关注
Luke O'Connor
Luke O'Connor
Security Consultant
没有经过验证的电子邮件地址 - 首页
标题
引用次数
引用次数
年份
MARS-a candidate cipher for AES
C Burwick, D Coppersmith, E D’Avignon, R Gennaro, S Halevi, C Jutla, ...
NIST AES Proposal 268, 80, 1998
2971998
Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party
C Binding, SG Hild, LJ O'connor, SK Singhal, VJ Shoup, M Steiner
US Patent 6,775,772, 2004
1832004
Method and apparatus for secure transmission of data and applications
G Karjoth, L O'Connor
US Patent App. 09/748,446, 2001
1552001
On the distribution of characteristics in bijective mappings
L O’Connor
Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application …, 1994
1251994
Embedding and probabilistic correlation attacks on clock-controlled shift registers
JD Golić, L O'Connor
Workshop on the Theory and Application of of Cryptographic Techniques, 230-243, 1994
981994
Exchanging supplemental information fields between a client and a server
C Binding, SG Hild, LJ O'connor, SK Singhal
US Patent 6,775,687, 2004
942004
Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a server will not use a message encoding scheme proposed by a client
C Binding, SG Hild, YM Huang, LJ O'connor, SK Singhal, VJ Shoup, ...
US Patent 6,694,431, 2004
752004
Properties of linear approximation tables
L O'Connor
Fast Software Encryption: Second International Workshop Leuven, Belgium …, 1995
601995
Method for inter-enterprise role-based authorization
HH Ludwig, LJ O'connor
US Patent 7,222,107, 2007
502007
The MARS encryption algorithm
C Burnwick, D Coppersmith
IBM, August 27, 1999
441999
Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks
D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ...
US Patent 6,185,679, 2001
432001
Comments on Soviet encryption algorithm
C Charnes, L O'Connor, J Pieprzyk, R Safavi-Naini, Y Zheng
Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995
401995
Inter-enterprise contract architecture for open distributed systems: Security requirements
Z Milosevic, D Arnold, L O'Connor
Proceedings of WET ICE'96. IEEE 5th Workshop on Enabling Technologies …, 1996
361996
XOR and non-XOR differential probabilities
P Hawkes, L O’Connor
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
351999
On the distribution of characteristics in bijective mappings
L O'connor
Journal of Cryptology 8, 67-86, 1995
351995
Method and apparatus for a symmetric block cipher using multiple stages
D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ...
US Patent 6,185,304, 2001
342001
Elevating the discussion on security management: The data centric paradigm
T Grandison, M Bilger, L O'Connor, M Graf, M Swimmer, M Schunter, ...
2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007
332007
Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme
C Binding, SG Hild, YM Huang, LJ O'connor, SK Singhal, VJ Shoup, ...
US Patent 7,039,946, 2006
332006
Method and device for detecting an invalid RFID tag and method for manufacturing an RFID tag
M Backes, C Cachin, S Duri, G Karjoth, L O'Connor
US Patent App. 11/415,796, 2007
322007
Method of establishing the trustworthiness level of a participant in a communication connection
C Binding, S Hild, M Moser, L O'connor
US Patent 7,134,024, 2006
312006
系统目前无法执行此操作,请稍后再试。
文章 1–20