Search the dblp DataBase
Kaisa Nyberg :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Kaisa Nyberg Generalized Feistel Networks. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:91-104 [Conf ] Sven Laur , Kaisa Nyberg Efficient Mutual Data Authentication Using Manually Authenticated Strings. [Citation Graph (0, 0)][DBLP ] CANS, 2006, pp:90-107 [Conf ] Kaisa Nyberg , Rainer A. Rueppel A New Signature Scheme Based on the DSA Giving Message Recovery. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:58-61 [Conf ] Kaisa Nyberg , Lars R. Knudsen Provable Security Against Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:566-574 [Conf ] Kaisa Nyberg IKE in Ad Hoc IP Networking. [Citation Graph (0, 0)][DBLP ] ESAS, 2004, pp:139-151 [Conf ] Jukka Valkonen , N. Asokan , Kaisa Nyberg Ad Hoc Security Associations for Groups. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:150-164 [Conf ] Kaisa Nyberg Constructions of Bent Functions and Difference Sets. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:151-160 [Conf ] Kaisa Nyberg Perfect Nonlinear S-Boxes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:378-386 [Conf ] Kaisa Nyberg On the Construction of Highly Nonlinear Permutations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:92-98 [Conf ] Kaisa Nyberg Differentially Uniform Mappings for Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:55-64 [Conf ] Kaisa Nyberg Linear Approximation of Block Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:439-444 [Conf ] Kaisa Nyberg , Rainer A. Rueppel Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:182-193 [Conf ] Kaisa Nyberg New Bent Mappings Suitable for Fast Implementation. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:179-184 [Conf ] Kaisa Nyberg S-boxes and Round Functions with Controllable Linearity and Differential Uniformity. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:111-130 [Conf ] Kaisa Nyberg Fast Accumulated Hashing. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:83-87 [Conf ] Kaisa Nyberg , Johan Wallén Improved Linear Distinguishers for SNOW 2.0. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:144-162 [Conf ] Miia Hermelin , Kaisa Nyberg Correlation Properties of the Bluetooth Combiner Generator. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:17-29 [Conf ] Ross J. Anderson , Serge Vaudenay , Bart Preneel , Kaisa Nyberg The Newton Channel. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:151-156 [Conf ] Sampo Sovio , N. Asokan , Kaisa Nyberg Defining Authorization Domains Using Virtual Devices. [Citation Graph (0, 0)][DBLP ] SAINT Workshops, 2003, pp:331-336 [Conf ] N. Asokan , Valtteri Niemi , Kaisa Nyberg Man-in-the-Middle in Tunnelled Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:28-41 [Conf ] Kaisa Nyberg Correlation theorems in cryptanalysis. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2001, v:111, n:1-2, pp:177-188 [Journal ] Kaisa Nyberg , Rainer A. Rueppel Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:61-81 [Journal ] Kaisa Nyberg , Lars R. Knudsen Provable Security Against a Differential Attack. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1995, v:8, n:1, pp:27-37 [Journal ] Billy Bob Brumley , Kaisa Nyberg Differential Properties of Elliptic Curves and Blind Signatures. [Citation Graph (0, 0)][DBLP ] ISC, 2007, pp:376-389 [Conf ] Multidimensional Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (, )][DBLP ] Linear Distinguishing Attack on Shannon. [Citation Graph (, )][DBLP ] Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited. [Citation Graph (, )][DBLP ] A Key-Recovery Attack on SOBER-128. [Citation Graph (, )][DBLP ] Multidimensional Extension of Matsui's Algorithm 2. [Citation Graph (, )][DBLP ] A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. [Citation Graph (, )][DBLP ] Wireless Group Security Using MAC Layer Multicast. [Citation Graph (, )][DBLP ] On Modular Decomposition of Integers. [Citation Graph (, )][DBLP ] Random Beacon for Privacy and Group Security. [Citation Graph (, )][DBLP ] Message from the SecPri Workshop Organizing Technical Co-chairs. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs