TCS / Research / Publications / Kaisa Nyberg
Helsinki University of Technology, 
     Laboratory for Theoretical Computer Science

Publications by Kaisa Nyberg

to appear

56Zahra Ahmadian, Javad Mohajeri, Mahmoud Salmasizadeh, Risto Hakala, and Kaisa Nyberg. A practical distinguisher for the Shannon cipher. Journal of Systems and Software, to appear.
Info
See dx.doi.org ...

2010

55Miia Hermelin and Kaisa Nyberg. Dependent linear approximations - the algorithm of Biryukov and others revisited. In CT-RSA'10, volume 5985 of Lecture Notes in Computer Science, pages 318–333. Springer, 2010.
Info

2009

54Risto Hakala and Kaisa Nyberg. A multidimensional linear distinguishing attack on the Shannon cipher. International Journal of Applied Cryptography, 1(3):161–168, 2009.
Info
53Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Multidimensional Extension of Matsui's Algorithm 2. In Fast Software Encryption 2009, volume 5665 of Lecture Notes in Computer Science, pages 209–227. Springer, 2009.
Info
52Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Statistical tests for key recovery using multidimensional extension of Matsui's algorithm 1 (poster). In Eurocrypt 2009, April 19-23, 2009, Cologne, Germany, 2009.
Info
51Billy Bob Brumley and Kaisa Nyberg. On modular decomposition of integers. In Progress in Cryptology—AFRICACRYPT 2009, volume 5580 of Lecture Notes in Computer Science, pages 386–402. Springer-Verlag, 2009.
Info
50Kaisa Nyberg. Methods for Symmetric Key Cryptography and Cryptanalysis. In EWM PhD Summer School, Turku, Finland, June 2009, 2009.
PDF (243 kB)
Info
49René Mayrhofer, Kaisa Nyberg, and Tim Kindberg. Secure Spontaneous Interaction, Special issue, International Journal of Security and Networks Volume 4 Nos. 1/2. Inderscience, 2009.
Info
48N. Asokan and Kaisa Nyberg. Security associations for wireless devices. In Stefanos Gritzalis, Tom Karygiannis, and Charalabos Skianis, editors, Security and Privacy in Mobile and Wireless Networking. Troubador Publishing Ltd, Leicester, UK, 2009.
Info

2008

47Jukka Valkonen and Kaisa Nyberg. Uudet salausmenetelmät parantavat yksityisyydensuojaa. Tietosuoja, 4:24–27, 2008. In Finnish.
Info
46Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Multidimensional linear cryptanalysis of reduced round Serpent. In Jennifer Seberry Yi Mu, Willy Susilo, editor, Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, volume 5107 of LNCS, pages 297–305. Springer, 2008.
Info
45Risto Hakala and Kaisa Nyberg. Linear distinguishing attack on Shannon. In Jennifer Seberry Yi Mu, Willy Susilo, editor, Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, volume 5107 of LNCS, pages 203–215. Springer, 2008.
Info
44Miia Hermelin and Kaisa Nyberg. Multidimensional linear distinguishing attacks and Boolean functions. In Fourth International Workshop on Boolean Functions: Cryptography and Applications, 2008.
Info
43Joo Yeon Cho, Miia Hermelin, and Kaisa Nyberg. A new technique for multidimensional linear cryptanalysis with applications on reduced round Serpent. In The 11th International Conference on Information Security and Cryptology 2008, ICISC'08, Seoul, Korea, volume 5461 of Lecture Notes in Computer Science, pages 383 – 398, 2008.
Info
42Aleksi Saarela, Jan-Erik Ekberg, and Kaisa Nyberg. Random beacon for privacy and group security. In IEEE International Conference on Wireless and Mobile Computing, Networking and Communications WIMOB 08, pages 514–519. IEEE, 2008.
Info
41Kaisa Nyberg, editor. Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, volume 5086 of Lecture Notes in Computer Science. Springer, 2008.
Info

