Lars R. Knudsen
Orcid: 0000-0003-3057-9327Affiliations:
- Technical University of Denmark
According to our database1,
Lars R. Knudsen
authored at least 110 papers
between 1991 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
On csauthors.net:
Bibliography
2020
On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
2017
2016
Des. Codes Cryptogr., 2016
2015
2014
2013
2012
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis.
Int. J. Inf. Sec., 2012
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).
IACR Cryptol. ePrint Arch., 2012
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations.
IACR Cryptol. ePrint Arch., 2012
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Encyclopedia of Information Assurance, 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Information Security and Cryptography, Springer, ISBN: 978-3-642-17341-7, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
IET Inf. Secur., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the E-Business and Telecommunication Networks, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Computer Security, 2004
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004
2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
2002
Construction of secure and fast hash functions using nonbinary error-correcting codes.
IEEE Trans. Inf. Theory, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
2001
Linear Frameworks for Block Ciphers.
Des. Codes Cryptogr., 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Advances in Cryptology, 2000
The Case for Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1999
Proceedings of the Cryptography and Coding, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the State of the Art in Applied Cryptography, 1997
1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM.
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Fast Software Encryption, 1993
Proceedings of the Fast Software Encryption, 1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991