. Thomsen
2012
journals/joc
On-line Ciphers and the Hash-CBC Constructions.
Mihir Bellare
Alexandra Boldyreva
Lars R. Knudsen
Chanathip Namprempre
2012
journals/joc
Security Analysis of Randomize-Hash-then-Sign Digital Signatures.
Praveen Gauravaram
Lars R. Knudsen
2012
conf/eurocrypt
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Andrey Bogdanov
Lars R. Knudsen
Gregor Leander
François-Xavier Standaert
John P. Steinberger
Elmar Tischhauser
2012
conf/asiacrypt
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Julia Borghoff
Anne Canteaut
Tim Güneysu
Elif Bilge Kavun
Miroslav Knezevic
Lars R. Knudsen
Gregor Leander
Ventzislav Nikov
Christof Paar
Christian Rechberger
Peter Rombouts
Søren S. Thomsen
Tolga Yalçin
2011
conf/fse
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes.
Julia Borghoff
Lars R. Knudsen
Gregor Leander
Søren S. Thomsen
2011
conf/acisp
Improved Security Analysis of Fugue-256 (Poster).
Praveen Gauravaram
Lars R. Knudsen
Nasour Bagheri
Lei Wei
2010
journals/joc
Cryptanalysis of MD2.
Lars R. Knudsen
John Erik Mathiassen
Frédéric Muller
Søren S. Thomsen
2010
conf/acisp
Distinguishers for the Compression Function and Output Transformation of Hamsi-256.
Jean-Philippe Aumasson
Emilia Käsper
Lars R. Knudsen
Krystian Matusiewicz
Rune Steinsmo Ødegård
Thomas Peyrin
Martin Schläffer
2010
conf/ches
PRINTcipher: A Block Cipher for IC-Printing.
Lars R. Knudsen
Gregor Leander
Axel Poschmann
Matthew J. B. Robshaw
2010
conf/sacrypt
Hill Climbing Algorithms and Trivium.
Julia Borghoff
Lars R. Knudsen
Krystian Matusiewicz
2009
conf/crypto
Cryptanalysis of C2.
Julia Borghoff
Lars R. Knudsen
Gregor Leander
Krystian Matusiewicz
2009
conf/eurocrypt
Cryptanalysis of MDC-2.
Lars R. Knudsen
Florian Mendel
Christian Rechberger
Søren S. Thomsen
2009
conf/eurocrypt
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures.
Praveen Gauravaram
Lars R. Knudsen
2009
conf/sacrypt
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384.
Jian Guo
Krystian Matusiewicz
Lars R. Knudsen
San Ling
Huaxiong Wang
2008
conf/acns
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography.
Ivan Damgård
Lars R. Knudsen
Søren S. Thomsen
2007
conf/fse
The Grindahl Hash Functions.
Lars R. Knudsen
Christian Rechberger
Søren S. Thomsen
2007
conf/ches
PRESENT: An Ultra-Lightweight Block Cipher.
Andrey Bogdanov
Lars R. Knudsen
Gregor Leander
Christof Paar
Axel Poschmann
Matthew J. B. Robshaw
Yannick Seurin
C. Vikkelsoe
2007
conf/asiacrypt
Known-Key Distinguishers for Some Block Ciphers.
Lars R. Knudsen
Vincent Rijmen
2007
conf/sacrypt
Cryptanalysis of the CRUSH Hash Function.
Matthew Henricksen
Lars R. Knudsen
2005
journals/joc
Partial Key Recovery Attack Against RMAC.
Lars R. Knudsen
Chris J. Mitchell
2005
conf/fse
SMASH - A Cryptographic Hash Function.
Lars R. Knudsen
2005
conf/fse
Preimage and Collision Attacks on MD2.
Lars R. Knudsen
John Erik Mathiassen
2005
conf/asiacrypt
Some Attacks Against a Double Length Hash Proposal.
