default search action
Kaisa Nyberg
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Kaisa Nyberg:
Modifications of bijective S-Boxes with linear structures. Cryptogr. Commun. 15(3): 617-625 (2023) - 2022
- [j18]Tomer Ashur, Mohsin Khan, Kaisa Nyberg:
Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations. IEEE Trans. Inf. Theory 68(2): 1296-1315 (2022) - [i20]Kaisa Nyberg:
Modifications of Bijective S-Boxes with Linear Structures. IACR Cryptol. ePrint Arch. 2022: 1550 (2022) - [i19]Kaisa Nyberg:
Characterisation of Bijectivity Preserving Componentwise Modification of S-Boxes. IACR Cryptol. ePrint Arch. 2022: 1566 (2022) - 2021
- [j17]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Kaisa Nyberg:
Editorial: Special issue on Boolean functions and their applications 2020. Cryptogr. Commun. 13(6): 887-889 (2021) - [j16]Kaisa Nyberg:
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2021(4): 124-137 (2021) - [i18]Tomer Ashur, Mohsin Khan, Kaisa Nyberg:
Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations. IACR Cryptol. ePrint Arch. 2021: 1567 (2021) - 2020
- [i17]Nils Gregor Leander, Bart Mennink, Kaisa Nyberg, Kan Yasuda:
Symmetric Cryptography (Dagstuhl Seminar 20041). Dagstuhl Reports 10(1): 130-143 (2020)
2010 – 2019
- 2019
- [j15]Kaisa Nyberg:
Affine linear cryptanalysis. Cryptogr. Commun. 11(3): 367-377 (2019) - [j14]Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg:
Multidimensional Linear Cryptanalysis. J. Cryptol. 32(1): 1-34 (2019) - [i16]Mohsin Khan, Kaisa Nyberg:
Linear Approximations of Random Functions and Permutations. IACR Cryptol. ePrint Arch. 2019: 934 (2019) - [i15]Kaisa Nyberg:
The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions. IACR Cryptol. ePrint Arch. 2019: 1381 (2019) - 2018
- [i14]Joan Daemen, Tetsu Iwata, Nils Gregor Leander, Kaisa Nyberg:
Symmetric Cryptography (Dagstuhl Seminar 18021). Dagstuhl Reports 8(1): 1-32 (2018) - 2017
- [j13]Céline Blondeau, Kaisa Nyberg:
Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity. Des. Codes Cryptogr. 82(1-2): 319-349 (2017) - [j12]Céline Blondeau, Gregor Leander, Kaisa Nyberg:
Differential-Linear Cryptanalysis Revisited. J. Cryptol. 30(3): 859-888 (2017) - [i13]Kaisa Nyberg:
Statistical and Linear Independence of Binary Random Variables. IACR Cryptol. ePrint Arch. 2017: 432 (2017) - 2016
- [j11]Céline Blondeau, Kaisa Nyberg:
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2016(2): 162-191 (2016) - [i12]Frederik Armknecht, Tetsu Iwata, Kaisa Nyberg, Bart Preneel:
Symmetric Cryptography (Dagstuhl Seminar 16021). Dagstuhl Reports 6(1): 34-54 (2016) - [i11]Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:
Capacity and Data Complexity in Multidimensional Linear Attack. IACR Cryptol. ePrint Arch. 2016: 51 (2016) - 2015
- [j10]Céline Blondeau, Kaisa Nyberg:
Perfect nonlinear functions and cryptography. Finite Fields Their Appl. 32: 120-147 (2015) - [j9]Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. J. Cryptol. 28(3): 718-744 (2015) - [c42]Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:
Capacity and Data Complexity in Multidimensional Linear Attack. CRYPTO (1) 2015: 141-160 - [e5]Kaisa Nyberg:
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings. Lecture Notes in Computer Science 9048, Springer 2015, ISBN 978-3-319-16714-5 [contents] - [i10]Céline Blondeau, Kaisa Nyberg:
New Links Between Differential and Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 183 (2015) - [i9]Céline Blondeau, Kaisa Nyberg:
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. IACR Cryptol. ePrint Arch. 2015: 184 (2015) - [i8]Céline Blondeau, Kaisa Nyberg:
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks. IACR Cryptol. ePrint Arch. 2015: 935 (2015) - 2014
- [j8]Hadi Soleimany, Kaisa Nyberg:
