Kaisa Nyberg

Orcid: 0000-0003-2885-6364

According to our database1, Kaisa Nyberg authored at least 73 papers between 1990 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Modifications of bijective S-Boxes with linear structures.
Cryptogr. Commun., May, 2023

2022
Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations.
IEEE Trans. Inf. Theory, 2022

Characterisation of Bijectivity Preserving Componentwise Modification of S-Boxes.
IACR Cryptol. ePrint Arch., 2022

2021
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2021

Editorial: Special issue on Boolean functions and their applications 2020.
Cryptogr. Commun., 2021

2020
Symmetric Cryptography (Dagstuhl Seminar 20041).
Dagstuhl Reports, 2020

2019
Multidimensional Linear Cryptanalysis.
J. Cryptol., 2019

The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions.
IACR Cryptol. ePrint Arch., 2019

Linear Approximations of Random Functions and Permutations.
IACR Cryptol. ePrint Arch., 2019

Affine linear cryptanalysis.
Cryptogr. Commun., 2019

2018
Symmetric Cryptography (Dagstuhl Seminar 18021).
Dagstuhl Reports, 2018

2017
Differential-Linear Cryptanalysis Revisited.
J. Cryptol., 2017

Statistical and Linear Independence of Binary Random Variables.
IACR Cryptol. ePrint Arch., 2017

Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity.
Des. Codes Cryptogr., 2017

2016
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2016

Capacity and Data Complexity in Multidimensional Linear Attack.
IACR Cryptol. ePrint Arch., 2016

Symmetric Cryptography (Dagstuhl Seminar 16021).
Dagstuhl Reports, 2016

2015
Reflection Cryptanalysis of PRINCE-Like Ciphers.
J. Cryptol., 2015

Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks.
IACR Cryptol. ePrint Arch., 2015

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities.
IACR Cryptol. ePrint Arch., 2015

New Links Between Differential and Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015

Perfect nonlinear functions and cryptography.
Finite Fields Their Appl., 2015

2014
Zero-correlation linear cryptanalysis of reduced-round LBlock.
Des. Codes Cryptogr., 2014

2013
Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers.
Des. Codes Cryptogr., 2013

2012
Multiple Differential Cryptanalysis using \LLR and χ<sup>2</sup> Statistics.
IACR Cryptol. ePrint Arch., 2012

Multidimensional linear distinguishing attacks and Boolean functions.
Cryptogr. Commun., 2012

Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

"Provable" Security against Differential and Linear Cryptanalysis.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

Integral and Multidimensional Linear Distinguishers with Correlation Zero.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Exploiting Linear Hull in Matsui's Algorithm 1 (extended version).
IACR Cryptol. ePrint Arch., 2011

Linear Cryptanalysis Using Multiple Linear Approximations.
IACR Cryptol. ePrint Arch., 2011

2010
A practical distinguisher for the Shannon cipher.
J. Syst. Softw., 2010

On the Nonlinearity of Discrete Logarithm in \mathbb <i>F</i><sub>2<sup><i>n</i></sup></sub>\mathbb F_{2^n}.
Proceedings of the Sequences and Their Applications - SETA 2010, 2010

Consecutive S-box Lookups: A Timing Attack on SNOW 3G.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited.
Proceedings of the Topics in Cryptology, 2010

2009
A multidimensional linear distinguishing attack on the Shannon cipher.
Int. J. Appl. Cryptogr., 2009

Multidimensional Extension of Matsui's Algorithm 2.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

On Modular Decomposition of Integers.
Proceedings of the Progress in Cryptology, 2009

2008
Random Beacon for Privacy and Group Security.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Message from the SecPri Workshop Organizing Technical Co-chairs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent.
Proceedings of the Information Security and Cryptology, 2008

Multidimensional Linear Cryptanalysis of Reduced Round Serpent.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

Linear Distinguishing Attack on Shannon.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Wireless Group Security Using MAC Layer Multicast.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Multidimensional Walsh Transform and a Characterization of Bent Functions.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

Differential Properties of Elliptic Curves and Blind Signatures.
Proceedings of the Information Security, 10th International Conference, 2007

A Key-Recovery Attack on SOBER-128.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

2006
Improved Linear Distinguishers for SNOW 2.0.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Ad Hoc Security Associations for Groups.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

Efficient Mutual Data Authentication Using Manually Authenticated Strings.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2005
Efficient Mutual Data Authentication Using Manually Authenticated Strings.
IACR Cryptol. ePrint Arch., 2005

2004
IKE in Ad Hoc IP Networking.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

2003
Defining Authorization Domains Using Virtual Devices.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

UMTS security.
Wiley, ISBN: 978-0-470-84794-7, 2003

2002
Man-in-the-Middle in Tunnelled Authentication Protocols.
IACR Cryptol. ePrint Arch., 2002

2001
Correlation theorems in cryptanalysis.
Discret. Appl. Math., 2001

1999
Correlation Properties of the Bluetooth Combiner Generator.
Proceedings of the Information Security and Cryptology, 1999

1996
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem.
Des. Codes Cryptogr., 1996

The Newton Channel.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

Fast Accumulated Hashing.
Proceedings of the Fast Software Encryption, 1996

Generalized Feistel Networks.
Proceedings of the Advances in Cryptology, 1996

1995
Provable Security Against a Differential Attack.
J. Cryptol., 1995

1994
S-boxes and Round Functions with Controllable Linearity and Differential Uniformity.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

Linear Approximation of Block Ciphers.
Proceedings of the Advances in Cryptology, 1994

1993
New Bent Mappings Suitable for Fast Implementation.
Proceedings of the Fast Software Encryption, 1993

Differentially Uniform Mappings for Cryptography.
Proceedings of the Advances in Cryptology, 1993

A New Signature Scheme Based on the DSA Giving Message Recovery.
Proceedings of the CCS '93, 1993

1992
On the Construction of Highly Nonlinear Permutations.
Proceedings of the Advances in Cryptology, 1992

Provable Security Against Differential Cryptanalysis.
Proceedings of the Advances in Cryptology, 1992

1991
Perfect Nonlinear S-Boxes.
Proceedings of the Advances in Cryptology, 1991

1990
Constructions of Bent Functions and Difference Sets.
Proceedings of the Advances in Cryptology, 1990


  Loading...