Luke O'Connor
Luke O'Connor
KPMG
在 kpmg.com.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
MARS-a candidate cipher for AES
C Burwick, D Coppersmith, E D’Avignon, R Gennaro, S Halevi, C Jutla, ...
NIST AES Proposal 268, 80, 1998
2651998
Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party
C Binding, SG Hild, LJ O'connor, SK Singhal, VJ Shoup, M Steiner
US Patent 6,775,772, 2004
1772004
Method and apparatus for secure transmission of data and applications
G Karjoth, L O'Connor
US Patent App. 09/748,446, 2001
1502001
On the distribution of characteristics in bijective mappings
L O’Connor
Workshop on the Theory and Application of of Cryptographic Techniques, 360-370, 1993
1131993
Exchanging supplemental information fields between a client and a server
C Binding, SG Hild, LJ O'connor, SK Singhal
US Patent 6,775,687, 2004
932004
Embedding and probabilistic correlation attacks on clock-controlled shift registers
JD Golić, L O'Connor
Workshop on the Theory and Application of of Cryptographic Techniques, 230-243, 1994
911994
Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a server will not use a message encoding scheme proposed by a client
C Binding, SG Hild, YM Huang, LJ O'connor, SK Singhal, VJ Shoup, ...
US Patent 6,694,431, 2004
692004
Properties of linear approximation tables
L O'Connor
International Workshop on Fast Software Encryption, 131-136, 1994
491994
Method for inter-enterprise role-based authorization
HH Ludwig, LJ O'connor
US Patent 7,222,107, 2007
472007
Comments on Soviet encryption algorithm
C Charnes, L O'Connor, J Pieprzyk, R Safavi-Naini, Y Zheng
Workshop on the Theory and Application of of Cryptographic Techniques, 433-438, 1994
361994
Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks
D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ...
US Patent 6,185,679, 2001
352001
Inter-enterprise contract architecture for open distributed systems: Security requirements
Z Milosevic, D Arnold, L O'Connor
Proceedings of WET ICE'96. IEEE 5th Workshop on Enabling Technologies …, 1996
351996
Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme
C Binding, SG Hild, YM Huang, LJ O'connor, SK Singhal, VJ Shoup, ...
US Patent 7,039,946, 2006
322006
The Mars Encryption Algorithm
C Burnwick, D Coppersmith
IBM, August 27, 1999
311999
On applying linear cryptanalysis to IDEA
P Hawkes, L O'Connor
International Conference on the Theory and Application of Cryptology and …, 1996
311996
Method and apparatus for a symmetric block cipher using multiple stages
D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ...
US Patent 6,185,304, 2001
302001
Elevating the discussion on security management: The data centric paradigm
T Grandison, M Bilger, L O'Connor, M Graf, M Swimmer, M Schunter, ...
2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007
292007
Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks
D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ...
US Patent 6,189,095, 2001
272001
Method and device for detecting an invalid RFID tag and method for manufacturing an RFID tag
M Backes, C Cachin, S Duri, G Karjoth, L O'Connor
US Patent App. 11/415,796, 2007
262007
On blending attacks for mixes with memory
L O’Connor
International Workshop on Information Hiding, 39-52, 2005
262005
系统目前无法执行此操作,请稍后再试。
文章 1–20