dblp.uni-trier.dewww.uni-trier.de

Luke O'Connor

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2005
26EELuke O'Connor: On Blending Attacks for Mixes with Memory. Information Hiding 2005: 39-52
2001
25 Luke O'Connor: On String Replacement Exponentiation. Des. Codes Cryptography 23(2): 173-184 (2001)
2000
24 Luke O'Connor, Günter Karjoth: Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees. CARDIS 2000: 327-344
23EEHeiko Ludwig, Luke O'Connor, Simon Kramer: MIERA: Method for Inter-Enterprise Role-Based Authorization. EC-Web 2000: 133-144
1999
22EEPhilip Hawkes, Luke O'Connor: XOR and Non-XOR Differential Probabilities. EUROCRYPT 1999: 272-285
21EELuke O'Connor: An Analysis of Exponentiation Based on Formal Languages. EUROCRYPT 1999: 375-388
1997
20EELuke O'Connor: Nondegenerate Functions and Permutations. Discrete Applied Mathematics 73(1): 41-57 (1997)
1996
19 Philip Hawkes, Luke O'Connor: On Applying Linear Cryptanalysis to IDEA. ASIACRYPT 1996: 105-115
18EEZoran Milosevic, David B. Arnold, Luke O'Connor: Inter-enterprise contract architecture for open distributed systems: security requirements. WETICE 1996: 68-73
1995
17 Jovan Dj. Golic, Luke O'Connor: A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps. Cryptography: Policy and Algorithms 1995: 174-185
16EELuke O'Connor: Convergence in Differential Distributions. EUROCRYPT 1995: 13-23
15 Luke O'Connor: A Differential Cryptananlysis of Tree-Structured Substitution-Permutation Networks. IEEE Trans. Computers 44(9): 1150-1152 (1995)
14EELuke O'Connor: A New Lower Bound on the Expected Size of Irredundant Forms for Boolean Functions. Inf. Process. Lett. 53(6): 347-353 (1995)
13 Luke O'Connor: On the Distribution of Characteristics in Bijective Mappings. J. Cryptology 8(2): 67-86 (1995)
1994
12 Luke O'Connor, Jovan Dj. Golic: A Unified Markow Approach to Differential and Linear Cryptanalysis. ASIACRYPT 1994: 387-397
11EEJovan Dj. Golic, Luke O'Connor: Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. EUROCRYPT 1994: 230-243
10EEChris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438
9 Luke O'Connor: Properties of Linear Approximation Tables. FSE 1994: 131-136
8 Luke O'Connor: An Upper Bound on the Number of Functions Satisfying the Strict Avalanche Criterion. Inf. Process. Lett. 52(6): 325-327 (1994)
7 Luke O'Connor: An Analysis of a Class of Algorithms for S-Box Construction. J. Cryptology 7(3): 133-151 (1994)
6 Luke O'Connor, Andrew Klapper: Algebraic Nonlinearity and Its Applications to Cryptography. J. Cryptology 7(4): 213-227 (1994)
1993
5EELuke O'Connor: On the Distribution of Characteristics in Composite Permutations. CRYPTO 1993: 403-412
4EELuke O'Connor: On the Distribution of Characteristics in Bijective Mappings. EUROCRYPT 1993: 360-370
3EEWilliam J. Caelli, Ian G. Graham, Luke O'Connor: Cryptographic Application Programming Interfaces (APIs). Computers & Security 12(7): 640-645 (1993)
1992
2EELuke O'Connor, Tim Snider: Suffix Tree and String Complexity. EUROCRYPT 1992: 138-152
1991
1EELuke O'Connor: Enumerating Nondegenerate Permutations. EUROCRYPT 1991: 368-377

Coauthor Index

1David B. Arnold [18]
2William J. Caelli [3]
3Chris Charnes [10]
4Jovan Dj. Golic [11] [12] [17]
5Ian G. Graham [3]
6Philip Hawkes [19] [22]
7Günter Karjoth [24]
8Andrew Klapper [6]
9Simon Kramer [23]
10Heiko Ludwig [23]
11Zoran Milosevic [18]
12Josef Pieprzyk [10]
13Reihaneh Safavi-Naini [10]
14Tim Snider [2]
15Yuliang Zheng [10]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)