Stafford E. Tavares

According to our database1, Stafford E. Tavares authored at least 51 papers between 1969 and 2006.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2006
On some probabilistic approximations for AES-like s-boxes.
Discret. Math., 2006

2005
Affine equivalence in the AES round function.
Discret. Appl. Math., 2005

2004
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael.
IACR Cryptol. ePrint Arch., 2004

2003
Comments on the security of fast encryption algorithm for multimedia (FEA-M).
IEEE Trans. Consumer Electron., 2003

2002
On Some Algebraic Structures in the AES Round Function.
IACR Cryptol. ePrint Arch., 2002

2001
Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs.
IACR Cryptol. ePrint Arch., 2001

Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs.
Proceedings of the Advances in Cryptology, 2001

1999
Modeling Linear Characteristics of Substitution-Permutation Networks.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

1998
Cryptanalysis of RC4-like Ciphers.
Proceedings of the Selected Areas in Cryptography '98, 1998

Toward Provable Security of Substitution-Permutation Encryption Networks.
Proceedings of the Selected Areas in Cryptography '98, 1998

1997
Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis.
Des. Codes Cryptogr., 1997

1996
Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
J. Cryptol., 1996

Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion".
Inf. Process. Lett., 1996

Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy.
Cryptologia, 1996

1995
Avalanche Characteristics of Substitution-Permutation Encryption Networks.
IEEE Trans. Computers, 1995

Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis.
Inf. Process. Lett., 1995

Information Leakage of a Randomly Selected Boolean Function.
Proceedings of the Information Theory and Applications II, 1995

1994
Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria.
Proceedings of the CCS '94, 1994

The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
Proceedings of the CCS '94, 1994

1993
A Design of a Fast Pipelined Modular Multiplier Based on a Diminished-Radix Algorithm.
J. Cryptol., 1993

1992
New Fault Tolerant Techniques for Residue Number Systems.
IEEE Trans. Computers, 1992

Generating Bent Sequences.
Discret. Appl. Math., 1992

On the Design of SP Networks From an Information Theoretic Point of View.
Proceedings of the Advances in Cryptology, 1992

Modelling and Analyzing Cryprographic Protocols Using Petri Nets.
Proceedings of the Advances in Cryptology, 1992

Constructing Large Cryptographically Strong S-boxes.
Proceedings of the Advances in Cryptology, 1992

1991
An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks.
Proceedings of the Advances in Cryptology, 1991

1990
Generating and counting binary bent sequences.
IEEE Trans. Inf. Theory, 1990

The Structured Design of Cryptographically Good S-Boxes.
J. Cryptol., 1990

1989
Flexible Access Control with Master Keys.
Proceedings of the Advances in Cryptology, 1989

Good S-Boxes Are Easy To Find.
Proceedings of the Advances in Cryptology, 1989

1988
Architectures for exponentiation in GF(2<sup>m</sup>).
IEEE J. Sel. Areas Commun., 1988

1986
A Fast VLSI Multiplier for GF(2<sup>m</sup>).
IEEE J. Sel. Areas Commun., 1986

VLSI Implementation of Public-Key Encryption Algorithms.
Proceedings of the Advances in Cryptology, 1986

1985
On the Design of S-Boxes.
Proceedings of the Advances in Cryptology, 1985

A Layered Approach to the Design of Private Key Cryptosystems.
Proceedings of the Advances in Cryptology, 1985

1984
Sequence Complexity as a Test for Cryptographic Systems.
Proceedings of the Advances in Cryptology, 1984

1982
Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982

1978
A Note on Extended Quaternary Quadratic Residue Codes and Their Binary Images
Inf. Control., August, 1978

The minimum distance of all binary cyclic codes of odd lengths from 69 to 99.
IEEE Trans. Inf. Theory, 1978

1975
Weight distribution of some 'best' (3m, 2m) binary quasi-cyclic codes (Corresp.).
IEEE Trans. Inf. Theory, 1975

1974
Difference Sets of the Hadamard Type and Quasi-Cyclic Codes
Inf. Control., December, 1974

Some rate- p/(p+1) quasi-cyclic codes (Corresp.).
IEEE Trans. Inf. Theory, 1974

On binary majority-logic decodable codes (Corresp.).
IEEE Trans. Inf. Theory, 1974

1973
A Note on the Decomposition of Cyclic Codes into Cyclic Classes
Inf. Control., February, 1973

1971
On the Decomposition of Cyclic Codes into Cyclic Classes
Inf. Control., May, 1971

1970
Synchronization of a Class of Codes Derived from Cyclic Codes
Inf. Control., April, 1970

Detecting and correcting multiple bursts for binary cyclic codes (Corresp.).
IEEE Trans. Inf. Theory, 1970

Further results on the synchronization of binary cyclic codes (Corresp.).
IEEE Trans. Inf. Theory, 1970

1969
Synchronization of Cyclic Codes in the Presence of Burst Errors
Inf. Control., May, 1969

Matrix approach to synchronization recovery for binary cyclic codes.
IEEE Trans. Inf. Theory, 1969


  Loading...