Lars R. Knudsen
Frédéric Muller
2004
conf/esorics
On the Role of Key Schedules in Attacks on Iterated Ciphers.
Lars R. Knudsen
John Erik Mathiassen
2003
conf/fse
Analysis of RMAC.
Lars R. Knudsen
Tadayoshi Kohno
2002
journals/joc
The Security of Feistel Ciphers with Six Rounds or Less.
Lars R. Knudsen
2002
journals/joc
Cryptanalysis of the ANSI X9.52 CBCM Mode.
Eli Biham
Lars R. Knudsen
2002
conf/fse
Integral Cryptanalysis.
Lars R. Knudsen
David A. Wagner
2001
journals/joc
Attacks on Block Ciphers of Low Algebraic Degree.
Thomas Jakobsen
Lars R. Knudsen
2001
conf/crypto
Online Ciphers and the Hash-CBC Construction.
Mihir Bellare
Alexandra Boldyreva
Lars R. Knudsen
Chanathip Namprempre
2001
conf/ctrsa
Analysis of SHA-1 in Encryption Mode.
Helena Handschuh
Lars R. Knudsen
Matthew J. B. Robshaw
2001
conf/sacrypt
A Differential Attack on Reduced-Round SC2000.
Håvard Raddum
Lars R. Knudsen
2000
journals/joc
A Detailed Analysis of SAFER K.
Lars R. Knudsen
2000
conf/fse
Correlations in RC6 with a Reduced Number of Rounds.
Lars R. Knudsen
Willi Meier
2000
conf/fse
A Chosen-Plaintext Linear Attack on DES.
Lars R. Knudsen
John Erik Mathiassen
2000
conf/crypto
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm.
Don Coppersmith
Lars R. Knudsen
Chris J. Mitchell
1999
conf/fse
On the Decorrelated Fast Cipher (DFC) and Its Theory.
Lars R. Knudsen
Vincent Rijmen
1999
conf/crypto
Truncated Differentials and Skipjack.
Lars R. Knudsen
Matthew J. B. Robshaw
David A. Wagner
1999
conf/eurocrypt
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem.
Lars R. Knudsen
Willi Meier
1998
journals/joc
Attacks on Fast Double Block Length Hash Functions.
Lars R. Knudsen
Xuejia Lai
Bart Preneel
1998
journals/joc
Two-Key Triple Encryption.
Ivan Damgård
Lars R. Knudsen
1998
conf/fse
Serpent: A New Block Cipher Proposal.
Eli Biham
Ross J. Anderson
Lars R. Knudsen
1998
conf/fse
Differential Cryptanalysis of the ICE Encryption Algorithm.
Bart Van Rompay
Lars R. Knudsen
Vincent Rijmen
1998
conf/fse
On the Design and Security of RC2.
Lars R. Knudsen
Vincent Rijmen
Ronald L. Rivest
Matthew J. B. Robshaw
1998
conf/eurocrypt
Cryptanalysis of the ANSI X9.52 CBCM Mode.
Eli Biham
Lars R. Knudsen
1998
conf/asiacrypt
Analysis Methods for (Alleged) RC4.
Lars R. Knudsen
Willi Meier
Bart Preneel
Vincent Rijmen
Sven Verdoolaege
1997
conf/fse
The Interpolation Attack on Block Ciphers.
Thomas Jakobsen
Lars R. Knudsen
1997
conf/fse
The Block Cipher Square.
Joan Daemen
Lars R. Knudsen
Vincent Rijmen
1997
conf/crypto
Fast and Secure Hashing Based on Codes.
Lars R. Knudsen
Bart Preneel
1997
conf/eurocrypt
Two Attacks on Reduced IDEA.
Johan Borst
Lars R. Knudsen
Vincent Rijmen
1996
conf/fse
Truncated Differentials of SAFER.
Lars R. Knudsen
Thomas A. Berson
1996
conf/crypto
Improved Differential Attacks on RC5.
Lars R. Knudsen
Willi Meier
1996
conf/eurocrypt
Non-Linear Approximations in Linear Cryptanalysis.
