dblp.uni-trier.dewww.uni-trier.de

Lars R. Knudsen Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
72EEJulia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz: Cryptanalysis of C2. CRYPTO 2009: 250-266
71EELars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen: Cryptanalysis of MDC-2. EUROCRYPT 2009: 106-120
70EEPraveen Gauravaram, Lars R. Knudsen: On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. EUROCRYPT 2009: 88-105
2008
69EEIvan Damgård, Lars R. Knudsen, Søren S. Thomsen: Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. ACNS 2008: 144-155
2007
68EELars R. Knudsen, Vincent Rijmen: Known-Key Distinguishers for Some Block Ciphers. ASIACRYPT 2007: 315-324
67EEAndrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe: PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007: 450-466
66EELars R. Knudsen, Christian Rechberger, Søren S. Thomsen: The Grindahl Hash Functions. FSE 2007: 39-57
65EEMatthew Henricksen, Lars R. Knudsen: Cryptanalysis of the CRUSH Hash Function. Selected Areas in Cryptography 2007: 74-83
2006
64 Lars R. Knudsen, Søren S. Thomsen: Proposals for Iterated Hash Functions. SECRYPT 2006: 246-253
2005
63EELars R. Knudsen, Frédéric Muller: Some Attacks Against a Double Length Hash Proposal. ASIACRYPT 2005: 462-473
62EELars R. Knudsen: SMASH - A Cryptographic Hash Function. FSE 2005: 228-242
61EELars R. Knudsen, John Erik Mathiassen: Preimage and Collision Attacks on MD2. FSE 2005: 255-267
60EELars R. Knudsen, Chris J. Mitchell: Partial Key Recovery Attack Against RMAC. J. Cryptology 18(4): 375-389 (2005)
2004
59EEHans Dobbertin, Lars R. Knudsen, Matthew J. B. Robshaw: The Cryptanalysis of the AES - A Brief Survey. AES Conference 2004: 1-10
58EELars R. Knudsen, John Erik Mathiassen: On the Role of Key Schedules in Attacks on Iterated Ciphers. ESORICS 2004: 322-334
2003
57EELars R. Knudsen, Tadayoshi Kohno: Analysis of RMAC. FSE 2003: 182-191
56EELars R. Knudsen, Chris J. Mitchell: Analysis of 3gpp-MAC and Two-key 3gpp-MAC. Discrete Applied Mathematics 128(1): 181-191 (2003)
2002
55 Lars R. Knudsen: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings Springer 2002
54EELars R. Knudsen, David Wagner: Integral Cryptanalysis. FSE 2002: 112-127
53 Lars R. Knudsen, Bart Preneel: Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Transactions on Information Theory 48(9): 2524-2539 (2002)
52EEEli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. J. Cryptology 15(1): 47-59 (2002)
51EELars R. Knudsen: The Security of Feistel Ciphers with Six Rounds or Less. J. Cryptology 15(3): 207-222 (2002)
2001
50EEMihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre: Online Ciphers and the Hash-CBC Construction. CRYPTO 2001: 292-309
49EEHelena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw: Analysis of SHA-1 in Encryption Mode. CT-RSA 2001: 70-83
48EEHåvard Raddum, Lars R. Knudsen: A Differential Attack on Reduced-Round SC2000. Selected Areas in Cryptography 2001: 190-198
47 Joan Daemen, Lars R. Knudsen, Vincent Rijmen: Linear Frameworks for Block Ciphers. Des. Codes Cryptography 22(1): 65-87 (2001)
46 Lars R. Knudsen, David Wagner: On the structure of Skipjack. Discrete Applied Mathematics 111(1-2): 103-116 (2001)
45EELars R. Knudsen, Chris J. Mitchell: An analysis of the 3gpp-MAC scheme. Electronic Notes in Discrete Mathematics 6: 346-355 (2001)
44EEThomas Jakobsen, Lars R. Knudsen: Attacks on Block Ciphers of Low Algebraic Degree. J. Cryptology 14(3): 197-210 (2001)
2000
43 Ross J. Anderson, Eli Biham, Lars R. Knudsen: The Case for Serpent. AES Candidate Conference 2000: 349-354
42EEDon Coppersmith, Lars R. Knudsen, Chris J. Mitchell: Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. CRYPTO 2000: 184-196
41EELars R. Knudsen, John Erik Mathiassen: A Chosen-Plaintext Linear Attack on DES. FSE 2000: 262-272
40EELars R. Knudsen, Willi Meier: Correlations in RC6 with a Reduced Number of Rounds. FSE 2000: 94-108
39EELars R. Knudsen: A Detailed Analysis of SAFER K. J. Cryptology 13(4): 417-436 (2000)
1999
38 Lars R. Knudsen: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings Springer 1999
37EELars R. Knudsen, Matthew J. B. Robshaw, David Wagner: Truncated Differentials and Skipjack. CRYPTO 1999: 165-180
36EELars R. Knudsen, Willi Meier: Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. EUROCRYPT 1999: 363-374
35EELars R. Knudsen, Vincent Rijmen: On the Decorrelated Fast Cipher (DFC) and Its Theory. FSE 1999: 81-94
34EELars R. Knudsen: Advanced Encryption Standard (AES) - An Update. IMA Int. Conf. 1999: 185
1998
33EELars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege: Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341
32 Ross J. Anderson, Eli Biham, Lars R. Knudsen: Serpent and Smartcards. CARDIS 1998: 246-253
31EEEli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. EUROCRYPT 1998: 100-111
30EELars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw: On the Design and Security of RC2. FSE 1998: 206-221
29EEEli Biham, Ross J. Anderson, Lars R. Knudsen: Serpent: A New Block Cipher Proposal. FSE 1998: 222-238
28EEBart Van Rompay, Lars R. Knudsen, Vincent Rijmen: Differential Cryptanalysis of the ICE Encryption Algorithm. FSE 1998: 270-283
27EELars R. Knudsen: Contemporary Block Ciphers. Lectures on Data Security 1998: 105-126
26EELars R. Knudsen, Xuejia Lai, Bart Preneel: Attacks on Fast Double Block Length Hash Functions. J. Cryptology 11(1): 59-72 (1998)
25EEIvan Damgård, Lars R. Knudsen: Two-Key Triple Encryption. J. Cryptology 11(3): 209-218 (1998)
24 Lars R. Knudsen, Keith M. Martin: In Search of Multiple Domain Key Recovery. Journal of Computer Security 6(4): 219-236 (1998)
1997
23EELars R. Knudsen, Bart Preneel: Fast and Secure Hashing Based on Codes. CRYPTO 1997: 485-498
22EEJohan Borst, Lars R. Knudsen, Vincent Rijmen: Two Attacks on Reduced IDEA. EUROCRYPT 1997: 1-13
21EEJoan Daemen, Lars R. Knudsen, Vincent Rijmen: The Block Cipher Square. FSE 1997: 149-165
20EEThomas Jakobsen, Lars R. Knudsen: The Interpolation Attack on Block Ciphers. FSE 1997: 28-40
19EELars R. Knudsen: Block Ciphers - A Survey. State of the Art in Applied Cryptography 1997: 18-48
1996
18EELars R. Knudsen, Bart Preneel: Hash Functions Based on Block Ciphers and Quaternary Codes. ASIACRYPT 1996: 77-90
17EELars R. Knudsen, Willi Meier: Improved Differential Attacks on RC5. CRYPTO 1996: 216-228
16EELars R. Knudsen, Matthew J. B. Robshaw: Non-Linear Approximations in Linear Cryptoanalysis. EUROCRYPT 1996: 224-236
15EELars R. Knudsen, Torben P. Pedersen: On the Difficulty of Software Key Escrow. EUROCRYPT 1996: 237-244
14 Lars R. Knudsen, Thomas A. Berson: Truncated Differentials of SAFER. FSE 1996: 15-26
1995
13EELars R. Knudsen: A Key-schedule Weakness in SAFER K-64. CRYPTO 1995: 274-286
12 Ivan Damgård, Lars R. Knudsen: Multiple Encryption with Minimum Key. Cryptography: Policy and Algorithms 1995: 156-164
11 Kaisa Nyberg, Lars R. Knudsen: Provable Security Against a Differential Attack. J. Cryptology 8(1): 27-37 (1995)
1994
10EELars R. Knudsen, Xuejia Lai: New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. EUROCRYPT 1994: 410-418
9EELars R. Knudsen: New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract). EUROCRYPT 1994: 419-424
8 Lars R. Knudsen: Truncated and Higher Order Differentials. FSE 1994: 196-211
1993
7EEIvan Damgård, Lars R. Knudsen: The Breaking of the AR Hash Function. EUROCRYPT 1993: 286-292
6 Xuejia Lai, Lars R. Knudsen: Attacks on Double Block Length Hash Functions. FSE 1993: 157-165
5 Lars R. Knudsen: Practically Secure Feistel Cyphers. FSE 1993: 211-221
1992
4 Lars R. Knudsen: Cryptanalysis of LOKI91. AUSCRYPT 1992: 196-208
3EELars R. Knudsen: Iterative Characteristics of DES and s²-DES. CRYPTO 1992: 497-511
2EEKaisa Nyberg, Lars R. Knudsen: Provable Security Against Differential Cryptanalysis. CRYPTO 1992: 566-574
1991
1EELars R. Knudsen: Cryptanalysis of LOKI. ASIACRYPT 1991: 22-35

