R
Risto Hakala
Researcher at Aalto University
Publications - 21
Citations - 559
Risto Hakala is an academic researcher from Aalto University. The author has contributed to research in topics: Distinguishing attack & Linear cryptanalysis. The author has an hindex of 7, co-authored 21 publications receiving 484 citations. Previous affiliations of Risto Hakala include Helsinki University of Technology.
Papers
More filters
Journal ArticleDOI
Preparation of poly(ε-caprolactone)-based tissue engineering scaffolds by stereolithography.
Laura Elomaa,Sandra Da Silva Teixeira,Risto Hakala,Harri Korhonen,Dirk W. Grijpma,Dirk W. Grijpma,Jukka Seppälä +6 more
TL;DR: The photocrosslinkable, biodegradable PCL resin is well suited for the solvent-free fabrication of tissue engineering scaffolds by stereolithography and precisely matched the computer-aided designs, with no observable material shrinkage.
Book ChapterDOI
Cache-Timing Template Attacks
Billy Bob Brumley,Risto Hakala +1 more
TL;DR: It is shown that the combination of vector quantization and hidden Markov model cryptanalysis is a powerful tool for automated analysis of cache-timing data; it can be used to recover critical algorithm state such as key material.
Journal ArticleDOI
Photocrosslinkable Polyesters and Poly(ester anhydride)s for Biomedical Applications
TL;DR: A synthesis route in which functional telechelic aliphatic polyester oligomers are used as precursors for the preparation of crosslinked polyesters and poly(ester anhydride)s is described.
Journal ArticleDOI
Porous biodegradable scaffold: predetermined porosity by dissolution of poly(ester-anhydride) fibers from polyester matrix.
TL;DR: A novel selective leaching method for the porogenization of the biodegradable scaffolds was developed, resulting in the porosity that replicated exactly the single fiber dimensions and the overall arrangement of the fibers.
Book ChapterDOI
Consecutive S-box lookups: a timing attack on SNOW 3G
TL;DR: A cache-timing attack on the SNOW 3G stream cipher is presented, capable of recovering the full cipher state from empirical timing data in a matter of seconds, requiring no known keystream and only observation of a small number of cipher clocks.