2007

40Kaisa Nyberg and Jukka Valkonen. Wireless Group Security Using MAC Layer Multicast. In 8th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2007, Helsinki, Finland, June 2007. IEEE.
Info
39Kaisa Nyberg and Risto Hakala. A key-recovery attack on SOBER-128. In Eli Biham, Helena Handschuh, Stefan Lucks, and Vincent Rijmen, editors, Symmetric Cryptography, number 07021 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, 2007.
Info
See drops.dagstuhl.de ...
38Kaisa Nyberg and Miia Hermelin. Multidimensional Walsh transform and a characterization of bent functions. In Tor Helleseth, P. Vijay Kumar, and Oyvind Ytrehus, editors, Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, pages 83–86. IEEE, 2007.
PDF (86 kB)
Info
37Billy Bob Brumley and Kaisa Nyberg. Differential properties of elliptic curves and blind signatures. In Information Security, 10th International Conference—ISC '07, volume 4779 of Lecture Notes in Computer Science, pages 376–389. Springer-Verlag, 2007.
Info
See dx.doi.org ...
36Kaisa Nyberg. Kryptologia – tiedon turvaamisen tiede. Tietojenkäsittelytiede, 26:32–53, Heinäkuu 2007.
Info

2006

35Sven Laur and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings. In D. Pointcheval, editor, The 5th International Conference on Cryptology and Network Security, CANS 2006, volume 4301 of Lecture Notes in Computer Science, pages 90–107, Suzhou, China, December 2006. Springer.
Info
See dx.doi.org ...
34Jukka Valkonen, N. Asokan, and Kaisa Nyberg. Ad hoc security association for groups. In L. Buttyan, V. Gligor, and D. Westhoff, editors, Proceedings of ESAS 2006, volume 4357 of Lecture Notes in Computer Science, pages 150–164, Hamburg, Germany, September 2006. Springer.
Info
See dx.doi.org ...
33Kaisa Nyberg and Johan Wallén. Improved linear distinguishers for SNOW 2.0. In M. Robshaw, editor, Proceedings of the International Workshop on Fast Software Encryption (FSE 2006), volume 4047 of Lecture Notes in Computer Science, pages 144–162, Graz, Austria, March 2006. Springer.
PDF (301 kB)
Info
See dx.doi.org ...
32Kaisa Nyberg. Connect Now to MitM. In Crypto 2006 Rump Session, 2006.
PDF (49 kB)
Info

2005

31Sven Laur and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings. Report 2005/424, Cryptology ePrint Archive, November 2005.
Info
See eprint.iacr.org ...
30N. Asokan, Valtteri Niemi, and Kaisa Nyberg. Man-in-the-middle in tunnelled authentication protocols. In International Workshop on Security Protocols, volume 3364 of Lecture Notes in Computer Science, pages 28 – 41. Springer-Verlag, 2005.
Info
See dx.doi.org ...
29Kaisa Nyberg. IKE in ad-hoc IP networking. In European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), volume 3313 of Lecture Notes in Computer Science, pages 139–151, Heidelberg, Germany, 2005. Springer-Verlag.
Info
See springerlink.metapress.com ...

2004

28Kaarle Ritvanen and Kaisa Nyberg. New key replay attacks on Bluetooth. In Proceedings of Nordsec 2004, pages 105–109. Department of Telematics, NTNU, 2004.
PDF (56 kB)
Info
27Kaisa Nyberg. Cryptographic algorithms for UMTS. In ECCOMAS 2004, Proceedings, volume II, page 506, 2004.
PDF (144 kB)
Info
26Christian Gehrmann, Chris J. Mitchell, and Kaisa Nyberg. Manual authentication for wireless devices. RSA Cryptobytes, 7(1):29–37, Spring 2004.
Info

2003

25Sampo Sovio, N. Asokan, and Kaisa Nyberg. Defining authorization domains using virtual devices. In SAINT Workshops, pages 331–336, 2003.
Info
See computer.org ...
24Anne-Maria Ernvall and Kaisa Nyberg. On server-aided computation for RSA protocols with private key splitting. In Svein Knapskog, editor, Proceedings of Nordsec 2003, pages 195–206. Department of Telematics, NTNU, 2003.
PDF (217 kB)
Info
23Valtteri Niemi and Kaisa Nyberg. UMTS Security. Wiley & Sons, 2003.
Info
22Kaisa Nyberg and Howard M. Heys, editors. Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, volume 2595 of Lecture Notes in Computer Science. Springer, 2003.
Info

2002

21Kaisa Nyberg. Link layer security for the first hop. In Proceedings of the International Workshop on European Cooperation in the Field of Development of Mobile Personal Communication – IST Projects, 2002.
Info

