MARS-a candidate cipher for AES C Burwick, D Coppersmith, E D’Avignon, R Gennaro, S Halevi, C Jutla, ... NIST AES Proposal 268, 80, 1998 | 297 | 1998 |
Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party C Binding, SG Hild, LJ O'connor, SK Singhal, VJ Shoup, M Steiner US Patent 6,775,772, 2004 | 183 | 2004 |
Method and apparatus for secure transmission of data and applications G Karjoth, L O'Connor US Patent App. 09/748,446, 2001 | 155 | 2001 |
On the distribution of characteristics in bijective mappings L O’Connor Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application …, 1994 | 125 | 1994 |
Embedding and probabilistic correlation attacks on clock-controlled shift registers JD Golić, L O'Connor Workshop on the Theory and Application of of Cryptographic Techniques, 230-243, 1994 | 98 | 1994 |
Exchanging supplemental information fields between a client and a server C Binding, SG Hild, LJ O'connor, SK Singhal US Patent 6,775,687, 2004 | 94 | 2004 |
Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a server will not use a message encoding scheme proposed by a client C Binding, SG Hild, YM Huang, LJ O'connor, SK Singhal, VJ Shoup, ... US Patent 6,694,431, 2004 | 75 | 2004 |
Properties of linear approximation tables L O'Connor Fast Software Encryption: Second International Workshop Leuven, Belgium …, 1995 | 61 | 1995 |
Method for inter-enterprise role-based authorization HH Ludwig, LJ O'connor US Patent 7,222,107, 2007 | 50 | 2007 |
The MARS encryption algorithm C Burnwick, D Coppersmith IBM, August 27, 1999 | 44 | 1999 |
Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ... US Patent 6,185,679, 2001 | 43 | 2001 |
Comments on Soviet encryption algorithm C Charnes, L O'Connor, J Pieprzyk, R Safavi-Naini, Y Zheng Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995 | 40 | 1995 |
Inter-enterprise contract architecture for open distributed systems: Security requirements Z Milosevic, D Arnold, L O'Connor Proceedings of WET ICE'96. IEEE 5th Workshop on Enabling Technologies …, 1996 | 36 | 1996 |
XOR and non-XOR differential probabilities P Hawkes, L O’Connor Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999 | 35 | 1999 |
On the distribution of characteristics in bijective mappings L O'connor Journal of Cryptology 8, 67-86, 1995 | 35 | 1995 |
Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme C Binding, SG Hild, YM Huang, LJ O'connor, SK Singhal, VJ Shoup, ... US Patent 7,039,946, 2006 | 34 | 2006 |
Method and apparatus for a symmetric block cipher using multiple stages D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ... US Patent 6,185,304, 2001 | 34 | 2001 |
Method and device for detecting an invalid RFID tag and method for manufacturing an RFID tag M Backes, C Cachin, S Duri, G Karjoth, L O'Connor US Patent App. 11/415,796, 2007 | 33 | 2007 |
Elevating the discussion on security management: The data centric paradigm T Grandison, M Bilger, L O'Connor, M Graf, M Swimmer, M Schunter, ... 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007 | 33 | 2007 |
Method of establishing the trustworthiness level of a participant in a communication connection C Binding, S Hild, M Moser, L O'connor US Patent 7,134,024, 2006 | 31 | 2006 |