Publications by Risto Hakala

to appear

13Risto M. Hakala, Atle Kivelä, and Kaisa Nyberg. Estimating resistance against multidimensional linear attacks: An application on DEAN. In Information Security and Cryptology, 8th International Conference, Inscrypt 2012, Bejing, China, November 28-30, 2012, Proceedings, to appear.
Info

2012

12Risto M. Hakala. An upper bound for the linearity of Exponential Welch Costas functions. Finite Fields and Their Applications, 18(4):855–862, 2012.
Info
See dx.doi.org ...

2011

11Risto M. Hakala. A lower bound for the nonlinearity of Exponential Welch Costas functions. In Daniel Augot and Anne Canteaut, editors, Coding and Cryptography, 7th International Workshop, WCC 2011, Paris, France, April 11-15, 2011, Proceedings, pages 397–404, 2011. Extended abstract.
Info

2010

10Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, and Sampo Sovio. Consecutive S-box lookups: A timing attack on SNOW 3G. In Miguel Soriano, Sihan Qing, and Javier López, editors, Information and Communications Security, 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010, Proceedings, volume 6476 of Lecture Notes in Computer Science, pages 171–185. Springer, 2010.
Info
See dx.doi.org ...
9Risto M. Hakala and Kaisa Nyberg. On the nonlinearity of discrete logarithm in . In Claude Carlet and Alexander Pott, editors, Sequences and Their Applications – SETA 2010, 6th International Conference, Paris, France, September 13-17, 2010, Proceedings, volume 6338 of Lecture Notes in Computer Science, pages 333–345. Springer, 2010.
Info
See dx.doi.org ...
8Zahra Ahmadian, Javad Mohajeri, Mahmoud Salmasizadeh, Risto M. Hakala, and Kaisa Nyberg. A practical distinguisher for the Shannon cipher. Journal of Systems and Software, 83(4):543–547, 2010.
Info
See dx.doi.org ...

2009

7Billy Bob Brumley and Risto M. Hakala. Cache-timing template attacks. In Mitsuru Matsui, editor, Advances in Cryptology – ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings, volume 5912 of Lecture Notes in Computer Science, pages 667–684. Springer, 2009.
Info
See dx.doi.org ...
6Risto M. Hakala and Kaisa Nyberg. A multidimensional linear distinguishing attack on the Shannon cipher. International Journal of Applied Cryptography, 1(3):161–168, 2009.
Info
See dx.doi.org ...

2008

5Risto M. Hakala and Kaisa Nyberg. Linear distinguishing attack on Shannon. In Yi Mu, Willy Susilo, and Jennifer Seberry, editors, Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, volume 5107 of Lecture Notes in Computer Science, pages 297–305. Springer, 2008.
Info
See dx.doi.org ...
4Miki Sirola, Jukka Parviainen, Jaakko Talonen, Golan Lampi, Tuomas Alhonnoro, and Risto Hakala. Early fault detection with SOM based methods and visualizations – new contents for wide monitoring screens. In EHPG-Meeting of OECD Halden Reactor Project, 2008.
Info

2007

3Risto Hakala. Linear cryptanalysis of two stream ciphers. Master's thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Laboratory for Theoretical Computer Science, 2007.
PDF (411 kB)
Info
2Kaisa Nyberg and Risto Hakala. A key-recovery attack on SOBER-128. In Eli Biham, Helena Handschuh, Stefan Lucks, and Vincent Rijmen, editors, Symmetric Cryptography, number 07021 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, 2007.
Info
See drops.dagstuhl.de ...

2006

1Risto Hakala, Timo Similä, Miki Sirola, and Jukka Parviainen. Process state and progress visualization using self-organizing map. In Emilio Corchado, Hujun Yin, Vicente J. Botti, and Colin Fyfe, editors, Intelligent Data Engineering and Automated Learning – IDEAL 2006, 7th International Conference, Burgos, Spain, September 20-23, 2006, Proceedings, volume 4224 of Lecture Notes in Computer Science, pages 73–80. Springer, 2006.
Info
See dx.doi.org ...