Risto M. Hakala

According to our database1, Risto M. Hakala authored at least 10 papers between 2006 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
An upper bound for the linearity of Exponential Welch Costas functions.
Finite Fields Their Appl., 2012

Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2010
A practical distinguisher for the Shannon cipher.
J. Syst. Softw., 2010

On the Nonlinearity of Discrete Logarithm in \mathbb <i>F</i><sub>2<sup><i>n</i></sup></sub>\mathbb F_{2^n}.
Proceedings of the Sequences and Their Applications - SETA 2010, 2010

Consecutive S-box Lookups: A Timing Attack on SNOW 3G.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
A multidimensional linear distinguishing attack on the Shannon cipher.
Int. J. Appl. Cryptogr., 2009

Cache-Timing Template Attacks.
Proceedings of the Advances in Cryptology, 2009

2008
Linear Distinguishing Attack on Shannon.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
A Key-Recovery Attack on SOBER-128.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

2006
Process State and Progress Visualization Using Self-Organizing Map.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2006


  Loading...