to appear |
56 | Zahra Ahmadian, Javad Mohajeri, Mahmoud Salmasizadeh, Risto Hakala, and Kaisa Nyberg. A practical distinguisher for the Shannon cipher. Journal of Systems and Software, to appear. |
|
2010 |
55 | Miia Hermelin and Kaisa Nyberg. Dependent linear approximations - the algorithm of Biryukov and others revisited. In CT-RSA'10, volume 5985 of Lecture Notes in Computer Science, pages 318–333. Springer, 2010. |
|
2009 |
54 | Risto Hakala and Kaisa Nyberg. A multidimensional linear distinguishing attack on the Shannon cipher. International Journal of Applied Cryptography, 1(3):161–168, 2009. |
|
53 | Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Multidimensional Extension of Matsui's Algorithm 2. In Fast Software Encryption 2009, volume 5665 of Lecture Notes in Computer Science, pages 209–227. Springer, 2009. |
|
52 | Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Statistical tests for key recovery using multidimensional extension of Matsui's algorithm 1 (poster). In Eurocrypt 2009, April 19-23, 2009, Cologne, Germany, 2009. |
|
51 | Billy Bob Brumley and Kaisa Nyberg. On modular decomposition of integers. In Progress in Cryptology—AFRICACRYPT 2009, volume 5580 of Lecture Notes in Computer Science, pages 386–402. Springer-Verlag, 2009. |
|
50 | Kaisa Nyberg. Methods for Symmetric Key Cryptography and Cryptanalysis. In EWM PhD Summer School, Turku, Finland, June 2009, 2009. |
|
49 | René Mayrhofer, Kaisa Nyberg, and Tim Kindberg. Secure Spontaneous Interaction, Special issue, International Journal of Security and Networks Volume 4 Nos. 1/2. Inderscience, 2009. |
|
48 | N. Asokan and Kaisa Nyberg. Security associations for wireless devices. In Stefanos Gritzalis, Tom Karygiannis, and Charalabos Skianis, editors, Security and Privacy in Mobile and Wireless Networking. Troubador Publishing Ltd, Leicester, UK, 2009. |
|
2008 |
47 | Jukka Valkonen and Kaisa Nyberg. Uudet salausmenetelmät parantavat yksityisyydensuojaa. Tietosuoja, 4:24–27, 2008. In Finnish. |
|
46 | Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Multidimensional linear cryptanalysis of reduced round Serpent. In Jennifer Seberry Yi Mu, Willy Susilo, editor, Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, volume 5107 of LNCS, pages 297–305. Springer, 2008. |
|
45 | Risto Hakala and Kaisa Nyberg. Linear distinguishing attack on Shannon. In Jennifer Seberry Yi Mu, Willy Susilo, editor, Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, volume 5107 of LNCS, pages 203–215. Springer, 2008. |
|
44 | Miia Hermelin and Kaisa Nyberg. Multidimensional linear distinguishing attacks and Boolean functions. In Fourth International Workshop on Boolean Functions: Cryptography and Applications, 2008. |
|
43 | Joo Yeon Cho, Miia Hermelin, and Kaisa Nyberg. A new technique for multidimensional linear cryptanalysis with applications on reduced round Serpent. In The 11th International Conference on Information Security and Cryptology 2008, ICISC'08, Seoul, Korea, volume 5461 of Lecture Notes in Computer Science, pages 383 – 398, 2008. |
|
42 | Aleksi Saarela, Jan-Erik Ekberg, and Kaisa Nyberg. Random beacon for privacy and group security. In IEEE International Conference on Wireless and Mobile Computing, Networking and Communications WIMOB 08, pages 514–519. IEEE, 2008. |
|
41 | Kaisa Nyberg, editor. Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, volume 5086 of Lecture Notes in Computer Science. Springer, 2008. |
|
2007 |
40 | Kaisa Nyberg and Jukka Valkonen. Wireless Group Security Using MAC Layer Multicast. In 8th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2007, Helsinki, Finland, June 2007. IEEE. |
|
39 | Kaisa Nyberg and Risto Hakala. A key-recovery attack on SOBER-128. In Eli Biham, Helena Handschuh, Stefan Lucks, and Vincent Rijmen, editors, Symmetric Cryptography, number 07021 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, 2007. |
|
38 | Kaisa Nyberg and Miia Hermelin. Multidimensional Walsh transform and a characterization of bent functions. In Tor Helleseth, P. Vijay Kumar, and Oyvind Ytrehus, editors, Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, pages 83–86. IEEE, 2007. |
|
37 | Billy Bob Brumley and Kaisa Nyberg. Differential properties of elliptic curves and blind signatures. In Information Security, 10th International Conference—ISC '07, volume 4779 of Lecture Notes in Computer Science, pages 376–389. Springer-Verlag, 2007. |
|
36 | Kaisa Nyberg. Kryptologia – tiedon turvaamisen tiede. Tietojenkäsittelytiede, 26:32–53, Heinäkuu 2007. |
|
2006 |
35 | Sven Laur and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings. In D. Pointcheval, editor, The 5th International Conference on Cryptology and Network Security, CANS 2006, volume 4301 of Lecture Notes in Computer Science, pages 90–107, Suzhou, China, December 2006. Springer. |
|
34 | Jukka Valkonen, N. Asokan, and Kaisa Nyberg. Ad hoc security association for groups. In L. Buttyan, V. Gligor, and D. Westhoff, editors, Proceedings of ESAS 2006, volume 4357 of Lecture Notes in Computer Science, pages 150–164, Hamburg, Germany, September 2006. Springer. |
|
33 | Kaisa Nyberg and Johan Wallén. Improved linear distinguishers for SNOW 2.0. In M. Robshaw, editor, Proceedings of the International Workshop on Fast Software Encryption (FSE 2006), volume 4047 of Lecture Notes in Computer Science, pages 144–162, Graz, Austria, March 2006. Springer. |
|
32 | Kaisa Nyberg. Connect Now to MitM. In Crypto 2006 Rump Session, 2006. |
|
2005 |
31 | Sven Laur and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings. Report 2005/424, Cryptology ePrint Archive, November 2005. |
|
30 | N. Asokan, Valtteri Niemi, and Kaisa Nyberg. Man-in-the-middle in tunnelled authentication protocols. In International Workshop on Security Protocols, volume 3364 of Lecture Notes in Computer Science, pages 28 – 41. Springer-Verlag, 2005. |
|
29 | Kaisa Nyberg. IKE in ad-hoc IP networking. In European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), volume 3313 of Lecture Notes in Computer Science, pages 139–151, Heidelberg, Germany, 2005. Springer-Verlag. |
|
2004 |
28 | Kaarle Ritvanen and Kaisa Nyberg. New key replay attacks on Bluetooth. In Proceedings of Nordsec 2004, pages 105–109. Department of Telematics, NTNU, 2004. |
|
27 | Kaisa Nyberg. Cryptographic algorithms for UMTS. In ECCOMAS 2004, Proceedings, volume II, page 506, 2004. |
|
26 | Christian Gehrmann, Chris J. Mitchell, and Kaisa Nyberg. Manual authentication for wireless devices. RSA Cryptobytes, 7(1):29–37, Spring 2004. |
|
2003 |
25 | Sampo Sovio, N. Asokan, and Kaisa Nyberg. Defining authorization domains using virtual devices. In SAINT Workshops, pages 331–336, 2003. |
|
24 | Anne-Maria Ernvall and Kaisa Nyberg. On server-aided computation for RSA protocols with private key splitting. In Svein Knapskog, editor, Proceedings of Nordsec 2003, pages 195–206. Department of Telematics, NTNU, 2003. |
|
23 | Valtteri Niemi and Kaisa Nyberg. UMTS Security. Wiley & Sons, 2003. |
|
22 | Kaisa Nyberg and Howard M. Heys, editors. Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, volume 2595 of Lecture Notes in Computer Science. Springer, 2003. |
|
2002 |
21 | Kaisa Nyberg. Link layer security for the first hop. In Proceedings of the International Workshop on European Cooperation in the Field of Development of Mobile Personal Communication – IST Projects, 2002. |
|
2001 |
20 | Kaisa Nyberg. Correlation theorems in cryptanalysis. Discrete Applied Mathematics, 111:177–188, 2001. |
|
19 | Christian Gehrmann and Kaisa Nyberg. Enhancements to Bluetooth baseband security. In Proceedings of Nordsec 2001, 2001. |
|
2000 |
18 | Miia Hermelin and Kaisa Nyberg. Correlation properties of the Bluetooth combiner generator. In J. S. Song, editor, Proceedings of ICISC'99, volume 1787 of Lecture Notes in Computer Science, pages 17–29. Springer-Verlag, 2000. |
|
1998 |
17 | Kaisa Nyberg, editor. Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, volume 1403 of Lecture Notes in Computer Science. Springer, 1998. |
|
1996 |
16 | Kaisa Nyberg and Rainer A. Rueppel. Message recovery for signature schemes based on the discrete logarithm problem. Designs, Codes and Cryptography, 7(1–2):61–81, 1996. |
|
15 | Kaisa Nyberg. Commutativity in cryptography. In 1st International Trier Conference in Functional Analysis. Walter Gruyter & Co, 1996. |
|
14 | Kaisa Nyberg. Fast accumulated hashing. In Fast Software Encryption, FSE 3, volume 1039 of Lecture Notes in Computer Science. Springer-Verlag, 1996. |
|
13 | Ross Anderson, Serge Vaudenay, Bart Preneel, and Kaisa Nyberg. The Newton channel. In Proceedings of the Cambridge Workshop on Information Hiding, volume 1174 of Lecture Notes in Computer Science. Springer-Verlag, 1996. |
|
12 | Kaisa Nyberg. Generalized Feistel networks. In Advances in Cryptology - ASIACRYPT'96, volume 1163 of Lecture Notes in Computer Science. Springer-Verlag, 1996. |
|
1995 |
11 | Kaisa Nyberg and Lars R. Knudsen. Provable security against a differential attack. Journal of Cryptology, 8(1):27–37, 1995. |
|
10 | Kaisa Nyberg and Rainer A. Rueppel. Message recovery for signature schemes based on the discrete logarithm problem. In Advances in Cryptology - EUROCRYPT'94, volume 950 of Lecture Notes in Computer Science. Springer-Verlag, 1995. |
|
9 | Kaisa Nyberg. Linear approximation of block ciphers. In Advances in Cryptology - EUROCRYPT'94, volume 950 of Lecture Notes in Computer Science. Springer-Verlag, 1995. |
|
8 | Kaisa Nyberg. S-boxes and round functions with controllable linearity and differential uniformity. In Fast Software Encryption, FSE 2, volume 1008 of Lecture Notes in Computer Science. Springer-Verlag, 1995. |
|
1994 |
7 | Kaisa Nyberg and Rainer A. Rueppel. Weaknesses in some recent key agreement protocols. Electronics Letters, 30(1):26–27, 1994. |
|
6 | Kaisa Nyberg. Differentially uniform mappings for cryptography. In Advances in Cryptology - EUROCRYPT'93, volume 765 of Lecture Notes in Computer Science. Springer-Verlag, 1994. |
|
5 | Kaisa Nyberg. New bent mappings suitable for fast implementation. In Fast Software Encryption, FSE 1, volume 809 of Lecture Notes in Computer Science. Springer-Verlag, 1994. |
|
1993 |
4 | Kaisa Nyberg. On the construction of highly non-linear permutations. In Advances in Cryptology - EUROCRYPT'92, volume 658 of Lecture Notes in Computer Science. Springer-Verlag, 1993. |
|
3 | Kaisa Nyberg and Rainer A. Rueppel. A new signature scheme based on the dsa giving message recovery. In Proceedings of the 1st ACM CCCS, Fairfax, 1993. ACM. |
|
1991 |
2 | Kaisa Nyberg. Constructions of bent functions and difference sets. In Advances in Cryptology - EUROCRYPT'90, volume 473 of Lecture Notes in Computer Science. Springer-Verlag, 1991. |
|
1 | Kaisa Nyberg. Perfect nonlinear s-boxes. In Advances in Cryptology - EUROCRYPT'91, volume 547 of Lecture Notes in Computer Science. Springer-Verlag, 1991. |
|