Stafford E. Tavares
According to our database1,
Stafford E. Tavares
authored at least 51 papers
between 1969 and 2006.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2006
2005
2004
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael.
IACR Cryptol. ePrint Arch., 2004
2003
IEEE Trans. Consumer Electron., 2003
2002
IACR Cryptol. ePrint Arch., 2002
2001
Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs.
IACR Cryptol. ePrint Arch., 2001
Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Advances in Cryptology, 2001
1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
1997
Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis.
Des. Codes Cryptogr., 1997
1996
Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
J. Cryptol., 1996
Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion".
Inf. Process. Lett., 1996
Cryptologia, 1996
1995
IEEE Trans. Computers, 1995
Inf. Process. Lett., 1995
Proceedings of the Information Theory and Applications II, 1995
1994
Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria.
Proceedings of the CCS '94, 1994
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
Proceedings of the CCS '94, 1994
1993
A Design of a Fast Pipelined Modular Multiplier Based on a Diminished-Radix Algorithm.
J. Cryptol., 1993
1992
IEEE Trans. Computers, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks.
Proceedings of the Advances in Cryptology, 1991
1990
1989
Proceedings of the Advances in Cryptology, 1989
1988
IEEE J. Sel. Areas Commun., 1988
1986
Proceedings of the Advances in Cryptology, 1986
1985
Proceedings of the Advances in Cryptology, 1985
1984
Proceedings of the Advances in Cryptology, 1984
1982
Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982
1978
Inf. Control., August, 1978
IEEE Trans. Inf. Theory, 1978
1975
IEEE Trans. Inf. Theory, 1975
1974
Inf. Control., December, 1974
1973
Inf. Control., February, 1973
1971
1970
Inf. Control., April, 1970
IEEE Trans. Inf. Theory, 1970
IEEE Trans. Inf. Theory, 1970
1969
Inf. Control., May, 1969
IEEE Trans. Inf. Theory, 1969