Differentially uniform mappings for cryptography K Nyberg Workshop on the Theory and Application of of Cryptographic Techniques, 55-64, 1993 | 1462 | 1993 |
Perfect nonlinear S-boxes K Nyberg Workshop on the Theory and Application of of Cryptographic Techniques, 378-386, 1991 | 754 | 1991 |
A new signature scheme based on the DSA giving message recovery K Nyberg, RA Rueppel Proceedings of the 1st ACM Conference on Computer and Communications …, 1993 | 416 | 1993 |
Linear approximation of block ciphers K Nyberg Workshop on the Theory and Application of of Cryptographic Techniques, 439-444, 1994 | 395 | 1994 |
Provable security against differential cryptanalysis K Nyberg, LR Knudsen Annual international cryptology conference, 566-574, 1992 | 363 | 1992 |
Message recovery for signature schemes based on the discrete logarithm problem K Nyberg, RA Rueppel Workshop on the Theory and Application of of Cryptographic Techniques, 182-193, 1994 | 349 | 1994 |
Man-in-the-middle in tunnelled authentication protocols N Asokan, V Niemi, K Nyberg International Workshop on Security Protocols, 28-41, 2003 | 347 | 2003 |
Provable security against a differential attack K Nyberg, LR Knudsen Journal of Cryptology 8, 27-37, 1995 | 299 | 1995 |
Manual authentication for wireless devices C Gehrmann, CJ Mitchell, K Nyberg RSA Cryptobytes 7 (1), 29-37, 2004 | 293 | 2004 |
On the construction of highly nonlinear permutations K Nyberg Workshop on the Theory and Application of of Cryptographic Techniques, 92-98, 1992 | 287 | 1992 |
Message recovery for signature schemes based on the discrete logarithm problem K Nyberg, RA Rueppel Designs, Codes and Cryptography 7 (1), 61-81, 1996 | 238 | 1996 |
Generalized feistel networks K Nyberg International conference on the theory and application of cryptology and …, 1996 | 234 | 1996 |
Efficient mutual data authentication using manually authenticated strings S Laur, K Nyberg International Conference on Cryptology and Network Security, 90-107, 2006 | 217 | 2006 |
Message recovery for signature schemes based on the discrete logarithm K Nyberg Advances in Cryptology, EUROCRYPT'94, 175-190, 1994 | 161 | 1994 |
Improved linear distinguishers for SNOW 2.0 K Nyberg, J Wallén Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006 | 147 | 2006 |
Integral and multidimensional linear distinguishers with correlation zero A Bogdanov, G Leander, K Nyberg, M Wang Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 143 | 2012 |
UMTS security V Niemi, K Nyberg John Wiley & Sons, 2006 | 142 | 2006 |
Method for sharing the authorization to use specific resources S Sovio, N Asokan, K Nyberg, V Niemi US Patent 7,343,014, 2008 | 140 | 2008 |
Multidimensional extension of Matsui’s algorithm 2 M Hermelin, JY Cho, K Nyberg International Workshop on Fast Software Encryption, 209-227, 2009 | 138 | 2009 |
Constructions of bent functions and difference sets K Nyberg Advances in Cryptology—EUROCRYPT’90: Workshop on the Theory and Application …, 1991 | 137 | 1991 |