Kaisa Nyberg
#27,975
Most Influential Person Now
Finnish cryptographer
Kaisa Nyberg's AcademicInfluence.com Rankings
Kaisa Nybergcomputer-science Degrees
Computer Science
#2743
World Rank
#2871
Historical Rank
Database
#7400
World Rank
#7669
Historical Rank
Download Badge
Computer Science
Kaisa Nyberg's Degrees
- PhD Mathematics University of Turku
- Masters Mathematics University of Turku
Why Is Kaisa Nyberg Influential?
(Suggest an Edit or Addition)According to Wikipedia, Kaisa Nyberg is a Finnish cryptographer and computer security researcher. Contributions Nyberg's research includes the theory of perfect nonlinear S-boxes , provably secure block cipher design Education and career Nyberg received her Ph.D. in mathematics in 1980 from the University of Helsinki. Her dissertation, On Subspaces of Products of Nuclear Fréchet Spaces, was in topology, and was supervised by Edward Leonard Dubinsky.
Kaisa Nyberg's Published Works
Published Works
- Differentially Uniform Mappings for Cryptography (1994) (938)
- Advances in Cryptology — EUROCRYPT'98 (1998) (556)
- Perfect Nonlinear S-Boxes (1991) (428)
- Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem (1994) (309)
- A new signature scheme based on the DSA giving message recovery (1993) (268)
- Linear Approximation of Block Ciphers (1994) (257)
- Provable Security Against Differential Cryptanalysis (1992) (240)
- On the Construction of Highly Nonlinear Permutations (1992) (192)
- Efficient Mutual Data Authentication Using Manually Authenticated Strings (2006) (176)
- Message recovery for signature schemes based on the discrete logarithm problem (1996) (165)
- Provable security against a differential attack (1994) (159)
- Man-in-the-Middle in Tunnelled Authentication Protocols (2003) (159)
- Multidimensional Extension of Matsui's Algorithm 2 (2009) (113)
- S-boxes and Round Functions with Controllable Linearity and Differential Uniformity (1994) (106)
- Integral and Multidimensional Linear Distinguishers with Correlation Zero (2012) (97)
- Fast Accumulated Hashing (1996) (93)
- Improved Linear Distinguishers for SNOW 2.0 (2006) (87)
- Multidimensional Linear Cryptanalysis of Reduced Round Serpent (2008) (83)
- Generalized Feistel Networks (1996) (79)
- Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities (2014) (78)
- Man-in-the-Middle in Tunneled Authentication Protocols (2002) (78)
- Constructions of Bent Functions and Difference Sets (1991) (76)
- Zero-correlation linear cryptanalysis of reduced-round LBlock (2014) (61)
- New Links Between Differential and Linear Cryptanalysis (2013) (61)
- Differential-Linear Cryptanalysis Revisited (2014) (60)
- Reflection Cryptanalysis of PRINCE-Like Ciphers (2013) (55)
- Weaknesses in some recent key agreement protocols (1994) (52)
- Perfect nonlinear functions and cryptography (2015) (51)
- UMTS security (2021) (46)
- Security in personal area networks (2004) (46)
- The Newton Channel (1996) (43)
- Correlation Properties of the Bluetooth Combiner Generator (1999) (43)
- New digital signature scheme based on discrete logarithm (1994) (42)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (2017) (42)
- Enhancements to Bluetooth Baseband Security (2007) (42)
- Correlation Theorems in Cryptanalysis (2001) (41)
- Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics (2012) (41)
- The personal CA – PKI for a Personal Area Network (2003) (39)
- Ad Hoc Security Associations for Groups (2006) (38)
- A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent (2009) (37)
- Linear Cryptanalysis Using Multiple Linear Approximations (2011) (34)
- Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited (2010) (32)
- Capacity and Data Complexity in Multidimensional Linear Attack (2015) (25)
- Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis (2017) (20)
- Defining authorization domains using virtual devices (2003) (19)
- Multidimensional Walsh Transform and a Characterization of Bent Functions (2007) (19)
- Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers (2008) (18)
- New Bent Mappings Suitable for Fast Implementation (1993) (17)
- Consecutive S-box Lookups: A Timing Attack on SNOW 3G (2010) (16)
- Multidimensional linear distinguishing attacks and Boolean functions (2012) (15)
- Personal network security architecture (2005) (14)
- Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1 (2009) (13)
- Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography (2002) (12)
- Tameness of pairs of nuclear power series spaces and related topics (1984) (11)
- Generalization of Matsui’s Algorithm 1 to linear hull for key-alternating block ciphers (2013) (11)
- Advances in cryptology-EUROCRYPT '98 : International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31-June 4, 1998 : proceedings (1998) (10)
- On the nonlinearity of discrete logarithm in F2n (2010) (10)
- Differential Properties of Elliptic Curves and Blind Signatures (2007) (9)
- Linear Distinguishing Attack on Shannon (2008) (9)
- Final Version of the Network-Level Security Architecture Specification (2005) (9)
- "Provable" Security against Differential and Linear Cryptanalysis (2012) (8)
- The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions (2019) (8)
- Improved Linear Cryptanalysis of SMS4 Block Cipher (2011) (7)
- A tame splitting theorem for Köthe spaces (1989) (7)
- Exploiting Linear Hull in Matsui's Algorithm 1 (extended version) (2011) (7)
