2009 | ||
---|---|---|
71 | EE | Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen: Cryptanalysis of MDC-2. EUROCRYPT 2009: 106-120 |
70 | EE | Praveen Gauravaram, Lars R. Knudsen: On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. EUROCRYPT 2009: 88-105 |
2008 | ||
69 | EE | Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen: Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. ACNS 2008: 144-155 |
2007 | ||
68 | EE | Lars R. Knudsen, Vincent Rijmen: Known-Key Distinguishers for Some Block Ciphers. ASIACRYPT 2007: 315-324 |
67 | EE | Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe: PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007: 450-466 |
66 | EE | Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen: The Grindahl Hash Functions. FSE 2007: 39-57 |
65 | EE | Matthew Henricksen, Lars R. Knudsen: Cryptanalysis of the CRUSH Hash Function. Selected Areas in Cryptography 2007: 74-83 |
2006 | ||
64 | Lars R. Knudsen, Søren S. Thomsen: Proposals for Iterated Hash Functions. SECRYPT 2006: 246-253 | |
2005 | ||
63 | EE | Lars R. Knudsen, Frédéric Muller: Some Attacks Against a Double Length Hash Proposal. ASIACRYPT 2005: 462-473 |
62 | EE | Lars R. Knudsen: SMASH - A Cryptographic Hash Function. FSE 2005: 228-242 |
61 | EE | Lars R. Knudsen, John Erik Mathiassen: Preimage and Collision Attacks on MD2. FSE 2005: 255-267 |
60 | EE | Lars R. Knudsen, Chris J. Mitchell: Partial Key Recovery Attack Against RMAC. J. Cryptology 18(4): 375-389 (2005) |
2004 | ||
59 | EE | Hans Dobbertin, Lars R. Knudsen, Matthew J. B. Robshaw: The Cryptanalysis of the AES - A Brief Survey. AES Conference 2004: 1-10 |
58 | EE | Lars R. Knudsen, John Erik Mathiassen: On the Role of Key Schedules in Attacks on Iterated Ciphers. ESORICS 2004: 322-334 |
2003 | ||
57 | EE | Lars R. Knudsen, Tadayoshi Kohno: Analysis of RMAC. FSE 2003: 182-191 |
56 | EE | Lars R. Knudsen, Chris J. Mitchell: Analysis of 3gpp-MAC and Two-key 3gpp-MAC. Discrete Applied Mathematics 128(1): 181-191 (2003) |
2002 | ||
55 | Lars R. Knudsen: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings Springer 2002 | |
54 | EE | Lars R. Knudsen, David Wagner: Integral Cryptanalysis. FSE 2002: 112-127 |
53 | Lars R. Knudsen, Bart Preneel: Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Transactions on Information Theory 48(9): 2524-2539 (2002) | |
52 | EE | Eli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. J. Cryptology 15(1): 47-59 (2002) |
51 | EE | Lars R. Knudsen: The Security of Feistel Ciphers with Six Rounds or Less. J. Cryptology 15(3): 207-222 (2002) |
2001 | ||
50 | EE | Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre: Online Ciphers and the Hash-CBC Construction. CRYPTO 2001: 292-309 |
49 | EE | Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw: Analysis of SHA-1 in Encryption Mode. CT-RSA 2001: 70-83 |
48 | EE | Håvard Raddum, Lars R. Knudsen: A Differential Attack on Reduced-Round SC2000. Selected Areas in Cryptography 2001: 190-198 |
47 | Joan Daemen, Lars R. Knudsen, Vincent Rijmen: Linear Frameworks for Block Ciphers. Des. Codes Cryptography 22(1): 65-87 (2001) | |
46 | Lars R. Knudsen, David Wagner: On the structure of Skipjack. Discrete Applied Mathematics 111(1-2): 103-116 (2001) | |
45 | EE | Lars R. Knudsen, Chris J. Mitchell: An analysis of the 3gpp-MAC scheme. Electronic Notes in Discrete Mathematics 6: 346-355 (2001) |
44 | EE | Thomas Jakobsen, Lars R. Knudsen: Attacks on Block Ciphers of Low Algebraic Degree. J. Cryptology 14(3): 197-210 (2001) |
2000 | ||
43 | Ross J. Anderson, Eli Biham, Lars R. Knudsen: The Case for Serpent. AES Candidate Conference 2000: 349-354 | |
42 | EE | Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell: Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. CRYPTO 2000: 184-196 |
41 | EE | Lars R. Knudsen, John Erik Mathiassen: A Chosen-Plaintext Linear Attack on DES. FSE 2000: 262-272 |
40 | EE | Lars R. Knudsen, Willi Meier: Correlations in RC6 with a Reduced Number of Rounds. FSE 2000: 94-108 |
39 | EE | Lars R. Knudsen: A Detailed Analysis of SAFER K. J. Cryptology 13(4): 417-436 (2000) |
1999 | ||