2001

20Kaisa Nyberg. Correlation theorems in cryptanalysis. Discrete Applied Mathematics, 111:177–188, 2001.
Info
19Christian Gehrmann and Kaisa Nyberg. Enhancements to Bluetooth baseband security. In Proceedings of Nordsec 2001, 2001.
Info

2000

18Miia Hermelin and Kaisa Nyberg. Correlation properties of the Bluetooth combiner generator. In J. S. Song, editor, Proceedings of ICISC'99, volume 1787 of Lecture Notes in Computer Science, pages 17–29. Springer-Verlag, 2000.
Info

1998

17Kaisa Nyberg, editor. Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, volume 1403 of Lecture Notes in Computer Science. Springer, 1998.
Info

1996

16Kaisa Nyberg and Rainer A. Rueppel. Message recovery for signature schemes based on the discrete logarithm problem. Designs, Codes and Cryptography, 7(1–2):61–81, 1996.
Info
15Kaisa Nyberg. Commutativity in cryptography. In 1st International Trier Conference in Functional Analysis. Walter Gruyter & Co, 1996.
Info
14Kaisa Nyberg. Fast accumulated hashing. In Fast Software Encryption, FSE 3, volume 1039 of Lecture Notes in Computer Science. Springer-Verlag, 1996.
Info
13Ross Anderson, Serge Vaudenay, Bart Preneel, and Kaisa Nyberg. The Newton channel. In Proceedings of the Cambridge Workshop on Information Hiding, volume 1174 of Lecture Notes in Computer Science. Springer-Verlag, 1996.
Info
12Kaisa Nyberg. Generalized Feistel networks. In Advances in Cryptology - ASIACRYPT'96, volume 1163 of Lecture Notes in Computer Science. Springer-Verlag, 1996.
Info

1995

11Kaisa Nyberg and Lars R. Knudsen. Provable security against a differential attack. Journal of Cryptology, 8(1):27–37, 1995.
Info
10Kaisa Nyberg and Rainer A. Rueppel. Message recovery for signature schemes based on the discrete logarithm problem. In Advances in Cryptology - EUROCRYPT'94, volume 950 of Lecture Notes in Computer Science. Springer-Verlag, 1995.
Info
See link.springer.de ...
9Kaisa Nyberg. Linear approximation of block ciphers. In Advances in Cryptology - EUROCRYPT'94, volume 950 of Lecture Notes in Computer Science. Springer-Verlag, 1995.
Info
See link.springer.de ...
8Kaisa Nyberg. S-boxes and round functions with controllable linearity and differential uniformity. In Fast Software Encryption, FSE 2, volume 1008 of Lecture Notes in Computer Science. Springer-Verlag, 1995.
Info

1994

7Kaisa Nyberg and Rainer A. Rueppel. Weaknesses in some recent key agreement protocols. Electronics Letters, 30(1):26–27, 1994.
Info
6Kaisa Nyberg. Differentially uniform mappings for cryptography. In Advances in Cryptology - EUROCRYPT'93, volume 765 of Lecture Notes in Computer Science. Springer-Verlag, 1994.
Info
See link.springer.de ...
5Kaisa Nyberg. New bent mappings suitable for fast implementation. In Fast Software Encryption, FSE 1, volume 809 of Lecture Notes in Computer Science. Springer-Verlag, 1994.
Info

1993

4Kaisa Nyberg. On the construction of highly non-linear permutations. In Advances in Cryptology - EUROCRYPT'92, volume 658 of Lecture Notes in Computer Science. Springer-Verlag, 1993.
Info
See link.springer.de ...
3Kaisa Nyberg and Rainer A. Rueppel. A new signature scheme based on the dsa giving message recovery. In Proceedings of the 1st ACM CCCS, Fairfax, 1993. ACM.
Info
See doi.acm.org ...

1991

2Kaisa Nyberg. Constructions of bent functions and difference sets. In Advances in Cryptology - EUROCRYPT'90, volume 473 of Lecture Notes in Computer Science. Springer-Verlag, 1991.
Info
See link.springer.de ...
1Kaisa Nyberg. Perfect nonlinear s-boxes. In Advances in Cryptology - EUROCRYPT'91, volume 547 of Lecture Notes in Computer Science. Springer-Verlag, 1991.
Info
See link.springer.de ...

[TCS main] [Contact Info] [Personnel] [Research] [Publications] [Software] [Studies] [News Archive] [Links]
Latest update: 19 January 2010.