Coauthor Index

1Ross J. Anderson [29] [32] [43]
2Mihir Bellare [50]
3Thomas A. Berson [14]
4Eli Biham [29] [31] [32] [43] [52]
5Andrey Bogdanov [67]
6Alexandra Boldyreva [50]
7Julia Borghoff [72]
8Johan Borst [22]
9Don Coppersmith [42]
10Joan Daemen [21] [47]
11Ivan Damgård [7] [12] [25] [69]
12Hans Dobbertin [59]
13Praveen Gauravaram [70]
14Helena Handschuh [49]
15Matthew Henricksen [65]
16Thomas Jakobsen [20] [44]
17Tadayoshi Kohno [57]
18Xuejia Lai [6] [10] [26]
19Gregor Leander [67] [72]
20Keith M. Martin [24]
21John Erik Mathiassen [41] [58] [61]
22Krystian Matusiewicz [72]
23Willi Meier [17] [33] [36] [40]
24Florian Mendel [71]
25Chris J. Mitchell [42] [45] [56] [60]
26Frédéric Muller [63]
27Chanathip Namprempre [50]
28Kaisa Nyberg [2] [11]
29Christof Paar [67]
30Torben P. Pedersen [15]
31Axel Poschmann [67]
32Bart Preneel [18] [23] [26] [33] [53]
33Håvard Raddum [48]
34Christian Rechberger [66] [71]
35Vincent Rijmen [21] [22] [28] [30] [33] [35] [47] [68]
36Ronald L. Rivest [30]
37Matthew J. B. Robshaw [16] [30] [37] [49] [59] [67]
38Bart Van Rompay [28]
39Yannick Seurin [67]
40Søren S. Thomsen [64] [66] [69] [71]
41Sven Verdoolaege [33]
42C. Vikkelsoe [67]
43David Wagner [37] [46] [54]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)