Zero-correlation linear cryptanalysis of reduced-round LBlock. Des. Codes Cryptogr. 73(2): 683-698 (2014) - [c41]Céline Blondeau, Kaisa Nyberg:
Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. EUROCRYPT 2014: 165-182 - [c40]Céline Blondeau, Gregor Leander, Kaisa Nyberg:
Differential-Linear Cryptanalysis Revisited. FSE 2014: 411-430 - 2013
- [j7]Andrea Röck, Kaisa Nyberg:
Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers. Des. Codes Cryptogr. 66(1-3): 175-193 (2013) - [c39]Céline Blondeau, Kaisa Nyberg:
New Links between Differential and Linear Cryptanalysis. EUROCRYPT 2013: 388-404 - [c38]Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. FSE 2013: 71-91 - 2012
- [j6]Miia Hermelin, Kaisa Nyberg:
Multidimensional linear distinguishing attacks and Boolean functions. Cryptogr. Commun. 4(1): 47-64 (2012) - [c37]Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang:
Integral and Multidimensional Linear Distinguishers with Correlation Zero. ASIACRYPT 2012: 244-261 - [c36]Risto M. Hakala, Atle Kivelä, Kaisa Nyberg:
Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN. Inscrypt 2012: 246-262 - [c35]Kaisa Nyberg:
"Provable" Security against Differential and Linear Cryptanalysis. FSE 2012: 1-8 - [c34]Céline Blondeau, Benoît Gérard, Kaisa Nyberg:
Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics. SCN 2012: 343-360 - [e4]Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg:
Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers. Lecture Notes in Computer Science 7127, Springer 2012, ISBN 978-3-642-27936-2 [contents] - [i7]Céline Blondeau, Benoît Gérard, Kaisa Nyberg:
Multiple Differential Cryptanalysis using \LLR and χ2 Statistics. IACR Cryptol. ePrint Arch. 2012: 360 (2012) - 2011
- [i6]Miia Hermelin, Kaisa Nyberg:
Linear Cryptanalysis Using Multiple Linear Approximations. IACR Cryptol. ePrint Arch. 2011: 93 (2011) - [i5]Andrea Röck, Kaisa Nyberg:
Exploiting Linear Hull in Matsui's Algorithm 1 (extended version). IACR Cryptol. ePrint Arch. 2011: 285 (2011) - 2010
- [j5]Zahra Ahmadian, Javad Mohajeri, Mahmoud Salmasizadeh, Risto M. Hakala, Kaisa Nyberg:
A practical distinguisher for the Shannon cipher. J. Syst. Softw. 83(4): 543-547 (2010) - [c33]Miia Hermelin, Kaisa Nyberg:
Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited. CT-RSA 2010: 318-333 - [c32]Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio:
Consecutive S-box Lookups: A Timing Attack on SNOW 3G. ICICS 2010: 171-185 - [c31]Risto M. Hakala, Kaisa Nyberg:
On the Nonlinearity of Discrete Logarithm in \mathbb F2n\mathbb F_{2^n}. SETA 2010: 333-345
2000 – 2009
- 2009
- [j4]Risto M. Hakala, Kaisa Nyberg:
A multidimensional linear distinguishing attack on the Shannon cipher. Int. J. Appl. Cryptogr. 1(3): 161-168 (2009) - [c30]Billy Bob Brumley, Kaisa Nyberg:
On Modular Decomposition of Integers. AFRICACRYPT 2009: 386-402 - [c29]Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg:
Multidimensional Extension of Matsui's Algorithm 2. FSE 2009: 209-227 - [i4]Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg:
Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1. Symmetric Cryptography 2009 - 2008
- [c28]Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg:
Multidimensional Linear Cryptanalysis of Reduced Round Serpent. ACISP 2008: 203-215 - [c27]Risto M. Hakala, Kaisa Nyberg:
Linear Distinguishing Attack on Shannon. ACISP 2008: 297-305 - [c26]Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg:
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. ICISC 2008: 383-398 - [c25]Peter Mueller, Kaisa Nyberg, Stefanos Gritzalis, Costas Lambrinoudakis:
Message from the SecPri Workshop Organizing Technical Co-chairs. WiMob 2008 - [c24]Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg:
Random Beacon for Privacy and Group Security. WiMob 2008: 514-519 - [e3]Kaisa Nyberg:
Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5086, Springer 2008, ISBN 978-3-540-71038-7 [contents] - 2007
- [c23]Billy Bob Brumley, Kaisa Nyberg:
Differential Properties of Elliptic Curves and Blind Signatures. ISC 2007: 376-389 - [c22]Kaisa Nyberg, Miia Hermelin:
Multidimensional Walsh Transform and a Characterization of Bent Functions. ITW 2007: 1-4 - [c21]Kaisa Nyberg, Jukka Valkonen:
Wireless Group Security Using MAC Layer Multicast. WOWMOM 2007: 1-8 - [i3]Kaisa Nyberg, Risto M. Hakala:
A Key-Recovery Attack on SOBER-128. Symmetric Cryptography 2007 - 2006
- [c20]Sven Laur, Kaisa Nyberg:
Efficient Mutual Data Authentication Using Manually Authenticated Strings. CANS 2006: 90-107 - [c19]Jukka Valkonen, N. Asokan, Kaisa Nyberg:
Ad Hoc Security Associations for Groups. ESAS 2006: 150-164 - [c18]Kaisa Nyberg, Johan Wallén:
Improved Linear Distinguishers for SNOW 2.0. FSE 2006: 144-162 - 2005
- [i2]Sven Laur, N. Asokan, Kaisa Nyberg:
Efficient Mutual Data Authentication Using Manually Authenticated Strings. IACR Cryptol. ePrint Arch. 2005: 424 (2005) - 2004
- [c17]Kaisa Nyberg:
IKE in Ad Hoc IP Networking. ESAS 2004: 139-151 - 2003
- [b1]Valtteri Niemi, Kaisa Nyberg:
UMTS security. Wiley 2003, ISBN 978-0-470-84794-7, pp. I-XII, 1-273 - [c16]Sampo Sovio, N. Asokan, Kaisa Nyberg:
Defining Authorization Domains Using Virtual Devices. SAINT Workshops 2003: 331-336 - [c15]N. Asokan, Valtteri Niemi, Kaisa Nyberg:
Man-in-the-Middle in Tunnelled Authentication Protocols. Security Protocols Workshop 2003: 28-41 - [e2]Kaisa Nyberg, Howard M. Heys:
Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers. Lecture Notes in Computer Science 2595, Springer 2003, ISBN 3-540-00622-2 [contents] - 2002
- [i1]N. Asokan, Valtteri Niemi, Kaisa Nyberg:
Man-in-the-Middle in Tunnelled Authentication Protocols. IACR Cryptol. ePrint Arch. 2002: 163 (2002) - 2001
- [j3]Kaisa Nyberg:
Correlation theorems in cryptanalysis. Discret. Appl. Math. 111(1-2): 177-188 (2001)
1990 – 1999
- 1999
- [c14]Miia Hermelin, Kaisa Nyberg:
Correlation Properties of the Bluetooth Combiner Generator. ICISC 1999: 17-29 - 1998
- [e1]Kaisa Nyberg:
Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding. Lecture Notes in Computer Science 1403, Springer 1998, ISBN 3-540-64518-7 [contents] - 1996
- [j2]Kaisa Nyberg, Rainer A. Rueppel:
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. Des. Codes Cryptogr. 7(1-2): 61-81 (1996) - [c13]Kaisa Nyberg:
Generalized Feistel Networks. ASIACRYPT 1996: 91-104 - [c12]Kaisa Nyberg:
Fast Accumulated Hashing. FSE 1996: 83-87 - [c11]Ross J. Anderson, Serge Vaudenay, Bart Preneel, Kaisa Nyberg:
The Newton Channel. Information Hiding 1996: 151-156 - 1995
- [j1]Kaisa Nyberg, Lars R. Knudsen:
Provable Security Against a Differential Attack. J. Cryptol. 8(1): 27-37 (1995) - 1994
- [c10]Kaisa Nyberg, Rainer A. Rueppel:
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. EUROCRYPT 1994: 182-193 - [c9]Kaisa Nyberg:
Linear Approximation of Block Ciphers. EUROCRYPT 1994: 439-444 - [c8]Kaisa Nyberg:
S-boxes and Round Functions with Controllable Linearity and Differential Uniformity. FSE 1994: 111-130 - 1993
- [c7]Kaisa Nyberg, Rainer A. Rueppel:
A New Signature Scheme Based on the DSA Giving Message Recovery. CCS 1993: 58-61 - [c6]Kaisa Nyberg:
Differentially Uniform Mappings for Cryptography. EUROCRYPT 1993: 55-64 - [c5]Kaisa Nyberg:
New Bent Mappings Suitable for Fast Implementation. FSE 1993: 179-184 - 1992
- [c4]Kaisa Nyberg, Lars R. Knudsen:
Provable Security Against Differential Cryptanalysis. CRYPTO 1992: 566-574 - [c3]Kaisa Nyberg:
On the Construction of Highly Nonlinear Permutations. EUROCRYPT 1992: 92-98 - 1991
- [c2]Kaisa Nyberg:
Perfect Nonlinear S-Boxes. EUROCRYPT 1991: 378-386 - 1990
- [c1]Kaisa Nyberg:
Constructions of Bent Functions and Difference Sets. EUROCRYPT 1990: 151-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint