Lars Ramkilde Knudsen


Ontology type: schema:Person     


Person Info

NAME

Lars Ramkilde

SURNAME

Knudsen

Publications in SciGraph latest 50 shown

  • 2020-11-13 A quantum distinguisher for 7/8-round SMS4 block cipher in QUANTUM INFORMATION PROCESSING
  • 2015-11-09 Reflection ciphers in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-08-12 Security of the AES with a Secret S-Box in FAST SOFTWARE ENCRYPTION
  • 2014-11-09 Building indifferentiable compression functions from the PGV compression functions in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2012-09-12 The suffix-free-prefix-free hash function construction and its indifferentiability security analysis in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2012 PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2012
  • 2012 Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2012
  • 2011-10-27 Slender-Set Differential Cryptanalysis in JOURNAL OF CRYPTOLOGY
  • 2011-10-12 Security Analysis of Randomize-Hash-then-Sign Digital Signatures in JOURNAL OF CRYPTOLOGY
  • 2011-10-11 Advanced Topics in THE BLOCK CIPHER COMPANION
  • 2011-10-11 A Short Survey and Six Prominent Ciphers in THE BLOCK CIPHER COMPANION
  • 2011-10-11 Linear Cryptanalysis: The Idea in THE BLOCK CIPHER COMPANION
  • 2011-10-11 Differential Cryptanalysis: The Idea in THE BLOCK CIPHER COMPANION
  • 2011-10-11 Using Block Ciphers in THE BLOCK CIPHER COMPANION
  • 2011-10-11 DES in THE BLOCK CIPHER COMPANION
  • 2011-10-11 AES in THE BLOCK CIPHER COMPANION
  • 2011-10-11 Introduction in THE BLOCK CIPHER COMPANION
  • 2011-10-11 Brute Force Attacks in THE BLOCK CIPHER COMPANION
  • 2011-09-07 On-line Ciphers and the Hash-CBC Constructions in JOURNAL OF CRYPTOLOGY
  • 2011 Improved Security Analysis of Fugue-256 (Poster) in INFORMATION SECURITY AND PRIVACY
  • 2011 C2 – Block Cipher in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Hill Climbing Algorithms and Trivium in SELECTED AREAS IN CRYPTOGRAPHY
  • 2011 Luby-Rackoff Ciphers in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes in FAST SOFTWARE ENCRYPTION
  • 2011 Block Ciphers in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 CLEFIA in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 PRESENT – Block Cipher in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2010 Cryptographic Hash Functions in HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY
  • 2010 Distinguishers for the Compression Function and Output Transformation of Hamsi-256 in INFORMATION SECURITY AND PRIVACY
  • 2010 PRINTcipher: A Block Cipher for IC-Printing in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, CHES 2010
  • 2009-12-31 On hash functions using checksums in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2009-12-15 Counting equations in algebraic attacks on block ciphers in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2009-10-28 Cryptanalysis of MD2 in JOURNAL OF CRYPTOLOGY
  • 2009 Cryptanalysis of MDC-2 in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009
  • 2009 Cryptanalysis of C2 in ADVANCES IN CRYPTOLOGY - CRYPTO 2009
  • 2009 Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 in SELECTED AREAS IN CRYPTOGRAPHY
  • 2009 Bivium as a Mixed-Integer Linear Programming Problem in CRYPTOGRAPHY AND CODING
  • 2009 On Randomizing Hash Functions to Strengthen the Security of Digital Signatures in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009
  • 2008-01-01 Proposals for Iterated Hash Functions in E-BUSINESS AND TELECOMMUNICATION NETWORKS
  • 2008 Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2007-01-01 The Grindahl Hash Functions in FAST SOFTWARE ENCRYPTION
  • 2007-01-01 PRESENT: An Ultra-Lightweight Block Cipher in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007
  • 2007-01-01 Known-Key Distinguishers for Some Block Ciphers in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2007
  • 2007-01-01 Cryptanalysis of the CRUSH Hash Function in SELECTED AREAS IN CRYPTOGRAPHY
  • 2005-02-24 Partial Key Recovery Attack Against RMAC in JOURNAL OF CRYPTOLOGY
  • 2005 SMASH – A Cryptographic Hash Function in FAST SOFTWARE ENCRYPTION
  • 2005 The Cryptanalysis of the AES – A Brief Survey in ADVANCED ENCRYPTION STANDARD – AES
  • 2005 Some Attacks Against a Double Length Hash Proposal in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2005
  • 2005 Preimage and Collision Attacks on MD2 in FAST SOFTWARE ENCRYPTION
  • 2004 On the Role of Key Schedules in Attacks on Iterated Ciphers in COMPUTER SECURITY – ESORICS 2004
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "familyName": "Knudsen", 
        "givenName": "Lars Ramkilde", 
        "id": "sg:person.011360461372.82", 
        "identifier": [
          {
            "name": "orcid_id", 
            "type": "PropertyValue", 
            "value": "0000-0003-3057-9327"
          }
        ], 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011360461372.82", 
          "https://orcid.org/0000-0003-3057-9327"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-08-04T17:39", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/person/person_978.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.011360461372.82'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.011360461372.82'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.011360461372.82'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.011360461372.82'


     

    This table displays all metadata directly associated to this object as RDF triples.

    16 TRIPLES      10 PREDICATES      12 URIs      7 LITERALS      2 BLANK NODES

    Subject Predicate Object
    1 sg:person.011360461372.82 schema:familyName Knudsen
    2 schema:givenName Lars Ramkilde
    3 schema:identifier N584f3faa60fd42a2859f371bfe8ad0eb
    4 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011360461372.82
    5 https://orcid.org/0000-0003-3057-9327
    6 schema:sdDatePublished 2022-08-04T17:39
    7 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    8 schema:sdPublisher Nf753078f39b047e3877be30f7e442a18
    9 sgo:license sg:explorer/license/
    10 sgo:sdDataset persons
    11 rdf:type schema:Person
    12 N584f3faa60fd42a2859f371bfe8ad0eb schema:name orcid_id
    13 schema:value 0000-0003-3057-9327
    14 rdf:type schema:PropertyValue
    15 Nf753078f39b047e3877be30f7e442a18 schema:name Springer Nature - SN SciGraph project
    16 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...