Luke O'Connor
Luke O'Connor
KPMG
Verified email at kpmg.com.au - Homepage
Title
Cited by
Cited by
Year
MARS-a candidate cipher for AES
C Burwick, D Coppersmith, E D’Avignon, R Gennaro, S Halevi, C Jutla, ...
NIST AES Proposal 268, 80, 1998
2581998
Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party
C Binding, SG Hild, LJ O'connor, SK Singhal, VJ Shoup, M Steiner
US Patent 6,775,772, 2004
1752004
Method and apparatus for secure transmission of data and applications
G Karjoth, L O'Connor
US Patent App. 09/748,446, 2001
1492001
On the distribution of characteristics in bijective mappings
L O’Connor
Workshop on the Theory and Application of of Cryptographic Techniques, 360-370, 1993
1091993
Embedding and probabilistic correlation attacks on clock-controlled shift registers
JD Golić, L O'Connor
Workshop on the Theory and Application of of Cryptographic Techniques, 230-243, 1994
951994
Exchanging supplemental information fields between a client and a server
C Binding, SG Hild, LJ O'connor, SK Singhal
US Patent 6,775,687, 2004
922004
Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a server will not use a message encoding scheme proposed by a client
C Binding, SG Hild, YM Huang, LJ O'connor, SK Singhal, VJ Shoup, ...
US Patent 6,694,431, 2004
662004
Properties of linear approximation tables
L O'Connor
International Workshop on Fast Software Encryption, 131-136, 1994
521994
Method for inter-enterprise role-based authorization
HH Ludwig, LJ O'connor
US Patent 7,222,107, 2007
462007
Comments on Soviet encryption algorithm
C Charnes, L O'Connor, J Pieprzyk, R Safavi-Naini, Y Zheng
Workshop on the Theory and Application of of Cryptographic Techniques, 433-438, 1994
351994
Inter-enterprise contract architecture for open distributed systems: Security requirements
Z Milosevic, D Arnold, L O'Connor
Proceedings of WET ICE'96. IEEE 5th Workshop on Enabling Technologies …, 1996
341996
Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks
D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ...
US Patent 6,185,679, 2001
322001
Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme
C Binding, SG Hild, YM Huang, LJ O'connor, SK Singhal, VJ Shoup, ...
US Patent 7,039,946, 2006
302006
Method and apparatus for a symmetric block cipher using multiple stages
D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ...
US Patent 6,185,304, 2001
292001
The Mars Encryption Algorithm
C Burnwick, D Coppersmith
IBM, August 27, 1999
291999
On applying linear cryptanalysis to IDEA
P Hawkes, L O'Connor
International Conference on the Theory and Application of Cryptology and …, 1996
291996
Elevating the discussion on security management: The data centric paradigm
T Grandison, M Bilger, L O'Connor, M Graf, M Swimmer, M Schunter, ...
2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007
282007
Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks
D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ...
US Patent 6,189,095, 2001
262001
Algebraic nonlinearity and its applications to cryptography
L O'connor, A Klapper
Journal of Cryptology 7 (4), 213-227, 1994
251994
A unified Markov approach to differential and linear cryptanalysis
L O'Connor, JD Golić
International Conference on the Theory and Application of Cryptology, 385-397, 1994
251994
The system can't perform the operation now. Try again later.
Articles 1–20