Exact maximum expected differential and linear probability for 2-round Advanced Encryption Standard L Keliher, J Sui IET Information Security 1 (2), 53-57, 2007 | 104 | 2007 |
New method for upper bounding the maximum average linear hull probability for SPNs L Keliher, H Meijer, S Tavares International Conference on the Theory and Applications of Cryptographic …, 2001 | 74 | 2001 |
Hand occlusion with tablet-sized direct pen input D Vogel, M Cudmore, G Casiez, R Balakrishnan, L Keliher Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009 | 71 | 2009 |
Linear cryptanalysis of substitution-permutation networks LT Keliher Queen's University, 2003 | 64 | 2003 |
Improving the upper bound on the maximum average linear hull probability for Rijndael L Keliher, H Meijer, S Tavares Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001 …, 2001 | 64 | 2001 |
Refined analysis of bounds related to linear and differential cryptanalysis for the AES L Keliher Advanced Encryption Standard–AES: 4th International Conference, AES 2004 …, 2005 | 55 | 2005 |
Cryptanalysis of the toorani-falahati hill ciphers L Keliher, AZ Delaney 2013 IEEE Symposium on Computers and Communications (ISCC), 000436-000440, 2013 | 23 | 2013 |
A new substitution-permutation network cipher using key-dependent s-boxes L Keliher, H Meijer, S Tavares Proc SAC’97, 13-26, 1997 | 17 | 1997 |
Modeling linear characteristics of substitution-permutation networks L Keliher, H Meijer, S Tavares Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 …, 2000 | 16 | 2000 |
Selected Areas in Cryptography: 15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, 2008 R Avanzi, L Keliher, F Sica Springer, 2009 | 15* | 2009 |
Substitution-permutation network cryptosystems using key-dependent s-boxes. L Keliher Queen's University at Kingston, 1998 | 14 | 1998 |
Toward provable security against differential and linear cryptanalysis for Camellia and related ciphers L Keliher International Journal of Network Security 5, 167-175, 2007 | 10 | 2007 |
Cryptanalysis of a Modified Hill Cipher L Keliher International Journal of Computer and Network Security 2 (7), 122-126, 2010 | 8 | 2010 |
High probability linear hulls in Q L Keliher, H Meijer, S Tavares Proceedings of Second Open NESSIE Workshop, Royal Holloway College …, 2001 | 6 | 2001 |
Slide attacks against iterated hill ciphers L Keliher, S Thibodeau Security in Computing and Communications: International Symposium, SSCC 2013 …, 2013 | 5 | 2013 |
Toward the true random cipher: On expected linear probability values for SPNs with randomly selected s-boxes, chapter in Communications, Information and Network Security, V … L Keliher, H Meijer, S Tavares Kluwer Academic Publishers, 2003 | 5 | 2003 |
An analysis of personal journal subscriptions of university faculty. Part I. Science EJ Schuegraf, LT Keliher, MF van Bommel Journal of the American Society for Information Science 43 (1), 28-33, 1992 | 5 | 1992 |
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael L Keliher, H Meijer, S Tavares Cryptology ePrint Archive, 2004 | 4 | 2004 |
Toward the true random cipher: On expected linear probability values for SPNs with randomly selected S-boxes L Keliher, H Meijer, S Tavares Communications, Information and Network Security, 123-146, 2003 | 4 | 2003 |
Provable security of substitution-permutation encryption networks against linear cryptanalysis L Keliher, H Meijer, S Tavares 2000 Canadian Conference on Electrical and Computer Engineering. Conference …, 2000 | 4 | 2000 |