2009 |
71 | EE | Lars R. Knudsen,
Florian Mendel,
Christian Rechberger,
Søren S. Thomsen:
Cryptanalysis of MDC-2.
EUROCRYPT 2009: 106-120 |
70 | EE | Praveen Gauravaram,
Lars R. Knudsen:
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures.
EUROCRYPT 2009: 88-105 |
2008 |
69 | EE | Ivan Damgård,
Lars R. Knudsen,
Søren S. Thomsen:
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography.
ACNS 2008: 144-155 |
2007 |
68 | EE | Lars R. Knudsen,
Vincent Rijmen:
Known-Key Distinguishers for Some Block Ciphers.
ASIACRYPT 2007: 315-324 |
67 | EE | Andrey Bogdanov,
Lars R. Knudsen,
Gregor Leander,
Christof Paar,
Axel Poschmann,
Matthew J. B. Robshaw,
Yannick Seurin,
C. Vikkelsoe:
PRESENT: An Ultra-Lightweight Block Cipher.
CHES 2007: 450-466 |
66 | EE | Lars R. Knudsen,
Christian Rechberger,
Søren S. Thomsen:
The Grindahl Hash Functions.
FSE 2007: 39-57 |
65 | EE | Matthew Henricksen,
Lars R. Knudsen:
Cryptanalysis of the CRUSH Hash Function.
Selected Areas in Cryptography 2007: 74-83 |
2006 |
64 | | Lars R. Knudsen,
Søren S. Thomsen:
Proposals for Iterated Hash Functions.
SECRYPT 2006: 246-253 |
2005 |
63 | EE | Lars R. Knudsen,
Frédéric Muller:
Some Attacks Against a Double Length Hash Proposal.
ASIACRYPT 2005: 462-473 |
62 | EE | Lars R. Knudsen:
SMASH - A Cryptographic Hash Function.
FSE 2005: 228-242 |
61 | EE | Lars R. Knudsen,
John Erik Mathiassen:
Preimage and Collision Attacks on MD2.
FSE 2005: 255-267 |
60 | EE | Lars R. Knudsen,
Chris J. Mitchell:
Partial Key Recovery Attack Against RMAC.
J. Cryptology 18(4): 375-389 (2005) |
2004 |
59 | EE | Hans Dobbertin,
Lars R. Knudsen,
Matthew J. B. Robshaw:
The Cryptanalysis of the AES - A Brief Survey.
AES Conference 2004: 1-10 |
58 | EE | Lars R. Knudsen,
John Erik Mathiassen:
On the Role of Key Schedules in Attacks on Iterated Ciphers.
ESORICS 2004: 322-334 |
2003 |
57 | EE | Lars R. Knudsen,
Tadayoshi Kohno:
Analysis of RMAC.
FSE 2003: 182-191 |
56 | EE | Lars R. Knudsen,
Chris J. Mitchell:
Analysis of 3gpp-MAC and Two-key 3gpp-MAC.
Discrete Applied Mathematics 128(1): 181-191 (2003) |
2002 |
55 | | Lars R. Knudsen:
Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings
Springer 2002 |
54 | EE | Lars R. Knudsen,
David Wagner:
Integral Cryptanalysis.
FSE 2002: 112-127 |
53 | | Lars R. Knudsen,
Bart Preneel:
Construction of secure and fast hash functions using nonbinary error-correcting codes.
IEEE Transactions on Information Theory 48(9): 2524-2539 (2002) |
52 | EE | Eli Biham,
Lars R. Knudsen:
Cryptanalysis of the ANSI X9.52 CBCM Mode.
J. Cryptology 15(1): 47-59 (2002) |
51 | EE | Lars R. Knudsen:
The Security of Feistel Ciphers with Six Rounds or Less.
J. Cryptology 15(3): 207-222 (2002) |
2001 |
50 | EE | Mihir Bellare,
Alexandra Boldyreva,
Lars R. Knudsen,
Chanathip Namprempre:
Online Ciphers and the Hash-CBC Construction.