38 | Lars R. Knudsen: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings Springer 1999 | |
37 | EE | Lars R. Knudsen, Matthew J. B. Robshaw, David Wagner: Truncated Differentials and Skipjack. CRYPTO 1999: 165-180 |
36 | EE | Lars R. Knudsen, Willi Meier: Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. EUROCRYPT 1999: 363-374 |
35 | EE | Lars R. Knudsen, Vincent Rijmen: On the Decorrelated Fast Cipher (DFC) and Its Theory. FSE 1999: 81-94 |
34 | EE | Lars R. Knudsen: Advanced Encryption Standard (AES) - An Update. IMA Int. Conf. 1999: 185 |
1998 | ||
33 | EE | Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege: Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341 |
32 | Ross J. Anderson, Eli Biham, Lars R. Knudsen: Serpent and Smartcards. CARDIS 1998: 246-253 | |
31 | EE | Eli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. EUROCRYPT 1998: 100-111 |
30 | EE | Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw: On the Design and Security of RC2. FSE 1998: 206-221 |
29 | EE | Eli Biham, Ross J. Anderson, Lars R. Knudsen: Serpent: A New Block Cipher Proposal. FSE 1998: 222-238 |
28 | EE | Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen: Differential Cryptanalysis of the ICE Encryption Algorithm. FSE 1998: 270-283 |
27 | EE | Lars R. Knudsen: Contemporary Block Ciphers. Lectures on Data Security 1998: 105-126 |
26 | EE | Lars R. Knudsen, Xuejia Lai, Bart Preneel: Attacks on Fast Double Block Length Hash Functions. J. Cryptology 11(1): 59-72 (1998) |
25 | EE | Ivan Damgård, Lars R. Knudsen: Two-Key Triple Encryption. J. Cryptology 11(3): 209-218 (1998) |
24 | Lars R. Knudsen, Keith M. Martin: In Search of Multiple Domain Key Recovery. Journal of Computer Security 6(4): 219-236 (1998) | |
1997 | ||
23 | EE | Lars R. Knudsen, Bart Preneel: Fast and Secure Hashing Based on Codes. CRYPTO 1997: 485-498 |
22 | EE | Johan Borst, Lars R. Knudsen, Vincent Rijmen: Two Attacks on Reduced IDEA. EUROCRYPT 1997: 1-13 |
21 | EE | Joan Daemen, Lars R. Knudsen, Vincent Rijmen: The Block Cipher Square. FSE 1997: 149-165 |
20 | EE | Thomas Jakobsen, Lars R. Knudsen: The Interpolation Attack on Block Ciphers. FSE 1997: 28-40 |
19 | EE | Lars R. Knudsen: Block Ciphers - A Survey. State of the Art in Applied Cryptography 1997: 18-48 |
1996 | ||
18 | Lars R. Knudsen, Bart Preneel: Hash Functions Based on Block Ciphers and Quaternary Codes. ASIACRYPT 1996: 77-90 | |
17 | EE | Lars R. Knudsen, Willi Meier: Improved Differential Attacks on RC5. CRYPTO 1996: 216-228 |
16 | EE | Lars R. Knudsen, Matthew J. B. Robshaw: Non-Linear Approximations in Linear Cryptoanalysis. EUROCRYPT 1996: 224-236 |
15 | EE | Lars R. Knudsen, Torben P. Pedersen: On the Difficulty of Software Key Escrow. EUROCRYPT 1996: 237-244 |
14 | Lars R. Knudsen, Thomas A. Berson: Truncated Differentials of SAFER. FSE 1996: 15-26 | |
1995 | ||
13 | EE | Lars R. Knudsen: A Key-schedule Weakness in SAFER K-64. CRYPTO 1995: 274-286 |
12 | Ivan Damgård, Lars R. Knudsen: Multiple Encryption with Minimum Key. Cryptography: Policy and Algorithms 1995: 156-164 | |
11 | Kaisa Nyberg, Lars R. Knudsen: Provable Security Against a Differential Attack. J. Cryptology 8(1): 27-37 (1995) | |
1994 | ||
10 | EE | Lars R. Knudsen, Xuejia Lai: New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. EUROCRYPT 1994: 410-418 |
9 | EE | Lars R. Knudsen: New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract). EUROCRYPT 1994: 419-424 |
8 | Lars R. Knudsen: Truncated and Higher Order Differentials. FSE 1994: 196-211 | |
1993 | ||
7 | EE | Ivan Damgård, Lars R. Knudsen: The Breaking of the AR Hash Function. EUROCRYPT 1993: 286-292 |
6 | Xuejia Lai, Lars R. Knudsen: Attacks on Double Block Length Hash Functions. FSE 1993: 157-165 | |
5 | Lars R. Knudsen: Practically Secure Feistel Cyphers. FSE 1993: 211-221 | |
1992 | ||
4 | Lars R. Knudsen: Cryptanalysis of LOKI91. AUSCRYPT 1992: 196-208 | |
3 | EE | Lars R. Knudsen: Iterative Characteristics of DES and s²-DES. CRYPTO 1992: 497-511 |
2 | EE | Kaisa Nyberg, Lars R. Knudsen: Provable Security Against Differential Cryptanalysis. CRYPTO 1992: 566-574 |
1991 | ||
1 | Lars R. Knudsen: Cryptanalysis of LOKI. ASIACRYPT 1991: 22-35 |