Lars R. Knudsen
Matthew J. B. Robshaw
1996
conf/eurocrypt
On the Difficulty of Software Key Escrow.
Lars R. Knudsen
Torben P. Pedersen
1996
conf/asiacrypt
Hash Functions Based on Block Ciphers and Quaternary Codes.
Lars R. Knudsen
Bart Preneel
1995
journals/joc
Provable Security Against a Differential Attack.
Kaisa Nyberg
Lars R. Knudsen
1995
conf/crypto
A Key-schedule Weakness in SAFER K-64.
Lars R. Knudsen
1994
conf/fse
Truncated and Higher Order Differentials.
Lars R. Knudsen
1994
conf/eurocrypt
New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract).
Lars R. Knudsen
1994
conf/eurocrypt
New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM.
Lars R. Knudsen
Xuejia Lai
1993
conf/fse
Attacks on Double Block Length Hash Functions.
Xuejia Lai
Lars R. Knudsen
1993
conf/fse
Practically Secure Feistel Cyphers.
Lars R. Knudsen
1993
conf/eurocrypt
The Breaking of the AR Hash Function.
Ivan Damgård
Lars R. Knudsen
1992
conf/crypto
Provable Security Against Differential Cryptanalysis.
Kaisa Nyberg
Lars R. Knudsen
1992
conf/crypto
Iterative Characteristics of DES and s²-DES.
Lars R. Knudsen
1992
conf/asiacrypt
Cryptanalysis of LOKI91.
Lars R. Knudsen
1991
conf/asiacrypt
Cryptanalysis of LOKI.
Lars R. Knudsen
Coauthors
Alexandra Boldyreva
(2)
Andrey Bogdanov
(2)
Anne Canteaut
(1)
Axel Poschmann
(2)
Bart Preneel
(4)
Bart Van Rompay
(1)
C. Vikkelsoe
(1)
Chanathip Namprempre
(2)
Chris J. Mitchell
(2)
Christian Rechberger
(3)
Christof Paar
(2)
David A. Wagner
(2)
Don Coppersmith
(1)
Eli Biham
(3)
Elif Bilge Kavun
(1)
Elmar Tischhauser
(1)
Emilia Käsper
(1)
Florian Mendel
(1)
François-Xavier Standaert
(1)
Frédéric Muller
(2)
Gregor Leander
(7)
Håvard Raddum
(1)
Helena Handschuh
(1)
Huaxiong Wang
(1)
Ivan Damgård
(3)
Jean-Philippe Aumasson
(1)
Jian Guo
(1)
Joan Daemen
(1)
Johan Borst
(1)
John Erik Mathiassen
(4)
John P. Steinberger
(1)
Julia Borghoff
(5)
Kaisa Nyberg
(2)
Krystian Matusiewicz
(4)
Lars R. Knudsen
(69)
Lei Wei
(1)
Martin M. Lauridsen
(1)
Martin Schläffer
(1)
Matthew Henricksen
(1)
Matthew J. B. Robshaw
(6)
Mihir Bellare
(2)
Miroslav Knezevic
(1)
Nasour Bagheri
(1)
Peter Rombouts
(1)
Praveen Gauravaram
(3)
Ronald L. Rivest
(1)
Ross J. Anderson
(1)
Rune Steinsmo Ødegård
(1)
San Ling
(1)
Stefan Kölbl
(1)
Sven Verdoolaege
(1)
Søren S. Thomsen
(7)
Tadayoshi Kohno
(1)
Thomas A. Berson
(1)
Thomas Jakobsen
(2)
Thomas Peyrin
(1)
Tim Güneysu
(1)
Tolga Yalçin
(1)
Torben P. Pedersen
(1)
Tyge Tiessen
(1)
Ventzislav Nikov
(1)
Vincent Rijmen
(7)
Willi Meier
(4)
Xuejia Lai
(3)
Yannick Seurin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to