Follow
Luke O'Connor
Luke O'Connor
Security Consultant
No verified email - Homepage
Title
Cited by
Cited by
Year
MARS-a candidate cipher for AES
C Burwick, D Coppersmith, E D’Avignon, R Gennaro, S Halevi, C Jutla, ...
NIST AES Proposal 268, 80, 1998
2661998
Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party
C Binding, SG Hild, LJ O'connor, SK Singhal, VJ Shoup, M Steiner
US Patent 6,775,772, 2004
1782004
Method and apparatus for secure transmission of data and applications
G Karjoth, L O'Connor
US Patent App. 09/748,446, 2001
1532001
On the distribution of characteristics in bijective mappings
L O’Connor
Workshop on the Theory and Application of of Cryptographic Techniques, 360-370, 1993
1161993
Exchanging supplemental information fields between a client and a server
C Binding, SG Hild, LJ O'connor, SK Singhal
US Patent 6,775,687, 2004
942004
Embedding and probabilistic correlation attacks on clock-controlled shift registers
JD Golić, L O'Connor
Workshop on the Theory and Application of of Cryptographic Techniques, 230-243, 1994
931994
Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a server will not use a message encoding scheme proposed by a client
C Binding, SG Hild, YM Huang, LJ O'connor, SK Singhal, VJ Shoup, ...
US Patent 6,694,431, 2004
722004
Properties of linear approximation tables
L O'Connor
International Workshop on Fast Software Encryption, 131-136, 1994
551994
Method for inter-enterprise role-based authorization
HH Ludwig, LJ O'connor
US Patent 7,222,107, 2007
482007
Comments on Soviet encryption algorithm
C Charnes, L O'Connor, J Pieprzyk, R Safavi-Naini, Y Zheng
Workshop on the Theory and Application of of Cryptographic Techniques, 433-438, 1994
361994
Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks
D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ...
US Patent 6,185,679, 2001
352001
Inter-enterprise contract architecture for open distributed systems: Security requirements
Z Milosevic, D Arnold, L O'Connor
Proceedings of WET ICE'96. IEEE 5th Workshop on Enabling Technologies …, 1996
351996
The mars encryption algorithm
C Burnwick, D Coppersmith
IBM, August 27, 1999
341999
Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme
C Binding, SG Hild, YM Huang, LJ O'connor, SK Singhal, VJ Shoup, ...
US Patent 7,039,946, 2006
332006
Method and apparatus for a symmetric block cipher using multiple stages
D Coppersmith, R Gennaro, S Halevi, CS Jutla, SM Matyas Jr, ...
US Patent 6,185,304, 2001
312001
On applying linear cryptanalysis to IDEA
P Hawkes, L O'Connor
International Conference on the Theory and Application of Cryptology and …, 1996
311996
On the distribution of characteristics in bijective mappings
L O'connor
Journal of Cryptology 8 (2), 67-86, 1995
311995
Elevating the discussion on security management: The data centric paradigm
T Grandison, M Bilger, L O'Connor, M Graf, M Swimmer, M Schunter, ...
2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007
302007
Method and device for detecting an invalid RFID tag and method for manufacturing an RFID tag
M Backes, C Cachin, S Duri, G Karjoth, L O'Connor
US Patent App. 11/415,796, 2007
292007
Method of establishing the trustworthiness level of a participant in a communication connection
C Binding, S Hild, M Moser, L O'connor
US Patent 7,134,024, 2006
282006
The system can't perform the operation now. Try again later.
Articles 1–20