Cache-timing template attacks BB Brumley, RM Hakala Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 217 | 2009 |
Consecutive S-box lookups: A Timing Attack on SNOW 3G BB Brumley, RM Hakala, K Nyberg, S Sovio Information and Communications Security: 12th International Conference …, 2010 | 31 | 2010 |
On the Nonlinearity of Discrete Logarithm in RM Hakala, K Nyberg International Conference on Sequences and Their Applications, 333-345, 2010 | 13 | 2010 |
Linear distinguishing attack on shannon RM Hakala, K Nyberg Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008 | 12 | 2008 |
A practical distinguisher for the Shannon cipher Z Ahmadian, J Mohajeri, M Salmasizadeh, RM Hakala, K Nyberg Journal of Systems and Software 83 (4), 543-547, 2010 | 9 | 2010 |
An upper bound for the linearity of Exponential Welch Costas functions RM Hakala Finite Fields and Their Applications 18 (4), 855-862, 2012 | 6 | 2012 |
A multidimensional linear distinguishing attack on the Shannon cipher RM Hakala, K Nyberg International Journal of Applied Cryptography 1 (3), 161-168, 2009 | 5 | 2009 |
Linear cryptanalysis of two stream ciphers R Hakala | 5 | 2007 |
Process state and progress visualization using self-organizing map R Hakala, T Similä, M Sirola, J Parviainen Intelligent Data Engineering and Automated Learning–IDEAL 2006: 7th …, 2006 | 4 | 2006 |
A key-recovery attack on SOBER-128 K Nyberg, R Hakala Schloss Dagstuhl–Leibniz-Zentrum für Informatik, 2007 | 3 | 2007 |
Estimating resistance against multidimensional linear attacks: an application on DEAN RM Hakala, A Kivelä, K Nyberg Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013 | 2 | 2013 |
Early fault detection with SOM based methods and visualizations-new contents for wide monitoring screens M Sirola, J Parviainen, J Talonen, G Lampi, T Alhonnoro, R Hakala EHPG-Meeting of OECD Halden Reactor Project. Loen, Norway, 2008 | 2 | 2008 |
Results on linear models in cryptography RM Hakala Aalto University, 2013 | 1 | 2013 |
A Lower Bound for the Nonlinearity of Exponential Welch Costas Functions RM Hakala WCC 2011-Workshop on coding and cryptography, 397-404, 2011 | | 2011 |
15. Intelligent data engineering O Simula, J Hollmén, K Raivio, M Sirola, T Similä, M Sulkava, P Lehtimäki, ... Biennial report 2006-2007/K. Raivio, R. Vigário, L. Koivisto (eds.), 2008 | | 2008 |
A Key Recovery Attack on SOBER-128 R Hakala, K Nyberg Internat. Begegnungs-und Forschungszentrum für Informatik, 2007 | | 2007 |