The SCEAS System
| |||||||

## Search the dblp DataBase
Luke O'Connor:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Philip Hawkes, Luke O'Connor
**On Applying Linear Cryptanalysis to IDEA.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1996, pp:105-115 [Conf] - Luke O'Connor, Jovan Dj. Golic
**A Unified Markow Approach to Differential and Linear Cryptanalysis.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1994, pp:387-397 [Conf] - Luke O'Connor, Günter Karjoth
**Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees.**[Citation Graph (0, 0)][DBLP] CARDIS, 2000, pp:327-344 [Conf] - Jovan Dj. Golic, Luke O'Connor
**A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps.**[Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:174-185 [Conf] - Luke O'Connor
**On the Distribution of Characteristics in Composite Permutations.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1993, pp:403-412 [Conf] - Heiko Ludwig, Luke O'Connor, Simon Kramer
**MIERA: Method for Inter-Enterprise Role-Based Authorization.**[Citation Graph (0, 0)][DBLP] EC-Web, 2000, pp:133-144 [Conf] - Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng
**Comments on Soviet Encryption Algorithm.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:433-438 [Conf] - Jovan Dj. Golic, Luke O'Connor
**Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:230-243 [Conf] - Philip Hawkes, Luke O'Connor
**XOR and Non-XOR Differential Probabilities.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:272-285 [Conf] - Luke O'Connor
**Enumerating Nondegenerate Permutations.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1991, pp:368-377 [Conf] - Luke O'Connor
**On the Distribution of Characteristics in Bijective Mappings.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1993, pp:360-370 [Conf] - Luke O'Connor
**Convergence in Differential Distributions.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1995, pp:13-23 [Conf] - Luke O'Connor
**An Analysis of Exponentiation Based on Formal Languages.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:375-388 [Conf] - Luke O'Connor, Tim Snider
**Suffix Tree and String Complexity.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1992, pp:138-152 [Conf] - Luke O'Connor
**Properties of Linear Approximation Tables.**[Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1994, pp:131-136 [Conf] - Luke O'Connor
**On Blending Attacks for Mixes with Memory.**[Citation Graph (0, 0)][DBLP] Information Hiding, 2005, pp:39-52 [Conf] - Zoran Milosevic, David Arnold, Luke O'Connor
**Inter-enterprise contract architecture for open distributed systems: security requirements.**[Citation Graph (0, 0)][DBLP] WETICE, 1996, pp:68-73 [Conf] - William J. Caelli, Ian G. Graham, Luke O'Connor
**Cryptographic Application Programming Interfaces (APIs).**[Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:7, pp:640-645 [Journal] - Luke O'Connor
**Nondegenerate Functions and Permutations.**[Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 1997, v:73, n:1, pp:41-57 [Journal] - Luke O'Connor
**On String Replacement Exponentiation.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2001, v:23, n:2, pp:173-184 [Journal] - Luke O'Connor
**An Upper Bound on the Number of Functions Satisfying the Strict Avalanche Criterion.**[Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1994, v:52, n:6, pp:325-327 [Journal] - Luke O'Connor
**A New Lower Bound on the Expected Size of Irredundant Forms for Boolean Functions.**[Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1995, v:53, n:6, pp:347-353 [Journal] - Luke O'Connor
**An Analysis of a Class of Algorithms for S-Box Construction.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 1994, v:7, n:3, pp:133-151 [Journal] - Luke O'Connor
**On the Distribution of Characteristics in Bijective Mappings.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 1995, v:8, n:2, pp:67-86 [Journal] - Luke O'Connor, Andrew Klapper
**Algebraic Nonlinearity and Its Applications to Cryptography.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 1994, v:7, n:4, pp:213-227 [Journal] - Luke O'Connor
**A Differential Cryptananlysis of Tree-Structured Substitution-Permutation Networks.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1995, v:44, n:9, pp:1150-1152 [Journal]
Search in 0.421secs, Finished in 0.422secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |