Differentially uniform mappings for cryptography K Nyberg Workshop on the Theory and Application of of Cryptographic Techniques, 55-64, 1993 | 1048 | 1993 |
Perfect nonlinear S-boxes K Nyberg Workshop on the Theory and Application of of Cryptographic Techniques, 378-386, 1991 | 584 | 1991 |
Message recovery for signature schemes based on the discrete logarithm problem K Nyberg, RA Rueppel Workshop on the Theory and Application of of Cryptographic Techniques, 182-193, 1994 | 466 | 1994 |
A new signature scheme based on the DSA giving message recovery K Nyberg, RA Rueppel Proceedings of the 1st ACM conference on Computer and communications …, 1993 | 359 | 1993 |
Linear approximation of block ciphers K Nyberg Workshop on the Theory and Application of of Cryptographic Techniques, 439-444, 1994 | 328 | 1994 |
Man-in-the-middle in tunnelled authentication protocols N Asokan, V Niemi, K Nyberg International Workshop on Security Protocols, 28-41, 2003 | 312 | 2003 |
Provable security against differential cryptanalysis K Nyberg, LR Knudsen Annual International Cryptology Conference, 566-574, 1992 | 298 | 1992 |
Manual authentication for wireless devices C Gehrmann, CJ Mitchell, K Nyberg RSA Cryptobytes 7 (1), 29-37, 2004 | 270 | 2004 |
Provable security against a differential attack K Nyberg, LR Knudsen Journal of Cryptology 8 (1), 27-37, 1995 | 250 | 1995 |
On the construction of highly nonlinear permutations K Nyberg Workshop on the Theory and Application of of Cryptographic Techniques, 92-98, 1992 | 240 | 1992 |
Message recovery for signature schemes based on the discrete logarithm problem K Nyberg, RA Rueppel Designs, Codes and Cryptography 7 (1-2), 61-81, 1996 | 224 | 1996 |
Efficient mutual data authentication using manually authenticated strings S Laur, K Nyberg International Conference on Cryptology and Network Security, 90-107, 2006 | 196 | 2006 |
Generalized feistel networks K Nyberg International conference on the theory and application of cryptology and …, 1996 | 169 | 1996 |
Multidimensional extension of Matsui’s algorithm 2 M Hermelin, JY Cho, K Nyberg International Workshop on Fast Software Encryption, 209-227, 2009 | 117 | 2009 |
UMTS security V Niemi, K Nyberg Wiley, 2003 | 113 | 2003 |
Integral and multidimensional linear distinguishers with correlation zero A Bogdanov, G Leander, K Nyberg, M Wang International Conference on the Theory and Application of Cryptology and …, 2012 | 108 | 2012 |
Improved linear distinguishers for SNOW 2.0 K Nyberg, J Wallén International Workshop on Fast Software Encryption, 144-162, 2006 | 107 | 2006 |
S-boxes and round functions with controllable linearity and differential uniformity K Nyberg International Workshop on Fast Software Encryption, 111-130, 1994 | 101 | 1994 |
Method for sharing the authorization to use specific resources S Sovio, N Asokan, K Nyberg, V Niemi US Patent 7,343,014, 2008 | 94 | 2008 |
Fast accumulated hashing K Nyberg International Workshop on Fast Software Encryption, 83-87, 1996 | 94 | 1996 |