CRYPTO 2001: 292-309 |
49 | EE | Helena Handschuh,
Lars R. Knudsen,
Matthew J. B. Robshaw:
Analysis of SHA-1 in Encryption Mode.
CT-RSA 2001: 70-83 |
48 | EE | Håvard Raddum,
Lars R. Knudsen:
A Differential Attack on Reduced-Round SC2000.
Selected Areas in Cryptography 2001: 190-198 |
47 | | Joan Daemen,
Lars R. Knudsen,
Vincent Rijmen:
Linear Frameworks for Block Ciphers.
Des. Codes Cryptography 22(1): 65-87 (2001) |
46 | | Lars R. Knudsen,
David Wagner:
On the structure of Skipjack.
Discrete Applied Mathematics 111(1-2): 103-116 (2001) |
45 | EE | Lars R. Knudsen,
Chris J. Mitchell:
An analysis of the 3gpp-MAC scheme.
Electronic Notes in Discrete Mathematics 6: 346-355 (2001) |
44 | EE | Thomas Jakobsen,
Lars R. Knudsen:
Attacks on Block Ciphers of Low Algebraic Degree.
J. Cryptology 14(3): 197-210 (2001) |
2000 |
43 | | Ross J. Anderson,
Eli Biham,
Lars R. Knudsen:
The Case for Serpent.
AES Candidate Conference 2000: 349-354 |
42 | EE | Don Coppersmith,
Lars R. Knudsen,
Chris J. Mitchell:
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm.
CRYPTO 2000: 184-196 |
41 | EE | Lars R. Knudsen,
John Erik Mathiassen:
A Chosen-Plaintext Linear Attack on DES.
FSE 2000: 262-272 |
40 | EE | Lars R. Knudsen,
Willi Meier:
Correlations in RC6 with a Reduced Number of Rounds.
FSE 2000: 94-108 |
39 | EE | Lars R. Knudsen:
A Detailed Analysis of SAFER K.
J. Cryptology 13(4): 417-436 (2000) |
1999 |
38 | | Lars R. Knudsen:
Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings
Springer 1999 |
37 | EE | Lars R. Knudsen,
Matthew J. B. Robshaw,
David Wagner:
Truncated Differentials and Skipjack.
CRYPTO 1999: 165-180 |
36 | EE | Lars R. Knudsen,
Willi Meier:
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem.
EUROCRYPT 1999: 363-374 |
35 | EE | Lars R. Knudsen,
Vincent Rijmen:
On the Decorrelated Fast Cipher (DFC) and Its Theory.
FSE 1999: 81-94 |
34 | EE | Lars R. Knudsen:
Advanced Encryption Standard (AES) - An Update.
IMA Int. Conf. 1999: 185 |
1998 |
33 | EE | Lars R. Knudsen,
Willi Meier,
Bart Preneel,
Vincent Rijmen,
Sven Verdoolaege:
Analysis Methods for (Alleged) RC4.
ASIACRYPT 1998: 327-341 |
32 | | Ross J. Anderson,
Eli Biham,
Lars R. Knudsen:
Serpent and Smartcards.
CARDIS 1998: 246-253 |
31 | EE | Eli Biham,
Lars R. Knudsen:
Cryptanalysis of the ANSI X9.52 CBCM Mode.
EUROCRYPT 1998: 100-111 |
30 | EE | Lars R. Knudsen,
Vincent Rijmen,
Ronald L. Rivest,
Matthew J. B. Robshaw:
On the Design and Security of RC2.
FSE 1998: 206-221 |
29 | EE | Eli Biham,
Ross J. Anderson,
Lars R. Knudsen:
Serpent: A New Block Cipher Proposal.
FSE 1998: 222-238 |
28 | EE | Bart Van Rompay,
Lars R. Knudsen,
Vincent Rijmen:
Differential Cryptanalysis of the ICE Encryption Algorithm.
FSE 1998: 270-283 |
27 | EE | Lars R. Knudsen:
Contemporary Block Ciphers.
Lectures on Data Security 1998: 105-126 |
26 | EE | Lars R. Knudsen,
Xuejia Lai,
Bart Preneel:
Attacks on Fast Double Block Length Hash Functions.
J. Cryptology 11(1): 59-72 (1998) |
25 | EE | Ivan Damgård,
Lars R. Knudsen:
Two-Key Triple Encryption.
J. Cryptology 11(3): 209-218 (1998) |
24 | | Lars R. Knudsen,
Keith M. Martin:
In Search of Multiple Domain Key Recovery.
Journal of Computer Security 6(4): 219-236 (1998) |
1997 |
23 | EE | Lars R. Knudsen,
Bart Preneel:
Fast and Secure Hashing Based on Codes.
CRYPTO 1997: 485-498 |
22 | EE | Johan Borst,
Lars R. Knudsen,
Vincent Rijmen:
Two Attacks on Reduced IDEA.
EUROCRYPT 1997: 1-13 |
21 | EE | Joan Daemen,
Lars R. Knudsen,
Vincent Rijmen:
The Block Cipher Square.
FSE 1997: 149-165 |
20 | EE | Thomas Jakobsen,
Lars R. Knudsen:
The Interpolation Attack on Block Ciphers.
FSE 1997: 28-40 |
19 | EE | Lars R. Knudsen:
Block Ciphers - A Survey.
State of the Art in Applied Cryptography 1997: 18-48 |
1996 |
18 | | Lars R. Knudsen,
Bart Preneel:
Hash Functions Based on Block Ciphers and Quaternary Codes.
ASIACRYPT 1996: 77-90 |
17 | EE | Lars R. Knudsen,
Willi Meier:
Improved Differential Attacks on RC5.
CRYPTO 1996: 216-228 |
16 | EE | Lars R. Knudsen,
Matthew J. B. Robshaw:
Non-Linear Approximations in Linear Cryptoanalysis.
EUROCRYPT 1996: 224-236 |
15 | EE | Lars R. Knudsen,
Torben P. Pedersen:
On the Difficulty of Software Key Escrow.
EUROCRYPT 1996: 237-244 |
14 | | Lars R. Knudsen,
Thomas A. Berson:
Truncated Differentials of SAFER.
FSE 1996: 15-26 |
1995 |
13 | EE | Lars R. Knudsen:
A Key-schedule Weakness in SAFER K-64.
CRYPTO 1995: 274-286 |
12 | | Ivan Damgård,
Lars R. Knudsen:
Multiple Encryption with Minimum Key.
Cryptography: Policy and Algorithms 1995: 156-164 |
11 | | Kaisa Nyberg,
Lars R. Knudsen:
Provable Security Against a Differential Attack.
J. Cryptology 8(1): 27-37 (1995) |
1994 |
10 | EE | Lars R. Knudsen,
Xuejia Lai:
New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM.
EUROCRYPT 1994: 410-418 |
9 | EE | Lars R. Knudsen:
New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract).
EUROCRYPT 1994: 419-424 |
8 | | Lars R. Knudsen:
Truncated and Higher Order Differentials.
FSE 1994: 196-211 |
1993 |
7 | EE | Ivan Damgård,
Lars R. Knudsen:
The Breaking of the AR Hash Function.
EUROCRYPT 1993: 286-292 |
6 | | Xuejia Lai,
Lars R. Knudsen:
Attacks on Double Block Length Hash Functions.
FSE 1993: 157-165 |
5 | | Lars R. Knudsen:
Practically Secure Feistel Cyphers.
FSE 1993: 211-221 |
1992 |
4 | | Lars R. Knudsen:
Cryptanalysis of LOKI91.
AUSCRYPT 1992: 196-208 |
3 | EE | Lars R. Knudsen:
Iterative Characteristics of DES and s²-DES.
CRYPTO 1992: 497-511 |
2 | EE | Kaisa Nyberg,
Lars R. Knudsen:
Provable Security Against Differential Cryptanalysis.
CRYPTO 1992: 566-574 |
1991 |
1 | | Lars R. Knudsen:
Cryptanalysis of LOKI.
ASIACRYPT 1991: 22-35 |