Luke O'Connor

According to our database1, Luke O'Connor authored at least 27 papers between 1991 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Entropy Bounds for Traffic Confirmation.
IACR Cryptol. ePrint Arch., 2008

2005
On the Entropy of Arcfour Keys.
IACR Cryptol. ePrint Arch., 2005

On Blending Attacks for Mixes with Memory.
Proceedings of the Information Hiding, 7th International Workshop, 2005

2001
On String Replacement Exponentiation.
Des. Codes Cryptogr., 2001

2000
MIERA: Method for Inter-Enterprise Role-Based Authorization.
Proceedings of the Electronic Commerce and Web Technologies, 2000

Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
An Analysis of Exponentiation Based on Formal Languages.
Proceedings of the Advances in Cryptology, 1999

XOR and Non-XOR Differential Probabilities.
Proceedings of the Advances in Cryptology, 1999

1997
Nondegenerate Functions and Permutations.
Discret. Appl. Math., 1997

1996
Inter-enterprise contract architecture for open distributed systems: security requirements.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

On Applying Linear Cryptanalysis to IDEA.
Proceedings of the Advances in Cryptology, 1996

1995
A Differential Cryptananlysis of Tree-Structured Substitution-Permutation Networks.
IEEE Trans. Computers, 1995

On the Distribution of Characteristics in Bijective Mappings.
J. Cryptol., 1995

A New Lower Bound on the Expected Size of Irredundant Forms for Boolean Functions.
Inf. Process. Lett., 1995

Convergence in Differential Distributions.
Proceedings of the Advances in Cryptology, 1995

A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Algebraic Nonlinearity and Its Applications to Cryptography.
J. Cryptol., 1994

An Analysis of a Class of Algorithms for S-Box Construction.
J. Cryptol., 1994

An Upper Bound on the Number of Functions Satisfying the Strict Avalanche Criterion.
Inf. Process. Lett., 1994

Properties of Linear Approximation Tables.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers.
Proceedings of the Advances in Cryptology, 1994

Comments on Soviet Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1994

A Unified Markow Approach to Differential and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Cryptographic Application Programming Interfaces (APIs).
Comput. Secur., 1993

On the Distribution of Characteristics in Composite Permutations.
Proceedings of the Advances in Cryptology, 1993

1992
Suffix Tree and String Complexity.
Proceedings of the Advances in Cryptology, 1992

1991
Enumerating Nondegenerate Permutations.
Proceedings of the Advances in Cryptology, 1991


  Loading...