Follow
Risto Hakala
Risto Hakala
Finnish Transport and Communications Agency
Verified email at traficom.fi - Homepage
Title
Cited by
Cited by
Year
Cache-timing template attacks
BB Brumley, RM Hakala
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
2122009
Consecutive S-box lookups: A Timing Attack on SNOW 3G
BB Brumley, RM Hakala, K Nyberg, S Sovio
Information and Communications Security: 12th International Conference …, 2010
292010
On the Nonlinearity of Discrete Logarithm in
RM Hakala, K Nyberg
International Conference on Sequences and Their Applications, 333-345, 2010
132010
Linear distinguishing attack on shannon
RM Hakala, K Nyberg
Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008
122008
A practical distinguisher for the Shannon cipher
Z Ahmadian, J Mohajeri, M Salmasizadeh, RM Hakala, K Nyberg
Journal of Systems and Software 83 (4), 543-547, 2010
92010
A multidimensional linear distinguishing attack on the Shannon cipher
RM Hakala, K Nyberg
International Journal of Applied Cryptography 1 (3), 161-168, 2009
52009
Linear cryptanalysis of two stream ciphers
R Hakala
52007
An upper bound for the linearity of Exponential Welch Costas functions
RM Hakala
Finite Fields and Their Applications 18 (4), 855-862, 2012
42012
Process state and progress visualization using self-organizing map
R Hakala, T Similä, M Sirola, J Parviainen
Intelligent Data Engineering and Automated Learning–IDEAL 2006: 7th …, 2006
42006
A key-recovery attack on SOBER-128
K Nyberg, R Hakala
Dagstuhl Seminar Proceedings, 2007
32007
Estimating resistance against multidimensional linear attacks: an application on DEAN
RM Hakala, A Kivelä, K Nyberg
Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013
22013
Early fault detection with SOM based methods and visualizations-new contents for wide monitoring screens
M Sirola, J Parviainen, J Talonen, G Lampi, T Alhonnoro, R Hakala
EHPG-Meeting of OECD Halden Reactor Project. Loen, Norway, 2008
22008
Results on linear models in cryptography
RM Hakala
Aalto University, 2013
12013
A Lower Bound for the Nonlinearity of Exponential Welch Costas Functions
RM Hakala
WCC 2011-Workshop on coding and cryptography, 397-404, 2011
2011
15. Intelligent data engineering
O Simula, J Hollmén, K Raivio, M Sirola, T Similä, M Sulkava, P Lehtimäki, ...
Biennial report 2006-2007/K. Raivio, R. Vigário, L. Koivisto (eds.), 2008
2008
A Key Recovery Attack on SOBER-128
R Hakala, K Nyberg
Internat. Begegnungs-und Forschungszentrum für Informatik, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–16