- Statistical and Linear Independence of Binary Random Variables (2017) (7)
- On Server-Aided Computation for RSA Protocols with Private Key Splitting (2003) (7)
- CRYPTOGRAPHIC ALGORITHMS FOR UMTS (2004) (7)
- Topics in Cryptology –- CT-RSA 2015 (2015) (7)
- Symmetric Cryptography (Dagstuhl Seminar 18021) (2018) (6)
- On Distinct Known Plaintext Attacks (2015) (6)
- Twisted sums of nuclear Fréchet spaces (1982) (6)
- Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks (2015) (6)
- Affine linear cryptanalysis (2018) (6)
- A practical distinguisher for the Shannon cipher (2010) (5)
- On the Nonlinearity of Discrete Logarithm in \mathbb F2n\mathbb F_{2^n} (2010) (5)
- On Modular Decomposition of Integers (2009) (5)
- Trust model, communication and configuration security for Personal Area (2002) (5)
- Universal Mobile Telecommunications System Security: Niemi/UMTS Security (2006) (4)
- A multidimensional linear distinguishing attack on the Shannon cipher (2009) (4)
- Introduction to Security and to UMTS (2006) (4)
- Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15–16, 2002 Revised Papers (2003) (4)
- Zero-correlation linear cryptanalysis of reduced-round LBlock (2014) (4)
- Secure Spontaneous Interaction, Special issue, International Journal of Security and Networks Volume 4 Nos. 1/2 (2009) (3)
- Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings (2009) (3)
- A Key-Recovery Attack on SOBER-128 (2007) (3)
- IKE in Ad Hoc IP Networking (2004) (3)
- Ad-hoc Security Associations for Wireless Devices (2006) (3)
- Linear Cryptanalysis of Two Stream Ciphers (2007) (2)
- Conceptual Secure PN Architecture (2005) (2)
- Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations (2022) (2)
- Wireless Group Security Using MAC Layer Multicast (2007) (1)
- Reflection Cryptanalysis of PRINCE-Like Ciphers (2013) (1)
- State of the Art and Functional Specification of Network-Level Security Architecture (2004) (1)
- Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN (2012) (1)
- Splitting twisted sums of nuclear Köthe spaces (1986) (1)
- Multidimensional Linear Cryptanalysis (2018) (1)
- The Ramsey theorem and complemented basic sequences in Fréchet spaces with absolute finite-dimensional decompositions (1989) (1)
- Linear Approximations of Random Functions and Permutations (2019) (1)
- First solutions for implementation of Key Management and Crypto techniques (2006) (1)
- Modifications of bijective S-Boxes with linear structures (2023) (1)
- The Newton (2004) (1)
- Characterisation of Bijectivity Preserving Componentwise Modification of S-Boxes (2022) (1)
- Differential-Linear Cryptanalysis Revisited (2016) (1)
- Security Associations for Wireless Devices (2009) (1)
- 3GPP Algorithm Specification Principles (2006) (0)
- Information Security Technology for Applications, 15th Nordic Conference on Secure IT Systems, NordSec 2010, Aalto University, Finland, October 27-29, 2010, Revised Selected Papers (2012) (0)
- Information Security Technology for Applications (2010) (0)
- Wireless GroupSecurity UsingMAC LayerMulticast (2007) (0)
- A method for ensuring data security, communication system and communication device (2001) (0)
- Information Security, 10th International Conference-ISC '07 (2007) (0)
- Symmetric Cryptography (Dagstuhl Seminar 16021) (2016) (0)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (2016) (0)
- Security Features in Releases 4 and 5 (2006) (0)
- Message from the SecPri Workshop Organizing Technical Co-chairs (2008) (0)
- Key Replay Attack on Improved Bluetooth Encryption (0)
- Authentication and Key Generation Algorithm (2006) (0)
- Authentification d'abonnes (2001) (0)
- Affine linear cryptanalysis (2018) (0)
- Multidimensional linear distinguishing attacks and Boolean functions (2011) (0)
- Multidimensional WalshTransform andaCharacterization ofBentFunctions (2007) (0)
- Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis (2021) (0)
- Securing network access in future mobile systems (2004) (0)
- Confidentiality and Integrity Algorithms (2006) (0)
- Kernel Algorithm KASUMI (2006) (0)
- The subscriber authentication (2000) (0)
- UMTS Security Features in Release 1999 (2006) (0)
- Method for digital signature and key agreement method (1993) (0)
- Introduction to Cryptography (2006) (0)
- Proceedings of the 15th Nordic conference on Information Security Technology for Applications (2010) (0)
- Report from Dagstuhl Seminar 18021 Symmetric Cryptography (2016) (0)
- The 11th International Conference on Information Security and Cryptology 2008, ICISC'08, Seoul, Korea (2008) (0)
- ISO MANA Certificates in Practice (2010) (0)
- Random Beacon for Privacy and Group Security (2008) (0)
- Complemented subspaces of products of power series spaces (1982) (0)
- Editorial: Special issue on Boolean functions and their applications 2020 (2021) (0)
- Generalization of Matsui’s Algorithm 1 to linear hull for key-alternating block ciphers (2012) (0)
- A method for ensuring data transmission safety-, communication system and communication device (2002) (0)
- Symmetric Cryptography (Dagstuhl Seminar 20041) (2020) (0)
- Quantitative Analysis of Cyber (2018) (0)
- Notation of Parameters, Sets and Functions (2006) (0)
This paper list is powered by the following services:
Other Resources About Kaisa Nyberg
What Schools Are Affiliated With Kaisa Nyberg?
Kaisa Nyberg is affiliated with the following schools: