2005 |
26 | EE | Luke O'Connor:
On Blending Attacks for Mixes with Memory.
Information Hiding 2005: 39-52 |
2001 |
25 | | Luke O'Connor:
On String Replacement Exponentiation.
Des. Codes Cryptography 23(2): 173-184 (2001) |
2000 |
24 | | Luke O'Connor,
Günter Karjoth:
Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees.
CARDIS 2000: 327-344 |
23 | EE | Heiko Ludwig,
Luke O'Connor,
Simon Kramer:
MIERA: Method for Inter-Enterprise Role-Based Authorization.
EC-Web 2000: 133-144 |
1999 |
22 | EE | Philip Hawkes,
Luke O'Connor:
XOR and Non-XOR Differential Probabilities.
EUROCRYPT 1999: 272-285 |
21 | EE | Luke O'Connor:
An Analysis of Exponentiation Based on Formal Languages.
EUROCRYPT 1999: 375-388 |
1997 |
20 | EE | Luke O'Connor:
Nondegenerate Functions and Permutations.
Discrete Applied Mathematics 73(1): 41-57 (1997) |
1996 |
19 | | Philip Hawkes,
Luke O'Connor:
On Applying Linear Cryptanalysis to IDEA.
ASIACRYPT 1996: 105-115 |
18 | EE | Zoran Milosevic,
David B. Arnold,
Luke O'Connor:
Inter-enterprise contract architecture for open distributed systems: security requirements.
WETICE 1996: 68-73 |
1995 |
17 | | Jovan Dj. Golic,
Luke O'Connor:
A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps.
Cryptography: Policy and Algorithms 1995: 174-185 |
16 | EE | Luke O'Connor:
Convergence in Differential Distributions.
EUROCRYPT 1995: 13-23 |
15 | | Luke O'Connor:
A Differential Cryptananlysis of Tree-Structured Substitution-Permutation Networks.
IEEE Trans. Computers 44(9): 1150-1152 (1995) |
14 | EE | Luke O'Connor:
A New Lower Bound on the Expected Size of Irredundant Forms for Boolean Functions.
Inf. Process. Lett. 53(6): 347-353 (1995) |
13 | | Luke O'Connor:
On the Distribution of Characteristics in Bijective Mappings.
J. Cryptology 8(2): 67-86 (1995) |
1994 |
12 | | Luke O'Connor,
Jovan Dj. Golic:
A Unified Markow Approach to Differential and Linear Cryptanalysis.
ASIACRYPT 1994: 387-397 |
11 | EE | Jovan Dj. Golic,
Luke O'Connor:
Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers.
EUROCRYPT 1994: 230-243 |
10 | EE | Chris Charnes,
Luke O'Connor,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Yuliang Zheng:
Comments on Soviet Encryption Algorithm.
EUROCRYPT 1994: 433-438 |
9 | | Luke O'Connor:
Properties of Linear Approximation Tables.
FSE 1994: 131-136 |
8 | | Luke O'Connor:
An Upper Bound on the Number of Functions Satisfying the Strict Avalanche Criterion.
Inf. Process. Lett. 52(6): 325-327 (1994) |
7 | | Luke O'Connor:
An Analysis of a Class of Algorithms for S-Box Construction.
J. Cryptology 7(3): 133-151 (1994) |
6 | | Luke O'Connor,
Andrew Klapper:
Algebraic Nonlinearity and Its Applications to Cryptography.
J. Cryptology 7(4): 213-227 (1994) |
1993 |
5 | EE | Luke O'Connor:
On the Distribution of Characteristics in Composite Permutations.
CRYPTO 1993: 403-412 |
4 | EE | Luke O'Connor:
On the Distribution of Characteristics in Bijective Mappings.
EUROCRYPT 1993: 360-370 |
3 | EE | William J. Caelli,
Ian G. Graham,
Luke O'Connor:
Cryptographic Application Programming Interfaces (APIs).
Computers & Security 12(7): 640-645 (1993) |
1992 |
2 | EE | Luke O'Connor,
Tim Snider:
Suffix Tree and String Complexity.
EUROCRYPT 1992: 138-152 |
1991 |
1 | EE | Luke O'Connor:
Enumerating Nondegenerate Permutations.
EUROCRYPT 1991: 368-377 |